No. |
Title and Author |
Area |
Country |
Page |
151 |
IMPROVING THE THROUGHTPUT IN VEHICULAR NETWORKS
-C.ABHISHEK ; A.CHARITHA
Vehicular communication networks have emerged as a promising platform for the deployment of safety and infotainment applications. The stack of protocols for vehicular net- works will potentially include Network Mobility Basic Support (NEMO BS) to enable IP mobility for infotainment and Internet-based applications. However, the protocol has performance limitations in highly dynamic scenarios, and several route optimization mechanisms have been proposed to overcome these limitations. This article addresses the problem of IP mobility and its specific requirements in vehicular scenarios. A qualitative comparison among the existent IP mobility solutions that optimize NEMO BS in vehicular networks is provided. Their improvements with respect to the current standard, their weaknesses, and their fulfillment of the specific requirements are also identified. In addition, the article describes some of the open research challenges related to IP mobility in vehicular scenarios. . This paper studies the 802.11p/WAVE standard and its limitations for the support of infrastructure-based IP applications, and proposes the Vehicular IP in WAVE (VIP-WAVE) frame- work. VIP-WAVE defines the IP configuration for extended and non-extended IP services and a mobility management scheme sup- ported by Proxy Mobile IPv6 over WAVE. . Extensive simulations are performed to demonstrate the accuracy of our analytical model and the effectiveness of VIP-WAVE in making feasible the deployment of IP applications in the vehicular network. Read More...
|
ELECTRONICS AND COMMUNICATION ENGINEERING |
India |
594-598 |
152 |
Enhancing dynamic directions and trajectories
-suganthini ; Aishwarya; Shireen sithara
This paper presents a smart driving direction system leveraging the intelligence of experienced drivers. In this system, GPS-equipped taxis are employed as mobile sensors probing the traffic rhythm of a city and taxi drivers' intelligence in choosing driving directions in the physical world. We propose a time-dependent landmark graph to model the dynamic traffic pattern as well as the intelligence of experienced drivers so as to provide a user with the practically fastest route to a given destination at a given departure time. Then, a Variance-Entropy-Based Clustering approach is devised to estimate the distribution of travel time between two landmarks in different time slots. Based on this graph, we design a two-stage routing algorithm to compute the practically fastest and customized route for end users. We build our system based on a real-world trajectory data set generated by over 33,000 taxis in a period of three months, and evaluate the system by conducting both synthetic experiments and in-the-field evaluations. As a result, 60-70 percent of the routes suggested by our method are faster than the competing methods, and 20 percent of the routes share the same results. On average, 50 percent of our routes are at least 20 percent faster than the competing approaches. Read More...
|
computer science and engineering |
India |
599-603 |
153 |
Dynamic View for Next Higher Level Item in Assembly for Effective BOM Management
-MOHAMMAD FAYYAZ ; Dalvi Sandip
As the world is moving towards dynamism so is the technology. This article is to propose a dynamic methodology in PLM tool. According to industry need this paper aims to define a solution as to develop a custom view in Teamcenter to have a “Dynamic view†for items in Teamcenter. The proposed methods is to use Service Oriented Architectures, which best suitable to solve the problem of service personalization in large smart environments like PLM; where number of potential users, data and potentially available services is rapidly growing. Methodology is to design a service which will search the database for all level parent items in the assembly according to the Where Used and represent the result in a tabular view. Then user can easily analyze the impacts of item which will save the time of data searching and help to effectively manage the BOM. Read More...
|
Teamcenter customization |
India |
604-608 |
154 |
IMPLEMENTATION OF MDP OVER MOBILE AD HOC NETWORKS
-T.Premkumar ; K.Vanitha; M.Mohammed Musthafa
We consider the location service in a mobile ad-hoc network (MANET), where each and every node needs to maintain its information about location by 1) often updating its positional information within its neighboring region, which is called neighborhood update (NU), and 2) frequently updating its location information to specific distributed location server in the network, which is called location server update (LSU). The tradeoff between the operation costs in location updates and the performance losses of the target application due to location errors imposes a crucial question for nodes to decide the optimal strategy to update their location information, where the optimality is in the sense of reducing the overall costs. In this paper, we develop a stochastic sequential decision framework to analyze this problem. Under a Markovian mobility model, the location update decision problem is modeled as a Markov Decision Process (MDP). We first investigate the monotonicity properties of optimal NU and LSU operations with respect to location inaccuracies under a general cost setting. From the discovered separation property of the problem structure and the monotonicity properties of optimal actions, we find that 1) there always exists a simple optimal threshold-based update rule for LSU operations; 2) for NU operations, an optimal threshold-based update rule exists in a low-mobility scenario. In the case that no advance knowledge of the MDP model is available, we also introduce a practical model-free learning approach to find a near-optimal solution for the issue. Read More...
|
Computer Science and Engineering |
India |
609-612 |
155 |
Floating Point Unit(FPU) for FPGAs
-NIKHIL SS ; NIKHIL SS; SHEELA DEVI ASWATHY CHANDRAN
Floating point describes a method of representing an approximation of a real number in a way that can support a wide range of values. The numbers are in general, represented approximately to a fixed number of significant digits (the mantissa) and scaled using an exponent. The base for the scaling is normally 2, 10 or 16. Floating point arithmetic and logic unit require many algorithms. Then again, many scientific applications require floating point arithmetic because of high accuracy in their calculations. FPGAs are becoming more suitable for supporting high speed floating point arithmetic units. Floating point units are widely used in digital applications such as digital signal processing, digital image processing and multimedia. Many algorithms depend on floating point arithmetic because floating point representation supports huge range. So many algorithms are used to define the arithmetic operations such as Addition, Subtraction, Multiplication and Division. In top-down design approach, four arithmetic modules, addition, subtraction, multiplication and division are combined to form a floating point arithmetic unit and the logical operations such as logic gates and shifting operations are combined together to form logic unit. For the synthesis and simulation Xilinx 13.2 is required. Read More...
