1 |
|
|
1-4 |
|
Secure Data Sharing Using KAC
Abstract
Data sharing is an important functionality in database storage. In this project, we show how to securely, efficiently, and flexibly share data with others in database storage. We describe new public-key cryptosystems which produce constant-size ciphertexts such that efficient delegation of decryption rights for any set of ciphertexts are possible. The novelty is that one can aggregate any set of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertexts set in database storage, but the other encrypted files outside the set remain confi- dential. This compact aggregate key can be conveniently sent to others or be stored in a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also describe other application of our schemes. In particular, our schemes give the first public- key corporate-controlled encryption for flexible hierarchy, which was yet to be known.
2 |
|
|
5-11 |
|
FACTORS AFFECTING QUALIFICATIONS GAP FOR NETWORK TECHNICIANS: BAGHDAD UNIVERSITIES CASE STUDY
Abstract
Generally, qualifications for personnel who work in IT field and network operators, in particular, are considered for many purposes, includes: measuring whether a specific employee capable of handling a certain job or not and it can be made as a direction in order to develop human resources. Whereas, the qualifications are different based on the needs of organizations and views. Furthermore, several influence factors for qualifications in the literature revealed have been employed for industry and academic domains such as skill, knowledge, ability, attitude, certification, education, and experience. However, few studies have been investigated the impact of the qualifications gap for the previous elements, especially inside public universities. On the other hand, many studies have determined the values for each of the certification, education, and experience as qualifications for IT personnel. In this paper, conduct a new model to measure the influence for each of Certification Lack (CL), Education Lack (EL1), and Experience Lack (EL2) on the qualifications gap for network technicians inside Baghdad public universities. Data have collected by on-line survey from seventy respondents in order to analyze and test empirically the proposed hypotheses. Education Lack is the highest influenced of qualifications gap followed by Experience Lack, and Certification Lack is the findings of the proposed model.
3 |
|
|
12-18 |
|
VAV Conversion of Metallic Scrapper to Plastic Scrapper
Abstract
In routine life everyday people use metallic scrapper. Now a day in every home or in canteens, scrapper can be seen. These scrapper are made up of metals. This metallic scrapper are used in very large quantity all over the world, but there are some problems with these metallic scrapper like:
1. It can bring rust contact with your food.
2. Cannot hold it easily. (Absence of handles)
3. We have to be careful as there are chances of cuts in your hand.
4. The chances of titanus(tid) increase.
5. High Weight.
6. Sometime metallic content of these scrapper may get mixed with the food.
7. Costly.
So there is requirement of new product to be developed which can overcome with all the above problems. This can be explained in this document. Required changes and modification can be done by Valve Engineeering approach which will convert the needs of customer into design input. DFMA can be used to simplify manufacturing and assembling of the product. The rapid prototyping technique will help to understand the product to the customer. After the selection of product injection moulding tool design study can be done, which will deliver a scrapper as a product which is going to satisfy the needs of the consumers.
4 |
|
|
19-31 |
|
Design and analysis of engine and chassis mounting bracket
Abstract
The objective of this project is to carry out the static analysis of front engine mounting bracket to calculate deformation and stress in the component for different load conditions along x, y, z- direction using numerical analysis. And even to carry out modal analysis of front engine mounting bracket using numerical model to determine natural frequency and different mode shapes. Weight and stiffness optimization of front engine mounting bracket on basis of stress build up in bracket.
It was statically and dynamically analyzed using simulation software Altair Hypermesh and Ansys. Static analysis is to find out the total amount of stress and displacement of engine front engine mounting bracket. Dynamic analysis is to find out the natural frequency of front engine mounting bracket. Optimization is based on Ansys linear static and dynamic modal analysis results, which can be used to enhance the efficiency of design process. Considering the result obtained from optimization, geometric modal was modified and iterated until satisfactory results were achieved. The process is repeated until all specified criteria are met.
The process helps in finding the optimized design for the front engine mounting bracket in which it has the best performance without any failure and with minimum loads acting on the front engine mounting bracket. After implementing optimization, weight of the front engine mounting bracket will be reduced. FEA also be carried out on optimized design of the front and rear engine mounting bracket check whether the optimized design is safe or not. Final results are more optimize than existing design.
