No. |
Title and Author |
Area |
Country |
Page |
151 |
enhanced energy efficient routing protocol for wsn
-shilpa thakur ; shilpa thakur; kanika sharma
Wireless sensor networks has come out as an important computing platform.A wireless sensor network is an aggregation of nodes organized into a cooperative network.Each node consists of processing capacity. Energy conservation and maximization of network lifetime are commonly recognized as a key challenge in the design and implementation of wireless sensor networks.
In this paper, we propose an Enhanced Energy Efficient Chain-based Routing Protocol (EEECRP) for wireless sensor networks to minimize energy consumption and transmission delay.EEECRP organizes sensor nodes into a set of horizontal chains and a vertical chains. Chain heads are elected based on the residual energy of nodes and distance from the header of upper level. In each horizontal chain, sensor nodes transmit their data to their own chain head. EEECRP also adopts a chain-based data transmission mechanism for sending data packets from the chain heads to the base station. The simulation results shows that EECRP outperforms PEGASIS , ECCP and EECRP in terms of network lifetime, energy consumption.
Read More...
|
electrical |
India |
594-598 |
152 |
Project Management Software Tracker Tool Built Using ADF
-varsha k.g ; H. Ramakrishna; G.R Pashupatimath
Oracle Application Development Framework is an end-to-end Java EE framework that simplifies application development by providing out-of-the-box infrastructure services and a visual and declarative development experience. This paper reviews project tool built using Framework, project details in excel sheet which is been used from years as a tracker by the employees, daily updating of details and during weekly meetings. It is manually being updated and it is time consuming process so building a project tool that satisfies all project requirements as a project tracker software tool which comes with Oracle Application Development Framework as a front end. This proposed work focuses on building a tool with user friendly applications. This paper also shows you how to build a rich internet application that interacts with a database. The framework regards Web application development as a special type of software development project. The use of the framework should result in more effective Web application development and enable developers to write programs using runtime environment. Read More...
|
computer science , information science, industrial engineering and management |
India |
599-600 |
153 |
PALMPRINT IMAGE PROCESSING WITH NON-HALO COMPLEX MATCHED FILTERS FOR FORENSIC DATA ANALYSIS
-C.Kamesh
Palmprint is widely used biometric feature in biometric and forensic applications, however it is still a challenging task to process the images and extract the useful data, because the evidence, left at the crime scenes, are usually deformed and distorted by artifacts. Palmprint contains different types of visible features that can be used for identification of criminals, including big details, like crease, ridge flow, and small details, like ridges, valleys and minutiae points. In this paper we focus on ridge extraction task. We demonstrate how integration of angular preference to an existing algorithm (Non-Halo Complex Matched Filtering, NH-CMF) may significantly improve quality of extracted features. We introduce the approach where NH-CMF and automated analysis of magnitude weighted angle histogram are used for ridge pattern extraction and noise reduction. Extracted information may support or even automate ridge routing that is necessary for palmprint feature extraction in forensics. Read More...
|
computer science |
India |
601-604 |
154 |
AUTONOMOUS ROBOTIC SYSTEM
-G. Selva Kumar
There are many engineering challenges involved in exploring remote areas without human assistance and in particular there is a strong need in advanced Robotics. Robots must be able to function in unknown, unstructured environments. Robots are more précised and it can be used where human involvement is dangerous, such as detecting Land Mines. We have developed a Robot which is completely Autonomous and it can also be controlled manually through Mobile phone. Robot interacts with human with the help of mobile communication and it accepts commands through Short Messaging Service (SMS). Robot is also provided with Infra-red sensors for Object detection and path finding mechanism. We have formed an algorithm for its autonomous operation and Artificial Intelligence through Micro-controller. Read More...
|
Robotics |
India |
605-608 |
155 |
Review of Heat Transfer Enhancement Using Passive Techniques in Different Type of Twisted Tapes in Circular Tube
-Sunny Gulia ; Loveleen Punia; Sitender Dahiya; Rusi kamboj
Heat transfer enhancement techniques refer to different methods used to increase rate of heat transfer with-out affecting much the overall performance of the system. Heat transfer enhancement is the process of modifying a heat transfer surface to increase the heat transfer coefficient between the surface and a fluid. A majority of heat exchangers used in thermal power plants, chemical processing plants, air conditioning equipment, and processing plants, air conditioning equipment, and refrigerators, petrochemical, biomedical and food processing plants serve to heat and cool different types of fluids. This review paper based on different type of twisted tape and their different orientation or arrangements. In the present paper stress is given on to work dealing with displaced insert into circular tubes (twist tap insert, screw tap insert, helical tap insert, wire mesh tape insert) and CFD based analysis in laminar and turbulent flow. According to recent studies these are known to be economic heat transfer enhancement tools. Read More...
