1 |
|
|
1-3 |
|
AUTOMATIC DRIP IRRIGATION SYSTEM USING SOLAR POWER
Abstract
In the field of agriculture, use of proper method of irrigation is important because the main reason is the lack of rains & scarcity of land reservoir water. Another very important reason of this is due to unplanned use of water due to which a significant amount of water goes waste. For this purpose; we use this automatic plant irrigation system. In this project we use solar energy which is used to operate the irrigation pump. This project is designed to water plants regularly. The circuit comprises of sensor parts built using op-amp IC LM358. Op-amp’s are configured here as a comparator. Two stiff copper wires are inserted in the soil to sense whether the soil is wet or dry.
2 |
|
|
4-10 |
|
Importance of Relay Node Set Framework for MANET Communication Environment
Abstract
MANET technology is growing in every day life so many protocols and tools has been developed for the improvement of MANET protocols efficiency , when author analysis past research of MANET network they found a need to more improve and update the traditional MANET routing protocols , Routing protocols are very important activity of MANET network with efficient routing it is not possible to resolve the complexity scenario of MANET structure , it true for the point of view of network administrator that when some one gets route then network get depend on some intermediate router for routing purpose, therefore it is the demand of this new infrastructure network to resolve the issues of MANET routing by having some extra ordinary framework to proceed MANET processes efficiently is call Frame Relay Model by the author of this paper to renew the procedure followed by the traditional protocols of the MANET network.
As the author of the research paper has been going through the various proposed research module in near days they find that “MANET has been getting struggle with few common issues of network like, at central point of communication it face so many performance related issues to that degrades overall network performance down on the other hand we can also have the theoretical measurement to establish the new development ” which is the main objective of this research paper to explorer the new research area regarding to overcome from the errors.
3 |
|
|
11-16 |
|
Performance Analysis of Mixed Flow Pump impeller using CFD
Abstract
Centrifugal pumps are probably among the most often used machinery in industrial facilities as well as in common life. After being invented they passed long evolutionary development until they became accessible for various applications. Centrifugal pump design is well facilitated by the use of Computational Fluid Dynamics (CFD). But still some problems are arising to improve the pump performance. This improvement can be achieved by making geometrical changes in design of an impeller. In this study, different techniques for improving centrifugal pump performance by changing impeller geometry are discussed.
4 |
|
|
17-21 |
|
ARDUINO BASED UNDERGROUND CABLE FAULT DETECTOR
Abstract
The project is intended to detect the location of fault in underground cable lines from the base station to exact location in kilometers using an Arduino micro controller kit. In the urban areas, the electrical cable runs in undergrounds instead of overhead lines. Whenever the fault occurs in underground cable it is difficult to detect the exact location of the fault for process of repairing that particular cable. The proposed system finds the exact location of the fault. This system uses an Arduino micro controller kit and a rectified power supply. Here the current sensing circuits made with a combination of resistors are interfaced to Arduino micro controller kit to help of the internal ADC device for providing digital data to the microcontroller representing the cable length in kilometers. The fault creation is made by the set of switches. The relays are controlled by the relay driver. A 16x2 LCD display connected to the microcontroller to display the information. In case of short circuit the voltage across series resistors changes accordingly, which is then fed to an ADC to develop precise digital data to a programmed Arduino micro controller kit that further displays exact fault location from base station in kilometers. The project future can be implemented by using capacitor in an AC circuit to measure the impedance which can even locate the open circuited cable.Whenever a fault occurs in a cable the buzzer produce the alarm to alert and to take an immediate action by field workers
5 |
|
|
22-26 |
|
DISTRIBUTION LINE FAULT DETECTION AND INTIMATION USING GSM
Abstract
This project is locating fault in a power distribution line is a complicated and severe problem in power system. This is designed with micro controller, GSM mobile, Driver circuit, control circuit interfaced with GSM modem. It is useful for remote monitoring and control of multiple stand-alone distribution transformers plants. In normal conditions, the system records and periodically reports the overall performances, whereas, in case of incorrect behaviours , it immediately informs the operators. Moreover, through appropriate instructions, users are able to modify some elements of the plant and the settings of the measurement system . In order to adapt the system to the specific operative conditions, several means of communications and plant configurations. The work described is a development of Microcontroller-based Protection of Electric Distribution system for the purpose of effective monitoring and sending information of distribution system. However, for a more general, flexible and cost-effective implementation, the remote communications are based on a powerful GSM networking is designed when the voltage through the line falls below a programmed voltage, an immediate indication is provided by the microcontroller through the GSM modem. The interfaced GSM modem will receive the signal and to send data from Distribution side to the substation and to the line patrol staffs as a message.
6 |
|
|
27-30 |
|
POWER FACTOR CORRECTED ZETA CONVERTER BASED IMPROVED POWER QUALITY SWITCHED MODE POWER SUPPLY
Abstract
Power Factor, the ratio between the real or average power and the apparent power forms a very essential parameter in power system. It is indicative of how effectively the real power of the system has been utilized. With rapid development in power semiconductor devices, the usage of power electronic systems has expanded to new and wide application range that include residential, commercial, aerospace and many others. Power electronic interfaces e.g. switch mode power supplies (SMPS) have proved to be superior over traditional linear power supplies. The current drawn by the SMPSs from the line is distorted resulting in a high Total Harmonic Distortion (THD) and Low Power Factor (PF).Hence, there is a continuous need for power factor improvement and reduction of line current harmonics. Development of new circuit topologies and control strategies for Power Factor Correction (PFC) and harmonic reduction has become still more essential with the introduction of strong technical IEC standards. The work initially involves simulation of basic power electronic circuits and the analysis of the current and voltage waveforms. It starts with simple circuits with a gradual increase in complexity by inclusion of new components and their subsequent effect on the current and voltage waveforms. We focus on the objective of improving the input current waveform i.e. making it sinusoidal by tuning the circuits.
7 |
|
|
31-36 |
|
Design and Implementation of Autonomous Lawn Mower
Abstract
The present technology commonly used for trimming the grass is by using the manually handle device. In this paper we have automated the machine for trimming the grass. The device consists of linear blade which is operated with the help of the motor the power supply for the motor is by using battery. The battery can be charge by using power supply and solar panel. In case of any obstacles in the path it is sensed by using ultrasonic sensor. If there is any variation then the device using free direction sensor and find the new path to travel. The above feature is enabled so that the damage to the hardware of the device is avoided. In future the automation of the device will play a vital role in world wide. This project is an autonomous lawn mower that will allow the user to the ability to cut their grass with minimal effort. Unlike other robotic lawn mowers on the market, this design requires no perimeter wires to maintain the robot within the lawn. Through an array of sensors, this robot will not only stay on the lawn, it will avoid and detect objects and humans. This design is still in the prototype stage due to financial and time constraints. Documentation includes all major design aspects.
8 |
|
|
37-42 |
|
Safety system for Fishing boats to prevent from International Border Crossing
Abstract
This system provides safety to fisherman and prevents them from crossing international border. A Geo fencing concept has been used in this system to identify the Indian sea border. Nowadays many fisherman and people traveling in sea are punished by other country due to crossing border. This is happening because they don’t know the border limit while sailing. This project is designed to help those people. The major application of this system are to give an intimation to the fisherman that they are heading border nearly, to send emergency message to the control room or Coast Guard if any natural disasters or any other issues and to track missed boat’s location using GPS. The fencing area is defined by using latitude and longitude values of border line. The GPS receiver continuously receives signal from satellite to obtain the boat location when the boat enters the danger zone. The GSM modem sends signal to the server which is operated by Coast Guard and the boat can be controlled and tracked by Coast Guard.
9 |
|
|
43-47 |
|
analysis of link efficiency and handoff with mobility management in cognitive radio
Abstract
Cognitive radio cellular network has been proposed as a solution to spectrum scarcity and spectrum inefficiency problems. However, they face challenges based on the opportunistic communication of secondary user, making it more difficult to support seamless communications especially when user moves out of the serving cell. In this paper, a novel architecture is constructed to aggravate spectrum availability. Based on this architecture, a management framework is developed to support mobility events which consist of user spectrum mobility management and user mobility management. Spectrum mobility management defines spectrum band for opportunistically communication secondary users. User mobility management defines selection of handoff so as to banish call dropping by considering an extended area QoS analysis is performed based on blocking probability, dropping probability, failure probability. Simulation results show that proposed system achieves better performance in terms of mobility support in CR cellular communication.
10 |
|
|
48-59 |
|
A Performance Model for the Measurement of Web Service Framework
Abstract
Web services are the main implementation technology of the service oriented architecture (SOA). Web services exchange SOAP XML messages, thus they provide a true platform and language independent distributed communication. SOAP XML messages burden the communication with a significant serialization and deserialization overhead which can even be comparable with the execution time of the service’s application logic itself. Web services are built on XML.It use XML for describing the service interface, message exchange and the WS- protocols that provide addressing, security and reliable messaging. When the interface of a web service is being designed, it is important to find the right granularity for the parameters, i.e., the most reusable interface with the best response times. To determine the best response times, it is essential to have the capability to predict the estimated response time based on the interface and on its expected usage of the service. This problem inspired us to examine the response time overhead of the various frameworks implementing the web service stack, and to give a performance model equipped with performance prediction capability for web services. I proposed a performance model with which the response time overhead of web services with arbitrary interfaces can be predicted if the coefficients of the model are calculated from some simple measurements for the given set of test cases. It shows the measurement results for two web service frameworks and also gives a detailed description of the performance model.
11 |
|
|
60-69 |
|
DYNAMATE : Automatic Checking loop invariants using Mutation, Dynamic Analysis and static checking
Abstract
Automatic program verification, proving program correct still requires substantial expert manual effort. One of the biggest burden is providing loop invariants properties that hold for every iteration of a loop. Compared to other requirement elements such as pre -and post conditions, loop invariants tend to be difficult to understand and to express. The proposed system automates the functional verification of incomplete correctness of programs with loops by inferring the required loop invariants. In this approach it combines complementary techniques such as test case generation, dynamic invariant detection, and static verification. This approach can be implemented by a tool called DYNAMATE. DYNAMATE improves the flexibility of loop invariant inference by combining static (proving) and dynamic (testing) techniques. The DYNAMATE tool presented in this process combines different techniques with the overall goal of providing fully automatic verification of programs with loops
12 |
|
|
70-77 |
|
Analysis of Power Dissipation and Delay in 6T and 8T SRAM Using Tanner Tool
Abstract
Due to growth of technology scaling, at low-voltage operation, Static Random Access memory (SRAM) bit-cells suffer from large failure rate and power consumption is also more in scaling technology, In this paper we work on CMOS SRAM, To decrease the power dissipation during the Write operation because the write operation consumes more power. The charging of bit lines and discharging of bit lines dissipate more power during write “1” and write “0” operation. 8T SRAM cell includes two more transistors (NMOS) for appropriate charging and discharging the bit lines. The results of 8T SRAM cell are taken on different frequencies at power supply of 1.5 Volt. In the circuit we use the 130 nm technology, and the supply voltage of 1.5 Volt. Finally the results are compared with Conventional 6T SRAM. The power dissipated in low power 8T (transistors) SRAM cell is reduced in comparison to conventional 6T SRAM cell.
13 |
|
|
78-81 |
|
Intelligent Collision Preventive System using Arduino Microcontroller
Abstract
- Vehicle technology has increased rapidly in recent years, particularly in relation to braking systems and sensing systems. The widespread introduction of anti-lock braking has provided the building blocks for a wide variety of braking control systems. In parallel to the development of braking technologies, sensors have been developed that are capable of detecting physical obstacles, other vehicles or pedestrian around the vehicle. A method of preventing an accident using a technology is called ultrasonic. This project focuses on building a user-friendly device that specializes in detecting intrusions besides doing close range obstacle detection. Automobile safety can be improved by anticipating a crash before it occurs and thereby providing additional time to deploy safety technologies. Warnings can be like buzzer if the driver is approaching a pothole or any obstruction, driver may be warned in advanced regarding what the road entails. The project’s ultimate aim thus finalized as, one to build a general, easy-to-use and versatile system that can prevent fatal accidents
14 |
|
|
82-87 |
|
HIGH PERFORMANCE Z SOURCE 3 PHASE INVERTER BASED MOTER DRIVE
Abstract
Z – source inverters have been recently proposed as an alternative power conversion concept as they have both voltage buck and Boost capabilities. These inverters use a unique impedance network, coupled between the power source and converter circuit, to provide both voltage buck and boost properties, which cannot be achieved with conventional voltage source and current source inverters. This paper deals with sensor less control of Z-source inverter under direct torque control to get an instantaneous torque control. Sliding mode observer is a parameter for estimating the phase to phase trapezoidal back-EMF in sensor less mode. Z-source inverter is used to boost up the voltage.
15 |
INTELLIGENT SERVICE ROBOT
Author(s):
SATHYA S N , SHIBIA J , RUTHRA KUMAR V , PRIYADHARSHINI S , KEERTHANA V A , ABIYANA DEVI D.
|
|
88-94 |
|
INTELLIGENT SERVICE ROBOT
Abstract
Recently, there has been an need to improve the use of robotics in medical fields , to enhance the patient care. Though there are more advancements in technology still the patients informations are in paper form . This can lead to errors in obtaining informations and also leads to misdiagnosis. So this project is mainly used for viewing patients details , food habits, prescriptions. For better improvement , robot is being used. This is very interactive with the patient and doctors for providing the information. The technology of Voice Recognition is used in this project for the interaction. The informations feeded to the robot can be obtained by the doctor. As it locomotive there would be no risk for the physically challenged people. The robot is also designed to indicate the patients to consume medicines, food at the respective times. It can also kept as a home nurse for the regular monitoring of the disabled people.
16 |
|
|
95-100 |
|
AN EFFICIENT VIDEO WATERMARKING SCHEME FOR CONCEALING DATA RECORDS USING LABVIEW
Abstract
This paper proposes a watermarking algorithm for hiding the data securely over the public network. A watermark is embedded into YCBCR (Y-Luminance, CB-Chrominance Blue, and CR-Chrominance Red) colour channels of each video frame using Discrete Wavelet Transform with Principle Component Analysis. The process of digital watermarking involves the modification of the original multimedia data to embed a watermark containing a key information such as authentication copyright codes. The embedding method must leaving the original data perceptually unchanged, yet should expose modification which can be detected by using an appropriate extraction algorithm. This method is implemented using LabVIEW.
