1 |
|
|
1-3 |
|
Object-Oriented Data Modelling for Spatial Databases
Abstract
Data modelling is a critical stage of database design. Recent research has focused upon object-oriented data modes, which appear more appropriate for certain applications than either the traditional relational model or the entity-relationship approach. The object-oriented approach has proved to be especially fruitful in application areas, such as the design of geographical information systems which have a richly structured knowledge domain and are associated with multimedia databases. This article discusses the key concept in object-oriented modelling and demonstrates the applicability of an object-oriented design methodology to the design of geographical information systems. In order to show more clearly how this methodology may be applied, the paper considers the specific object-oriented data model.
2 |
|
|
4-15 |
|
OBJECT DETECTION AND TRACKING IN VIDEO SURVEILLANCE SYSTEM IN LOW RESOLUTION CONDITION
Abstract
This paper presents a detailed view of various techniques related to video surveillance system improving the security. The goal of this paper is to review the various moving object detection and object tracking methods. This paper focuses on detection of moving objects in video surveillance system then tracking the detected objects in the scene in all condition like low resolution. Moving Object detection is first low level important task for any video surveillance application. Detection of moving object is a challenging task. Tracking is required in higher level applications that require the location and shape of object in every frame.
The conventional approach to object tracking is based on the difference between the current image and the background image. However, algorithms based on the difference image cannot simultaneously detect still objects. Furthermore, they cannot be applied to the case of a moving camera. Algorithms including the camera motion information have been proposed previously, but, they still contain problems in separating the information from the background.
Video Surveillance Systems have been in use for long. It has several applications such as Security in public and commercial domains, Smart video data mining and Law enforcement and Military purposes etc.
Video surveillance is all about keeping track of activities at a particular place through surveillance cameras. It uses the concept of Detecting and Tracking different objects in all condition like low resolution to detect any suspicious activity and take any kind of action required. There are also some other areas where Video Surveillance is used like Patrolling of highways and railways for accident detection, Surveillance of properties and forests for fire detection , Observation of the activities of elderly and infirm people for early alarm, Measuring effectiveness of medical treatments.
In this paper, we propose an approach for object detection from a sample input video and then it performs object tracking using Kalman Filter.
3 |
|
|
16-20 |
|
Design of smart solar irrigation system
Abstract
Solar systems are devices that cleanly convert sunlight into electricity and offer a practical solution to the problem of power generation in remote areas. The paper involves the development of an Automatic Solar radiation tracker that could be used for agriculture purpose, making use of a sensor as the control system. A feasible approach to maximizing the efficiency of solar array systems is sun tracking. The system that controls the movement of a solar panel so that it is constantly aligned towards the direction of the sun. Automatic Sun Tracking System is a hybrid hardware/software prototype, which automatically provides best alignment of solar panel with the sun, to get maximum output (electricity). The system will be implemented for irrigation purpose wherein the irrigation system will be controlled by using moisture sensor which helps to know the condition of soil weather it is dry or wet, and a GSM system is used in the system to eliminate the manual approach controlling the system and special solar powered pumps are used to pump the water from underground to over head tank and then the water is used for irrigation purpose,
4 |
|
|
21-28 |
|
Dimensionality reduction based on Class of Interest
Abstract
In this paper by focusing on particular class dimensionality reduction is made attention on particular class is called as Class of Interest (COI).COI is doped with other classes and the results are observed and analyzed.
5 |
|
|
29-38 |
|
An Efficient Provable Multicopy Dynamic Data Possession Method over Cloud Servers
Abstract
Abstract - Cloud Computing has changed the way how data is processed and stored by computing resources. The rapid development in computing infrastructure, data communication, and associated technologies has led to the birth of shared, on-demand, pervasive computing that can be easily provisioned to meet the increasing demands of users world-wide to process massive amounts of structured, semi-structured and unstructured data. Organizations, professionals and naïve users have started to switch from local storages to remote data centers (storage servers) for hosting their valuable data. The necessity of outsourcing large volumes of complex, sensitive data demands reliable services of entrusted Cloud Service Providers that can offer privacy, confidentiality, durability and reliability to the clients’ data. The pay as you use model of CSPs apply varied charges to clients’ based on many factors like number of copies of data to be stored, number of storage servers, storage space, duration etc., that the clients’ request. Some clients consider their data to be very crucial and hence, request CSPs to replicate them on multiple cloud storages. As modifications (additions/deletions) to some parts or to all of the data are oblivious, the clients’ ask for most recent and consistent copy of their outsourced data. At the same time, clients also demand integrity of their outsourced data in as many copies on as many cloud storages, as per the service level agreement. So, there is a greater need for developing a method that can provide privacy, confidentiality, and reliability to the clients’ data, along with a mechanism that proves requested services are delivered properly to the clients by the CSPs, as per the service contract.
In this paper, we propose An Efficient Provable Multicopy Dynamic Data Possession Method over Cloud Servers that addresses afore said challenges efficiently and offers privacy, confidentiality, as well as reliability to the clients’ data. In addition, the proposed method proves integrity, consistency and possession of dynamic data on multiple cloud servers using efficient algorithms. The performance of the proposed scheme is better compared to the previous PDP schemes with respect to access time, as the users’ can retrieve data from cloud servers within their close proximity. Theoretical analysis shows less communication overhead and communication cost.