5 |
|
|
32-37 |
|
Review on active electrohydraulic thruster for application in emergency brake assist system in automobiles
Abstract
Emergency brake assist system can be explained as a driver is surprised by the car in
front of him braking suddenly. After a momentary shock, he recognizes the situation and applies the
brakes. Perhaps because he has not had to brake in critical situations very often and therefore has no
feel for how hard he must brake, he does not press the pedal with all his might. Consequently, the
greatest possible brake pressure will not be developed in the system and valuable braking distance is
lost. The vehicle may not come to a stop in time. In comparison, let’s look at a car in the same
situation but with a brake assist system. As before, the brakes are not applied with sufficient force.
Based on the speed and force with which the brake pedal is pressed, the brake assist system detects
an emergency. The brake assist system increases the brake pressure until the ABS regulation
intervenes to prevent the wheels from locking. This way the greatest possible braking effect can be
achieved and the brake path can be shortened significantly. To apply this brake force on the wheels
with less effort we use the component electrohydraulic thruster which applies force which is multiple
of the force applied on the brake pedal by the driver in emergency situation. Paper represents the
review on development in braking system using electrohydraulic thruster and it’s testing for various
speeds with respect to brake load, braking distance and deceleration of vehicle also gives review on
design and analysis of active electrohydraulic thruster.
6 |
|
|
38-42 |
|
POTENTIAL SOIL CONSERVATION METHODS AND REVEGETATION OF INDIAN COLD DESERT REGION-LADAKH
Abstract
An arid region is an area characterized by a severe lack of available water, to the extent of hindering or preventing the growth and development of plant and animal life. The cold arid region in Jammu and Kashmir is confined to Ladakh region, geographically located between 320 15’ to 360 north latitude and &750 15’ to 800 15’ east longitude. Due to its high altitude, the climate is extremely cold and dry. On an average soil loss from India land surfaces is 16 t/ha/year. J&K state is only next to Rajasthan in terms of highest percentage of degraded land (18.08%).The strategies for soil conservation must be based on: covering the soil to protect it from raindrop impact; increasing the infiltration capacity of the soil to reduce runoff; improving the aggregate stability of the soil; and increasing surface roughness to reduce the velocity of runoff and wind. Seabuckthorn act as an effective soil binder and helps in sand dune fixation in Nubra valley of Ladakh and has the ability to fix nitrogen directly from air through the nodules in its roots. Juniperus polycarpos at lower altitude and J. indica at higher altitude are ecologically the more suitable species for the successful implementation of conservation programmes. Salix spp. (willows) and Populas spp. (poplars) which give a bushy growth under Ladakh conditions should be vigorously planted.
7 |
|
|
43-50 |
|
DESIGN AND ANALYSIS OF SINGLE STAGE INDUSTRIAL HELICAL GEARBOX CASING
Abstract
This paper contains the study of structural analysis of a single stage industrial Helical gearbox casing using Finite Element Analysis (FEA) Method. Gearbox casing is plays an important role in power transmission system. Thus the strength, weight, manufacturability and cost of gearbox casing are an important factor is to be taken while designing. The 3D model is prepared by using Pro-E creo2.0 pre-processing is prepared by using Hypermesh 11.0 while FEM is solved by using Ansys 14.5 solver. It was statically analyzed using simulation software Altair Hypermesh and Ansys. Static analysis is to find out the total amount of stresses and displacement of gearbox casing and End cover.
8 |
|
|
51-60 |
|
Power Quality Improvement in Grid Connected Hybrid System
Abstract
This paper illustrates the power quality improvement for hybrid systems in microgrids. The inverter control scheme is implemented to maintain unity power factor and power quality at the point of common coupling. Active and reactive power compensation is obtained because of the absence of FACTS devices. This also cancels out harmonic current in the system. When hybrid power generation system integrated to power system it produces major stability and control problems. The influence of the hybrid system in the grid system concerning the power quality measurements are the active power, reactive power, voltage deviation, flicker, harmonics, and electrical behaviour of switching operation and these are measured according to International Electro-Technical Commission (IEC). The proposed ANN Inverter control scheme is used to mitigate the power quality issues for power quality improvement in the grid connected hybrid power generation. This power quality improvement in grid connected hybrid system is simulated using MATLAB/SIMULINK in power system block set.The control scheme has a capability to cancel out the harmonic parts of the load current and maintains the source voltage and current in-phase.