Keywords: Video Watermarking, Defence Data Records, Principle Component Analysis, DWT.
17 |
|
|
101-107 |
|
DC Electric Spring for Microgrids
Abstract
Abstract: A lot of emphasis is being made on integrating renewable energy sources like solar energy, wind energy into DC distributed power system and DC micro grids. When large proportion of power is being generated from renewable energy sources, there will be power quality and grid stability issues. This paper presents an electric active suspension technology known as the DC electric springs for stabilizing and improving the quality of the power distributions in DC microgrids. DC electric spring can be used for (i) regulating the DC bus voltage within the required limits while enduring the fluctuations of intermittent energy sources or deep voltage sags of power faults and (ii) performing load boosting and shedding functions to match the power consumption of the DC loads to the renewable power generation connected to the DC grids. Simulations results show that the above conditions can be achieved in the DC microgrids and the quality issues can also be mitigated using the proposed DC electric spring technology.
18 |
|
|
108-117 |
|
Security in DOA routing protocol for Mobile Adhoc Networks
Abstract
One of the most important requirements to establish communication among nodes in MANET (Mobile Adhoc Network) is cooperation of nodes among each other. In the presence of malicious nodes, this requirement may lead to serious security issues. In some cases such nodes may even disrupt the routing process. Hence preventing or detecting malicious nodes causing gray hole or collaborative black hole attacks is a challenge. Our paper attempts to solve this issue by implementing security using the Cooperative Bait Detection Scheme (CBDS) in DOA (DSR over AODV routing mechanism. This work integrates the merits of both proactive and reactive type of MANET routing protocols. DOA (DSR over AODV) is a hierarchical routing protocol developed from the combination of DSR and AODV routing protocols. It is used in environments where overcoming the routing issues that occur in MANETs due to increase in network size is necessary. Our CBDS method adopts a reverse tracing technique to help in achieving the expected solution.
19 |
|
|
118-126 |
|
THE TORQUE AND FLUX RIPPLE MINIMIZATIOIN USING SVM-DTC METHOD
Abstract
This paper presents a simulation of Direct Torque control (DTC) Method of Induction Motor using Space Vector Modulation (SVM) technique. Direct Torque Control is the control strategy used for high performance torque control of Induction Motor. DTC scheme of Induction Motor presents in this paper, which features in low torque ripple and low flux ripple by means of Space Vector Modulation (SVM). The performance is explained using simulation in MATLAB environment. Results of the simulation show improvements in flux and torque.
20 |
|
|
127-131 |
|
SPEED CONTROL OF THREE PHASE INDUCTION MOTOR BY USING MULTIPHASE DC CONVERTER AND FOUR SWITCH INVERTER
Abstract
The four-switch three-phase (B4) inverter, having a lower number of switches, was first presented for the possibility of reducing the inverter cost, and it became very attractive as it can be utilized in fault-tolerant control to solve the open/short-circuit fault of the six-switch three-phase (B6) inverter. However, the balance among the phase currents collapses due to the fluctuation of the two dc-link capacitor voltages; therefore, its application is limited. This paper proposes a predictive torque control (PTC) scheme for the B4 inverter-fed Induction Motor (IM) with the dc-link voltage offset suppression. The voltage vectors of the B4 inverter under the fluctuation of the two dc-link capacitor voltages are derived for precise prediction and control of the torque and stator flux. The three-phase currents are forced to stay balance by directly controlling the stator flux. The voltage offset of the two dc-link capacitors is modeled and controlled in the predictive point of view. In this proposed system the genetic algorithm is used for speed loop.
Keywords: Multiphase DC converter,Four-switch three-phase inverter, Arduino microcontroller.
21 |
|
|
132-136 |
|
DYNAMIC CHANGE OVER OF HYBRID CHARGING FOR EXISTING UPS
Abstract
This system is a system which is used to charge the battery with the maximum utilization of solar energy. This system consists of two relays. It is used for the switching modes of charging a battery. The voltage obtained from the solar panel is being sensed by the voltage sensor. Here the voltage should be within a certain limit. If the voltage is between (10-14V), then both the relays will be operating, besides the battery will charge through the solar energy. This mode is said to be solar mode. In other case, if the voltage from the solar panel is below 10V, the charge of the battery will be switched to EB mode. The voltage from the solar panel and different mode of the battery are displayed through the LCD display. When the EB mains are turned off, the voltage from the battery is discharged through this system. This project aims to make a simple solar charge controller which can be connected to the existing UPS and can act as a smart UPS. Solar panels will not supply the regulated voltage for charging the battery. Hence, an external charge controller is used to have the desired constant voltage. Development of this project as a product can eliminate the cost of the hybrid inverter.
22 |
|
|
137-141 |
|
A NEW SINGLE STAGE THREE LEVEL ISOLATED PFC CONVERTER
Abstract
Majority of electronic appliances used today is operated only through dc power supplies and this requires ac-dc conversion. For such ac-dc conversion, the research focuses on single stage multi-level topologies because of their low cost. This paper proposes a new single stage three level ac/dc PFC converters for low power applications such as SMPS, laptop adapters, smart TV power supply systems, etc., With this proposed converter, the input current shaping and output voltage regulation can be achieved with the help of microcontroller based soft switching technique and it does not require any additional switches. Through this soft switching technique, the inverter switches are turned on under zero current and zero voltage in discontinuous conduction mode operation. Due to the flexible dc-link voltage, high power factor can be achieved with regulated dc output. A 300W/110V prototype is designed and developed for the proof of concept, which shows the power factor is in the range of 0.96 to 0.99.
23 |
Remote Droid
Author(s):
Uma Goradia , Ankita Singh , Roshni Dubey , Suchita Dhuri.
|
|
142-149 |
|
Remote Droid
Abstract
Wireless Droid is an Android application which enables users to usetheir Android mobile device act like a real joystick.It provides a solution to establish a wireless connection between Android mobile device and servercomputer.Whenever the server receives correct message, the server will simulatea virtual joystick input signal.The objective of this thesis project is to develop a smart phone joystick which enables people to use a smart phone application to do the joystick job. Differentwith real joystick, it is wireless. All functions expected arecarried out and performed perfectly. It can send messages from mobiledevices to target server and simulate joystick input correctly without any delay.All of the objectives are achieved.
24 |
|
|
150-152 |
|
SOLAR POWERED AUTOMATIC COW DUNG COLLECTING CUM CLEANING SYSTEM
Abstract
In today`s scenario farmers are having hard time in maintaining the cow shed to clean the cow dung they have to spend more time or they have to hire workers for more money. So in this paper we suggest a mechanism which is used to collect the cow dung and also used to clean the area. We use cow dung cleaning machine which runs under the power generated by solar. By using this process automatically human power will be saved.
25 |
|
|
153-158 |
|
A Review on role of mathematical morphology in digital image processing
Abstract
The geometric structures of images and signals can be systematically analyzed by using mathematical morphology. Mathematical morphology provides very useful tools and techniques for analysis of digital images. Image Operations like reduction, enlargement, rotation, color corrections, quantization or image differencing are geometric transformations. The basic assumption in image morphology is that image contains geometric structures that can be handled by set operators. Mathematical morphology can be used in many areas like noise elimination, feature extraction, edge detection and image segmentation. In this paper role of mathematical morphology in digital image processing will be described.
26 |
|
|
159-164 |
|
Constructing structures using eco-bricks
Abstract
Disposal of non-bio-degradable substances has become an issue of major concern now a day, mounds of garbage has been created over the earth surface. In order to deal with this problem a new concept of eco bricks also known as bottle bricks is trending. Eco bricks are a new class of building material which is made up of plastic bottles are filled with plastic wastes, sometimes with soil and can be further use for construction purpose. [1] These are energy and resource efficient bricks and can be used to make garden spaces partition walls and full scale buildings such as schools and houses. Use of these bricks reduces the construction cost as well as reduction of the land pollution. This paper intends to investigate plastic bottles as a construction material. It also mentions the manufacturing as well as other properties of eco bricks .At the end different factors such as cost efficiency and reduction of pollution due to use of these bricks is also concluded.
27 |
|
|
165-171 |
|
A Survey on Wireless Sensor Network Security
Abstract
This paper presents a brief overview on WSN (wireless sensor network) network architecture and also it presents a detailed discussion on various security goals related to sensor nodes in WSN network such as Data confidentiality, Data integrity, Availability, Authentication, Data freshness, Time Synchronization etc. Numbers of hazardous attacks that can occur in a WSN network are presented in this paper for which solutions can be designed in order to improve the services of such networks. Such malicious attacks are as follows: Spoofed, altered, or replayed information, Selective forwarding, Sinkhole attack, Sybil Attack, HELLO flood attack, Wormholes Attack.
28 |
|
|
172-174 |
|
Smart Vehicle Theft Control
Abstract
one of the issues faced now-a-days is vehicle theft. As increasing vehicle theft, the ideas for vehicle security is also improving. Using new technology the manufacturers are trying hard for securing vehicles manufactured by them. The proposed system has the advantage of controlling the vehicle even if the vehicle has been theft. Using the smart device the vehicle can be prevented from theft and if theft the intruder can be easily trapped with real time communication of the vehicle with sms alerts, tracking of vehicle on Google maps, fuel cut-off, and engine control. The user can lodge an online complaint with the nearest police station with the range of 5kms radius which can be automatically detected by the system and user will get an acknowledgement on the complaint. Using the alarm system vehicle can be alerted in the crowded area by knowing through gps.
29 |
|
|
175-182 |
|
VHDL implementation of a direct digital synthesizer for various applications
Abstract
A frequency synthesizer is an electronic device which generates a range of frequency mostly sine wave from a fixed clock provided. These frequency synthesizers are commonly found in radio receivers, mobile telephones radio telephones, wacky talkies, as local oscillators, satellite receivers, GPS system. Direct digital synthesizer (DDS) is a frequency synthesizer which digitally creates arbitrary wave forms of different frequencies from the fixed frequency provided as clock input. DDS generates digital wave forms and these digital waveforms are converted to analog signals by the digital to analog converter connected at the output of DDS. The DDS designed here is a ROM based DDS. DDS has many advantages over PLL and other similar approaches such as fast settling time, sub-hertz frequency resolution, continuous phase switching response and low phase noise. This system has many applications such as the confidential message transfer, speedy frequency switching.
30 |
|
|
183-189 |
|
MYSTERIES DARK ENERGY AND UNIVERSE
Abstract
The nature of dark energy is one of the most important unsolved problems in all of science. Step backs a minute and considers a more familiar experience: what happens when you toss a ball straight up into the air? It gradually slows down as gravity tugs on it, finally stopping in mid-air and falling back to the ground. Of course, if you threw the ball hard enough (about 25,000 miles per hour) it would actually escape from the Earth entirely and shoot into space, never to return. But even in that case, gravity would continue to pull feebly on the ball, slowing its speed as it escaped the clutches of the Earth. But now imagine something completely different. Suppose that you tossed a ball into the air, and instead of being attracted back to the ground, the ball was repelled by the Earth and blasted faster and faster into the sky. This would be an astonishing event, but it's exactly what astronomers have observed happening to the entire universe. In this paper we are going to discuss the dark energy and universe.
31 |
|
|
190-194 |
|
An Advanced Analysis on Grid Computing Security Threats
Abstract
Abstract— Grid computing is a distributed computing and storage infrastructure which provides high end computing or supercomputing capability by sharing the resources of computers over the network. To achieve grid computing, development of secure and friendly environment is required. Even being a trustworthy computing environment there are number of threats a grid has to face. A grid can face security hazards due to defenselessness, security compromises, getting hit directly by hackers, security breaches and many more. This paper analyzes the complete analysis of various threats to grid and the possible solutions of it.
32 |
|
|
195-200 |
|
A Study On Image Segmentation Techniques
Abstract
Image segmentation is very important step of image analysis which is used to partitioned image into several homogenous regions by classifying pixels of whole image into different regions that exhibit similar characters. The result of image segmentation is a set of sections that together cover the whole image. This paper has presented a review on various image segmentations techniques like thresholding, region based, clustering, and genetic algorithm based segmentation.
33 |
|
|
201-206 |
|
A Review on Efficacy of Artificial Neural Networks in Medical & Business Areas
Abstract
With rapid pace of technology artificial neural network (ANN) plays vital role in medical as well in business areas. An ANN is an information processing paradigm that is inspired by the way biological nervous systems, such as the brain, process information. The key element of this paradigm is the novel structure of the information processing system. An ANN is configured for a specific application, such as pattern recognition or data classification, through a learning process. This paper explores the efficacy of artificial intelligence and neural networks and provides an overview of the field, where the Artificial Intelligence & Neural Networks are separately used, also where they used together, and discuss the critical role of them in business & medical field like lung cancer scanning system, Protein prediction stroke & heart diseases
34 |
|
|
207-214 |
|
A SURVEY ON EFFICIENT PIEZOELECTRIC ENERGY HARVESTING TECHNIQUES AND THEIR APPLICATIONS
Abstract
Energy harvesting is the process of foraging electrical energy from energy sources available in the environment. This paper reviews energy harvesting technology using PZT as the specific piezoceramic material with its modules to determine the capacitance for optimal energy-storage in piezoelectric vibration energy harvesting (VEH) systems . It reviews various applications of piezoelectric energy harvesting from different sources . The PSPICE software can be used to determine the optimal energy-storage capacitance in a VEH system with one or more piezoelectric modules. By the simulation, the optimal capacitance of the storage capacitor can be determined to obtain a maximum energy storage power. Keywords- piezoelectric, PSPICE, vibration energy harvesting (VEH).
35 |
|
|
215-220 |
|
A REVIEW OF CARRIER MOBILITY AND DRAIN CURRENT ENHANCEMENT IN STRAINED Si CHANNEL MOSFET
Abstract
Abstract— As the time is going on the technology is growing with the devices small in size and better performance. There are several ways to improve performance of very large scale integrated (VLSI) circuits and to meet technology requirements. But one of the emerging trends in VLSI circuit is to use strained Si channel MOSFETs to achieve better performance. In this article we have reviewed various methodologies to induce strain in channel & their effect on physical structure and performance of device.