6 |
|
|
39-47 |
|
A Versatile Mobile Application for Grading Agriculture Produce: A Prototype implementation for Jowar
Abstract
Agriculture sector is backbone of Indian economy. Technology is applied to this sector to get good product/s. As mobile phones have become powerful in recent years. Mobile computing together with image processing helps in many applications for farmers. As manual grading is time consuming and less efficient an automated grading system is developed using mobile application and image processing. Prime objective of application is to help farmer to know the type quality and price of jowar without any intermediate person. Application directly provides the rate and the type classified. Jowar is taken as case study. Grading of jowar is done in matlab using image processing. Through application request is sent for its type and rate for jowar. Server processes the request through image processing and sends back reply to application . Reply includes the type of jowar classified and its price
Keywords: Image Processing, Mobile App, Grading
7 |
|
|
48-52 |
|
Performance analysis of voip over wimax
Abstract
Voice over IP (VoIP) applications are being widely used in today network such as Skype, Google Talk, and Face Time and it consider as one of most promising technologies for providing low cost voice calls to customers over the existing data networks and higher quality of service than pstn dose . in parallel WiMAX is a deployed technology that has great impact in filed of 4th generation networks. it provides high speed ,throughput and cover larger area which make it appropriate to achieve quality requirements for voip service . In this paper, we use OPNET 14.5 A simulator to analyze QoS parameter for VoIP application under various voip codes.
8 |
|
|
53-57 |
|
Qos of voip over wimax: compressive review
Abstract
Throughout the world interoperability for Microwave access(WIMAX) is a 802. 16 wireless communication standard that gives high speed, throughput and cover larger area. Besides service quality support, ieee 802. 16 standard usually offer data rate upto 100mbps and cover wide area up to 50km. VOIP through wimax is most dominant service and is a growing speedily in world of telecommunication. Recent studies directing on qos scheduling services and performance related matrices such as jitter, mos and throughput have recently been addressed in this paper.
9 |
|
|
58-60 |
|
Assessment of Groundwater Quality around Fertilizer Factory in Bathinda City, Punjab
Abstract
This study has been performed in NFL, in the district of Bathinda. The purpose of the study has been to examine the changes if any, in the composition and the physical and chemical properties of the ground water, owing to the clearance of the fly ash in the landfills. The fly ash is dumped into the empty and dried ponds which are called the ash ponds. When it rains, the water collects in these ponds that cause the discharge of the fly ash and hence the particles of the fly ash percolate deep into the underground water, thereby leading to a change in the properties of the water. This study has been carried out so as to inspect whether the discarding of the fly ash in the Bathinda unit of National Fertilizers Limited has any influence on the properties of the underground water or not. Thus, 10 specimens of underground water from various areas in the vicinity of the ash pond were collected. These were then taken to the laboratory, where they were examined for a range of parameters such as pH, Electrical Conductivity, Hardness, TDS, BOD, COD, presence of Zinc and Iron. Summing up, the research was carried out so as to examine the effect of the particles of the fly ash, on the properties of the underground water in the vicinity of the ash ponds.
10 |
|
|
61-66 |
|
Investigation of Biodiesel (POME and COME) and Acetone Blend Fuels Properties
Abstract
The properties like viscosity and acid value are to be mainly considered to use biodiesel as fuel in internal combustion engines. In the present work these properties were compared for two biodiesels (POME and COME) and their blends with acetone at different percentages. The variation in properties were observed by adding acetone at 5%, 15%, 25%, and 35% to biodiesels and also at 35°C, 40°C, 45°C, 50°C, 55°C temperature. The property values obtained for biodiesels and their blends with acetone by increasing the temperature were decreasing and are compared with diesel fuel. At 55°C temperature both the blend fuels are with very less viscosity and acid value than diesel fuel to use in I C engine. Acetone in the blend fuel improves the ability to vaporize completely which increases the output of engine.
11 |
|
|
67-70 |
|
Designing and building the traffic control system
Abstract
This paper study is one of further studies aims to design a traffic system for Khartoum state ، it started by determining the problems within the current state traffic system and then designed model for the proposed system ، and used GIS in order to make an updated map for Khartoum state ، then the map used to determine the position of the master controls and the center basis of measuring the distance between local controls ، also the map can be used to locate the center and the appropriate communication technique . Further to growing of the traffic the synchronization between the local controls was appeared ،which required using a software to solve this issue and provided by a real traffic data such as traffic volume cycle length . the final output of the software is a model for north and middle of Khartoum can be used as a base in the future if we need to upgrade the system or extend it . Khartoum state planning using a geographic mapping system software in order to calculate the distance between the local controllers and then put the controllers of the main building on the map. Simulation work to the streets in Khartoum head to see the default synchronization time in order to determine the number of sensors required in every way and determine the speeds on the roads, or even determine the shape of the road.