|
Electronics Engineering |
India |
613-617 |
156 |
Environmental Governance and Policy: Water
-Sahil Pratap Singh ; Yash Johri
The related terms, "sustainable" and "sustainability" are popularly used to describe a wide variety of activities in the environment which are generally ecologically laudable but which may not be sustainable. The sustainable development agenda has introduced a number of principles to guide policy-making – for example, long-term planning horizons should be employed, equity implications should be considered, and opportunities for international cooperation should be sought. One of the principles that has been relatively easy to agree upon is environmental governance and policy (EGP).It refers to the “the sum of organizations, policy instruments, financing mechanisms, rules, procedures and norms that regulate the processes of global environmental protection. The purpose of this paper is to provide a literature review of the EGP concept and how it has been studied and evaluated in practice, in order to identify the key reasons due to which we are not able to sustain our environment properly. Following a brief overview of EGP initiatives at the national and domestic level in India, three questions have guided the literature review. First, what is meant by EGP? The examination of a range of conceptions suggests that the two most important differences at the conceptual level are whether a weighting criterion giving ‘principled priority’ to environmental objectives or not, and whether it is seen as process or an output. . Second, how make EGP work to obtain sustainable environment? The review of both theoretical and practitioner-oriented literature suggests that variables and measures for EPG can be roughly divided into three broad and inter-related categories: normative. Leadership, overall policy framework, change of policy-making culture), organizational (e.g. integrating non-governmental organization, change of the budgeting process), and procedural factors (e.g. EGP strategies and action plans, regularly monitoring on plans, systematic impact assessment procedures). ). Thirdly, what criteria can be used to evaluate the degree of EGP? While there are a few different sets of procedural criteria for evaluating specific EGP measures, there is a lack of criteria for evaluating the degree of EGP in substantive policy outputs resulting from ‘normal’ sector policy-making. The paper is concluded by highlighting key conceptual choices and making recommendations for further EGP study, including more theory-driven and explorative approaches. Read More...
|
Environmental Engineering |
India |
618-621 |
157 |
Implementation of Privacy Algorithm for Data Publishing
-S. Subashini ; R. Mohana Bharathi
With numerous organizations collecting customer data there exists a possibility of data sharing for exploring interesting data about behavior of customers. This leads to identification of customers which can be treated as a privacy threat according to directives. These acts insist that anonymity should be guaranteed if the customers wish so. A customer data normally contains attributes like SSN name, age, postal code, date of birth and gender. This data enables identification of the individuals even though information like SSN and Name suppressed. This was first identified. The solution proposed k-anonymity property to be applied to the data before release. Subsequently several solutions were published. Most of them addressed issues related to preserving privacy of individuals related to a single organization. This paper discusses an approach to protect privacy when anonymized data of two or more organizations is integrated. Read More...
|
COMPUTER SCIENCE AND ENGINEERING |
India |
622-623 |
158 |
Sybil Clutches: Apprehension And Attestation
-prof.Nidhi Sharma ; Ashwini A Dange; Monali M. Kamthe; Swapnil S. Menge
Sybil attacks are one of the well-known and powerful attacks against online social networks. Sybil users propagate spam or unfairly increase the influence of target users. However, sybil users alone do not harm the system. What is really dangerous that multiple sybil users collude together and form a sybil clutch. In this paper, we present the first attempt to identify and validate sybil clutches in online social networks. We build sybil clutch detector based on multiple attributes such as based on last login time, register time, friend establishment time etc. Our sybil clutch apprehension and attestation mechanisms have important implications for system design to defend against sybil attacks in online social networks.we verify that the largemajority of links between Sybil accounts are created accidentally, unbeknownst to the attacker. Read More...
|
computer Engineering |
India |
624-627 |
159 |
A Review Study on CFD Analysis and Experimental Study on Impeller of Centrifugal Pump
-Alpeshkumar Ramabhai Patel ; Neeraj Dubey
A subject of this paper is CFD analysis and experimental study on the impeller of centrifugal pump. The geometrical design data of impeller is measured manually with precision measuring instruments. The impeller's geometry is transferred into 3D CAD modelling software. The paper also presents the result of original geometry and validation of test result and CFD analysis result. The aim of CFD analysis is to optimize the geometry of impeller and improve the head of pump. Read More...
|
Mechanical Engineering |
India |
628-630 |
160 |
Improve Vision of Travel System for Blind People
-Patel Nimishaben Chandubhai ; Patel Hemangini Hiteshbhai; Patel sejalbahen Kishorbhai; Padariya Krishnaben Maheshbhai
This paper intends to solve the problems of visually impaired persons for travelling in bus. Degradation of the visual system can lead to dramatic reduction of the mobility. So a visually impaired person faces many difficulties in their day to day life. One big challenge for them is to transport from one place to another. So we are making a device which makes travelling easier for them. It will help them to get information such as bus timings, routes and stations. Nowadays means the technology world which is day by day progressing fast has contributed many special devices for visually impaired person. So our system is gift for them. Read More...
|
Electronics and communication |
India |
631-632 |
161 |
Multi-level Authentication Scheme Using Textual-Graphical Password Method
-Akshay Phadake ; Rohit Mathur; Bharat Modi; Sheetal Thakare
In Information Technology security plays an integral part which is braced by authentication process. One of the most commonly and traditionally used authentication method is alpha-numeric username and password which are vulnerable to many attacks such as spyware attack, shoulder surfing, brute force etc. To vanquish the cons of traditional methods, graphical and visual passwords have been introduced as possible substitute to text-based scheme. We are in the process of implementing a strong authentication scheme in which text are used along with images and Draw a Secret (DAS) scheme to generate the session password. In addition to this we would make use of an unique SMS service in which the generated session password is being forwarded to the user. Read More...
|
Computer Engineering |
India |
633-635 |
162 |
Comparative Study Of Different Classifier For Gujarati Off- Line Text Recognition
-Ashwin R. Dobariya ; Dr.V.R.Rathod
During the last fifty years, handwritten character recognition (HCR) has most often been targeted under the research of character recognition (OCR). This paper presents an experimental review of the efficiency of various classifiers for text recognition in terms of accuracy. The paper gives an overall idea about recognition results of different classifiers and provides new information & benchmark for future research for improvement in field of recognition. Here we have given comparative study of different Classifier for Gujarati offline text recognition. Read More...