9 |
|
|
61-65 |
|
A Study on the Behaviour of Clay with Egg Shell Powder
Abstract
Nowadays, considerable attention has been paid to the utilization of alternative materials, which bear higher engineering quality than traditional materials and are financially affordable. Soil is one of the most important materials used in a variety of construction projects due to the fact that soils may provide all the resistance characteristics. Clay soils, particularly soft clay soils, have good plastic properties so that increased moisture results in their decreased shear strength, compressive strength and volume changes. These damages typically take an irreparable toll on structures, which further clarifies the importance of soil improvement. In this study, Egg Shell powder is used as the stabilizing agent to combine with soil and the properties of clay soil including liquid and plastic limits as well as plasticity index, dry density, optimum moisture content and shear strength are investigated for its improvement in different mixture proportions such as 5%, 10%, 15%, 20% and 25%.
10 |
|
|
66-77 |
|
Monitoring Health Parameters using Wireless Sensor Networks
Abstract
Wireless Sensor Network technologies have become a latest research area in health care industries due to rapid maturity in improving the quality of life of a patient. Wireless Sensor Networks when work in medical field provide continuous monitoring of vital health parameters which over a long period of time provide doctors much needed help to make accurate diagnosis and giving better treatment. In this paper we propose a model which monitors various health parameters like heart rate (BPM), body temperature, blood pressure monitor (mm Hg) and ECG (Electrocardiogram) of an individual. The collected data through the system is then transferred over the internet to a smartphone application of the patient. This data is transferred to the registered doctors on to their smartphone application. The doctor can then prescribe the medication based on the data results shown by the system. The designed prototype will reduce the burden on patients to visit the doctor every time for monitoring of these health parameters.
11 |
|
|
78-88 |
|
Fault Diagnosis of Power Transformer using Duval Triangle Based Artificial Intelligence Techniques
Abstract
The fault diagnosis of the dissolved gas analysis (DGA) of the power transformer is to be enhanced than previous adopted techniques; this paper proposes a novel adaptive neuro Fuzzy inference system for the incipient fault recognition through enhanced approach. Complying with the practical DGA records and associated fault causes as much as possible, an ANFIS algorithm is presented to establish fault diagnosis system. After 584 groups of training and testing gas-in oil samples, this work compares and analyzes the network training process and diagnostics results of ANFIS with the previous adopted ANN system. The Diagnostics accuracy of the ANFIS is much more accurate than ANN system. The faults are identified for the records using Duval triangle analysis which is more accurate than other Rogers ratio method, IEC codes etc.
Index Terms—Dissolved gas analysis (DGA), fault diagnosis, ANFIS algorithm, power transformers,.
12 |
|
|
89-94 |
|
Enhanced DRX Quick Sleeping Mechanism for Power Aware LTE System
Abstract
Discontinuous Reception (DRX) is one of the mechanisms to reduce User Equipment (UE) power consumption in Long Term Evolution (LTE) systems. The Discontinuous Reception (DRX) mechanism which is widely adopted in LTE to conserve the user equipment (UE)’s battery resources, not only introduces high handover latency but also reduces the downlink scheduler efficiency. A key objective of this work is to design battery power aware scheduling by incorporating the per-UE DRX parameters in downlink scheduling. In this paper, we propose a modified DRX mechanism incorporating the Quick Sleeping Indication (QSI) as a novel, simple and energy efficient solution for low-complexity, low-mobility MTC UEs. The UE power consumption is minimized by reducing the time that a UE spends receiving data. This is achieved by predominantly scheduling a single UE at a time. This allows maximizing the UEs battery lifetime while satisfying the application quality of service (QoS) requirement. In this paper, we propose an enhanced DRX-Aware scheduling Quick sleeping mechanism that can balance the trade-off between application QoS requirements and UE’s power consumption. Based on LTE system level simulation results, the UE power consumption could be significantly reduced while improving the mean delay using the scheduler, comparing to conventional proportional fair scheduler.
13 |
|
|
95-104 |
|
Security Intelligence: Leveraging Big Data Analytics in the Cloud
Abstract
Businesses are constantly increasing their network periphery due to new technologies like cloud computing and amount of security-related data being generated is ever-increasing. Traditional security solutions like firewalls, IDS, SIEMs are not equipped to handle these changes and a need for modern cloud based security solution is felt by enterprises. In the era of Big Data Analytics, organizations have already realized its potential in decision-making. This paper provides fundamental concepts related Big Data and how organizations can leverage Big Data Analytics to make a cost-effective security solution.