12 |
|
|
71-75 |
|
MSPS Heavy Fuel Oil Temperature Control Optimization Using DCS
Abstract
This paper is to study and control the temperature of heavy fuel oil (HFO), which is burned in the Holocaust (oven) for heating and evaporating the water in the boiler in El Shaheed dr\ Mahmoud Sharif power station in sudan in order to find the optimum temperature, which is then complete combustion of the fuel, resulting in reducing the amount of consumed fuel. also relate the distributed control system program with main control room of the station through this program the responsible personnel can control over wall system cases run, stop, operation fault, and trip and forbid all that through main control room HMI screen. MSPS, Heavy fuel oil cycle, with controlling the temperature of the fuel. to reach the optimum thermal generation of Electricity . The primarily objective of this paper is control the temperature of the fuel oil using the proposed program designed by DCS , to deal with DCS basic components, hardware configuration and the software , to learn the similarities and differences between the DCS and other automation techniques and to learn how to prepare a research proposal and projects
13 |
|
|
76-83 |
|
The Study of Ajara and Ajara-Lazica Endemics on the Content of Biologically Active Compound Coumarin
Abstract
The article deals with the content of biologically active compound coumarin in endemic plant species in Ajara and Ajara-Lazica applying tandem chromate mass spectrometry (GC-MS/MS) method. In the object under analysis, for the purpose of identification of the target substance, mass spectrums of the peaks existing on chromatographs were compared with the mass spectrums of the substances existing in the database (NIST 2011). Out of the examined 21 species coumarins appeared in the following 4 species:
1. Psoralea acaulis var.adzharica – Fabaceae; furocoumarin; 2.Astragalus sommieri Freyn. - Fabaceae Lindl; (chromene produced coumarin: cridimine archangelicin); 3. Seseli foliosum ( Somm. et Lev.) Mand. - Umbelliferae Juss., Apiaceae Lindl. Isopsoralen, edulisin, cridimine archangelicin; 4. Astragalus adzharicus M.Pop. - Fabaceae Lindl; furocoumarin; psoralen
14 |
|
|
84-90 |
|
Ground bounce noise and standby leakage current aware MTCMOS technique for 1 bit Full Adder
Abstract
Multi-threshold CMOS (MTCMOS) technology is an effective sub-threshold leakage power reduction method in CMOS circuits, which satisfies high-performance and low-power design requirements. The optimization of virtual supply network plays an important role in MTCMOS low-power design..In modern high performance systems-on-chips (SoCs), more than 40% of the total active mode energy can be dissipated due to the leakage currents [1]. With more transistors integrated on-die, leakage currents will soon dominate the total energy consumption of high performance SoCs. Furthermore, leakage current is the only source of energy consumption in an idle circuit. The battery-powered portable systems such as cell phones and laptop computers tend to have long standby modes. Reducing the leakage energy consumption of the portable systems during these long idle periods is crucial for a longer battery lifetime. This paper is based on leakage current and active power reduction in 10t structured pass transistor based single bit full adder using MTCOMS techniques for 45nm scale using cadence tool. A 20 ns access time and frequency 0.05 GHz provide 45 nm CMOS process technology with 0.7 V power supply is employed to carry out 1-bit Full Adder.
15 |
|
|
91-95 |
|
System Architecture design for Cybernetic communication
Abstract
The editorial talks about OpenCC, an open software design that defines an outline for various tasks engaged in tracing input devices and handling input records in cybernetic atmospheres with amplified certainty application. The OpenCC outline facilities growth and repairs of hardware systems in a better way compared to what is generally provided by cybernetic reality growth packages. The aim is accomplished by using an OOD built on XML, captivating fullest benefit of this latest innovation by agreeing to custom regular XML utilities for the creation, outline and documenting. The OpenCC mechanism is dependent on the concept called data flow for various VR model actions. A multi-threaded implementation model does pay attention for desired performance. Crystal clear system admission allows fast growth of segregated replication prototypes. Eventually, the interface of the software developer features a time-based and an event based replica, that can be used concurrently, to express a huge series of applications. OpenCC is a first attempt towards a” write once, input anywhere” approach to augmented reality apps development. For supporting these claims, integration into an existing augmented virtual system is established. We are showing how a model tracing equipment for mobile augmented reality can be assembled from consumer input devices with the aid of OpenCC. Once development is sufficiently mature, it is planned to make OpenCC obtainable to the community beneath a software license.
16 |
|
|
96-104 |
|
Biometric Steganography: A New Approach using Hand Geometry.
Abstract
With the growth of data communication over computer network, the security of information has become a major issue and thus data hiding technique has attracted many people around the globe. This paper presents a new framework for secure data hiding by combining steganography technique with biometrics traits. Steganography is the art and science of hiding the secret data in to the cover file in such a way that no one apart from sender and intended recipient, suspects the secret message. Here image steganography technique is used, in which secret data is embedded in the image file which acts like cover file. Traditional steganographic techniques uses sequential LSB data embedding method, in which secret data is going to embed in the least significant bit position of cover image pixels in sequential manner, this method is easily vulnerable to the attacks and attacker can easily get know to the data embedded position because data is embedded in sequential pixel position in least significant bits. Hence to overcome from this problem this paper proposes new framework called “Biometric steganography”. In this proposed framework steganography is implemented by utilizing one of the biometric traits i.e. Hand geometry. Here features are extracted from hand images of individuals and by utilizing these features one unique key is generated. This generated key is employed to find a particular pixel position from which, to embed the secret data in least significant bits of the cover image. Stego image is generated which contains secret data, and embedded secret message is extracted from the stego image by utilizing generated unique key, during information extraction. This approach gives a double layered data security.
Keywords— Biometric Steganography, Data Hiding, Key Generation, Hand Geometry, Secret Data.
17 |
|
|
105-113 |
|
Synthesis of TiO2 Nanoparticle by mechanochemical method
Abstract
TiO2 nanoparticles have been synthesized using a mechanochemical method using microwave technique. The morphological, compositional and structural properties of TiO2 nanocomposit were characterized by XRD scanning electron microscopy (SEM), Energy dispersive spectroscopy (EDX), TEM, TGA (Thermogravimetric Analysis) techniques. The gas sensing performances of the TiO2 nanoparticle were tested for various gases at different temperatures.
Keywords: Nanoparticals; TiO2; SEM; XRD; gas sensitivity; H2S
18 |
|
|
114-124 |
|
Synthesis, Characterization and Application Of SnO2 Nanoparticles
Abstract
SnO2 nanoparticles have been synthesized using a mechanochemical method using Autoclave. The morphological, compositional and structural properties of SnO2 nanoparticle were characterized by XRD, scanning electron microscopy (SEM), Energy dispersive spectroscopy (EDX), TGA (Thermogravimetric Analysis), Electrical conductivity techniques. The gas sensing performances of the SnO2 nanoparticle were tested for various gases at different temperatures.