|
Computer Science & Applications |
India |
636-638 |
163 |
Blue Eyes Technology
-CHANDANI R.SURYAWANSHI ; T. Raju
It seems to be a fiction, but it will be the life lead by “BLUE EYES†technology in the very near future. The basic idea behind this technology is to give the computer the human power. We all have some perceptual abilities. That is we can understand each other’s feelings. For example we can understand ones emotional state by analyzing his facial expression. If we add these perceptual abilities of human to computers would enable computers to work together with human beings as intimate partners. The “BLUE EYES†technology aims at creating computational machines that have perceptual and sensory ability like those of human beings. The Blue Eye system has hardware with software loaded on it. Blue Eye system can be applied in every working environment requiring permanent operator's attention for it. The hardware comprises of data acquisition unit and central system unit. The heart of data acquisition unit is ATMEL 89C52 microcontroller. Bluetooth technology is used for communication and coordination between the two units. Blue eye system can be applied in every working environment,which requires permanent operator’s attention. Blue eye system provides technical means for monitoring and recording human operator’s physiological condition. A blue eye is a project aiming to be a means of stress reliever driven by the advanced, technology of studying the facial expressions for judgment of intensity of stress handled. In totality blue eye aims at adding perceptual abilities which would end up in a healthy stress free environment and can be applied in every working environment requiring permanent operator’s attention. Read More...
|
WIRELESS COMMUNICATION |
India |
639-644 |
164 |
Fast Current Control Strategy of PWM Inverter used for STATCOM
-GAMIT HITESHKUMAR PRAVINBHAI ; ASHOK L VAGHAMSHI; AKASH M KUBAVAT
The Advanced Static VAR Compensator (STATCOM) uses a high power self-commutating inverter to draw reactive current from a transmission line. The STATCOM is based on the principle that a self-commutating static inverter can be connected between three-phase AC power lines and an energy-storage device, such as an inductor or capacitor, and controlled to draw mainly reactive current from the lines. This report deals with the modelling and control of an STATCOM system with self controlled DC bus which employs a three phase PWM voltage source inverter. The STATCOM system is modelled using the d-q transform and employs a programmed PWM voltage wave shaping pattern to simplify the logic software and hardware requirements. The inverter system can compensate leading and lagging reactive power supplied by the load connected to the supply. This model is used to design an efficient control strategy based on the control of the Magnitude and phase angle of the switching pattern. Simulated results obtained with MATLAB are also presented Read More...
|
ELECTRICAL ENGINEERING |
India |
645-647 |
165 |
Performance Evaluation of Radio Frequency Transmission over Fiber using Optical Amplifiers
-DIVYA U ; SHEELA DEVI ASWATHY CHANDRAN
The growth of mobile and wireless communication is increasing the demand for multimedia services with a guaranteed quality of service. This requires realization of broadband distribution and access networks. Radio over Fiber technology has various advantages when it applies to wireless systems, especially, mobile communication radio networks. Radio-over-Fiber (RoF) system mainly uses two modulation techniques ie; direct- and external-laser modulation. In RoF technology, the fiber dispersion and chirp parameters are the important parameters in degrading the performance of optical communication systems. External modulators of Mach-Zehnder type minimize the transmission power penalty due to fiber chromatic dispersion. So these modulators are also known as chirp-free modulators. Also, better suppression of nonlinear distortion is achieved by using Mach-Zehnder external modulator. Data is either externally modulated by using single-electrode (SEMZM) – and dual electrode (DEMZM) – Mach-Zehnder modulator. This work presents a simulation comparison of external modulation schemes using different optical amplifiers, comparison of received electric Rf power with different optical amplifiers and calculation of BER at received channel. Simulation of external modulation using EDFA and SOA are performed by using OPTSIM 5.3. Read More...
|
Electronics and Communication Engineering |
India |
648-653 |
166 |
Development of SS-WDM and High Speed SS-WDM
-Renu S. ; Sujith Kumar V.
Multiplexing is a term used to refer the process where multiple analog or digital signals are combined and transmitted through same transmitting media. The technology of combining a number of such independent information carrying wavelengths onto the same fiber is called Wavelength Division Multiplexing (WDM). The conventional WDM system can hardly be applied to systems that require high data transmission rate regardless of short haul or long haul transmission line. But now-a-days, the demands for high data transmission are increasing and also the use of lasers as source in WDM systems had increased the overall cost. To overcome these issues a new technology called spectral slicing was developed which brings WDM technology one step more ahead of advanced technology. In spectral sliced WDM system, LED or ASE can be used as the low cost broadband source. These sources have high broadband spectrum, so it can be sliced spectrally into many independent signals with equal channel spacing. The main advantages of using Spectral Sliced WDM(SS-WDM) system includes low cost and high channel capacity. Here, in this paper the realization of spectral sliced WDM system using NRZ and RZ modulation formats is performed and evaluate the performance of the system for use in various optical access networks using Optisystem 12. Read More...
|
Electronics and Communication Engineering |
India |
654-658 |
167 |
Secure Warehouse with Automatic Stock Calculation
-Urvashi S. Chaudhari ; Falguni S. Patel; Nalina G. Patel; Yamini D. Patel; Prof. Dhrumil Patel
Better Inventory management is the most difficult task in case of big warehouse/go-downs which may have hundreds or lacs of items stored in time. Sometimes it may also include valuable goods like costly mobiles, diamonds, laptops etc. so there may be a chance of theft. While due to number of items it is difficult to carry out stock calculation frequently and reliably as it is human driven process. Hence a system is required which calculates the number and type of items and that gets displayed on screen. It may also be displayed which item has been removed or stolen as soon as it goes away. Hence it also provides security. The system includes RFID transmitters which are to be mounted on each item. RFID transmitter transmits the unique code continuously and it is received by the RFID receiver. It decodes the unique code and generates the binary pattern which is given to the 8051 microcontroller. Microcontroller calculates which kind of stock it is and update its record and displays it on LCD. By this Automatic stock calculation it reduces human effort and error as well as it increases the speed and security of goods. For better security purpose GSM Modem and PIR sensor are used. Read More...