|
Mechanical Engineering |
India |
609-612 |
156 |
OPTIMAL SELECTION OF CAMERA CONFIGURATIONS IN MULTI-CAMERA NETWORKS
-ROOPASHREE SHAILENDRA
The optimal selection of camera configurations (camera locations, orientations, e.t.c) for multi-camera networks remains unsolved. Most of the previous approaches do not generalize well to large scale networks. They only focus on proposing various objective functions to achieve different tasks. To tackle with this problem a trans-dimensional simulated annealing algorithm is proposed. Comparison with the state-of-the-art method based on binary integer programming (BIP) show that the proposed approach also offers similar performance on small scale problems and better capability to deal with large scale problems. Read More...
|
COMPUTER SCIENCE AND ENGINEERING |
India |
613-618 |
157 |
DIGITAL IMAGE PROCESSING
-S.ARAVINDHAN
Most systems that control access to financial transactions, computer networks, or secured locations identify authorized persons by recognizing passwords or personal identification numbers. The weakness of these systems is that unauthorized persons can discover others’ passwords and numbers quite easily and use them without detection. Biometric identification systems, which use physical features to check a person’s identity, ensure much greater security than password and number systems. Biometric features such as the face or a fingerprint can be stored on a microchip in a credit card, for example, If someone steals the card and tries to use it, the impostor’s biometric features will not match the features stored in the card, and the system will prevent the transaction. Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic. Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. A single feature, however, sometimes fails to be exact enough for identification. Consider identical twins, for example. Their faces alone may not distinguish them. Another disadvantage of using only one feature is that the chosen feature is not always readable. For example, some five percent of people have fingerprints that cannot be recorded because they are obscured by a cut or a scar or are too fine to show up well in a photograph. This paper presents a system called BioID which is developed to identify a person using different features-Face, voice, lip movement,iris recognition, finger and palm geometry .With its three modalities, BioID achieves much greater accuracy than single feature systems. Read More...
|
SOFTWARE ENGINEERING |
India |
619-623 |
158 |
A Review Paper: Optimization in Underwater Sensor Networks
-surbhi ; nishant anand
A wireless network is having the limitation in terms of its energy constraint. With each communication over the network some energy loss is done. Because of this the improper placement or algorithmic approach can reduce the network life. In case of underwater sensor network the problem is more critical as the GPS is not present and the nodes are floating. The presented work is about the localization of the nodes in underwater sensor network with specific parameters as well as the improved clustering mechanism is introduced with two cluster heads. In the existing work the localization and clustering are done separately. Read More...
|
computer scence engineering |
India |
624-626 |
159 |
IMPROVE THE LIFE OF A NETWORK IN UWSN
-surbhi ; assistant prof. nishant anand
Wireless sensor network is a class of wireless ad- hoc networks in which sensor nodes collect process and communicate data acquired from the physical environment. There is some of the basic component in a sensor network: sensing unit which sense and get information, processing unit which process information, transmission unit which transmit information between sensors and to BS, power unit which supply power to all units, position finding system and mobilizer. An underwater sensor network is one of the emerging technologies that require the data transmission at high rate with higher reliability ratio. . These kind of network needs the equal concern for the architectural definitions as well as the algorithmic enhancements. While defining these kind of network, the concern is required while selecting the sensors based on the type of surface, the type of link, control center, control parameters etc. These networks needs the regular monitoring of network because of continuous change is possible as the sensors are having floating movement and relatively need to analyze the energy definitions, requirement, consumption etc. It also needs to analyze based on type of communication, type of channel etc. Read More...
|
computer scence engineering |
India |
627-632 |
160 |
DYE WASTE WATER TREATMENT
-shloka nayar
The wastewater from textile industry and its treatment methods processes were tested and a general evaluation was made by compiling previous studies in literature.In different stages of textile industry, a significant quantity of water is consumed and this makes it necessary for regular control of textile wastewater. In order for textile wastewater not to deteriorate the environment and the lives of human beings, this water must be discharged after various treatment methods. It’s required to find the most suitable treatment method for textile wastewater which can minimize the production and investment costs of wastewater treatment plants. Read More...
|
CHEMICAL ENGINEERING |
India |
633-637 |
161 |
Dynamic Analysis Of a Leaf spring
-Ritesh Mistry ; Vipul Dave; Nitesh Shah
A Four leaf spring used in suspension of a light vehicle is analyzed by Ansys 12 software. Design and modeling of leaf spring using CREO software. The Finite Element Results Showing stresses and Deflection Verified the Existing Analytical. Dynamic load Analysis analysis of leaf spring using Ansys 12 software. Read More...
|
Mechanical Engineering |
India |
638-640 |
162 |
Developing Backup Security Option for User Identity Management
-R.Kesav Vel ; M.Ram Kumar; N.Bala Murugan
Most cell phones use a password, PIN, or visual pattern to secure the phone. With these types of security methods being used, there is much vulnerability.Biometric security systems have been researched for many years. Some mobile manufacturers have implemented fingerprint scanners into their phones, such as apple phones Motorola atrix here we are trying to implement an efficient security system with agood backup system. To enhance identity acquisition procedures in smart phones and make the process transparent to the user, a novel User Identity. Sensing approach leveraging the unified fingerprint enabled touch panel that combines multiple capacitive TFT based fingerprint sensors directly with the touch screen panel of the Smartphone is proposed and back up user login feature are to be implemented for user interface. Read More...