Keywords: Nanoparticals; SnO2; SEM; XRD; gas sensitivity; NH3
19 |
|
|
125-135 |
|
Relations Among Fibonacci, Lucas and Fibonacci-Like Sequences.
Abstract
Abstract—In this paper, we examine Fibonacci-Like sequence that is defined by T(n+2) = T(n+1)+T(n), n≥0 , T(0)=m, T(1)=m where m being a fixed positive integer. In this paper we will introduce identities of Fibonacci-Like sequence as well as its connection formulae with Fibonacci and Lucas sequences and the proof of main results of this paper will be evaluated from the general form or general solution of the sequence.evaluated from the general form or general solution of the sequence.
20 |
|
|
136-141 |
|
An Efficient Auditing Protocol with user revocation using cyclic group & AES techniques
Abstract
Here in this paper a new and efficient technique for the data sharing over public clouds is proposes using user revocation on demand policy and cyclic group based key generation with AES encryption. The proposed methodology implemented here provides efficient security from various attacks over cloud and also provides efficient group signature and authentication and authorization of users.
21 |
|
|
142-149 |
|
Efficient data mining algorithms for agriculture data
Abstract
Agriculture plays a crucial role in Indian economy. Agriculture is a basic need of human beings. All the people depend on the agriculture productivity. Each state has different productivity study of the past data set and one can predict the future results, using information technology tools. Data mining is an important tool for extracting hidden information from large and varied data. In this connection, the paper, explores the possibility of applying different types of mining algorithms for extraction of important information. This work experiments with different data mining issues like classification, clustering and association to study the given data using weka package. Results obtained from analysis for applications such as classification based on yield, depends on two different issues, namely: crop with season and crop with yield. Clustering of data based on yield is experimented using different algorithms like EM and K-Means. It is found that LMT algorithm gives better results compared to others with respect to Classification, and K-means algorithms provides better performance in terms clustering of agricultural data.
Key word: J48, LMT, LADTree, ID3, EM and K-Means.
22 |
|
|
150-159 |
|
LAND USE AND LAND COVER CHANGE DETECTION USING REMOTE SENSING AND GIS FROM THOOTHUKUDI TO VEMBAR COAST
Abstract
The study area (78°8’12”E & 78°21’21”E Longitudes and 8°48’50”N & 9°6’4”N Latitudes) Thoothukudi to Vembar, Tamil Nadu, India. Land use and Land cover plays a major role in progressive planning. The present study reveals the changes that occurred in the area for 22 years. To generate the Land use and Land cover map from Satellite (Landsat) ETM+ of geocoded with UTM projection and datum WGS-84, Zone North 44 generated from the total bands 8 on a 1:50,000 scales, was used. Supervised classification and topographical maps were enhanced for better analysis. A process of integrating remote sensing techniques and field data to precisely map Land use and Land cover of the study area is undergone. The study also helps in demarcating the sector-wise changes i.e. the major changes happened to the agricultural land which constitutes about 60% in the study area. The changes are severe and rapid due to urbanization and emerging of new industrial complexes. The study gives an overview about the changes to be noted during the planning of further developmental activities in the area. From the study, the area has been subjected to change in the land use and land cover in all the present features. Field observation provides an idea about the existing status and issues of coastal problems. Five major classes were identified and mapped in the study area. These are: Agricultural land, Salt pans, Barren land, Shrub land and Water bodies. The study observed that cultivated land is dominant in the area but, it is subjected to a rapid change due to developmental activities. This is followed by salt pans. The study recommends the use of advanced satellite images for future Land use and Land cover monitoring studies.
23 |
|
|
160-171 |
|
~To Achieve QOS and Time Stable Performance in Parallel Queues with Heterogeneous Network
Abstract
Many requests arrive at the server at time varying rates. We consider the situation that at all times the load from the dispatcher is very high and a large number of servers are necessary. Although the challenges for right-sizing for non-stationary workloads have received significant attention, the problem of achieving time-stability over time-varying workloads has not been effectively addressed. Control, Design and performance analysis under such heterogeneous and transient conditions is extremely difficult. Achieving time-stability is essential for a heterogeneous system because it enables the system to provide guaranteed (QoS). Decomposes a multidimensional and non-stationary problem into a one-dimensional, simpler and stationary, and achieves time-stability by introducing an insignificant number of dummy requests. The queuing delays of one process affect the others when multiple jobs arrive at the server which results in leakage. Using Shannon’s mutual information to measure the information leakage. Usually attacker learns the user’s arrival pattern in longest-queue-first (LQF) scheduler. When the user job arrival rate is very low, first-come–first-serve (FCFS) and round-robin schedulers both completely reveal the user’s arrival pattern. The information leakage can be reduced in the low rate traffic region by using working-conserving schedulers.
Many requests arrive at the server at time varying rates. We consider the situation that at all times the load from the dispatcher is very high and a large number of servers are necessary. Although the challenges for right-sizing for non-stationary workloads have received significant attention, the problem of achieving time-stability over time-varying workloads has not been effectively addressed. Control, Design and performance analysis under such heterogeneous and transient conditions is extremely difficult. Achieving time-stability is essential for a heterogeneous system because it enables the system to provide guaranteed (QoS). Decomposes a multidimensional and non-stationary problem into a one-dimensional, simpler and stationary, and achieves time-stability by introducing an insignificant number of dummy requests. The queuing delays of one process affect the others when multiple jobs arrive at the server which results in leakage. Using Shannon’s mutual information to measure the information leakage. Usually attacker learns the user’s arrival pattern in longest-queue-first (LQF) scheduler. When the user job arrival rate is very low, first-come–first-serve (FCFS) and round-robin schedulers both completely reveal the user’s arrival pattern. The information leakage can be reduced in the low rate traffic region by using working-conserving schedulers.