|
Electronics and Communication |
India |
659-661 |
168 |
Deep Packet Analyzer By Using Proposed Aho-Corasick Algorithm
-Sushant Nalawade ; Reshma Walunj; Chandan Bhatte; Prof.D.R.Ingle
Deep Packet Analyzer (DPA) lies at the core of Intrusion Detection/Prevention Systems. This type of packet analyzer aims to identify various malware (including spam and viruses) by inspecting both the header and the payload of each packet and comparing it to a known set of patterns. This known set of pattern is stored in the signature database. Despite extensive research effort, ordinary anomaly detection systems still suffer from serious drawbacks such as high false alarm rates due to the enormous variety of network traffic. The intrusion detection system (IDS) proposed in this paper is operates on network flows rather than on entire network packets. Incoming traffic is analyzed using Aho-Corasick Algorithm and comparing with signature database. In short, the proposed IDS receive network traffic and analyze them with a Aho-Corasick Algorithm. Read More...
|
Computer Engineering |
India |
662-665 |
169 |
Easy Engineering: Android Application for Engineers
-Omkar Kamble ; Ashish Kambale; Krutika Bhatkar; Sagar Lawand
The aim of our project is to provide instance services to engineers through our application call "EASY ENGINEERING" an android application. This application is basically application suite, which consist of set of application module. Our agenda is to provide study related services through this application module. The idea came in mind, when we thought about our entire 3 years of journey. Engineers always need study related material at anytime and anywhere. This increase unnecessary stress, when student unable to get for what they are looking for. By using this application student can solve their problem instantly. This application provide set of application module which used by every Engineer every day, for example module like Scientific calculator, University question papers, aptitude, Searchable dictionary, GRE flashcards, , attendance checking s/w, maths formulae etc. Read More...
|
Engineering |
India |
666-669 |
170 |
A Survey on Botnet Analysis and Detection
-Divyang Rahevar ; Mr. H.P. Sanghvi
Botnets are the network of the computers that are compromised and controlled by the Botmaster or an attacker. Botnets are used for the spamming, phishing, stealing private information, click fraud and Distributed Denial of Service (DDoS) attack on computer networks. Different types of Botnets are used for the different purposes. The number of new Botnets in the network creates the challenge for the AV companies to detect them. This paper focuses on different types of Botnets and analysis and detection techniques. Read More...
|
Computer Engineering |
India |
674-676 |
171 |
Optimization of Solar-Wind hybrid power system for Distributed Generation
-Senjaliya Jaydeepkumar Dhanjibhai ; Asst. Prof. Divyesh Mangroliya; Mr. Sanjay shah
Solar and wind energy systems are omnipresent, freely available, environmental friendly, and they are considered as promising power generating sources due to their availability and topological advantages for local power generations. Hybrid solarwind energy systems, uses two renewable energy sources, allow improving the system efficiency and power reliability and reduce the energy storage requirements for stand-alone applications. The hybrid solarwind systems are becoming popular in remote area power generation applications due to advancements in renewable energy technologies and substantial rise in prices of petroleum products. This Paper presents simulation, optimization for the stand-alone hybrid solarwind energy systems with battery storage. Simulation and Optimization is done using HOMER (Hybrid Optimization Model for Electrical Renewable) software.Six different locations of Gujarat is selected for study with two different plant size i.e. 5 kWh/day, and 10 kWh/day. HOMER gives optimized rating of equipment except battery and calculation gives cost of energy. Read More...
|
Electrical Engineering |
India |
677-681 |
172 |
Realization of mixed HDWDM transmission system with minimum available channel spacing using different modulation formats
-JASEEN.A ; ANISHA A.P
Owing to the rapidly growing capacity requirement for long distance transmission, fiber optic telecommunication are advancing into high data rate and dense channel schemes enabled by wavelength division multiplexing(WDM).It is a technology which combines a number of optical carrier signals into a single optical fiber by using different wavelength of laser light. The latest version of WDM, High Density WDM achieves higher capacity by dividing a wavelength-band into even more channels. Today’s HDWDM system can combine up to 128 or more wavelength onto a single fiber. It is the method to minimize the channel spacing below 100GHz with high speed for data transmission. HDWDM system is still not widespread. The minimum channel spacing at high speed for data transmission is the main advantage which resembled from WDM and DWDM. In this work, the realization of mixed HDWDM transmission system using different modulation formats at 2.5Gbit/s bit rate and determine the channel interval at which successful transmission is possible. Simulation is done by using Optisystem ver.12. Read More...
|
Electronics Engineering |
India |
682-685 |
173 |
Enhanced Security in Mobile Adhoc Networks by using ECC Cryptography Technique
-A. Mohamed Ileeyas ; M. Balaji; A.N. Vinoth
A mobile ad hoc network (MANET) is a special type of wireless network consisting of a collection of nodes capable to communicate with each other without help from a network infrastructure. Due to its nature, providing security in this network is challenging. Because MANET has no any pre-existing fixed structure and mobile nodes sends packets to the destination nodes directsly or via the neighbouring nodes, it is of potential security concern because neighbour nodes cannot be trusted, While the routing aspects of mobile ad hoc networks (MANETs) are already well understood, and the research activities about security in MANETs are still at their beginning. In this paper, we propose an effective security Ad hoc On Demand Distance Vector (AODV) algorithm called ES-AODV to enhance the data security. And also we implement a technique using Elliptic Curve Cryptography (ECC) algorithm where the information is secured while passing through the nodes. Only the destination would be able to decrypt the data. This ensures that the finally received data has integrity. This protocol is energy efficient and uses low memory as we use the concept of Elliptic Curve Cryptography (ECC). Finally we analysing performance comparison of AOMDV with AODV using ns-2 simulations. Simulation results show that our algorithm provides a reasonably good level of security and performance Read More...