36 |
|
|
221-226 |
|
Interharmonic Mitigation Using Boost Converter In Variable Speed Drives
Abstract
Voltage source inverter (VSI) fed induction motors are widely used in industries. It injects significant amount of harmonics and interharmonics into the supply system. Interharmonics are components whose frequencies are not an integer multiple of the fundamental frequency. Interharmonics are injected into the supply when two different frequency systems are interlinked or due to load unbalance. In this work motor load unbalance is considered and a boost converter is designed to mitigate interharmonics. Simulation is carried out in PSIM and the superiority of the proposed method is discussed.
37 |
|
|
227-230 |
|
REVIEW OF IMAGE SEGMENTATION USING LEVEL SET METHOD
Abstract
: Image processing plays a vital role in medical diagnosis system. Out of various processing tools, image segmentation is very crucial in identifying the exact reason of disease. Image segmentation clusters the pixels into silent image regions i.e. regions corresponding to individual surfaces, objects or any part of objects. Various algorithms have been proposed for image segmentation. We have reviewed the different systems that have been developed for medical diagnosis purpose. Reviewing of these systems is based on level set methods of segmenting images. The theme, merits, demerits of various systems is discussed in this paper. Based on that, a new system has been proposed for segmenting the MRI image using variational level set algorithm without reinitialisation of MRI image. The system can be utilized both for simulated as well as real images.
38 |
|
|
231-240 |
|
TO STUDY THE EFFECT OF CRYOGENIC TREATMENT ON SINGLE POINT CUTTING TOOL MATERIALS FOR FINE TURNING
Abstract
Cryogenic treatment (CT) is the supplementary process to conventional heat treatment process in steels, by deep–freezing materials at cryogenic temperatures to enhance the mechanical and physical properties of materials being treated. Cryogenic treatment (CT) of materials has shown significant improvement in their properties .Various advantages like increase in hardness, increase in wear resistance, reduced residual stresses, fatigue Resistance, increased dimensional stability, increased thermal conductivity, toughness, by transformation of retained austenite to martensite, the metallurgical aspects of eta-carbide formation, precipitation of ultra fine carbides, and homogeneous crystal structure. Different approaches have been applied for CT to study the effect on different types of steels and other materials. This paper aims at the comprehensive analysis of strategies followed in Cryogenic Treatment process and their effects on properties like TWR, MRR and Roughness on HSS by application of appropriate types of CTs from cryogenic conditioning of the process.
39 |
|
|
241-245 |
|
DNS Tunneling Detection
Abstract
This paper surveys the problems, related to network traffic analysis to detect anomalies, particularly DNS tunnels. Suspicious connections are revealed with DNS packet analysis. Processing of the collected data performed with algebraic topology techniques.
40 |
|
|
246-249 |
|
A REVIEW ON VEHICLE ENGINE START AND STOP CONTROL SYSTEM USING SPEECH RECOGNITION
Abstract
Safety and security plays an important role in every one’s life. With advancement in technologies, advanced systems are incorporated in human life to protect the happiness. There is a growing demand for systems which are capable of theft detection for security purpose. With the advancement of vehicle technology, the security system inside the vehicle is of utmost importance. Many scientist and researchers have developed various systems to avoid the theft of vehicles. They have implemented speech recognition system to identify the voice of owner and responded accordingly. Based on the review of various systems, we have proposed our intelligent system which utilizes hearing sensor and the speech synthesis to the start and stop of vehicle. This low cost system can benefit to every category of human race.
41 |
|
|
250-252 |
|
REVIEW OF MICROCONTROLLER MANAGED MODULE FOR AUTOMATIC VENTILATION OF VEHICLE INTERIOR AND FIRE CONTROL
Abstract
Generally temperature inside the parked car can rise up to 30ᵒ C more than the outside temperature, thus during summer it can seriously affect the child or pet which had left inside the parked car. Even entering into such heated car is difficult exercise. Thus various systems were developed to provide proper ventilation for parked vehicles. These systems re-circulate the air once the interior temperature rises against the outside temperature. This paper review some of the current developed systems and tries to find is there scope for another efficient system. Review of different systems shows that there is scope for another simple, low cost system which will help to achieve proper ventilation system. The proposed system uses microcontroller and various sensors to achieve the objective. Sensors will provide the atmospheric conditions to controller then controller checks for uneasy condition inside the vehicle and if find so then will lower the windows for proper supply of air. Thus system can help to re-circulates air when needed.
42 |
|
|
253-256 |
|
Calorie and Nutrition Measurement Based On Food Image Processing
Abstract
Abstract: Now a day, people across the universe are becoming more sensitive to their diet. Unbalanced diet can cause many problems like weight gain, obesity, sugar, etc. So different systems were developed so as to analyze food images to calculate calorie, nutrition level etc. This paper gives a brief review of these systems and proposes a effective way to measure and manage daily food intake of patients and dietitians. The system will take the images of food and using image processing and segmentation, it calculates the nutrition and calorie content in the food. The proposed system will certainly improve and facilitate the current calorie measurement techniques.
43 |
|
|
257-263 |
|
CLOUD COMPUTING SECURITY
Abstract
Cloud computing is a way to run one’s business. It is an epitome in which the resources can be used whenever required thus reducing the cost and complexity of service providers. It has the capacity to add and subtract the resources as per the requirement. This helps in providing elasticity. Cloud computing promises to cut operational and capital costs and more importantly let IT departments focus on strategic projects instead of keeping datacenters running. We just pay for what we actually use. We can get the capacity on demand. It is highly flexible. It allows the user to access applications that do not reside at user’s location. Confidentiality, Integrity, Availability, Authenticity, and Privacy are essential concerns for both Cloud providers and consumers as well. In this paper, we discuss the need for valuation of Cloud Computing, structure the key components in a framework, and identify security issues related to Cloud Computing
44 |
|
|
264-267 |
|
User Interface for Metagenomics Data Analysis
Abstract
Metagenomics is the direct genetic analysis of genomes contained with an environmental sample. Metagenomics applies a suite of genomic technologies and bioinformatics tools to directly access the genetic content of entire communities of organisms. The field of metagenomics has been responsible for substantial advances in microbial ecology, evolution, and diversity over the past 5 to 10 years, and many research laboratories are actively engaged in it now. It provides access to the functional gene composition of microbial communities and thus gives a much broader description than phylogenetic surveys, which are often based only on the diversity of one gene. Performing metagenomics analysis is a tedious work using command prompt as it needs more computational knowledge. So it is better to have a GUI to perform this work in simple steps for sequence based metagenomics data analysis. This UI helps in measuring the concentration of the microbes like bacteria and fungus in water, soil and in clinical research. This User Interface is developed using java, which is platform independent.
45 |
|
|
268-273 |
|
Detection of Fog using Luminance and Gabor Filter
Abstract
Nowadays modern vehicles are geared up with a digital camera to capture the scene in front of them. If these cameras are equipped with realization of different weather conditions this digital camera can support many applications as well as establish new ones. Huge parts of road accidents are occur during night time due to visibility alterations in night time. Hence adjusting of these lights of vehicles during night time is very necessary. So an efficient complete night fog detection system is proposed in this work. The proposed methodology used both backscattered veil and holo detection algorithms to characterize the density of the fog and estimate the visibility. In view that the halos round light sources depend on the gap from the camera and on the density and type of fog, combing this with Gabor filter makes it more robust.
46 |
|
|
274-278 |
|
Brain Image Segmentation and Tumour Detection using Adaptive Clustering and RBF-SVM Classifier
Abstract
Brain tumour is a group of abnormal cells that grows inside of the brain or around the brain. Tumours can directly destroy all healthy brain cells. In order to detect the tumour part, image segmentation plays a significant role in computer vision systems. It aims at extracting meaningful objects lying within the image. Generally, there is no particular system or method for image segmentation. Clustering is a robust approach that has been reached in image segmentation. The cluster analysis is to partition image information set into a number of disjoint groups or clusters. In this work we used adaptive k-means clustering for segmentation, this is one among the standard methods because of its simplicity and computational efficiency, GLDM (Grey Level Difference Method) for features extraction and interpolation for feature selection. RBF-SVM (Radial Basis Function Support Vector Machine) classifier is used for the classification of the brain tumor part in image.
Keywords-Adaptive k-means Clustering, GLDM features, RBF-SVM Classifier.
47 |
|
|
279-284 |
|
EDUCATIONAL BLUETOOTH QUIZZING APPLICATION FOR ANDROID PHONE BASED ON RASPBERRY PI
Abstract
Nowadays, the developments in mobile learning give an opportunity to students and instructors to enhance their learning and teaching respectively. To increase the student knowledge, attendance, interest to learning the subjects. Bluetooth technology allow electronic device to communicate wireless. This paper is about Bluetooth quizzing system for student using RASPBERRY PI. It will utilize a quizzing system to allow the many students for giving answer. When Bluetooth is connected the can register and choose the option to complete the quiz. The result is automatically sent when quiz is done .Then data analysis can done.
48 |
|
|
285-291 |
|
Gi-Fi: New Innovation of Wireless Technology
Abstract
Gi-Fi is one of the most important wireless technology that enhances our personal environment, either work or private, by means of networking or a variety of personal and wearable devices within the space and with the outside world. In optical fibers, Gi-Fi played an important role for its high speed large files transfers within seconds. It is a scalable wireless platform for constructing alternative and complementary broadband networks and it operates at 60 GHz on the CMOS process. It will also allow the transfer of wireless audio and video files within a range of 10 meters. The installation of cables in optical fiber caused a greater difficulty and thus led to wireless access. Initially wireless technology includes infrared which was a very slow technology further inventions were done to make wireless technology a better for communication and the invention of Bluetooth, WI-MAX moved wireless communication to a new era.
49 |
|
|
292-298 |
|
Text Mining: A Study Of Techniques and Applications
Abstract
The Study of text mining is gaining more importance recently because of the availability of the increasing number of the electronic documents from a variety of sources. Text Mining is very emerging research area. It is used to find new, previously unknown information by automatically extracting information from different unstructured resources. The unstructured texts contains vast amount of information and therefore is not easy to be used for future processing. Therefore many processing algorithms and techniques are important in order to extract the valuable information which is completed by using text mining. In this paper, we have discussed general idea of text mining, comparison of different text mining techniques and applications of text mining. In addition, to explaining the Text Mining concepts, the use of GA in text mining has been discussed.
50 |
|
|
299-304 |
|
SEMI AUTOMATIC ROAD DETECTION FROM SATELLITE IMAGES
Abstract
Road extraction from satellite images is challenging research area in information extraction from high-resolution remote sensing images such as IKONOS and QUICKBIRD. The road from satellite images can be identified based on its geometric, spectral, topological and contextual properties as well as on various illumination and geographical environment. The road network extraction results in map generation in short time. In this paper roads are extracted by semi-automatic method road network. Image Binarization is achieved by C means clustering algorithm followed by morphological operation which includes filtering and image thinning.
51 |
|
|
305-315 |
|
IMPLICATION OF SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING
Abstract
In this paper, we discuss security issues for cloud computing, Big data, Map Reduce and Hadoop environment. The main focus is on security issues in cloud computing that are associated with big data. Big data applications are a great benefit to organizations, business, companies and many large scale and small scale industries.We also discuss various possible solutions for the issues in cloud computing security and Hadoop. Cloud computing security is developing at a rapid pace which includes computer security, network security, information security, and data privacy.Cloud computing plays a very vital role in protecting data, applications and the related infrastructure with the help of policies, technologies, controls, and big data tools. Moreover, cloud computing, big data and its applications, advantages are likely to represent the most promising new frontiers in science.
52 |
|
|
316-321 |
|
FIRE DETECTION WITH WIRELESS VIDEO CAMERA USING MATLAB
Abstract
The main aim of this paper is to detect the fire based on the image processing with wireless video camera. This system provides an automatic detecting system for fire using wireless video camera and PC with MATLAB. The video will be transmitted to the receiver using AV transmitter. At PC section, end, this can be seen on PC through MATLAB. It is a very low cost survey line system used to monitor a larger area. Present work is to detect flames in video by processing the data captured by a wireless camera.
53 |
|
|
322-326 |
|
A Study on Data Mining Horizons
Abstract
Data mining is the process of analyzing data from different perspectives and summarizing it into useful information. Among the rapid pace of data with the need of analysis as well as summarizing, the data mining techniques are applicable in insurance and banking, auditing, opinion mining & sentiment analysis, pharmaceutical sales & research, email spam filters, packaging industries, detection of unusual patterns, student performance analysis & counseling system, terrorist activities & fraudulent behavior, retail industries, telecom & public sector and in medical field. The advancement in different medical fields leads to the discovery of various critical diseases and provides the guidelines for their cure. This whole task is possible only with the help of data mining. This paper describes the data mining horizons in different areas, & highlights the areas where data mining has not mined the data.
54 |
|
|
327-340 |
|
Efficient lake garbage collector by using pedal operated boat
Abstract
The most sacred river in the world and the national river of India “Ganga River.” Ganga is the soul of India and is Holly River in India. If we look at current status of our national river it is very shocking we dump about 29 crore litres of sewage in Ganga which is loaded with pollutants, toxins.[9] We also dump tones of municipal solid waste. The government Of India takes charge to clean rivers Ahmadabad, Varanasi, etc. All of us know about the Ganga Abhiyan. Similarly, The villages in all state of India which joint with small & big lake and maximum villages does not use the water of lake for farming as well as drinking and daily uses due to the maximum amount of garbage present in the lake water by taking this into consideration. Our main motive is to clean the lake water for that purpose we are making efficient lake garbage collector by using pedal operated boat. In this we are using pedal operated boat with the conveyor attached to it for collecting garbage from the lake.
55 |
|
|
341-348 |
|
Hiding And Encrypting Binary Images Using A Different Approach
Abstract
Information security is one of the main issues in communication to ensure that unauthorized user can’t get unintended information. Cryptography and Steganography are such techniques to provide information security. In this paper a new technique proposes a Steganography using pixel indicator method and a model is proposed for data embedding by using various patterns to increase the complexity. In this approach, the basic idea is to replace the Least Significant Bits of the cover image with the bits of the messages to be hidden without destroying the property of the cover image significantly. The LSB-based technique is the simple one and it is difficult to differentiate between the cover-object and stego-object if few LSB bits of the cover object are replaced. The cover image containing hidden image is performed encryption with the secret key image. By using the secret key image, the chance of getting attacked by the attacker is reduced. Decrypting the encrypted image and retrieving the hidden images can be done in reverse process.