14 |
|
|
105-113 |
|
Analysis Of Charge Motion On Inlet Port Of Internal Combustion Engines Using CFD
Abstract
The task to improve the design and manufacture of Internal Combustion Engines (ICEs) is of significant importance to researchers due to its environmental challenges. Therefore, the presentation of Computational Fluid Dynamics (CFD) code to analyze the charge motion on inlet port of ICEs is focused to meet this target. Hence, this study was carried out by modeling the inlet port of ICE with given engine design specification using Solidworks tool. This computer based tool is user friendly, cost effective and can perform modeling/simulation at a shorter duration with analysis of results. Simulated results attest that irregularities and randomness of the flow motion are caused by turbulence. Results also confirm that the intensity of Turbulent Kinetic Energy (TKE) is maximum at the axial position x = 27 mm which represents the highest strength of the turbulence in the flow. Nevertheless, turbulence is recognised as an important factor that affects charge motion of ICEs. Thus, a critical study on how to control turbulence in the design process of ICE equally controls the combustion process hence limiting exhaust gas emission from the engine system. Therefore, the conducted simulation analysis for charge motion in the inlet port of ICEs is considered feasible and reliable.
15 |
|
|
114-121 |
|
Discrete wavelet transform based video query processing system
Abstract
The video which contains enormous amount of data at various levels of terms such as scenes, shots and frames. The frame extraction is principal venture in any of the video applications. It is important to dispose of the frames with monotonous or repetitive information during the extraction. Recently, numerous calculations of key frames extraction concentrated on unique video stream have been proposed. In the video processing system, the database contains videos whose the representative frames are processed to extract DWT features is employed. These feature which are used to index the database. The Video with similar images are to be extracted. The Image Query is processed to extract similar features and is used to match with index using a neural network for similarity processing. The results are satisfactory.
16 |
|
|
122-133 |
|
SECURITY BASED DATA AGGREGATION AGAINST COLLUSION ATTACK IN WIRELESS SENSOR NETWORKS
Abstract
In the presence of collision, secure data aggregation technique for wireless sensor networks, due to limited computational power and energy resources of sensor nodes, aggregation of data from multiple sensor nodes done at the aggregating node is usually accomplished by simple methods such as averaging. In several sensor applications, the data collection will form from the entity nodes be aggregate next to a base station or host computer. The performance of the network aggregation of data sensor at intermediary nodes enrooted towards the base station. For the duration of the process of the collection of the data in network sensor for energy outgoings of the nodes sensor and the communication in the clouds are reduces for the hop-by-hop data aggregation, this aggregation are incredibly vital technique. Iterative filtering algorithms enhanced grand undertake intended for such an intention. In this paper we assume that the aggregator itself is not compromised and concentrate on algorithms which make aggregation secure when the individual sensor nodes might be compromised and might be sending false data to the aggregator. We assume that each data aggregator has enough computational power to run an IF algorithm for data aggregation. First we apply Iterative Filtering algorithm to the Aggregator nodes also to provide more security and assign unique values to all the nodes using SHA algorithm.
17 |
|
|
134-141 |
|
Analysis of Leakage Current and SNM For 7T SRAM Cell in Nanometre Era
Abstract
In the microprocessors world SRAM play a vital role, but as the technology is scaling in nano meter, leakage current and leakage power both are the most known problems for SRAM cells in low power applications. More than 40% of the total power of the SRAM is waste due to the leakage through transistor. This paper compares the working, performance and results of two different SRAM topologies; a conventional 6T SRAM cell and a proposed 7T SRAM cell. Because of the direct paths through bit-line (BL) to their storage node, the conventional 6T SRAM cell suffered from external noise margin. But in the case of 7T SRAM cell there are two separate mechanisms for the data; one is for write the data and another one for read the stored data. Here we examined the difference between the power consumption of both 6T and 7T SRAM cell and also find out which cell works better on low power.