24 |
|
|
172-178 |
|
Feasibility study of hybrid power plant
Abstract
Increasing electricity demands, rising prices of fossil fuels, limited fossil fuel like coal and environmental concerns are the major factors which motivate to use renewable energy resources for electricity generation. By using renewable resources as alternatives, this would definitely help in overcoming the global warming effect. Hybrid energy system is a combination of generating electrical power with different renewable resources such as solar, biomass, wind, biogas, hydro along with the usage of diesel generators. This paper includes the study of combined solar and biomass hybrid system for generation of electric power. In rural areas, hybrid system brings reliability in electrical power, cost effectiveness and improvement in the quality of life. Different renewable resources are required to be integrated to meet load demands of any area. So in this study we have combined solar and biomass system and use this system as hybrid. Per unit cost of energy generation will be less in hybrid system as compared to cost incurred in operating both the systems as standalone.
25 |
|
|
179-185 |
|
Generation of Shares Using Secret-Sharing Method for Authentication of Colored Document Images
Abstract
Nowadays, Image Processing is the Fastest Growing Area of Research and Development. But with advance digital technologies, it is a big challenge to sharing a data and authenticate the same. So,to overcome image authentication problem, it is very essential to develop effective methods, particularly for images whose security must be preserved. In this paper, we are introducing a secret sharing technique for authentication of document images with self-repair capability for fixing tampered image content. The input image is assumed to be any color document image. Generate the several shares using the secret sharing Scheme, which is then embedded in the alpha channel to create an authentic image. The alpha channel is act like a carrier. The alpha channel is combined with the original cover image to form a PNG image. While shares embedding process, the computed shares values are mapped into a range of alpha channel value near their maximum value of 255 to yield a transparent stego image. In the process of image authentication, the block in an image is marked as a tampered if the authentication signal computed from the current block content of a binary image does not match that extracted from the share embedded in the alpha channel plane. Data repair is applied to each tampered block after collecting two shares from unmarked block.
26 |
|
|
186-191 |
|
K-NN Classifier for Relationally Encrypted Data
Abstract
With internet expanding in every aspect of businesses infrastructure, it becomes more and more important to make these businesses infrastructures safe and secure to the numerous attacks perpetrated on them conspicuously when it comes to denial of service (DoS) attack. IP is an internet protocol each and every system having a unique address to use this address to communicate to the internet. The attacker spoofing the source address to trace the information
27 |
|
|
192-203 |
|
Disjoint Multipath Routing for Failure Recovery in IP Networks Using Edged Spanning Tree with Wakeup
Abstract
Internet faces many challenges due to link failures. In most of the existing system the failure recovery is made with the help of finding another path to reach the destination but this recovery path may leads to loop formation. In-order to avoid the infinite loop formation we have selected the spanning tree. The contribution of this paper is given as the first contribution of this paper is constructing disjoint paths for failure recovery and multipath routing. The infrastructure necessary for reactive failure recovery schemes is exploited to provide disjoint paths for multipath routing during link failure time. The second contribution of this paper is about the overhead occurred in finding the multipath. The last contribution of this paper is reducing energy usage by keeping the nodes to standby state and ¬¬wakeup the nodes whenever there is a necessary for the nodes to transmit the packets using the line cards. We illustrate how the spanning trees rooted at a destination may be employed to achieve multipath routing and IP fast recovery. In this method we keeps the host processor in a standby mode, which only consumes a small fraction of power but will reduce the traffic by saving the wakeup time. The traffic formed is considerably reduced during wakeup in standby to sleep mode when compared to sleep to wakeup mode. We propose a new line card design with two major changes. A separate power supply is dedicated to the CPU and its circuits related to it to keep them running during line card is at sleep state and then the nodes on the selected path are made to wakeup.
28 |
|
|
204-212 |
|
FLOOD MONITORING OF ROANU CYCLONE USING NATIONAL AERONAUTICS AND SPACE ADMINISTRATION (NASA) WEB TOOLS
Abstract
A cyclone is a large scale air mass that rotates around a strong center of low atmospheric pressure. The term 'cyclone' actually refers to several different types of storms. They occur in different places, and some occur over land while others occur over water. What they all have in common is that they are spinning storms rotating around that low-pressure center. Roanu cyclone which was occurred 17th may 2016 along the coast of Bay of Bengal. In this study the coastal corridor Visakhapatnam and Srikakulam districts were considered form observations of Rainfall depth and Flood intensity from National Aeronautics and Space Administration (NSAS) web tools. These web tools designed based on TRMM observations for prediction of Rainfall and Flood. The observations are made from Global Flood Detection System Ver. 2.0 (GFDS) and Global Flood Monitoring System (GFMS). The main threat of Roanu cyclone effected to coastal belt of Visakha and srikakulam on 21st May 2016 which was confirmed from these web tools. The one day accumulated rainfall depth observed nearly 50-100 mm at Visakhapatnam and 100 -150 mm at Srikakulam.
29 |
|
|
213-222 |
|
STATISTICAL ANALYSIS OF VEHICULAR CARBON MONOXIDE AND METEOROLOGICAL VARIABLES IN NEW DELHI
Abstract
The statistical analysis has been done to study the general characteristics of real time concentration of vehicular carbon monoxide (CO) and its correlation with meteorological variables namely wind speed, temperature, humidity, and wind direction. The continuous hourly concentration of CO and meteorological variables were measured at Indian Institute of Technology, Delhi (IITD) during Jan.,1997- Aug.,1998. In order to depict the proportion of variance in CO concentration accounted for by the predictors i.e. time & meteorological variables in four seasons, regression analysis has been done using SYSTAT. Pearson correlation coefficient & coefficients of regression equation also have been calculated for all the four seasons considering one, two, three and four independent variables using SYSTAT. The conventional statistics student’s t - test and f - test were used to know quantitatively the effect of seasons on the concentration of CO.