56 |
|
|
349-352 |
|
Cloud Based Data Recovery and Reconstruction System Using BI-Methodology Erasure Code Implementation
Abstract
A key design goal of erasure-coded storage clusters is to minimize reconstruction time, which in turn leads to high reliability by reducing vulnerability window size. PULL-Rep and PULL-Sur are two existing reconstruction schemes based on PULL-type transmission, where a renewal node initiates reconstruction by sending a set of read requests to ongoing nodes to retrieve surviving blocks. This paper presents a technique for constructing a code that can correct up to three errors with a simple, regular encoding, which admits very efficient matrix inversions. In order to support this variety of use cases on the ever increasing amount of data, a flexible infrastructure that scales up in a cost winning manner, is critical. In this paper we introduce a new set of codes for erasure coding called Local Reconstruction Codes (LRC). We present an algorithm that finds the optimal number of codeword symbols needed for recovery for any XOR-based erasure code and produces recovery schedules that use a minimum amount of data.
57 |
|
|
353-356 |
|
Authorized Auditing Of Dynamic Big-data On cloud
Abstract
Cloud computing is widely spreading era. It includes it companies, business line , all online shopping sites including cell phone service providers etc… but in other hand storage capacity and security are increasing issues. Cloud user have no more longer direct control over their data, which makes data security one of the major concerns of using cloud. Previous research work already allows data integrity to be verified without possession of the actual data file. The trusted third party known as auditor. And verification done by this auditor is known as authorized auditing. The Previous system has many drawbacks regarding third party like any one can challenge to the cloud service provider for proof of data integrity.
Also in it includes research in BLSS signature algorithm to supporting fully dynamic data updates. This algorithm is used to update an only fixed-sized block known as coarse-grained updates. Though this system takes more time for updating data.
In our paper, we are providing a system which support authorized auditing and fine-grained update request. Thus, our system dose not only increases security and flexibility but also providing a new big data application to all cloud service providers for large data frequent small updates.
58 |
|
|
357-361 |
|
Internet of Things to promote Tourism: An insight into Smart Tourism
Abstract
Since the commencement of web technology in the nineties, Tourism has been a major domain of application of the World Wide Web. It is also one of the most benefitted areas of Internet and its related progressive technologies. With the initiation of ideas like Internet of Things (IoT), Smart cities, Cloud computing, Big Data etc. there has been an increase in the avenues of their implementation. Smart cities can accomplish their targets well only when all its areas work smartly. Smart tourism is the necessity for such smart cities which possess heritage value or other tourist attractions. It requires bringing together the various stakeholders in the tourism industry through a common platform of technology and hence provides a mechanism for their cooperative functioning through information exchange and analysis. This paper aims to provide an insight into this concept and how it can be realized through the modern technology of IoT. It reviews the perspective of the service providers as well as the tourists and how their experiences can be enhanced through Smart tourism.
59 |
|
|
362-369 |
|
A Mean-Shift Algorithm Based Autonomous Visual Tracking for Micro Aerial Vehicles
Abstract
The main objective is to track the Ground Moving Target continuously with Mean-Shift Visual Tracking Algorithm from On-board Autonomous Visual Tracking System. On-board Autonomous Visual Tracking System contains Gimbaled Camera, Inertial Navigation System / Global Positioning System, Image Tracking Software, Micro Aerial Vehicle Guidance Law, Camera Control Law and Autopilot. A Mean-Shift Algorithm is incorporated in the Image Tracking Software. This Algorithm identifies and tracks the Ground Moving Target based on its 2D colour space histogram. A Graphical User Interface based tool was developed for simulation and test the Autonomous Visual Tracking with Mean-Shift Algorithm performance using MATLAB. The experimental results exhibits that the Mean-Shift Algorithm identifies and tracks the GMT very accurately.
60 |
|
|
363-342 |
|
Analysis and Design of Wideband LNA Using a π-Match Input Network & Feedback
Abstract
The presented paper is a wideband low noise amplifier. The wideband low noise amplifier is designed using the multiple stages of LNA. Also the LNA consist of cascade topology with the RC feedback. The WLNA which consist of very large frequency range was achieved using the RC feedback which provides the linearity to the circuit; it reduces the factor which gives the non- linearity to the circuit. Also to support the wide frequency range for the matching network the π-matching is used. The wide band and the open loop feedback are provided by the degenerative inductor which is given at the common source configuration. The designed LNA is designed by using 180-nm technology in TSMC with the power supply 1.8V. The designing of LNA is done by using the ADS software. The designed LNA support the frequency range from 1.6- 10.6GHz and the results of LNA is given in the terms of s-parameters. Which have the gain (S21) is about 31dB- 28.9dB. The noise figure is between 3.5dB- 3.7dB. The two losses input return loss (S11) is -14.14dB- -6.46 and the output return loss is (S22) is -10.77dB- -12.94dB. The WLNA have the reverse isolation about -81.73dB- -60.99dB.
61 |
|
|
370-375 |
|
AUTOMOBILE IMPRINTING FOR CASUALTY PREVENTION
Abstract
Due to the technology advancement, the use of vehicles is quickly expanding and in the meantime the event mischance is likewise expanded due to speed, Drowsiness, and Drunk and Drive. Because of this, the street mischances occur much of the time which causes enormous death toll and loss of property due to the poor emergency facilities. When a vehicle meets with a mishap, accelerometer will identify the sign and will send it to ARM controller. Microcontroller sends the ready message through the GSM including the area to police control room, so that the police can instantly follow the area through the GPS MODEM, subsequent to getting the data. This framework manages programmed driver tiredness recognition taking into account visual data and Artificial Intelligence. We proposed an algorithm to find, track both the drivers face and eyes to by PERCLOS which is a logically supported measure of tiredness connected with moderate eye movement involving MATLAB.
62 |
|
|
376-382 |
|
A Review Paper on Map Reducing Using Hadoop
Abstract
Big data is used to describe a massive volume of both structured and unstructured data that is so large that it's difficult to process using traditional database and software techniques. Big data usually includes data sets with sizes beyond the ability of commonly used software tools to capture, curate, manage, and process data within a tolerable elapsed time. There are various challenges in big data. In this, we use a framework of map reducing using hadoop. MapReduce is a programming model and an associated implementation for processing and generating large data sets with a parallel, distributed algorithm on a cluster. Hadoop is an open-source software framework for distributed storage and distributed processing of big data on clusters of commodity hardware.
63 |
|
|
383-386 |
|
Dispersion Relation of a sheet Beam Driven Backward Wave Oscillator
Abstract
Backward wave oscillators (BWOs) driven by relativistic electron beams are capable of producing high power coherent radiations in the cm and mm wavelength region. We consider a modified version of a relativistic BWO in which a sheet electron beam is injected through a rippled space charge effects and thus suitable for high current electronic devices. A dispersion relation for rectangular waveguide driven by sheet electron beam is presented.
64 |
|
|
387-396 |
|
DESIGN OF ASYNCHRONOUS VITERBI DECODER USING HYBRID REGISTER EXCHANGE METHOD FOR LOW POWER APPLICATIONS
Abstract
In this paper, the Viterbi algorithm endorsed is the utmost widespread decoding algorithmic rule for convolution codes. From ages, Viterbi decoders are used with the growing usage of digital transmission and reception in the area of mobile communications. This area includes cellular, satellite, etc. communication. At the time of transmission and reception, noise and interference which gets added in the channel brings distortion in the transmitted signal and result in binary error. The receiver calculates the binary information transmitted by decoding. The Viterbi decoder is far exploited in mobile base station during the communication between the two ends. It is a forward error correction (FEC) scheme used in circumstances where transmission of blocks of data is to be done through a channel containing noise. Any communication system must be effective and consistent. Asynchronous Viterbi decoders have many potential advantages over their synchronous correspondence including lower latency, low power consumption, avoiding clock skew, high throughput problem, etc.
65 |
|
|
397-401 |
|
A survey on face detection techniques
Abstract
Abstract - Face detection is a technology which is used to locate human faces in an arbitrary image. It is a sub-field of digital image processing which is used for automatic detection of faces in an input digital image or a video frame. Recent advances in image processing techniques has made it possible to detect faces in real time. It is widely used in biometric technology, video surveillance and human computer interaction. The detection of faces is a challenging task and requires a fast and a reliable method which should be highly efficient. The proposed method should be able to detect facial region with a high degree of accuracy and minimum errors. In this paper, we present a comprehensive survey on various techniques that are used for face detection.
66 |
|
|
402-410 |
|
Design and Simulation of Fractal Antenna with DGS structure for Multiband Applications
Abstract
In this paper, square shaped fractal antenna is proposed by modifying the basic design structure of antenna. The antenna is designed by cutting the corner edges of square patch in a fractal manner. Fractal geometry is initiated to obtain the multiple resonance frequency applications and to achieve compact structure design and low profile antenna. The basic square patch structure is selected and three iterations with defective ground plane are simulated on HFSS.The increase of the iterations of fractal antenna no of resonances increases. The proposed fractal antenna includes Defective-Ground have multiband resonance response over the range of frequencies from 0Ghz to 15Ghz.The simulation results obtained for this antenna are 3.4Ghz,4.39Ghz,9.90Ghz,10.75Ghz and 14.43Ghz.The simulation results prove that the antenna can find its use multiband applications. The designed antenna is analyzed on the basic antenna parameters like return Loss, Gain, VSWR, directivity and bandwidth.
67 |
|
|
411-416 |
|
HAND GESTURE RECOGNISATION FOR HCI BASED ON ARTIFICIAL NEURAL NETWORK
Abstract
: Human computer interaction (HCI) is growing widely day by day with the improvement in its approaches and in its algorithms. A human can easily interacted with computer by utilizing different ways of natural communications and skills. One of such method is using the hand gesture as the medium for communication between human and computer. Many works are done in the past for the communication through HCI with the help of hand gloves but there was a major issue in accuracy and execution time. In this paper by using artificial neural network media player is controlled. The actions done are play, previous, pause, next. The proposed algorithm consists of image acquisition, segmentation, extraction and neural network. Using a web camera real time hand gestures are captured and they are further processes with extraction and segmentation algorithms. The image taken may contain the unwanted noise added naturally as the image taken is of real time colour image. Before extraction of region of interest it has to be pre-processed. Neural network is trained and it is used for classification. Algorithm used in neural network is feed forward. In this paper five different hand gestures are considered and they are trained. An average of around 120 gestures are taken as test images and processed which gave an overall accuracy of 98%. Past worked paper results are compared and proposed method result gives the better outcome in many factors like accuracy, execution speed, and complexity.
68 |
|
|
417-423 |
|
Optical Character Recognition using Artificial Neural Network
Abstract
The increasing use of computers for documentations have lead to a large amount of data in the form of various unstructured documents which are not arranged in a uniform, understandable and integrated way. The processing required for extracting information is still only in its preliminary stage and the hardly predictable document structure make it very hard to extract information automatically. This project focuses on extracting structured data from unstructured data using OCR (Optical Character Recognition) and Neural Network. OCR is a technology which is required to deal with common facts as well as complex designed fonts. It focuses on recognizing characters of a document, that is it does script identification from a variety of unstructured printed or handwritten documents. Discrete Cosine transform is used to obtain data sets for classification and recognition. The DCT components with maximum variances will be used for this purpose as trained data, that is, the system is already trained for recognizing characters of the input unstructured document. The techniques of feedforwarding and backpropagation will be used in Neural networks which will match the patterns and add new patterns on recognition. The system will be implemented and simulated using Java with Neural Network as the backend for the optical character recognition process. Such an OCR system with Neural Network at it’s back focuses towards increases accuracy by eliminating human errors that would occur if the work had be done manually. It also focuses on extracting data irrespective of the noise and the image processing
69 |
|
|
424-430 |
|
EFFICIENT P2P FILE SHARING IN MOBILE AD HOC NETWORKS(MANET) USING FILE REPLICATION
Abstract
File sharing applications are recently widely used in MANET. Because of limited communication range and node mobility, the file availability for sharing becomes tedious task. Peer To Peer over MANET is the most commonly used method for file sharing in MANET. In P2P file sharing system, File replication technology is mostly used to improve the file query efficiency. Most of the current file replication methods replicate files in all nodes or two end points on a client-server query path[1].Thus, these methods either have low effectiveness or have highly over headed cost. File replication in server side enhances replica hit rate, hence, look up efficiency but produces overloaded nodes and cannot significantly reduce query path length[2].An intuitive method to alleviate this problem is to create file replicas in the network. Actually, a node that has a higher meeting frequency with others provides higher availability to its files. This becomes even more evident in sparsely distributed MANETs, in which nodes meet disruptively [3]. In this paper, we introduce a new concept of resource for file replication, which considers both node storage and meeting frequency. And also this paper presents an efficient file replication algorithm that achieves high query efficiency and high replica utilization at a significantly low cost. Simulation results demonstrate the efficiency and effectiveness of distributed replication protocol in comparison with other approaches in both static and dynamic environments. It dramatically reduces the overhead of file replication and yields significant improvements on the efficiency and effectiveness of file replication in terms of query efficiency, replica hit rate, and overloaded nodes reduction.
Keywords: P2p,File Sharing,File Replication.
70 |
|
|
431-435 |
|
A HIGH VOLTAGE ISOLATED DC-DC CONVERTER USING Z-SOURCE FULL BRIDGE INVERTER
Abstract
The Z-source inverters are recent topological options proposed for buck–boost energy conversion with a high gain of boost. This paper proposes a new step up DC-DC converter which uses impedance source which uses a Z Source Inverter (ZSI), an isolation transformer with dual tappings and a full bridge rectifier. This paper enables the interactive connection of renewable power between the local DC micro-grid. The ZSI overcomes the conceptual and theoretical barriers and limitations of the traditional VSI and CSI. Continuous current is maintained on the primary side of the isolation transformer by the use of dual capacitor inductor pairs for reducing energy losses in the output. The unique ability of this system is to short the DC link current which improves reliability of the circuit. Shoot-through (ST) and non-shoot through (NST) are the two operating modes of this system. Pulse Width Modulation (PWM) technique which involves the method of duty cycle ratio control is used for driving the ZSI. The concept of boosting the input voltage is based on implementing the Simple boost control method of shoot-through technique. Improved efficiency, increased gain, better boost factor and reduced ripple free output are the benefits of this proposed circuit. This paper focuses on the implementation of topology proposed.