18 |
|
|
142-147 |
|
DSP Based Controller for various Power Electronics Converters used in Micro-Grid
Abstract
Although in recent years renewable energy is the targeted solution for energy crises, it is a friendly solution which is free from pollution. Development of Renewable Energy Sources (RES) arises from the requirement to increase the reliability, continuity of power supply and to reduce greenhouse effect, emission of carbon dioxide etc. However, the main disadvantages of RES are the uncontrollability and limited availability of resources. If these systems are not properly controlled, their connections to the utility can lead to grid instability or even failure. In this paper a control system/controllers based on DSP processors for energy management system of Micro-grid, is proposed. Processors and controllers are used with distributed power generation and power distribution in conjunction with Micro-grid. The referred papers explain the generation of Pulse Width Modulation (PWM) gated pulse signals using the Texas Instrument’s Digital Signal Processor (TI’s DSP) with the help of MATLAB Code/Simulink and Code Composer Studio (CCS). Main components for the switching and regulation of the power sources are DC-DC and AC-DC converters, for this purpose an efficient method is to use of digital controllers to reduce the control system’s size and cost. The conventional three-phase rectifier with bulky LC output filter has been widely used in the industries. By eliminating the bulky LC filter from the conventional diode rectifier without losing most of the advantages of the conventional rectifier, power conversion with high power factor can hence be achieved. The proposed scheme will be verified by MATLAB simulation and the implemented DSP processor will be tested with the buck/boost converter, isolated buck/boost converter model in both current control mode and voltage control mode and 3 phase rectifier to have regulated output for the load and unity power factor at supply side.
19 |
|
|
148-151 |
|
Design Analyze and Implement Wireless Sensor Network Performance
Abstract
Wireless sensor networks (WSN), also known as sensor and actuator networks (WSAN) are spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location. The more modern networks are bi-directional, also enabling control of sensor activity. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance; In today such networks are used in many industrial and consumer applications, such as industrial process monitoring and control, machine health monitoring, etc. These Sensor Nodes communicate with each other through various protocols. The problem of the conventional method is, during gathering of sensed data each node transmits its sensed data directly to the base station for which it will deplete its power quickly. In hierarchical structure higher energy nodes are used to aggregate and send the information whereas low energy nodes are used to sense the data. This is an energy efficient routing protocol which improves network lifetime Example- LEACH, TEEN, A.PTEEN. Among them clustering based hierarchical protocol, proves to be most feasible for energy efficient routing in wireless network. Some of them are LEACH (Low energy adaptive clustering hierarchy) PEGASIS (Power efficient gathering in sensor information system) TEEN (Threshold sensitive energy efficient sensor network protocol) APTEEN (Adaptive threshold sensitive energy efficient sensor network protocol).
20 |
|
|
152-157 |
|
Structural and Electrical Studies on Blend Based Polymer Gel Electrolytes for Battery Applications
Abstract
In the present study an attempt has been made to cast a stable free standing PVA: PVP blend based polymer gel electrolyte film using ammonium acetate salt (CH3COONH4) and characterize them for application in solid state batteries. Formation of blend as well as composite polymer electrolyte is confirmed by XRD studies. Ionic conductivity of PVA: PVP blend based polymer gel electrolyte, namely, PVA: PVP: CH3COONH4 is seen to improve by an order of magnitude at room temperature with an optimum 1.34×10-3 S/cm for 0.4 mole ammonium acetate concentration. I-t measurement (tion~0.9) establish dominance of ionic charge transport in synthesized electrolytes. Combination of Arrhenious and VTF behavior is reflected during temperature dependent conductivity analysis. Jonscher Power law seems to be obeyed according to ac conductivity measurement.
21 |
|
|
158-162 |
|
Review on Overload Torque Limiter with Electromechanical Clutch for Timer Belt Spindle Drive – Review on Overload Torque Limiter with Electromechanical Clutch for Timer Belt Spindle Drive
Abstract
Clutches are used to transmit power between two coincident shafts. The positive engagement between the clutch elements ensures 100% torque transmission. But occasionally the output shaft may the subjected to a sudden overload which may make the driving motor or engine to stop, which will lead to burnout of the electric motor. In extreme cases this overload will lead to the breakage of drive elements or the clutch itself. In order to avoid the damage of the transmission elements it is necessary that the input and output shafts be disconnected in case of sudden overloads. Torque-limiters are overload safety devices which provide reliable overload protection. When a jam-up or excessive loading occurs the torque limiter will reliably and quickly disengage to prevent the system damage. The clutch transmission elements i.e. the balls will not come out of assembly when there is overload slipping. This will be an advantage as the clutch can be preset without removing it from assembly and will save considerable amount of downtime of process as compared to the conventional clutch. If temporary overload occurs the clutch will slip and remain disengaged only till the overload is removed thus if the overload is removed while in running condition the clutch shall automatically engage and start transmitting power. This leads to minimize process down time saving a considerable amount of man and machine hours wasted due to breakage or presetting as in conventional clutches.