For 1997, it is observed that average of weekend concentration of CO was significantly higher during early morning to till late afternoon, though in the evening it is lower compared to the average of weekdays concentration which is contradictory to first hand expectation. In 1998 there is shift in period which may be due to lack of data in 1998. It has been observed that percentage of concentration is considerably high both in 1997 and 1998 in comparison to the prescribed limits by Government of India.
The CO concentration is found inversely correlated with wind speed and temperature and positively correlated with humidity. It is found both positively as well as negatively correlated with wind direction. In all the four seasons independent variable wind speed is the most significant variable. It was also found that mean is significantly same in autumn & winter seasons and it is significantly different in summer & rainy and rainy & autumn seasons. The f - test confirms the above result.
30 |
|
|
223-227 |
|
Resonance Characteristics of Laminated Twisted Composite Cantilever Panel
Abstract
The twisted cantilever panels have basic applications in wide concordance turbine sharp edges, compressor edges, and fan bleeding edges and particularly in gas turbines. Helper parts subjected to in-plane incidental forces may provoke parametric resonation, in view of particular mixes of the associated in-plane weight parameters and the standard repeat of transverse vibrations. The instability may happen underneath the essential load of the structure under compressive weights over wide extents of excitation frequencies. Composite materials are continuously used as weight bearing assistant parts in aeronautics and sea structures, autos, weight vessels, turbine forefronts and various other building applications because of their high specific quality, specific strength and tailor ability. In this way, the parametric resonation characteristics of secured composite turned cantilever loads up are of amazing specific centrality for cognizance the dynamic behavior of structures under in-plane infrequent weights. This is a player in static and component soundness behavior of overlaid composite pre twisted cantilever panels is focused on in the present examination.
The study revealed that, in view of static piece of weight, the unsteadiness zones tend to move to lower frequencies. The onset of instability happens earlier with augmentation of purpose of bit of board with more broad frailty locale. Not in any way like bowed plates, there is basic deviation of the precariousness behavior of twisted round and empty sheets from that of untwisted barrel formed sheets. Tantamount behavior is also looked for the assortment of precariousness range of bended round and hyperbolic paraboloidal sheets. The excitation repeat lessens from square to rectangular sheets with addition of perspective extent. The handle presentation basically impacts the onset of instability and the width of the zones of wobbliness.
Thusly the precariousness behavior of wound cantilever sheets is affected by the geometry, material, handle lay-up and its presentation. This can be used to the upside of fitting in the midst of framework of composite reshaped structures.
31 |
|
|
228-230 |
|
Social Media Content Analysis
Abstract
Social media may be a platform wherever individuals will specific their opinions and concepts and communicate with other people from everywhere the globe. Social media will receive text, audio, video and pic formats. Social media promoting may be a method that created it doable for firms to introduce their merchandise and services within the net, and reach a community and customers that they might not reach with traditional promoting channels. Content analysis on social media will facilitate firms to create their marketing methods. Firms will verify the recognition of their merchandise and sentiment analysis can be accustomed study the general public response regarding the corporate merchandise.
32 |
|
|
231-238 |
|
Numerical Solution of Advection-diffusion problems by using parallel Computing
Abstract
Mathematical models of advection- diffusion of atmospheric pollutants have been solved by parallel programming and obtained results have been compared with the numerical results obtained from sequential programming of mathematical models [1]. In sequential programming, governing equations have been fractioned by fractional step method and results obtained from prior processes have been used as initial condition for next process, though they are happening simultaneously in the atmosphere. Error introduces due to time gap in run of the code of various processes. Therefore, numerical methods with very small time step are being used to solve these models. Due to small time step number of computations increases and as consequence error increases. Parallel programming computes all the concurrent procedures in parallel therefore it reduce the errors because there is no time difference between the run time of the code of two or more simultaneous processes.
In this paper parallel computing, steps have been considered based on physical processes. For parallel computing three systems with LAN card were used. C programs were run on Knoppix operating system using MPI routines and BCCD bootable Cluster CD and predicted results have been compared with results obtained by sequential programming. In sequential programming C code was run on gcc compiler running on Linux and FORTRAN 77 Programming was run on DOS. It was observed that CPU time was very less in parallel computing in comparison to sequential programming for achieving steady state.
In the first model, conversion of primary pollutants, emitted elevated crosswind source, from to secondary pollutants, advection-diffusion, settling and deposition of primary as well as secondary pollutants have been considered. No source was considered for secondary pollutants. In the second mathematical model advection - diffusion of atmospheric pollutants emitted from continuous crosswind elevated line source and their settling in the atmosphere and deposition on the ground has been calculated by using parallel computing It is a particular case of first model.. In addition to continuous crosswind line source two other types of time dependent crosswind elevated line sources i.e. instantaneous and periodic sources have also been considered.
33 |
|
|
239-246 |
|
Enhanced Ground Bounce Noise Reduction In a Low Leakage 45nm 0.7Volt CMOS Full Adder Cell
Abstract
Multi-threshold CMOS (MTCMOS) technology is an effective sub-threshold leakage power reduction method in CMOS circuits, which satisfies high-performance and low-power design requirements. The optimization of virtual supply network plays an important role in MTCMOS low-power design..In modern high performance systems-on-chips (SoCs), more than 40% of the total active mode energy can be dissipated due to the leakage currents [1]. With more transistors integrated on-die, leakage currents will soon dominate the total energy consumption of high performance SoCs. Furthermore, leakage current is the only source of energy consumption in an idle circuit. The battery-powered portable systems such as cell phones and laptop computers tend to have long standby modes. Reducing the leakage energy consumption of the portable systems during these long idle periods is crucial for a longer battery lifetime. This paper is based on leakage current and active power reduction in 10t structured pass transistor based single bit full adder using MTCOMS techniques for 45nm scale using cadence tool. A 20 ns access time and frequency 0.05 GHz provide 45 nm CMOS process technology with 0.7 V power supply is employed to carry out 1-bit Full Adder.