|
Computer Science Engineering |
India |
686-690 |
174 |
Forensic Analysis of Windows Server 2008 Physical Memory
-Harish Kumar ; Parry Gowher Majeed; Sumit Pundir
Due to the advancement of information technology and its ease of use, cyber-crime prevention demands serious attention. Physical memory forensics is relatively new field, wherein methods and techniques for collection, analysis and documentation of cybercrime activity evidences are studied. It has gradually moved into the focus of forensic investigator and researchers. To investigate any illegal activity on computer system, in most of the cases, sensitive information such as username, password and typed commands can only be found in physical memory. This paper explores a method based on search of sensitive information from different windows system states such as sleep state, logoff state, soft and hard reboot, for forensic analysis of Windows Server 2008 physical memory. The experiments were carried out in a virtual environment consisting of Windows Server 2008 operating system. Read More...
|
Digital forensics, Information Security, Physical Memory Forensics. |
India |
691-694 |
175 |
A Semantic Search Engine For Web Service Discovery By Mapping Wsdl To Owl
-ABDULNASEER.M ; S.Mohamed Yasir Hussain; A.Mohamed Ileeyas; R.Sahul Hameed
Web services is a web based API which provides functionality over web to integrate within web based applications. In such systems, there is often a machine-readable description of the operations offered by the service written in XML based markup language called the Web Services Description Language. The WSDL contains description about how the service can be called, what parameters it expects, and what data structures it returns. This WSDL file will be accessed by the search engine for the process of service discovery. Web services annotation is redefined to enhance the services discovery mechanism by mapping it to semantic annotations (OWL-S). The ontology mapping engine search for the keyword relationship with the existing keywords kept in the local ontology base and creates an ontology keyword list. There will be situation in which the local ontology database may not have the set of keyword relations to form an ontology keyword list. For that propose a standardization engine to fetches ontology which are not present in the local ontology database. This process of mapping mainly relies on a local ontology repository which is standardized using the global ontology base and by applying Onto-Ranking. It helps to manage the resultant that we get from the discovery process in an unsorted manner. Read More...
|
Computer Science and Engineering |
India |
694-698 |
176 |
Ensuring Distributed Accountability for Data Sharing in the Cloud
-Pallavi D. Rakh ; Vishwanath T. Kamble; Chetan Goje; Chinmay Shetty; Prof. Sulakshana Mane
Cloud computing is one of the latest technology which helps providing scalable service on the internet as per the needs of the users. All the data of the user are usually processed on a remote computer which is not known to the users. Because of this reason users fear of losing information as they do not have full control and access to their data This becomes a big barrier to the complete adoption of these features. To control this problem, in this paper we present a decentralized information accountability framework to keep track of the user’s data in the cloud. Here we enclose our logging information together with the user’s data and policies. We use the JAR technology to provide a trigger able authentication and automatic logging locals to the JARs, which will be dynamic and traveling objects. In this project, we will also be providing a distributed auditing mechanism. The experimental studies will show how efficient and effective the proposed system can be in the field of cloud computing. Read More...
|
Computer Engineering |
India |
699-702 |
177 |
Comparative Study of Various Distributed Clustering Algorithms
-AMITKUMAR KISHORBHAI DUDHAIYA ; Bakul Panchal
Clustering is the process of data segmentation in which data is grouped together based on similarity to form a cluster. These clusters are very useful to extract interesting patterns from large data. But as application grows it generates large amount of data. The growing need for distributed clustering algorithms is required to handle huge size of databases that is common nowadays. Normal (Centralized) clustering Algorithms lags when we have large amount of data. In this paper gives general classification and Analysis of Traditional Distributed Clustering Algorithms Read More...
|
Computer Science & Engineering |
India |
703-705 |
178 |
GPS Validation for QR Railway Ticket using Android
-Sneha Rambabu Singh ; Sagar Satish Chandane; Sneha Shivaram Bhagat; Prof. Dayanand R. Ingle
With the advancement of technology, new software and devices are being developed to ease man’s work. Waiting for ticket in long queues is a time consuming process. Some people use the Automatic Teller Vendor Machine(ATVM)card i.e. smart card to buy ticket but it also has long queues for buying ticket .If people forget to take their card or they do not have balance in their card they will have to stand in queue. The operating system, Android, has led to great increase in use of mobile phones .Today almost all of the work can be carried out through phone. The Android application proposed in this paper eases the task of buying railway tickets. People can buy suburban tickets (local travel) using just a smartphone application. The main thing about the paper is the “GPS†validation of ticket because of which we get to know the position of the user .The details of the ticket will be stored in the form of a Quick Response(QR) code in the phone itself thereby avoiding loss of ticket. Saving the information in database ensures easy retrieval and security. Also the ticket checker is provided with a ticket checking application to validate ticket either by QR code or by searching ticket details in database. Read More...
|
Computer Engineering |
India |
706-709 |
179 |
An Android Based Healthcare Management System And Emergency Alarm
-POONAM DHERANGE ; POONAM DHERANGE; PRIYANKA NIKAM; NIDHI SHAH; PROF. NIDHI SHARMA
This paper presents an emergency alarm and healthcare management system, which is mainly deployed in an android-based phone that is conveniently used and carried. With the help of the GPS and GSM network, the system can make sure the location of the users when they are in trouble and send the emergency message to their respective friends and family. When the doctor or family receives the alarm message, they can immediately take measures to rescue the user. It can also manage the health record of the user. The user can specify the symptoms through his mobile phone and receive prescriptions from the doctor accordingly. After that the life reminder system can remind the user to take medicine on time and so on. The user can also get easy tips related to first-aid. Read More...
|
Computer Engineering |
India |
710-713 |
180 |
Image Retrieval based on Content using Template Matching
-Aimen Chivelkar ; Huda Mulani; Pramil Kashid
The purpose of this paper is to introduce a faster and a more reliable approach to developing a Content Based Image Retrieval (CBIR) system. For developing such a system, we require a functional process that depends on certain features of the image. In this paper, we propose an algorithm which is solely based on Normalized Cross Correlation (NCC) and depends on the extracted template of the query image as its process feature. A template is basically a significant portion of the input query image and provides a measurement of the level to which the image considered should be either similar or identical to it. The calculation and comparison of the images is done by implementation of NCC and the output is interpreted by user defined threshold. Through this paper, we propose a complete system to analyze and implement the above functions using NCC as the base approach Read More...