71 |
|
|
436-441 |
|
AN EFFICIENT TECHNIQUE TO CANCER CLASSIFICATION USING FAST IMPROVED BACTERIAL FORAGING OPTIMIZATION
Abstract
Microarray data play an essential role in the development of efficient cancer diagnoses and classification System with Gene Expression Data. These expression data are usually unnecessary and noisy, and only a subset of them present discrete profiles for different classes of samples. Thus, selecting high discriminative genes from gene appearance data has become increasingly in the field of bioinformatics. In my work, a multi-objective biogeography based optimization technique is proposed to select the small subset of informative relevant to the classification. To choose multiple highly revealing gene subsets for cancer classification and diagnosis, a Fast improved Bacterial Foraging (FIBF) optimization is proposed to eliminate inappropriate, unnecessary, or noisy genes in changed granules at different stages and selects very informative genes with potentially different biological functions in balance. To show the efficiency of the expectations approach, we calculate the appearance of this technique with the Sensitivity, specificity and accuracy. Using gene microarray datasets dataset is leukaemia (including both binary and multi-class classification problems), we reveal experimentally that our proposed scheme can recognize significant empirical success and is biologically related for cancer diagnosis and drug.
72 |
|
|
442-452 |
|
An Efficient Multimedia Encryption using Hybrid Crypto Approaches
Abstract
Data Security nowadays is becoming a primary concern for any communication process especially when it is having confidential information and has to travel through an insecure medium of communication. There are many techniques to protect the data from unauthorized access. Methods such as Symmetric Encryption makes use of a secret key which is used by the sender and the receiver for encrypting and decrypting the contents respectively. Methods such as asymmetric encryption makes use of two different keys to do the same task. The former method is faster as compared to the latter but lacks in terms of security. The latter method makes use of a public key infrastructure to make the encryption process public but decryption private hence increasing the overall complexity. The best known symmetric cipher AES makes use of 256 bit keys to do the encryption. Very well-known asymmetric method RSA makes use of 1024 bit keys to do the same job, thus increasing the time and space complexity at the cost of increased security. Another asymmetric counterpart ECC makes use of a completely different approach by converting the characters into affine points of an elliptic curve. It makes use of 160 bit keys and produces the same result at a much better pace as compared to RSA. In this paper a novel efficient model of Hybrid Encryption involving AES and ECC is put forward which encrypts any multimedia data i.e. text, image, audio, video, etc. The advantages of both AES and ECC are utilized to create a more powerful hybrid cipher to bridge the gap of speed and security. With the help of lesser sized keys the time factor required to do the encryption is reduced. The results obtained after implementation reflected a 100 % accuracy and a huge speed gain over the existing symmetric and asymmetric technologies. The implementation is carried out in the Java environment by creating respective keys and utilizing them to carry out the encryption.
73 |
|
|
453-462 |
|
AN EXPERIMENTAL ANALYSIS OF IC ENGINE BY USING HYDROGEN BLEND
Abstract
In today’s generation everyone is dreaming about their own car. Due to this, the number of cars& the demand of fossil fuel are increasing day by day. But the main problem associated with the use of cars is the fuel economy & the pollution created by its use. So to improve the fuel economy and to reduce the emission of harmful gases we should find an alternative.
HHO is one of the best alternatives, which helps for the complete combustion of the fuel & by this it also helps in reducing the emission of the harmful gases. We have worked on the 4-stroke, Single cylinder engine for the experiments, with the use of HHO. We have supplied the HHO gas, produced by HHO kit, at the inlet manifold of the engine. The hydrogen gas mixes with the air and improves the combustion efficiency. We got the desirable results of reducing the specific fuel consumption and increase in the brake power as well as increase in brake thermal efficiency and reduction in CO emission at the cost of slightly increase in NOx emission by supplying. In the end, we have compared the readings of different parameters of the 4-stroke, Single cylinder engine without attaching the HHO kit & after attaching the HHO kit
74 |
|
|
463-467 |
|
The Agriculture Internet of Things: A review of the concepts and implications of implementation
Abstract
The inception of Internet brought a new outlook to all the businesses. The conventional models were refurbished and enhanced for large-scale adoption. Advancements in technology led to the Internet of things, which is an extension of the network of computers to the network of smart devices. This paper studies the realization of Internet of Things (IoT) in the field of agriculture. It provides a comprehensive review of its framework, considerations and implications in implementation. The paper intends to brief the reader about the IoT technology and its operational requirements in agricultural practices. The working of Agriculture IoT is discussed along with some real-world examples. The use of IoT in the fields and orchards will help the farmers reap the benefits of its technology manifold.
75 |
|
|
468-473 |
|
A SECURE STEGANOGRAPHY APPROACH OF MULTIPLE SECRET IMAGES USING ANN
Abstract
This paper proposes a modern steganography approach of embedding multiple secret colour images into a single cover image. According to proposed method each secret colour images are embedded in RGB planes of cover image respectively using artificial neural network along with LSB substitution method in spatial domain. From the stego image the embedded secret images are extracted with high quality. This approach focuses on increase the hiding capacity by embedding multiple secret images in single cover image while maintain the stego image high quality and Security level is enhanced by using the artificial neural network along with that Advanced encryption standard (AES) to provide dual layer of security to the approach. Results reveal that proposed method allows in obtaining highly secure approach and has high PSNR compared to other existing techniques
76 |
|
|
474-479 |
|
PERSONALIZATION OF E-MAIL MESSAGES
Abstract
Email spam, defined as unsolicited bulk email, continues to be a major problem in the Internet. With the spread of malware combined with the power of bot-nets, spammers are now able to launch large scale spam campaigns covering wide range of topics (e.g., pharmaceutical products, adult content, etc.) causing major traffic increase and leading to enormous economical loss. Filtering image email spam is considered to be a challenging problem because spammers keep modifying the images being used in their campaigns by employing different obfuscation techniques. Therefore, preventing text recognition using Optical Character Recognition (OCR) tools and imposing additional challenges in filtering such type of spam. In this project, we propose an image spam filtering technique, called Image visual features analysis that makes use of low-level image features for image characterization. And implement Support vector machine to classify the spam images or not. Our experimental studies based on social network framework show that the SVM classifier outperforms with improved accuracy
77 |
|
|
480-485 |
|
Development of a NGS Cancer Research Database – CancerBase
Abstract
Cancer is one of the most common causes of death all over the world. According to the World Health Organization, it causes about 12.5% (or 12.5 out of every 100) of all deaths worldwide. It is caused due to the mutations in the human DNA over a period of time which results in an abnormal growth of cells. There is a need to design a database with the description of specific cancer features which helps the medical users and researchers for the better understanding of the cancer mechanism to provide better diagnostics and treatment. Our study aims at the development of a cancer specific database i.e. CancerBase which provides information on Next Generation Sequencing SRA information and mutations causing cancer and the pathways involved.
78 |
|
|
486-489 |
|
Authentication of Message Through Hop by Hop with Soource Privacy in Wireless Sensor Networks Using SAMA
Abstract
Authentication of Message in Wireless Sensor Networks that is WSNs is huge area for attraction because of WSNs usage. This area has many ways to implement for better performances. To provide the security between messages numbers of cryptography techniques are being deigned. Cryptography techniques includes schemes based on Symmetric-Key and Public-Key systems. But most of them have the drawbacks for very high computational overhead with lack of scalability. There are number of techniques developed to resolve the above drawback . But here is one method is proposed for message authentication in WSNs based on SAMA way. This way is more efficient than polynomial based approach in terms of all parameters.
79 |
|
|
490-495 |
|
Survey on performance comparison of various Symmetric encryption Algorithms
Abstract
Day by day sizes of digital data are rapidly increasing over the Interne, due to its all time availability and efficient accessing. During digital exchange of data, it is important; data should not be access by an unauthorized user. Internet users exchange and shared their secret, confidential information during different on line transactions. Attackers attempts to access these sensitive data. Therefore, it is necessary to prevent unauthorized accessing of data and exchange data securely. Various cryptography techniques are use to convert users secret data in to secure cipher text format. Cryptography techniques are based on, symmetric key or private key and asymmetric key or public key. Researchers worked on secure and efficient data transmission and presented various cryptographic techniques. For secure and efficient data transmission over the network, it is necessary to use correct encryption method. Symmetric encryption is widely used technique. In this research, we are presenting the performance analysis of various symmetric key encryptions methods such as Data encryption standard, 3 Data encryption standard, Advance encryption standard, and blowfish fish, based on various comparison parameters.
80 |
|
|
496-499 |
|
Survey on advanced recommendations in a online bookstore
Abstract
Personalized suggestions make finding information on large websites a less difficult and even lesser time-consuming process. Tremendous number of books and documents pose a threat to due to the sheer number. This paper analyses several techniques to understand the best ones to suit our Book Recommendation System. Some of the key challenges that recommender systems face are producing high quality recommendations and servicing a large number of users simultaneously and when data is sparse. Content based filtering is used more on dynamic user models and can be used on positive feedback only. Association rules between items in a database can be mined with algorithms to extract essential data. Collaborative filtering makes use of correlations between certain set of user groups and the items that they purchase. Existing systems makes use of all these three techniques and generates output in an efficient and less time-consuming way.
81 |
|
|
500-505 |
|
Synthesis of Different Parameters and NLO properties of a new mixed L-Leucine doped in Ammonium Dihydrogen Phosphate Crystals.
Abstract
Ammonium dihydrogen phosphate (ADP) (NH4H2PO4) single crystals were grown by slow evaporation method using doped 0.8 % L-Leucine. The X-ray diffraction analysis of the as–grown ADP crystals showed that it possess tetragonal structure having lattice parameters a = b = 7.4854 Ǻ, c = 7.5377 Ǻ. The Fourier transform infrared spectroscopy (FTIR) of as-grown ADP crystal taken between wave-number 400 to 4000 cm-1 showed peaks due to vibration and stretching of functional group PO4,P-OH and HO-P-OH in 400 to 907..12 cm-1, P = O , NH2and P-O-H in 1099.31 to 1732.22 cm-1 and O=P-OH,P-O-H and O-H-O in 2414.99 to 3260.97 cm-1 range. The thermal properties of the as-grown ADP crystals were studied by thermogravimetric analysis (TGA). The thermal activation energy determined from the TGA curve using Broido, Piloyan-Novikova (PN) and Coats Redfern (CR) relations were in good agreement with each other. The relative second harmonic generation efficiency (SHG) was examined by Kurtz powder technique. A Q-switched Nd:YAG laser operating at the fundamental wavelength of 1064 nm, generating about 10.3 mJ and pulse width of 10 ns was used for the present experimental study The obtained results are discussed in details
Keywords: FTIR, XRD , SHG, , UV, EDAX, L-Leucine.
82 |
|
|
506-511 |
|
Utilization of Crushed Glass Waste as Aggregates
Abstract
Abstract: As the population of the world is increasing by leaps and bounds, there is an increase in the demand of shelters resulting in the excessive rise in demand of the concrete. As a consequence the production of portland cement, i.e., binding agent in concrete, leads to the release of significant amount of CO2, i.e. a green house gas. One tone of portland cement clinker production emits approximately one tone of CO2 and other greenhouse gases (GHGs).These gases are leading to various environmental issues such as air pollution causing various diseases to all the living beings. Hence in order to deal with this problem there is a dire need to replace a portion of cement by certain pozzolanic material so that the consumption of the cement can be reduced and the environmental impact can also be controlled up to certain extent [4]. Some of the industrial wastes like fly ash, silica fume, blast furnace slag etc are already in trend of being used in concrete. After using these wastes new research has been made so that the waste glass can be effectively added in concrete either as coarse aggregate or as pozzolona. Waste glass if grounded to very fine powder pozzolanic properties because of presence of silica [1]. Hence the glass powder to some extent can replace the cement and can also contribute to the development of the strength as well as durability of the concrete strength. [3]One of the major factor leading for this innovation was that the demand for recycled glass has considerably decreased in recent years, and also it is economical to store glass than to recycle, as conditioners needs expenses for the process of recycling. In order to provide a sustainable solution to glass storage, as well as preserving environment the solution would be to reuse this type of glass in concrete .This paper present literature review on replacement of cement by waste of glass powder which consists of current and future trends of research on the use of crushed glass powder in Portland cement concrete. The increasing awareness of recycling glass is speeding up the inspections on the use of waste glass with different forms in various fields. The use of waste glass as aggregate in concrete develops high architectural level besides its high performances.
83 |
|
|
512-518 |
|
Enhancement of Power System using TCSC with Fuzzy PID Controller
Abstract
This project presents the variable effective fundamental equivalent reactance capability of TCSC for enhancing the transient stability of power systems. For obtaining the varying effective fundamental equivalent reactance, two different controllers namely a speed deviation based Self-tuning Fuzzy PID Controller [1]and a nonlinear controller are used. To validate the performance of the control schemes, the simulation studies are carried out on a single machine infinite bus system using MATLAB/ SIMULINK software package. The results of computer simulation indicate that Self-tuning Fuzzy PID controlled TCSC can not only improve the static stability of system, but also effectively damp power oscillation and enhance the transient stability of system when the power system suffers small disturbance and short circuit. In addition, it also illuminates that Self-tuning Fuzzy PID Controlled TCSC is more effective than nonlinear control, traditional PID control and fixed series compensation.
84 |
|
|
519-524 |
|
Decision Fusion for Palmprint Biometric Application
Abstract
Abstract— Most previous research in the area of individual authentication using the palm print as a biometric element has concentrated on enhancing accuracy yet resistance to attacks is also a centrally important feature of any biometric security system. Palm print recognition being one of the important aspects of biometric technology is one of the most reliable and successful identification methods. Combining the left and right palm print images to perform multi biometrics is easy to implement and can obtain better results. In this paper, we have considered left and right palm print images. And right palm print image is applied with inversion in order to increase the accuracy. Principle line segmentation method is applied for image segmentation. We propose Gabor filter bank as a feature extractor to generate feature of segmented image. Classification is done using artificial neural networks.