34 |
|
|
247-254 |
|
High Speed Coherent Optical OFDM System using Adaptive Volterra Equalizer
Abstract
This paper addresses OFDM (orthogonal frequency division multiplexing) transmission over optical links with high spectral efficiency, i.e. by using high-order QAM-modulation schemes as a mapping method prior to the OFDM multicarrier representation. Here we address especially coherent optical OFDM modem in long distance which is affected by nonlinear distortion caused by fiber nonlinearity. Fiber nonlinearity is a major performance-limiting factor in advanced optical communication systems. We proposed a nonlinear electrical equalization scheme based on the Volterra model. To Compare with other popular linear compensation technique such as the LMS (least Mean Square), simulation results are presented to demonstrate the capability of a Volterra model based electrical equalizer used in a coherent optical orthogonal frequency division multiplexing system. It is shown that the Volterra model based equalizer can significantly reduce nonlinear distortion.
35 |
|
|
255-260 |
|
Secure & Dynamic Multi-Keyword Ranked Search and Storing Encrypted Data on Cloud
Abstract
As the cloud computing technology emerged during the last decade, outsourcing data to cloud service for storage becomes an attractive trend, which benefits in careful efforts on heavy data maintenance. since the outsourced distributed storage is not fully reliable, it raises security worries on the most proficient method to acknowledge information identical in cloud while accomplishing honesty inspecting. In this work, we examine the issue of uprightness evaluating and secure bit duplication on cloud information. In particular, going for accomplishing both information honesty and deduplication in cloud, we propose two secure frameworks, to be specific SecCloud and SecCloud+.
SecCloud presents a reviewing element with not keeping a MapReduce cloud, which helps the customers to produce information labels before transferring and in addition review the respectability of information have put away in cloud. Because of previous work the calculation by client in SecCloud is enormously decreased amid the document transferring and reviewing stages.
SecCloud+ is outlined inspired by the way that customer dependably need to encode their information before transferring, and empowers respectability reviewing and secure deduplication on scrambled information.
36 |
|
|
261-264 |
|
Multimedia Encryption Using Visual Cryptography
Abstract
The proposed system will include encryption and decryption of multi-media files (Documents, images, audio, video) using AES (Advanced Encryption Standard) and Visual Cryptography. The input multi-media file will be first converted to a encrypted text file using Base64 Encoding mechanism. That encrypted text file would undergo AES encryption using AES Keys so that the attacker cannot retrieve the secret information without the key. AES Algorithm is a Symmetric Block Cipher; it means that it will use the same Key for both Encryption and Decryption. AES is widely adopted and supported in hardware and software. The encrypted image or the resultant image that would get generated after applying AES Algorithm would now undergo Visual Cryptography using the visual cryptographic keys. And then the final encrypted image or the cipher images created after this process will be the final output of the encryption process. The Decryption Process is exact reverse of this. Firstly the output image would be decrypted using visual cryptographic keys i.e. it would undergo Visual Cryptography. Then it would undergo AES decryption algorithm using the same AES Keys. Then Base64 Decoding would be done upon the output image of the above step. And finally we would generate the original multi-media file.
37 |
|
|
265-270 |
|
A Keyless Approach To Image Encryption
Abstract
It's difficult to maintain the secrecy of image is the main area of research. Two different approaches are followed, first is encrypting the images through encryption algorithms using keys and the other approach involves dividing the image into multiple random shares to maintain the images secrecy. Since heavy computational cost and key management limit the use of the first approach. In this study paper, we propose an approach which involves no use of encryption keys. The approach involves the use of a hybrid algorithm which is a combination of SDS and Transformation over discrete image blocks. It employs Sieving, Division, and Shuffling to generate random shares which are further split and transformed.
38 |
|
|
271-279 |
|
Experimental Analysis on Variable Compression Diesel Engine Fuelled With Tire Pyrolysis Oil and Diesel Blends
Abstract
Conventional powers are diminishing because of increment in industrialization and modernization. The cost of traditional energizes is continuing expanding everyday furthermore expanding natural contamination because of more use. On the off chance that this goes ahead there will be no more conventional fuels. There is a need to hunt down option powers for the vehicle applications. In this way in the present venture the oil taken is the tire pyrolysis oil which is gotten by the pyrolysis of the waste vehicle tires and used transformer oil. In the initial step the test were directed to Variable Compression Ratio single cylinder diesel engine. The experimental investigations were carried out on the engine by utilizing 25% tire pyrolysis oil, (TPO), with diesel fuel (DF) to discover the performance parameters and emissions, it was observed that there are no CO and HC discharges. NOx and CO discharges when contrasted with diesel were seen less. Going to the engine performance Blends gave more brake thermal efficiency than diesel.
39 |
|
|
280-287 |
|
Design of Low Cost Weather Station with Ethernet Connection for Sudan
Abstract
Weather stations were install in Sudan before many decades, and so Sudan has a rich whether information records. In this paper we present a design of a weather station that automatically connected to a remote computer -works as a center- through a computer network, beside it gives the center the ability of request readings and check the status of the station, and so a deep control of readings scheduling in the center. The weather station is designed to measure temperature and humidity. A computer connected to a network was used to be a center to the station, and a PIC microcontroller with sensors was utilized to construct the station. The results from the simulation of the system are shown.