|
Computer Engineering(Image Processing) |
India |
714-716 |
181 |
Analysis & Function of Unified Power Quality Conditioner For Power Quality Improvement Of Distributed Network
-KUSHANG PARMAR ; jaydeep sarvaiya
In this paper a technical review of the integration of a Unified Power Quality Conditioner (UPQC) in a distributed generation network is presented.. The increasing use of the Nonlinear devices, such as power electronics converters, inject harmonic currents in the AC system and increase overall reactive power demanded by the equivalent load. Also, the number of sensitive loads that require ideal sinusoidal supply voltages for their proper operation has increased. This paper deals with the shunt APF, series APF and the unified power quality conditioner (UPQC) which aims at the integration of series and shunt active filters. The main purpose of a UPQC is to compensate for voltage flicker/imbalance, reactive power, negative sequence current and harmonics. In other words, the UPQC has the capability of improving power quality at the point of installation on power distribution systems or industrial power systems. & reduce the THD of voltage & current level. Read More...
|
ELECTRICAL ENGINEERING |
India |
717-722 |
182 |
Write Transfer of AMBA-AHB Lite Master Communication Protocol
-Harshil Gajjar ; Nirav Patel
In this paper, a write transfer of AMBA-AHB Lite communication protocol is designed and implemented. AMBA-AHB Lite communication protocol is designed using master-slave topology. To perform efficient write operation, a core is designed for communication between a master unit and a slave unit. This process involves the master unit, which generates various transactions/operations and a slave unit to receive these transaction and respond accordingly. The write transfer operations are generated using SystemVerilog and ModelSim 6.3f. The communication is configured for 32bit wide Address bus and Data bus. Read More...
|
VLSI & Embedded System Design |
India |
723-725 |
183 |
A MODERN APPROACH FOR ACHIEVING GREEN COMPUTING BY EFFECTIVE UTILIZATION OF CLOUD OS
-Vadivel.M ; Hariharan.P; Bethanasamy.R
Green computing refers to the practice of using computing resources more efficiently while maintaining or increasing overall performance. The greatest environmental challenge today is global warming, which is caused by carbon emissions. Green computing has been an active research area which studies an efficient use of computing resources. Green IT refers to the study and practice of using computing resources in an efficient, effective and economic way. Thus, it is necessary to significantly reduce pollution and substantially lower energy usage. The analysis of energy consumption in cloud computing consider both public and private clouds. Cloud computing with green environment can enable more energy efficient use of computing power. Currently, a large number of cloud computing systems waste a tremendous amount of energy and emit a considerable amount of carbon dioxide. In fact, cloud computing is an extend of Grid Computing, Distributed Computing and Parallel Computing. It's foreground is to provide secure, quick, convenient data storage and net computing service centered by internet. Green Cloud framework for reducing its carbon footprint in wholesome manner without sacrificing the quality of service (performance, responsiveness and availability) offered by the multiple Cloud providers. Read More...
|
Computer Science & Engineering |
India |
726-731 |
184 |
Low Power Pipeline ADC for Wireless Communication Applications
-Sushil I. Bakhtar
Wireless communication applications have driven the development of high-resolution A/D converters (ADCs) with high sample rates, good AC performance and IF sampling capability to enable wider cellular coverage, more carriers, and to simplify the system design. Further, many of the modern IF-sampling super-heterodyne communication systems require the ADC to sample input signals up to 300 MHz in order to reduce receiver complexity and lower overall system cost. Pipeline ADCs are the architecture of choice for ADCs used in such wireless communication systems, and are ideally suited for realizing 12–16 bits of resolution, 70–80 dB of SNR, while dissipating less than 1W of power Read More...
|
Electronics & Telecommunication |
India |
732-736 |
185 |
Smart Bracelet Computer For On Body Sensing With Cash Id Combo Using Arm7
-NEHA CHOTHE ; sayali parbat; Bhagyashri malkar; Prof.V.N.Ghodke
In earlier days when people used to go on any tourism or pilgrimages and if any accidents or stamped happens they are unable to contact their family and not able to track their position. These all miscommunication leads to bad hazards. To track the person’s exact position or any vehicle’s location, using of gps and gsm is the best option. Our system helps them, to track their position using gps .even the good health of tourist is also equally important so our system provides facility of health care, in which mainly temperature and pulse rate of tourist are continuously checked and monitored via gsm. And another thing is they have to carry lots of identification proofs and cash .our system provides inbuilt facility of cash transactions. Read More...
|
ELECTRONICS ENGINEERING |
India |
737-739 |
186 |
Digital Speedometer with Password Enabled Speed Controlling
-Patel Nishit S. ; Patel Nirmal B.; Rami Dipen M.; Prajapati Mayank L.; Panchal Pratik M.
The main aim of this project is to design a digital speedometer with password enabled with speed limit controlling. This simple system shows the ability to apply speed limit controlling techniques to the vehicle. Our digital speedometer takes input from vehicle speedometer cable and executes the speed limit controlling action.The system comprises of keypad, LCD display and microcontroller unit. The user interface includes keypad through which the password will be accepted by the microcontroller. Microcontroller controls the over speed of vehicle. Read More...