85 |
|
|
525-532 |
|
Data Mining As a Tool for Social Media Marketing
Abstract
The core of the business in this 21st century era lies in marketing. It can be can be considered as the heart of business .marketing can be called as an art by some but it is purely science. Most aspect of the successful business depends on this science of marketing. Marketing is huge ocean which covers advertising, public relation, promotions and sales. As marketing is the core of business, so as advertising is the core of marketing, where you get to introduce the product to the customers. The advertising that’s hitting the nerve of the customers is right now lies in the social media advertising like Facebook, Instagram, google-plus, twitter, Myspace. When it comes to social media marketing success or the impact factor it lies in publishing the rightful ads to the rightful customer, understanding the need of the customer, area of interest. So ultimately it sums up to that one thing that is marketing is a science we need to target the appropriate customers to run a successful campaign and business. In this paper we have focused how to identify the targeted customers, how to use the science of marketing, building business groups. We use clustering techniques and other data mining tools to study the formation of group and the user influence. We also extract the areas of interest of the user from the shares, likes, postings, updates, articles which is nothing but the feelings of the user.
86 |
|
|
533-537 |
|
User centric security requirements and threat analysis in Cloud Computing
Abstract
The evolution to network and computational technologies has gone through a remarkable phase of growth and development. The growth curve was indeed very steep in major domain of application of these technologies. The advent of Cloud computing, Big Data analytics, Evolutionary computing, Internet of Things (IoT) etc. has enhanced the implementation avenues of these technologies in various application areas. Cloud computing has emerged as a special area of interest for many researchers keeping in view its huge application-domain scope. Research is being done on different aspects of CC for identifying areas of improvement and their respective remedies. One important issue in CC is that of Security, because of the various threats of working on network architecture. This paper scribbles through various review papers and research papers to identify the threats and security requirements for different levels of use and the corresponding users. It reviews the perspective of the users at various level already described in good quality research papers which highlight security requirements and tries to emphasize on threats faced by users for those security requirements as mix of required security consideration can be better defined if the threats involved are taken into account and their respective remedies can be designed keeping user perspective in mind and their cloud computing usage experiences can be enhanced by following appropriate security measures.
87 |
|
|
538-541 |
|
Solar Panel Universal Mobile Charger with Coin Insertion
Abstract
The objective of this project when we inserting a coin in the input device then mobile phone charging will be start. Basically this project is based on solar energy and the solar panel used to convert the optical energy into electrical energy. The solar panel universal mobile battery charger developed which providing a unique service to the rural public area where electricity is not available for few hour to several hour and different public places such as bus stands, railway stations, hospitals etc. The solar panel universal mobile battery charger is worked according to the coding written in pic-micro controller. When we insert a coin, the coin sensor sense the coin and input is given to the pic-micro controller. The controller read the program and provides supply to the charger for a particular time period. The time period depends on the coding written in the controller. A multi-pin charger is connected through the controller. By using the multi-pin charger one or more than mobile will charge.
Keywords - Mobile phone, multi pin battery charger, solar panel, pic-micro controller, relay.
88 |
|
|
542-544 |
|
SURVEY ON AUTOMATED TESTING TOOL IN NATIVE AND MOBILE WEB APPLICATION
Abstract
Usage of Smart phones and mobile apps has become increasingly prevalent. Nowadays enormous apps are available in app stores from basic calendar to Banking apps. Automation has become the integral part of software development speedy life cycle. Manual testing is tricky for complex application and time consuming. This paper highlights on some mobile automation testing tools on different types of mobile apps like native, web and hybrid apps and also different testing techniques which suits Mobile applications.
89 |
|
|
545-548 |
|
A study of the role of Cloud services in the implementation of Internet of Things (IoT)
Abstract
Changing times have demanded the change in conventional working models. The large-scale use of Internet and its related technologies like Internet of Things has widened the horizons of their applications. However, the actual realization of Internet of Things (IoT) can be made possible only through the readily available location-independent services like the Cloud computing. There are various considerations while adopting Cloud services in IoT. This paper aims to present the role of Cloud computing services in IoT implementation and how they are most suitable for Internet of Things concept. It explicitly defines those parameters from the point of view of IoT implementation and performance.
90 |
|
|
549-556 |
|
EFFICIENCY OPTIMIZATION CONVERTER TO DRIVE BRUSHLESS DC MOTOR
Abstract
-Power factor correction based efficiency optimization converter fed BLDC motor drive is presented in this paper. To obtain unity power factor at AC mains using single voltage sensor, the converter is operated in DICM. To control the speed of BLDC motor it is electronically commutated such that VSI has been operated by fundamental frequency switching. The proposed model shows a valid increase in efficiency compared with existing system which is in acceptable range of IEC 61000-3-2 with less number of components used.
91 |
|
|
557-566 |
|
Smart Reliable Network On Chip
Abstract
Increasing complexity and the reliability evolution of SoCs, MPSoCs are becoming more sensitive to phenomena that generate permanent, transient, or intermittent faults. These faults may generate data packet errors and might even crash the router. The project is concentrated on the Design and develop architecture for intelligent independent reliable routers like reliable router RKT-switch for implementation on FPGA.The work is carried on a new reliable dynamic NoC .The proposed NoC is a mesh structure of routers able to detect routing errors for adaptive routing based on the XY algorithm. The enhanced work is done in the project is to investigate the shortfalls of the different methods and the present technology and to find out the advancements of new system and also to analyze the scope for performance enhancements with respect to present system. New architecture will be simulated, implemented on FPGA and tested to reduce the delay/power consumption and area on chip for the given system.Coded using HDL Verilog language analyzed by synthesis using Xilinx ISE v14.5 and verified Simulation using Modelsim.
92 |
|
|
567-571 |
|
SHIP MONITORING AND CONTROLLING SYSTEM
Abstract
The sea border between the countries is not easily identifiable, which is the main reason for this cross border vindictiveness, and many other problems between the countries. GPS offers a very easy and a relatively cheap way of finding out the correct location in the sea way, also delivers portable navigational guide. Using GPS, we can find the current latitude and longitude values and will be sent to the microcontroller unit. The Zigbee Transceiver is connected to the microcontroller unit at the ship, and also in the Base Control Centre we say Navy or Coastal Guard. The Zigbee is used to share the current location of the ship, to the Base Control Centre. The Predefined cross-over International Sea border location information will be loaded into the microcontroller, if the ship of defence or fisherman is trying to cross the sea border, then the Navy Control station can directly control the ship by passing the commands through the Zigbee Transceiver.
93 |
|
|
572-580 |
|
EMISSION ANALYSIS OF C.I ENGINE USING TYRE PYROLYSIS OIL AND DIESEL BLEND
Abstract
By different researches many alternate fuels are used. Based on literature review it is found that for diesel engine, Bio Diesel is most promising alternative fuel. In this project works prospects and opportunities of utilizing 100% Tyre pyrolysis oil and increasing Tyre pyrolysis oil diesel blend ratio as a fuel in diesel engine is going to be studied by varying engine loads. Also based on experimentation an optimum blend and engine parameters are to be suggested for obtaining better performance. Tyre pyrolysis oil presents a very promising scenario of functioning as alternative fuels to fossil diesel fuel.
The properties of these can be compared favorably with the characteristics required for internal combustion engine fuels specially C I engine. Experiments will performed for five engine loads i.e. 1,3,5,7 and 9 kg using pure diesel and Tyre pyrolysis oil-diesel blends i.e.T5, T15, T25, pure Tyre pyrolysis oil with constant speed of diesel engine. Which will study in emission are HC, CO, CO2, NOx.The results of experimental observations with biodiesel blends were compared with that of baseline diesel. All the blends of Tyre pyrolysis oil with diesel have considerable lesser Emission of HC, CO, CO2, NOX as compared to diesel.
94 |
|
|
581-583 |
|
A Secure Data Sharing Scheme for Dynamic Groups in the Cloud
Abstract
From cloud computing, users can attain an effective and economical approach of scheme for data sharing among group members in the cloud.First, we propose a secure way for key distribution without any secure communication channels. Second, our scheme can achieve fine-grained access control, any user in the group can use the source in the cloud and revoked users cannot access the cloud again. Third, we can protect the scheme from collusion attack, which means that revoked users cannot get the original data.
95 |
|
|
584-596 |
|
Fault diagnosis of Rolling Element bearing with Acoustic Emission and Modified Empirical Mode Decomposition
Abstract
This research is attempted to investigate incipient bearing faults using Hilbert Huang Transform (HHT) applying on Acoustic Emission data set. HHT analyses the AE signal using intrinsic mode functions (IMFs), which are extracted using the process of empirical mode decomposition (EMD).Spectral kurtosis is incorporate to detect non linear and non stationary signal features from different frequency band using forth order moment of IMF. Proposed concept is not looking for frequency band with maximum energy distribution with time but frequency band where sudden impulse will take place so incipient defect response can easily identified. This concept is validated with healthy bearing, bearing with inner race defect and outer race defect at different speeds. Also, Comparison is made with traditional envelop analysis based on fast kurtogram and HHT. The experimental results show that the proposed concept is a validated tool to develop an efficient On-line fault diagnosis system to diagnose the incipient bearing faults with Acoustic emission.
96 |
|
|
606-611 |
|
Security Embedded CoAP using DTLS for IoT
Abstract
The Internet of Things (IoT) consists of a large number of interconnected devices. These devices perform sensing and actuating tasks. Each of the devices is identified through a unique IPv6 address. The devices are connected to the Internet through which the sensors can be read and controlled. At the application layer, these resource constrained devices communicate using the Constrained Application Protocol (CoAP). Data is transmitted through the public Internet and hence security is a major issue. Hence there is a need for developing a secure version of CoAP Datagram Transport Layer Security (DTLS) protocol can be used to secure CoAP. DTLS security protocol operates at the transport layer. Security is also provided at the application layer using authentication techniques. In this paper security is looked at in two layers, namely application layer and transport layer.
97 |
|
|
612-614 |
|
Public verifying for shared data in the cloud
Abstract
With data storage and sharing services in the cloud, end users can easily modify and share the data in group. To ensure shared data security can be verified publicly, end users in the group need to generate signatures on all the blocks in shared data in cloud. Different blocks in shared data are generally signed by different end users due to data changes made by different end users. For security reasons, once an end user is removed from the group, the blocks which were previously signed by this removed end user must be re-signed by a present end user. The process of removing end users is called as revocation. The straightforward method, which allows a present end user to download the corresponding part of shared data and re-sign it during end user revocation. This is inefficient due to the large size of shared data in the cloud. In this paper, we propose a novel public verify mechanism for the security of shared data with efficient end user revocation in cloud. By applying the idea of proxy re-signatures, we allow the cloud to resign blocks on behalf of already present end user during end user revocation, so that already present end users do not need to download and re-sign blocks by themselves. In addition, a public verifier is always able to check the security of shared data without fetching the entire data from the cloud. Moreover, our mechanism is able to support batch auditing by verifying multiple auditing tasks simultaneously. Experimental results show that our mechanism can significantly improve the efficiency of user revocation.
98 |
|
|
615-619 |
|
Numerical investigation on the performance of choke in thermo acoustic engine
Abstract
Choke plays very important role in thermo acoustic engine. This paper focuses on performance comparison between rectangular and circular channel of the choke by numerically simulating and analyzing pressure and velocity drop induced in thermo acoustic engine .Three parameters velocity, pressure and outcome power basically being focused. And final conclusion of comparison of both section in terms of power generation.
99 |
|
|
620-627 |
|
Integrating Lamport’s One Time Password Authentication Scheme with Elliptic Curve Cryptography
Abstract
End-to-end authentication between devices and applications in Internet of Things (IoT) is a challenging task. In today's world of distributed data sources and Web services, remote client authentication is very important to protect customer's sensitive data over Internet. Common example of remote client authentication is the service like Internet banking. Existing authentication mechanisms are vulnerable to security crimes and threats and can interrupt the progress of communication between the devices or application due to the complexity and heterogenity in terms of devices, topology, communication and different security protocols used in IoT. Therefore, Our proposed scheme uses the principles of lightweight Identity Based Elliptic Curve Cryptography scheme and Lamport’s OTP algorithm. So, our scheme with a smaller key size and lesser infrastructure is the right candidate to perform the authentication without compromising the security level. Also this scheme can be implemented in real time IoT networks.
100 |
|
|
628-632 |
|
Remote home using Raspberry pi
Abstract
The main aim of this paper is to control the home appliances through human interaction by creating a mobile app on a smart phone device. The previous existing methods are Bluetooth, Zigbee, GSM based technology but here we are using Raspberry Pi which is achieved by interfacing with the internet. Raspberry Pi provides Python Environment as its default programming environment. Home Automation refers to the automated way of using and controlling home appliances using internet. The outcome of this paper is to turn a normal home into the smart home where not only the common man but also aged and disable person can remotely control the appliances; determining the power usage and cost of electricity which is used by the electric and electronic devices; automatically switching on the fire alarm and blocking the flow of electricity to the devices when there is a short circuit or the power input exceeds the maximum limit.
101 |
|
|
633-635 |
|
Partial Least Squares approach for imputation of missing values
Abstract
This paper is devoted to presentation of the Partial Least Squares approach (for imputation of values) Proposed here with PLS regression. This method Allows to analysis to set of J blocks of variables. We Assumed That Each block can Summarized be by one latent variable structural and That it exists relationships entre les latent variables. The PLS approach Allows to estimate the latent variables and the structural relationships. The PLS approach is to very synthetic method since it contains ace Particular boxes main component analysis, canonical correlation analysis, redundancy analysis, PLS regression, and generalized canonical analysis, at the first component level. Furthermore, the PLS approach Allows to analysis with tables missing data by using the NIPALS algorithm and PLS regression. In this paper, we give to General description of the NIPALS algorithm and of PLS regression With Their Hand properties. Next, we this, the PLS approach in detail.
102 |
|
|
636-641 |
|
Efficient analysis of bigdata using hadoop
Abstract
It results in efficiently analyzing real-time remote sensing Big Data using earth observatory system. Furthermore, the proposed architecture has the potential of storing incoming raw information to perform offline analysis on largely stored dumps, when required. Finally, a detailed analysis of remotely sensed earth observatory Huge Knowledge for land and ocean space are provided using- Hadoop.
103 |
|
|
642-644 |
|
Computing Applications for Education
Abstract
Abstract—In the existing system the students are suffer from many problems. When the students are shifted in any new places, they are face the problem related to the hostels, rooms, mess, coaching etc. The existing system is very time consuming. The complete details related to books, notes and rooms are not available, and they pay high cost of that. The searching related to all is very difficult because they are unknown from city. The students are waste their many time for all of that, due to late decision taking they lost the chance for book good hostels or rooms that are available on low cost. If they are not find the better hostels then they live in very congested rooms or hostels at any cost because they have no option.