22 |
|
|
163-167 |
|
Review on Cone Mixer with Sinusoidal Convex Blade System,Design, Development and Testing of Cone Mixer with Sinusoidal Convex Blade System.
Abstract
Conventional mixers are widely used in manufacturing Industries. As the stirrer of conventional mixer rotates in one direction only it creates a particular flow pattern in fluid. So that particles of mixture tend to stick to the wall of container due to centrifugal force. Therefore it results into poor quality mixture of paint and hence quality of the paint. Overall it effects on mixing time and cost of the mixing operation.
This research paper represents the design development and testing of cone mixer. Here in cone mixer we have developed two sets of sinusoidal blade which creates the special flow pattern. So there will be small amount of resultant fluid forces acting on Blades and Shaft and hence the uniform mixture.
The analytically obtained results are verified with finite element analysis results. The test and trial is taken on the cone mixer for fifteen litters paint batch and various parameters such as viscosity (centistokes), spread-ability (mm) of paint, cycle time and productivity of mixer are checked.
23 |
|
|
168-179 |
|
GEOLOGY AND GEOTOURISM POTENTIAL OF KWA FALL, AKAMKPA, SOUTH EASTERN NIGERIA
Abstract
The Kwa fall is an exotic, fascinating, glittery natural waterfall whose water continuously falls freely from the upper course of the Kwa river and flows through the exposures of hard resistive schist. The schist of the Kwa fall is highly jointed with a foliation trend in NE-SW direction. A deep pool of cool water collects at the bottom of the waterfall. These pools are protected from direct sunlight by canopies of the tropical rainforest trees and serve as a cool water bath in hot afternoons. A proper development of the Kwa fall, a geotourist attraction with an excellent geotourism potential, will not only preserved the amazing geology, geography and culture of the inhabitants of the Kwa fall and its environs but will also enhance the economic fortunes of Cross River State. Geotourism is currently a growing field around the world but not much has been done in this part of the world to join the global trend. A field based study approach was adopted for this research which attempts to analyze the characteristics and challenges of the geotourism potential of the Kwa fall with a view to improving the benefits that could be associated with it.
24 |
|
|
180-185 |
|
Modification of Passivation Unit In Continuous Galvanizing Line
Abstract
Galvanizing is the process of giving a protective zinc coating to steel or iron, to avoid rusting. The most common method is hot-dip galvanizing, in which steel in coil form is dipped in a bath of molten zinc. Galvanizing protects in two ways:-It generates a coating of corrosion-resistant zinc which prevents corrosive substances from reaching the more delicate part of the metal and increase the life of steel. The zinc serves as protecting layer so that even if the coating is removed by scratching, the exposed steel will still be protected by the remaining zinc coating
25 |
|
|
186-190 |
|
Performance Visualization of Bubble Sort in Worst Case Using R Programming in Personal Computer
Abstract
The present work attempts to perform a visual analysis of the performance of Bubble sort in the worst case in a personal computer (laptop). The said algorithm is implemented using R programming language and the run time of the Bubble sort in the worst case for the data size under study have been recorded. For the purpose of the study, 100 observations for each data size are recorded. For each data size, the researchers have calculated four measures namely minimum time, maximum time, average time and median time. These four measures are visualized using scatter plots and line charts and they are also visually compared with quadratic curves. It has been observed that the performances of Bubble sort in all the four cases are approximately similar and approximately follows the quadratic curves.
26 |
|
|
191-199 |
|
Multimedia Information Retrieval- A Review
Abstract
Traditionally, the database is of text and numerical data only, which is having less attention nowadays because of the massive amount of multimedia content. In the multimedia and storage technology, the preceding two decades have resulted in a substantial progress that has led to building of a large repository of digital image, video, and audio data. Currently, the information retrieval from the multimedia content is having a great attention. For exploring through the myriad variety of media all over the world Content-based multimedia information retrieval provides paradigms and methods. In this paper, an extensive review on Multimedia content based retrieval is presented together with the classification by means of the multimedia content either it may be an image or audio or video. In addition, a concise description about multimedia content retrieval is presented. Further more, a brief description on image, audio and video retrieval is presented.