|
electronics engineering |
India |
740-741 |
187 |
Study on Air and Noise Impacts at South Indian Port
-Neenu K Mathew ; Karthick J
The port is making considerable pollution to the environment due to its activities comprising of exports and imports of coal and iron ore. The port activities can cause deterioration of air and noise quality in the surrounding areas. Many people living in the localities in and around the harbor are suffering from respiratory infections due to the increased level of atmospheric pollution. To evaluate the environmental and health impacts of the air and noise pollution and to form new environmental management plan, it is important to conduct an air and noise quality survey in the port trust. An air quality survey was conducted at one of the Port in Tamilnadu by using a Respirable Dust Sampler. The particulate matter pollution and the emission due to different port activities were measured and analyzed at ambient zone and the working zone of the port. Noise pollution over the port was measured by using a sound level meter. The observed values of air and noise quality parameters were compared with pollution standards of Central Pollution Control Board (CPCB). It was found that the particulate matter emission exceeds the limits assigned by CPCB. So, the obtained data was used to develop an effective Environmental Management Plan (EMP) to reduce or eliminate the potential environmental impacts of port. A detailed management plan to improve the air quality parameters in the port was formulated. In addition to this, a management plan to reduce the public health impacts due to the port activities was also developed. Read More...
|
Environmental Engineering |
India |
742-745 |
188 |
Code length Reduction using CRFS Decoding for Frame Synchronization
-Anil Patel ; Snehal M.Patel
The process of the mobile station searching for a cell and achieving code and time synchronization to its downlink scrambling code is referred to as cell search. Cell search is complete in two modes: Initial mode cell search when mobile is switched on, and Target cell search in which idle mode search when mobile is inactive and active mode search during a call or activities. The process of achieving code and time synchronization in cell search algorithm divided in to five stages which are slot synchronization, frame synchronization and scrambling code group identification, scrambling code identification, frequency acquisition, and cell identification. Initial cell search is need all five stages while in that last two stages do not need in target cell search. The slot synchronization is achieved by the primary synchronization code in cell search procedure to use in slot boundary detection. During 2nd stage secondary synchronization code is use to achieve frame synchronization and scrambling code group identification in cell search procedure. A pipelined process of the first three stages that minimizes the average code and time acquisition time, during initial cell search procedure much large which is reduced by maximum likehood based frequency acquisition method after first three stage completion Read More...
|
Electronics & Communication System Department |
India |
746-749 |
189 |
E-learning platform for Linux Shell
-Prof. Vidya Chitre ; Nayana Gaikar; Vaibhav Vartak; Karthika Adidravida
The World Wide Web has a more impact on the education sector. This paper aims to describe a novel way of extending the e-learning techniques used in the area of Linux education. This paper includes web site which contains not only all commands information, tutorials & videos but also Linux bash shell which provides free hand practical approach to end users anytime anywhere. In this paper, way of Linux shell access is explained, which is a key feature of the system. Read More...
|
Computer Engineering |
India |
750-751 |
190 |
Event Based Alert Correlation System to Detect SQLI Activities and Prevention Using Stored Procedure Mechanism
-Nilesh Kasurde ; Rahul Patil; Aniket Deshpande
Alerts correlation techniques have been widely used to provide intelligent and stateful detection methodologies. This is to understand attack steps and predict the expected sequence of events. However, most of the proposed systems are based on rule –based mechanisms which are tedious and error prone. Other methods are based on statistical modeling, These are unable to identify causal relationships between the events. In this paper, we have identified the limitations of the current techniques and propose a model for alert correlation that overcomes the shortcomings. The proposed model has been implemented in real-time and has successfully generated security events on establishing a correlation between attack signatures. The system has been evaluated to detect one of the most serious multi-stage attacks in Cyber-Crime – SQLIA (SQL Injection Attack). Typical SQLIA steps are analyzed within the realm of simulated malicious activities normally used by cyber criminals. SQL Injection attacks target databases that are accessible through a web front-end, and take advantage of flaws in the input validation logic of Web components such as CGI scripts. SQL Injection attacks can be easily prevented by more secure authentication schemes in login phase itself. Read More...
|
Computer Engineering |
India |
752-754 |
191 |
Improve The Recursive Construction for Decompression and Message Extraction by using Joint Encoding and Decoding
-Ms.M.Magishasini ; Mr. C. Prakash Narayanan; B.Sakthivel
In reversible data hiding (shortly RDH), the original cover can be lossless restored after the embedded information is extracted. A famous author Kalker and Willems established a rate–distortion model for RDH, in which they proved out the rate–distortion bound and proposed a recursive code construction. In previous concept, improved the recursive construction to approach the rate distortion bound. But In this approach, I will use a decompression algorithm as the coding scheme for embedding data. And prove that the generalized codes can reach the rate distortion bound as long as the compression algorithm reaches entropy. By proposed binary codes, I improve three RDH schemes that use binary feature sequence as covers, i.e., an RS scheme for spatial images, one scheme for JPEG images, and a pattern substitution for binary images. By modifying the histogram shift (HS) manner, I also apply this coding method to one scheme that uses HS, showing that the proposed codes can be also exploited to improve integer-operation-based schemes. Read More...
|
Computer Science Engineering |
India |
755-758 |
192 |
Analysis, Verification and Fpga Implementation of Low Power Inter Integrated Circuit Interface for Custom Asics
-Jaswant Singh Rathore
This paper presents the design and simulation of an I2C (Inter-Integrated Circuit) serial interface. The design was described using the Verilog- hardware description language. The I2C Interface is intended for use in a family of integrated circuits (ICs) used in the detection of ionizing radiation. These custom ICs aid scientists in carrying out a wide variety of nuclear physics experiments. The ICs are being developed by the Integrated Circuit Design and were fabricated in a 5-Volt AMIS 0.5 μm, double-poly, tri-metal CMOS process (C5N). The current ICs only provide for analog outputs. Storing data in a digital format on chip before transmittal to a host computer via an I2C or "I2C-like" interface should result in improved system performance since the transmission of digital data is much less susceptible to interference form environmental noise. A large number of ICs are required in these types of instrumentation systems and therefore, at some point in the future, the I2C interface described herein will likely be incorporated along with an on-chip ADC and buffer RAM into second-generation versions of our current chips. The design of the proposed I2C interface was prototyped using inexpensive, readily-available Xilinx Spartan3E Starter development boards manufactured by Diligent. The prototype system consisted of two I2C "slaves" (emulating a pair of iii custom ICs) and an I2C "master". The "master" gathered results from the "slaves" and transmitted the data to a personal computer where it was displayed. The prototype system worked flawlessly at 100 KBits/sec but can accommodate up to 128 slaves. Read More...