104 |
|
|
645-649 |
|
Integration of Taxonomy using Semi-Supervised Technique
Abstract
Nowadays difficulties faced by the e-commerce portals or web service application is integration of master taxonomy from the provider taxonomy. E-commerce generally aim’s to integrate the products that are coming from the various multiple providers. While categorizing the products, it is impractical to assume that data provider will manually assign all the products from their catalog to the appropriate category in the master taxonomy. To provide high efficient service to customer, Master taxonomy can be designed with efficient manner and classify the products in different way from the provider taxonomy with the help of Support vector machine. In the proposed work, the product classification is based on the Machine Learning approach that Classify the master taxonomy using Semi-Supervised Learning Techniques, that classified data can be arrange in the optimised manner with help of graph based approach. Here the product details can be added automatically in Master taxonomy from the provider source document by using the support vector machines. While retrieving the classified data from master database, user query can retrieve the exact and relevant queried information of user query.
105 |
|
|
650-657 |
|
Architecture of Self Repairing Logic Systems for various fault tolerant applications
Abstract
In this paper, authors describes about the self-repairing circuit that is developed, inspired from the endocrine system of our body. It is the hormone system in our body. Endocrine cells secrets hormone only when it is stimulated. Also the secreted hormone is received by the target cell only. If an endocrine cell is dead a stem cell replaces it which contains the same gene code of the dead cell. So the new cell replaces the dead cell. Similarly, an electronic system is implemented with a working cell that can be replaced by spare cells when ever the working cell becomes faulty. The code contains information about the connection, since the endocrine cell system is implemented in electronics using a multiplexer. When a working cell become faulty, a spare cell replaces it automatically and the function of the faulty working cell is transferred to the spare cell. The proposed system repairs a fault in a simple way, just as the recovery in the endocrine cellular communication.
106 |
|
|
658-661 |
|
E-Commerce vs. M-Commerce: A Changing Trend
Abstract
Technology innovations have a huge impact on the life of human beings. Technology helps to reduce many barriers to acceptance of mobile services. Increasing globalization has led to more mobility and therefore to greater demand for mobile, ubiquities services that can be consumed “anytime, anywhere”.
This paper highlights the key characteristics of the E-Commerce and M-Commerce and the demand for these into the present scenario. The present study also evaluates the difference between the E-Commerce and M-Commerce. Electronic commerce is a combination of two words electronic and commerce. Where the meaning of electronic is the device that is operated through the electricity and commerce is doing the business by selling and purchasing some commodities. Electronic Commerce is process of doing business through computer, but the computer must have an internet connection. When a person sitting on his chair in front of a computer and able to access all the facilities of the Internet either buy or sell the products either from his office or from his home. Unlike traditional commerce that is carried out physically with effort of a person to go and purchase products, e commerce has made easier for human to reduce physical work and to save time. E-Commerce which was started in early 1990’s has taken a great lead in the world of technology. Whereas Mobile Commerce is a subset of e commerce, where users can interact with others through a mobile and wireless network, using mobile devices for information and transaction processing.
107 |
|
|
662-666 |
|
Next Generation Sequencing Quality trimming
Abstract
Next generation sequencing (NGS) technology has revolutionized genomic and genetic research. NGS refers to high-throughput sequencing that parallelizes the sequencing process, producing millions or billions of sequences concurrently.
NGS generates enormous amount of data, a single sequencing run could produce about one tear bytes (TB) of data which is difficult to maintain and the presence of poor quality or technical sequences such as adapters in NGS data can easily result in suboptimal downstream analysis so data needs to be pre-processed. Before analyzing data, quality checking and trimming of data is important. To do this Trimmomatic tool is used to check the quality of data generated from Illumina sequencing. Trimmomatic is a command prompt tool it requires more computational knowledge to perform, for a non-technician or for a biologist. To overcome this issue it is necessary to develop a GUI for a Trimmomatic tool, which helps biologist to perform quality check with less computational knowledge.
A transition from a Trimmomatic command prompt tool to Graphical User Interface (GUI) is done using java where user can do quality check in minimal button clicks and time saving.
Keywords-Next-generation sequencing, Adapter trimming, Data pre-processing, command line, Graphical User Interface.
108 |
|
|
667-670 |
|
Light Weight Protected Identify System for Packet Drop Hit of Wireless Sensor Network
Abstract
In most sensor networks data is streamed from several sources through intermediate processing nodes that aggregate information from all the nodes and transmits it to the base station. In such cases assuring data provenance is a main factor for evaluating data trustworthiness where the malicious nodes compromises the already existing nodes or introduces new nodes for reducing the network connection through which the data is being transmitted. Light weight scheme detects the node attacks caused by malicious nodes in the network area and ensures secure data transmission along the path. This scheme is based on in-packet bloom filter. It allows the data to pass through the filter using hashing functions. It also provides provenance encoding and decoding for secure transmission of data to the base station. Secure provenance scheme detects the packet forgery, packet drop attack and data loss during transmissions in the network made by the malicious node and increases the data integrity. In a multi hop sensor network, data provenance allows the base station to trace the individual data packet source path and data forwarding path. For each data packet its provenance must be recorded but important challenges arise due to the several constraints of sensor nodes and its data path. Hence devising a light weight provenance solution with low overhead is made necessary.
109 |
|
|
671-676 |
|
Analysing Captcha as a gRaphical Password (CaRP)
Abstract
A typical way to enter a textual password through keyboard is not secure against various attacks. Also bots can get access of the user’s account by doing the guessing attack. To overcome this drawback the graphical passwords are developed. Graphical password uses the hard AI problems which are easier for humans to solve and difficult for bots. A graphical password is an authentication system that works by having the user select from images, in a specific order, presented in a Graphical User Interface (GUI).
In this paper a novel group of graphical password frameworks based on top of Captcha innovation, which is called Captcha as gRaphical Password (CaRP) is used. The CaRP schemes named ClickText, ClickAnimal and AnimalGrid are developed. By using the CaRP, the captcha is going to work as both a captcha and a graphical password allowing the user for access. It should require less time to generate CaRP images, less time for user to log in, produce the large password space, hence enhancing the security.
110 |
|
|
677-682 |
|
COMPARATIVE ANALYSIS OF CLASSIFICATION METHODS USING PRIVACY PRESERVING DATA MINING
Abstract
Privacy preserving data mining (PPDM) is an emerging research topic in data mining, being studied in recent years. The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. Under PPDM four different user approaches were introduced and our work is on data miner's approach using the new classification method previously not involved. Under the data miner’s approach, classification method has been focused and a comparative analysis is shown between the old decision tree technique and the ensemble method. The results for this approach is given using ROC (Receiver Operating Characteristics) graphically.
111 |
|
|
683-686 |
|
An Intelligent Ambulance with Online Patient Monitoring System
Abstract
: Recently due to population and development, the use of vehicles are rapidly increasing. Now–a-days the traffic congestion problems are huge problems for transportation system which affects emergency vehicle like ambulance. It is impossible to prevent the accident but can save their life by reaching hospital at right time. This paper presents the system to minimize the delay caused by traffic and to provide the smooth flow of emergency vehicle. System also tracks the health conditions with few parameters such as heart rate and body temperature. These parameters are send to a registered phone number in the hospital by using GSM unit. This scheme is called the Online Patient Monitoring System. This combined system is proposed as An Intelligent Ambulance with Online Patient Monitoring System.
112 |
|
|
687-692 |
|
Intelligent Web Crawler: A Three-Stage Crawler for Effective Deep Web Mining
Abstract
As deep web grows at a very fast pace, there has been increased interest in techniques that help efficiently locate deep-web interfaces. However, due to the large volume of web resources and the dynamic nature of deep web, achieving wide coverage and high efficiency is a challenging issue. We propose a three-stage framework, namely Intelligent Web Crawler, for efficient harvesting deep web interfaces. In the first stage, Intelligent Web Crawler performs site-based searching for center pages with the help of search engines, avoiding visiting a large number of pages. To achieve more accurate results for a focused crawl, Intelligent Web Crawler ranks websites to prioritize highly relevant ones for a given topic. In the second stage, Intelligent Web Crawler achieves fast in-site searching by excavating most relevant links with an adaptive link-ranking. In the third stage, system will match the char by char user keywords with our Top-k Keywords. User will get some help to keyword typing in search panel based on Top-k Keywords. All results we compare with a threshold value (T-Value), Process those results which greater than T-value Top-k Keywords. To eliminate bias on visiting some highly relevant links in hidden web directories, we design a link tree data structure to achieve wider coverage for a website. Our experimental results on a set of representative domains show the agility and accuracy of our proposed crawler framework, which efficiently retrieves deep-web interfaces from large-scale sites and achieve higher harvest rates than other crawlers.
113 |
|
|
693-696 |
|
Secure auditing and deduplicating data in cloud for text files
Abstract
Outsourcing data into cloud services becomes attractive trend , which helps in bulk
maintenance of data and management . since storing the data in cloud is not trust worthy. Their raises security issues Related to find data deduplication in cloud and which achieves integrity auditing.
In this work, we study problem of integrity auditing and secure deduplication on cloud.
Aiming to achieve both data integrity and deduplication in cloud. we propose 2 systems
called as Sec cloud and Sec cloud +.Using sec cloud it introduces an auditing entity with a
maintenance of a map reduce cloud which helps to generate client data tags before uploading
as well as audit the integrity of data having stored.Using sec cloud + the customer always
want to provide security for their data before uploading and also enables integrity auditing
and secure deduplication on encrypted data.
114 |
|
|
697-698 |
|
Anonymous authentication for decentralized access control of data stored in cloud
Abstract
We proposed a new decentralized access control scheme for secure data storage in clouds that supports anonymous authentication.
115 |
|
|
699-701 |
|
MULTI ROUTE PATH: A COMPUTER NETWORK SECURITY
Abstract
In the present technological era computers play an important role in each and every step of human life. As a coin has 2 sides similarly if a computer has many more advantages then it has some threats also. The network security is the main problem when the computers are linked together. This study enlightens the introduction of network, network security problems which can be overcome by multipath routing techniques. With the help of this technique we can reduce the congestion on the network, as fractional part of the whole information will move on number of paths. Thus overall goal of this study is to improve the network security using multipath techniques.
116 |
|
|
702-706 |
|
Efficient Turn around Group Query Optimization in Spatial Data
Abstract
Group Query optimization in Spatial Data(RkNN)query is a broad application for decision support,profilebased marketing,and allocation of resource..The older work on RkNN search does not take textual information into consideration or limits to the Euclidean space.The most spatial objects are included with textual information and road networks.A new type of queries, in which reverse top-k boolean spatial keyword (RkBSK) retrieval,which assumes objects are on the road network and considers both spatial and textual information.A data set P on a road network and a query point q with a set of keywords, an RkBSK query retrieves the points in P that have q as one of answer points for their top-k Boolean spatial keyword queries.
The RkBSK query and filter-refinement framework based algorithms for answering RkBSK search with arbitrary k and no any pre-computation.Several novel pruning heuristics that utilize both spatial and textual information are employed to shrink the search space efficiently.A new data structure called count tree has been developed to further improve query performance.A comprehensive experimental evaluation using both real and synthetic data sets demonstrates the effectiveness of our presented pruning heuristics and the performance of our proposed algorithms.
Keywords: RkNN,RkBSK, arbitrary k, filter-refinement framework, pruning heuristics.
117 |
|
|
707-713 |
|
A Feasible study of Waste Management
Abstract
— Waste is an unnecessary input to or any undesirable output from any system comprising of all types of resources. Waste management is those activities required to manage waste from its final disposal process. These include amongst process such as collection, transport, treatment and disposal of waste and monitoring. It encompasses regulatory and the legal framework that related to waste management encompassing guidance on recycling. The amount of waste generated by humans was insignificant due to low population density and societal levels of the exploitation of natural resources. Some Common waste produced during pre-modern times was mainly ashes and human biodegradable waste and these were released back into the ground locally with minimum environmental impact. Tools made out of metal non-metals etc. were generally passed down through the generations. Emphasis is placed on integrated approaches. These approaches require the blending of technical and non-technical factors. The dissemination and application of innovative technical information is extremely important. The implementation of sustainable waste management practices also requires thorough understanding of the pertinent social, economic, legal and regulatory issues involved
118 |
|
|
714-718 |
|
Enhancement of Security in 3G/4G networks by Dynamic key length generation with reduced space complexity
Abstract
This work concentrate on Security enhancement of data transmission in 3G, 4G networks by using enhanced encryption method with AES algorithm of 256-bit key length. Enhancement is done with AES (Advanced Encryption Standard) algorithm by modifying the Static S-box (Substitution). The static S-box is made dynamic using cipher key. To increase the complexity of the system, AES is used in Round structure, at round structured AES S-box, changes in every round. So for n rounds S-box is generated n times for each block of data. The cipher key is used to convert the static S - box into the dynamic. The performance is evaluated based on parameters like Runtime, Throughput, CPU Usage, memory usage and Avalanche Effect for the input text file, image file, audio file and video file. By enhanced AES algorithm we can achieve maximum speed around 2.2Mbps for the system, which is compatible with LTE(Long Term Evolution) networks as it does not has much difference when compare to the speed of traditional AES . Also the complexity is increased by the use of Round structure and the system becomes more attack resistant. In this work along with the key the content is also encrypted.
119 |
|
|
719-724 |
|
Impact Of Social Media On Business Marketing
Abstract
-- Now a days the popularity of the Social Networking Sites like Facebook, Twitter etc., is increasing day by day as it is very much effective in establishing wide range connections between the users to communicate and to share information with greater ease. The social media has created a significant impact on the lives of the users and thus these sites have become a new face in the convergence of technologies, thus replacing the traditional ones.
Social Networking Sites is not all about connecting wide range of users , it has also become a great place for online marketing and business campaigning. This paper mainly talks about how social media has become a business center for online marketing replacing the traditional advertising media like Newspapers, Television etc.,
Social Networking Sites are not just cost effective and simple compared to the traditional Medias but also enables the business people to achieve their goals much easily as it establishes a direct connection between the customers, the company and other stakeholders. And also the Traditional Medias were effective only in targeting the interrelated business circle but social media sites are also effective in targeting and fulfilling the interests of individuals as well as group of users .Thus social networking sites have become a very significant part of our life.