27 |
|
|
200-211 |
|
An Introduction to Relativistic Cosmology: A Simple Relativity Theory of Everything
Abstract
Simple relativity theory of everything (RTE) postulates that all physical measurement of velocity, time, space, energy, and density are relative and depend on the relative motion between the observer and the object observed. The theory diverges from Einstein’s relativity in that it applies the relativity principle to all matter, including light photons. For the simple case of constant relativite motion, the theory yields novel time, distance, energy, and density transformations, and constructs a new model of the universe spacetime. The cosmology describes a universe where the material world is static and the luminous world expanding. This cosmology makes it possible to reconcile the static universe of Einstein with observations of the expanding universe. The theoretical results obtained reveal that RTE is compatible with quantum theory and Big Bang theories. For the case of very low velocities; the transformations obtained yield Newton’s laws of motion and energy. The theory generates plausible definitions of dark matter and dark energy and uses them to make a fairly good prediction of the content of the universe. In addition, it makes remarkably good predictions concerning several important phenomena, including prediction of the accelerating expansion of the universe, a remarkably good estimate of the Hubble constant and of the content of the universe.
28 |
|
|
212-221 |
|
How Efficient an Electronic Voting Machine (EVM) should be? Answer From the Dominion Voting Systems Corporation
Abstract
The efficiency of an EVM depends on its some characteristics such as simplicity to use, low cost and less time to complete voting process, reducing the risk of mechanical error etc. Moreover, the system should be modern, dependable and international standardize. Since voting is done through a computer or a device, ballot appearance can also be modified to fit the needs of the voter. For example, a voter with poor eyesight could use a ballot format with larger text. In this paper, we briefly analyze the efficiency of EVM products of Dominion Voting Systems Corporation – which leads user to choose EVM very easily and quickly for their election purpose to achieve the goal.
29 |
|
|
222-228 |
|
Implementation of Web Image Re-ranking using Hypersphere based Relevance Preserving Projection
Abstract
Text based search techniques for image retrieval has achieved limited success because such a techniques generally ignores the visual contents of image. Image search re-ranking reorders the initial text only search to improve the result and this has received increasing attention in the recent years. But these techniques faces problems as initial search results contains noticeable amount of noise which makes re-ranking process difficult. The purpose of this paper is to classify the methods used for re-ranking process and we also discuss promising technique designed for image re-ranking which preserves the relevance in result.
30 |
|
|
229-234 |
|
AN APPROACH TO HIDE DATA IN ENCRYPTED COMPRESSED VIDEO BITSTREAM
Abstract
Digital video sometimes needs to be stored and processed in an encrypted format to maintain security and privacy. Data hiding approach is necessary to perform in these encrypted videos for the purpose of content notation and tampering detection. In this way, data hiding in encrypted domain without decryption preserves the confidentiality of the content. In addition, it is more efficient without decryption followed by data hiding and re-encryption. Here, data hiding directly in the encrypted version of H.264/AVC video stream is approached, which includes the following three parts, i.e., H.264/AVC video encryption, data embedding, and data extraction. By analyzing the property of H.264/AVC codec, the code words of intra prediction modes, the code words of motion vector differences, and the code words of residual coefficients are encrypted with stream ciphers. Then, a data hider may embed additional data in the encrypted domain by using bits replacement technique, without knowing the original video content. Chaos crypto system is used here to encrypt/decrypt secret text data before/after data embedding/extraction. In order to adapt different application scenarios, data extraction is done either in the encrypted domain or in the decrypted domain.
31 |
|
|
235-240 |
|
AN EMPIRICAL APPROACH ON CENTRALIZED LOGGING
Abstract
As we know logs are the one of the most important part of any forensics investigation. With time as the demand of new technology is increasing, maintaining logs at one particular location is getting difficult. This paper mainly focuses upon how the way to centralized logging as changed with time due to rapid development of new technologies like Cloud Computing, Dockerization1 etc. Also we will try to propose a small model using the concept of ‘Rsyslog’ for fast log processing at centralized location.