40 |
|
|
288-295 |
|
Dairy Production Analysis and Prediction Tool using BIG DATA
Abstract
Accurate prefiguring of everyday milk production is a fundamental aspect of the dairy industry. During the past decades, although many models using numerous data analytic techniques have been suggested in the literature to address the milk production to prefigure the problem, these models have yet to be widely applied in daily operations. Given the increasing amount of milk production information collected every year, trouble also arises for studying big data. To deal with the challenges in dairy supply chains and help dairy producers, specifically for large-scale industry and to make use of data analytics in milk supply decision-making, a targeted effort is developed which is a feasible and cost-effective technique entitled as Milk Production Analysis and Prediction Tool. For analysis proposed system uses MACD (Moving Average Convergence Divergence) and RSI (Relative Strength Index). The blend of MACD and RSI facilitate the monitoring of real time progress of a company as well as futuristic analysis. For example, milk producer can use big data analytics to increase new visions about their customers in order to make the decision regarding sales and also to improve the speed of processing big amounts of organized sales data and to deliver data cost efficiently.
41 |
|
|
296-298 |
|
Tannery waste water treatment
Abstract
The main purpose of treating tannery waste water is to remove or reduce the hazardous materials that effects on environment when disposal un treated effluent ,we are focusing in these research on chrome level, and other pollutants ,the analysis of waste Water samples determine ph , cod (chemical oxygen demand), BOD (biological oxygen demand), TSS (total suspended solid ), TDS,(dissolved solid)and chromium percentage.
The result of study show the efficiency of tannery waste water treatment system in way correspond with Sudanese standards in waste water, and also some suggestion and recommendation to facilitate the process and obtain acceptable results .
42 |
|
|
299-303 |
|
PC-Based Center for Weather Stations in Sudan
Abstract
Monitoring and recording weather variables are very important; and of course a center for collecting weather data from various stations over country. This paper presents a low cost design of a center that collects weather data from weather stations in Sudan, to increase precision and flexibility in scheduling readings and so rich the weather data records. This paper presents a center based on a PC connected to the weather stations in Sudan through a computer network, displays weather data from all stations, gives a deep control for scheduling the weather data readings, and detects faulty stations. The system contains a PC connected to a network through Ethernet and software. A simulation of the center and one station was done. The system was tested under various settings and readings and passed the tests as in the specifications of design. The paper provides a center -with low cost- that can be connected to weather stations all over the country as well as the ability of recording the data and making a database.
43 |
|
|
304-312 |
|
Investigating Security and Privacy using Multicloud Architecture
Abstract
Security challenges are largest barrier in view of assumption of cloud services. There are set of investigation actions and amount of schemes are done on clearing those difficulties. Away from these security problems, the cloud consists of group of distinct characteristics, proficiency and structure. It produces a survey on feasible security excellence by manufacturing utilization of numerous definite clouds at the same time. Different definite structures are launch and talk over as stated by their security and privacy capacity and expectation. This system proposes the privacy and security to cloud users with less computation cost and minimum time. By using that Multicloud architecture this system is used AES algorithm to provide security to cloud user’s data. The propose system improved the security using AES algorithm. The file is devided on two clouds that are DriveHQ cloud and Dropbox cloud. So this system provides high privacy and security to users.
44 |
|
|
313-317 |
|
Review of Fluoropolymer Helical coil Tube in tube Heat Exchanger
Abstract
The transfer of heat is very important process in many engineering applications; generally the heat exchanger is used to transfer the heat. Heat exchangers are the devices which facilitates the exchange of heat between two fluids which are at different temperatures separated by a solid wall. But due to continuous flow of fluid in the tubes of heat exchanger may corrode the tubes as well as decreases the quality of fluid like degradation of thermal conductivity, mass flow rate, viscosity & density. So to overcome the above disadvantages inner tube is replaced by a fluoropolymer tube. Fluoropolymer tubes are chemically inert in nature as well as sustain the non corrosive nature. The fluoropolmer tubes are manufactured from high thermal conductivity PFA (Perfluoroalkoxy) polymers. Due to low cost, light in weight & non corrosive nature it is widely replace the metallic heat exchangers in many engineering applications. Due to use of such material efficiency & life of heat exchanger increases, which is indirectly economical? [line spacing 1.0]
45 |
|
|
318-323 |
|
STABILIZATION OF SOIL REINFORCED WITH QUARRY DUST
Abstract
The paper explore the feasibility of using quarry dust to investigate the possibility of stabilization of soil using quarry dust. Soil stabilization incorporates the various methods employed for modifying the properties of a soil to improve its engineering performance. It involves the use of soil, soil minerals and stabilizing agent or binders to improve its geotechnical properties such as compressibility, strength, permeability and durability.In the present investiagtiom the extensive laboratory testing was carried out on clayey soil and on clayey soil reinforced with quarry dust. Modified Proctor’s test was carried out on plane soil and soil mixed with different percentage of quarry dust and the optimum percentage of quarry dust is obtained.
46 |
|
|
324-326 |
|
Speed car of high away
Abstract
In this paper , a system designed to record and report on discrete activities within a process is called as Tracking System. In the same procedure we have developed a methodology of vehicle speed & direction system for robotics to control and achieve accurate direction speed for a class of non-linear systems in the presence of disturbances and parameter variations by using wireless communication technique. In this methodology we are using a micro controller, resulting in the state trajectory 'sliding' along path-varying slides on the surface. This idealized control law achieves perfect direction & speed however. The method is applied to the control of a two-link manipulator handling variable loads in a flexible manufacturing system environment . The main objectives of this study are construct a model of a speed checker by using two IRLED’s and photodiode pairs. and develop circuit built around Pica 18f452 microcontroller , develop codes in assembly language for this model.