120 |
|
|
725-734 |
|
Implementation of the Copyright Protection System for e-Book
Abstract
In recent times, the high-tech society has become the most important issue by IT technology and publication network. Today such flows have also been the case in the e-book field. Today's electronic publication is changing day by day. But there are some problems according to the prevalence of e-book. E-book is similar to p-book(paper-book). There is a limit to have perfect feeling of a texture of p-book. In order to purchase an e-book, people use online. People having malicious intent could copy and distribute it illegally. It leads to cyber abuses.
This paper aims at the copyright protection of e-book ePub writers. The proposed e-book copyright protection system is designed using e-book production Sigil environment and C program environment. This system uses client-server communication through e-book ePub as authentication information. It discerns whether to permit or not for a client to read the e-book using authentication information. Authentication information includes ID, password, IP address, limited time of authentication information, GUID(Globally Unique Identifier). If authentication information about e-book meets requirements, people can use it. But if not, it blocks people's approach by quitting program.
121 |
|
|
735-739 |
|
Secure Image Encryption Authentication Compression System
Abstract
A two-phase content-based image authentication scheme is constructed based on a combination of hard and soft authentication implementing previous existing generic approximate message authentication codes which is a error-correcting codes with cryptographic message authentication codes and symmetric encryption techniques. The message authentication codes which used for hard authentication. The two-phase image authentication scheme verifies the validity of an image in two phases. In low frequency elements the image are subjected to the early phase while some higher frequency elements are left to the instant phase only if the first phase succeeds. The planned scheme tolerates common content-preserving modifications in an image and can separate intended modifications affecting the image content. The Proposed scheme demonstrates high perceptive capability and can detect different types of forgery attacks on images while preserving the robustness. The level of content perseverance is defined by the content based authentication scheme in use, e.g., using a threshold value. This threshold is based on the criticality level of the application for which the threshold is chosen. Highly critical applications have more stringent requirements and therefore prefer a hard authentication by choosing a smaller threshold. Less critical applications uses soft authentication scheme by selecting a higher value for threshold.
Key words: Approximate Message Authentication Code, Hard and Soft authentication.
122 |
|
|
740-746 |
|
Design and Simulation of Carpool Service Problem using Soft Computing Tools
Abstract
In the 21th century, world is facing various problems. Because of the use of excessive energy resources. Traffic Congestion is one of the serious problem in metro cities. It has lot many effects such as fuel consumption, air n sound pollutions..Now a days, the carpooling is smart n alternative method for reducing traffic congestion. In this system, the same cab is booked by different people by using the very latest technology which is nothing but our smart android phones. This is commonly known as cab sharing. Many such systems are present but it doesn’t have the capacity of optimization. Optimization is the main feature which is used in our paper. By using the smart phones which has inbuilt GPS System one can easily tress the current position of the requester. And the advantage of this system is time saving with adding most appreciable content such as connections in the society .We are using the GENTIC Algorithm for finding the optimized path and route matching. The system is not too much complex so every people understand the use and save the money. The time required for the process is just a fraction of minutes. So the system is very much helpful for society.
123 |
|
|
747-756 |
|
Application of feature descriptors for remote sensing image retrieval
Abstract
This paper presents the results of application of feature descriptors for remote sensing image retrieval. The circular covariance histogram and the rotation-invariant point triplets potential are explored here as a multi-scale texture descriptors.
In remote sensing images, the availability of images containing a significantly higher amount of spatial and spectral details has Cover (a piece of ground) with flat stones or bricks; the way for new applications (e.g., hyper spectral target detection, compound object recognition, etc.) and new commercial products and it has enabled the use of a wider range of image analysis methods. On the other hand, the rapid accumulation of gigabytes worth of remote sensing data on a daily basis has provide robust and automated tools, which was designed for their management, search, and retrieval, as essential for their effective exploitation.
124 |
|
|
757-764 |
|
A Review on ECG based Human Authentication
Abstract
Biometric systems are mostly used for human identification and authentication. Recent developments have shown that for person identification ECG can be used as more powerful tool as it give more reliable and accurate results even in abnormal cases than other biometric characteristics. Credential based authentication methods (e.g., passwords, PINs, certificates) are not well-suited for remote healthcare as patients could give credentials to someone else. Furthermore, one-time authentication using trait-based biometrics (e.g., face, fingerprints, and iris) or credentials do not cover the entire monitoring period and may lead to unauthorized post-authentication use. In this paper various techniques previously proposed in literature for feature extraction and a comparative study to predict the accuracy of overall system is being discussed.
125 |
|
|
765-769 |
|
Efficient streamlining bio-medical text of Compound name units
Abstract
Normalization in the bio-medical text is to identify the composite named entity in the large data set. The pattern identification strategy identifies by systematically decomposing the six types of composite mentions. In biomedical named entity recognition (NER) and normalization is the identification and resolution of composite named entities, where a single span refers to more than one concept. The current normalization have either ignored composite mentions and used simple ad hoc rules, or only handled co-ordination ellipsis, making a robust approach for handling multiple composite mentions greatly needed. To handle the three most fundamental bio-concepts, re-annotate the composite mentions in five existing corpora for gene, chemical and disease.A hybrid method is proposed integrating a machine-learning model with a pattern identification strategy to identify the individual components of each composite mention.The relevant information is commonly focused on a specific topic, such as protein–protein interactions protein transport and localization, drug-disease associations or gene function extraction. Most of the common retrieval methods apply natural language processing or machine learning to identify relations in text.
126 |
|
|
770-777 |
|
Disc Brake Rotor Selection through Finite Element Analysis
Abstract
These days’ technologies go beyond us. For automotive field, the technology of engine develops very fast even the system of the car, luxury or comforts everything that develops by the innovation of engineer. Although the engineer gives priority for safety measure, but most consumers still have inadequate of knowledge in safety system. Thus safety is the first important thing we must focus. This paper deals with “Force and thermal Analysis on Disc Brake and Optimization of Disc Rotor” which studies about action on disc brake by analysis of the different forces acting on disc brake. Hopefully this paper will help everyone to understand action force and friction force on the disc brake and how disc brake works more efficiently, which can help to reduce the accident that may happen in each day. Profile 3 is selected for further work as it gives better result.
127 |
|
|
778-784 |
|
ADJACENT CONTIGUOUS CATEGORIZATION OVER SEMANTICALLY SECURED RECORDS
Abstract
Data Mining is the computer-assisted process of digging through and analyzing enormous sets of data and then extracting the meaning of the data. It has large applications in many areas such as banking, medicine, scientific research and among government agencies. But due to the rise of many security issues, many theoretical and practical solutions to the classification problem have been proposed under different security models. However, users now have the opportunity to outsource their data, in encrypted form, to the cloud. Since the data on the cloud is in encrypted form, existing privacy-preserving classification techniques are not applicable. This model focus on solving the classification problem over encrypted data. In particular, propose a secure k-NN classifier over encrypted data in the cloud. The proposed protocol protects the confidentiality of data, privacy of user’s input query, and hides the data access patterns. The secure k-NN classifier over encrypted data is developed under the semi- honest model.
128 |
|
|
785-789 |
|
Comparative Analysis of Modified H bridge Topology using Various PWM Techniques
Abstract
This paper deals with the comparative analysis of h bridge MLI using various PWM techniques such as single PWM, equal PWM, SPWM. The objective of this paper is to show the harmonic comparison. This paper featured about modified H bridge topology .It is significantly advantageous compared to other type of MLI, since it has reduced number of capacitors and switches, which is more economical, also reduces complexity of the whole circuit. Based on the comparison, harmonic distortion is much reduced in sine PWM technique .This paper presents the block diagram, switching sequence, simulation results using MATLAB and THD comparison.
129 |
|
|
790-792 |
|
Key Aggregate Searchable Encryption for group data sharing via cloud storage
Abstract
Abstract- The different users capability of Selectively sharing Encrypted data via Cloud storage may ease security concern over data leaks in the cloud. The key challenge here lies in efficient management of encrypting the keys. The flexibility of sharing group of required documents with any group of user demands different encryption keys to be used for different documents. The practical problem here is that the owner cannot generate Key for each and every users, it will be burden for him to generate such keys. Hence the owner combines several keys into one aggregate key, and that key will be provided to users to decrypt the file which they want to download. The proposed system provides efficient performance and security.
130 |
|
|
793-797 |
|
Identification Of Tumors In Lungs Using RBC
Abstract
As the medical imaging and telemedicine has been developing on large scale but with the increasing demand of storing and sending the medical image results in lack of sufficient memory spaces and transmission bandwidth. To fix these issues compression was introduced. In medical imaging lossless compression schemes are under intensive interest because there is no loss of information. The only small part is more useful out of the whole image. Region of Interest Based Coding techniques are more considerable in medical field (for DICOM Images) for the sake of efficient compression and transmission. The current work begins with separation of the image. Finally compression is performed to reduce the storage and network bandwidth. Lossy compression for Non ROI image is applied by using spiht algorithm and lossless compression for ROI part of an image by transforming the image to discrete wavelet transform using huffman coding
131 |
|
|
798-801 |
|
Design and implementation of Autonomous navigation system for localization and mapping using SLAM technique.
Abstract
Use of autonomous mobile robot has been tremendously increase in last couple of decades in various sectors like industries,military,medical,defence,transpotation etc. This paper repesent a software implimentation of SLAM (Simulataneous Localization And Mapping) for autonomus navigation system of robot for known environment. The system will be used by robot to reach the destination by avoiding obstacles in its path between source to destination and simultaneously mapps its own path as well as locates its own position in given environment. SLAM consists of multiple parts; Landmark extraction, data association, state estimation, state update and landmark update. There are many ways to solve each of the smaller parts. Some of them will be covered in this paper
132 |
|
|
802-809 |
|
A SURVEY: MOBILE HYBRID CLOUD COMPUTING FOR EDUCATION SYSTEM
Abstract
Education plays an important role in maintaining the economic growth of a country. Now a days the classroom teaching is changing and students are becoming more technology oriented and therefore in this changing environment, it’s important that we think about the latest technologies to incorporate in the teaching and learning process. One of the latest technologies prevailing now days is Cloud Computing. Basically Cloud computing is an internet based computing Service which provide infrastructure service, platform service, and software service. These services are utilized for storing and processing immensely colossal data set over Internet. Now a day’s mobile phones are increasing day by day and it is becoming part of human life as most effective and convenient Communication tool and it will not be bounded by the time and place. Mobile cloud education is an emerged term for the new approach of teaching and learning. Mobile cloud learning system can provide smart anytime-anywhere learning that is customized and adapted to individuals, and delivered via personal portables devices. Due to the growth of educational institutions all over the world there is a requirement of developing cloud architecture which can help storing and processing large information produced by these institutions. The Mobile Cloud computing can be a solution for storing the educational data into more systematic manner and it can be reached out easily to all kind of people in all regions. At the end of the day, mobile cloud learning brings the classroom to the student unlike other customary systems. It will benefit not only the learners but also the educators in their classroom management.
133 |
|
|
810-817 |
|
Study On performance Analysis of HECKERT 1600 in Milling Operation
Abstract
A Milling machine is a power driven machine that cuts by means of a multi tool rotating cutter. The mill constructed in such a manner that the fixed work piece is fed into the rotating cutter. Varieties of cutters and holding devices allow a wide range of cutting possibilities. The versatile mills are capable of performing many operations like drilling, sinking, boring. The spindle operates in either a Vertical or Horizontal position. In this we studied about the Horizontal Milling Machine Heckert 1600, the factors affecting milling machine performance and problems which arise during machining process. The Parameters such as Feed rate, Flatness, Squareness, Perpendicularity, Circularity and Concentricity are measured and calculated to find the reason which causes problems like Tool deflection, Axis backlash, Machine Mechanical Slippage, Squareness problem. Global offset method and Preventive maintenance is suggested in order to overcome these problem.
134 |
|
|
818-824 |
|
Nature monuments of endogenous origin and perspectives of tourism development in Rioni basin (Georgia)
Abstract
Nature monuments of endogenous origin and perspectives of tourism development in Rioni basin (Georgia)
Georgia, as a country and a site, always attracted many visitors, vendors and of course, conquerors from time immemorial. This interest, first of all, was a result of Georgia’s unique natural conditions with its mountainous sights or the sea, diverse herbs, animals, different traditions from people living in different corners of the country, agriculture and historical-architectural monuments. By the final stage of the Soviet Union Georgia had a well-developed tourist-resort infrastructure; there were tens of particularly important resorts centers and several hundreds of tourist headquarters. Hundreds of thousands of astonished foreigners or soviet tourists used to visit country every year. They had an opportunity to enjoy pleasantness of each natural area from subtropics of the Black Sea to glaciers of the Caucasus, from Kolkheti Valley to Alazani Valley, Darially Valley to Vardzia – all the tourist routes were filled of natural sights or historical monuments.
In 2015 the faculty of Natural Sciences of Ivane Javakhishvili State University conducted a research – Research and Popularization of Natural Monuments of Endogenous Origin in River Rioni Basin EN/15/2015. During research it was revealed very interesting and unique naturally remarkable places, which have a great potential of consumption allowing regions to develop tourist potential. Within frames of the project it was possible to search unique forms of relief, visit and evaluate on spot; in case of necessity include specialists for conducting further ground researches. Recommendations were made to grant status of natural monument to these forms. Meetings were held with the local population in order to notify them importance of the objects within their region and reveal new and unknown places which can be studied in the future.
135 |
|
|
825-828 |
|
Light Fidelity : An Emerging Technology
Abstract
Li Fi stands for Light Fidelity. Li-Fi is a latest technology which makes use of LED light for the transmission of data much faster than the data that can be transmitted through Wi-Fi. Many People are using internet for different tasks through wireless networks. Now a days transfer of data from one place to another is an important part of one’s routine. As a result Wireless data requirement is increasing enormously. With the increase in the users of wireless network speed of Wi-Fi decreased proportionally due to limited Radio Frequency spectrum. Li Fi overcomes this limitation as it uses visible light spectrum which have 10000 times the RF spectrum. Li-Fi provides better bandwidth, efficiency, availability, security than the Wi-Fi. Li-Fi technology have the potential to create new industry for meeting the demands of future cellular communication, Internet, smart homes and smart cities. In this survey paper, Light Fidelity concept is introduced. In addition to this its advantages, limitations, applications are also covered.