|
Electronics & Communication Engineering |
India |
759-761 |
193 |
A Multiobjective Optimization based Fast and Robust Design Methodology for Low Power and Low Phase Noise Current Starved VCO
-Gaurav Sharma
The paper introduces a multi-pass loop voltage controlled ring oscillator. The proposed structure uses cross-coupled PMOS transistors and replica bias with coarse/fine control signal. The design implemented in TSMC 90 nm CMOS technology, 0.9V power supply with frequency tuning range 481MHz to 4.08GHz and -94.17dBc/Hz at 1MHz offset from 4.08GHz with 26.15mW power consumption. Read More...
|
Electronics & Communication Engineering |
India |
762-767 |
194 |
Software Testing Strategies
-Mrs. Bhumika S. Zalavadia
Software has increased tremendously over the past decades which lead to inventions of more and more efficient software development techniques. It is always of interest that software must be developed with high degree of accuracy in minimum time period with the fact that software must satisfy all the desires of the customer. After the software is successfully developed by the software engineer, different efficient testing techniques are applied to test whether it produces the desired outputs or not. Testing techniques not only focus on the desired output, but it also focuses on the fact that output must be generated in easiest way. All the customers are not the computer experts. So software must be designed in such a way that any technical or non-technical person can operate the software in most convenient way. Read More...
|
Computer Engineering |
India |
768-770 |
195 |
Design and Realization of Embedded Web Server based on Arm 11 and Raspbian Wheezy
-PRIYA.L ; MAHESWARI.V
As the World-Wide Web (WWW) continues to evolve, it is clear that its underlying technologies are useful for much more than just browsing the web. Web browsers have become the de facto standard user interface for a variety of applications including embedded real time applications. The embedded web server technology is the combination of embedded device and Internet technology. Through this embedded web server user can access their equipments remotely. The equipment mentioned here could be home appliances and factory devices. This paper is focused on implementation of ARM embedded web server based on Raspberry Pi. The embedded web server design includes a complete web server with TCP/IP support and Ethernet interface. In this paper, we present the design to implement medical monitoring system from a sensor unit. So our approach to develop this system initiated with the extensive study of ARM, medical monitoring systems and web servers with encryption. Read More...
|
Embedded system |
India |
771-774 |
196 |
SEARCH ENGINE OPTIMIZATION A TECHNIQUE
-SANA ; Prof. Saoud Sarwar
Internet is the term which is known by everyone in this world. It is the fastest growing sector. All of us are consumer of it either as commerce, industry & individual. Search engine optimization is a technique which is used in the internet. We can say that it is a process of finding our desired result. Google is one of the known search engine. All of us use it in our daily life without the knowledge of how it works. In this paper we study how search engine optimization woks and on which algorithms it is based. Read More...
|
Computer Science & Engineering |
India |
775-778 |
197 |
secure data forwarding in cloud storage system with cryptographic scheme
-RAGHUNATH.V ; RADHIKA.A
Securing the data in a cloud environment is one of the important things. The problem in general encryption scheme is to provide data confidentiality, functions over storage system and security for key server. The secure storage system that supports multiple functions is challenging when the storage system is distributed and has no central authority. This project proposes a proxy re-encryption scheme that supports encoding operations over encrypted messages as well as forwarding operations over encoded and encrypted messages. This method fully integrates encrypting, encoding, and forwarding. Key server provides the key for encryption and decryption operations. This project analyzes and suggest suitable parameters for the number of copies of a message dispatched to storage servers and the number of storage servers queried by a key server. The security which is provided to key server forms a secure storage system. Read More...
|
Computer Science and Engineering |
India |
779-782 |
198 |
Smart Video Surveillance System using Android Smart Phones with GCM Alert
-Rupa Kesavan ; R. Anbarasu
Video surveillance systems are becoming increasingly important for crime investigation and the number of cameras installed in public space is increasing. However, many cameras installed at fixed positions are required to observe a wide and complex area. In order to efficiently observe such a wide area at lower cost, mobile robots are an attractive option. According to the result of moving object detection research on video sequences, the movement of the people is tracked using video surveillance. The moving object is identified using the Cauchy distribution model. The Cauchy distribution model will compare the current frame with the previous frame. The threshold value is calculated to find the moving image. Using threshold value the detected pixel is identified. Hence the movement of the object is identified accurately. After motion detection it will send GCM alert to the android mobile application. Experimental results demonstrate the effectiveness of the proposed method in providing a promising detection outcome and a low computational cost. Read More...
|
Computer Science & Engineering Dept |
India |
783-790 |
199 |
48 Pulse STATCOM for Improving Voltage Profile and Harmonic Reduction based on PI Controller
-Tusharkumar S Jadav ; Dharmesh M Ghlot; Mayank M Tandel ; Prof. Mitesh J Sathvara
STATCOM can provide effective and fast reactive power support to maintain power system voltage stability. In this paper gives a 48 pulse statcom with detailed analysis.48 pulse statcom consist of four 3 level converter inked by four zig- zag transformer which exhibits a low harmonic rate on AC side. so 48pulse statcom is used in high power application. Without controller voltage profile reached to unrecoverable stage. In this paper working of PI controller is given. PI controller of statcom is used and simulation of statcom for voltage regulation is there to understand how voltage profile is improved. Read More...
|
Electrical engineering |
India |
791-795 |
200 |
Dynamic Background Removing Using Gabor Filter
-Joshi Jignesh
In computer vision, image segmentation is the process of partitioning a digital image into multiple segments. The goal of background removing is to simplify and/or change the representation of an image into something that is more meaningful and easier to analyze. Background removing is typically used to locate objects and boundaries (lines, curves, etc.) in images. Identifying moving objects could be a crucial task for several computer vision applications; it provides a classification of the pixels into either foreground or background. A typical approach wont to deliver the goods such classification is background removal. In this paper confirm that the Gabor Filter used to remove dynamic background for given image. Read More...
|
Computer Science & Engineering |
India |
796-798 |