|
Computer Science and Engineering |
India |
641-648 |
163 |
CFD Analysis of Shell and Tube Heat Exchanger to Study the Effect of Baffle Cut on the Pressure Drop and Heat Transfer Coefficient
-Chetan Namdeo Patil ; N. S. Bhalkikar
The shell side design of a shell-and-tube heat exchanger; in particular the baffle spacing, baffle cut and shell diameter dependencies of the heat transfer coefficient and the pressure drop are investigated by numerically modeling a small heat exchanger. The flow and temperature fields inside the shell are resolved using a commercial CFD package. A set of CFD simulations is performed for a single shell and single tube pass heat exchanger with a variable number of baffles and turbulent flow. The results are observed to be sensitive to the turbulence model selection. The best turbulence model among the ones considered is determined by comparing the CFD results of heat transfer coefficient, outlet temperature and pressure drop with the Bell–Delaware method results. For two baffle cut values, the effect of the baffle spacing to shell diameter ratio on the heat exchanger performance is investigated by varying flow rate. Read More...
|
Mechanical Engineering |
India |
649-654 |
164 |
Design and Simulation of Slotted Super Wide Band Antenna with Coplanar Waveguide Feeding
-SHYAM SUNDER SONKAR ; Arvind Kumar; Chandan; R. K. Prasad
In this paper a slotted super wide band antenna is presented. Since the bandwidth of super wide band antenna is very large but due to non availability of some frequency components it is desired that the proposed antenna should not operate on that frequency band. Hence to full fill above requirement a slot has been cut from super wide band antenna. A comparative analysis has been done for super wide band antenna and slotted super wide band antenna. CST Microwave Studio simulation software is used for simulation. 14.27 GHz frequency component has been taken for analysis purpose. Read More...
|
Antenna |
India |
655-657 |
165 |
A Phishing Detection System for E-Banking Site
-Charudutt D. Pandya ; Mr. Dev M. Rathod
Phishing is an attack that deals with social engineering methodology to illegally acquire and use someone else’s data on behalf of legitimate website for own benefit (e.g. Steal of user’s password and credit card details during online communication). It is affecting all the major sectors of industry day by day with a lot of misuse of user credentials. It is affecting all the major sectors of industry and banking day by day with a lot of misuse of user credentials. To protect bank's users against online phishing, various anti-phishing techniques have been proposed that follows different strategies like client side and server side protection. Hence it is necessary to detect the attacker and secure individuals private data. Till now many approaches are found to detect phishing websites. Among them are Bacterial Foraging algorithm, Visual similarity based approach, etc. Every approach has some weakness or limitations such as less efficient or time consuming or no up-to-date blacklist or phishtank. To detect the phishing websites different techniques are proposed such as classifier technique, heuristics based technique, hybrid technique etc. In this paper, we propose a technique based on Heuristic based technique. In first Phase, website is identified based on different parameters like URL, IP Address, Forms, age of domain. In second Phase, the visual similarity of the phishing banking page is compared with the original banking website. The proposed approach also gives the suggestions to the users for their particular domain search that makes user more comfortable to use the system Read More...
|
Computer Engineering |
India |
662-667 |
166 |
Architecture and Localization Scheme for Underwater Acoustic Sensor Network
-Divya Bhargava ; Nishant Anand
Underwater Wireless Sensor Networks (UWSNs) provide a new opportunities to examine and predict the activities of aquatic environments. Some applications such as target tracking , disaster prevention etc where sensed data is worthless without any location information. Localization is the process of estimating the location of each node in a sensor network. In underwater sensor networks (UWSNs) determining the location of each sensor is of critical importance. Various localization algorithms have been proposed for terrestrial sensor networks, there are comparatively few localization schemes for UWSNs and even fewer for polar environments under ice. Numerous localization protocols currently exist for terrestrial applications. However, there are prohibitive obstacles which prevent the application of terrestrial-oriented localization techniques to an underwater environment. In this paper, for extending the field in underwater environments, we study various sensor localization technique for underwater wireless sensor networks (UWSNs). In underwater environments, radio frequency (RF) signal is not suitable for underwater usage because of extremely limited propagation. Since for that reason UWSNs should be constituted with acoustic modems. This work is about improving Localization mechanisms in Underwater Sensing Networks and node traceback. Read More...
|
Computer Engineering |
India |
668-671 |
167 |
Effect of Particle Size on Convective Heat Transfer in Flat Plate Through Nano Fluid
-G V P N SRIKANTH ; Dr.G SRINIVAS; Dr.MAMATHA NAKKA; O.RAMA KRISHNA
The significant research has seen with nano fluid flow and heat transfer. A theoretical investigation has attempted in this paper to study the chemical reaction effects. We have studied convective heat transfer of MHD nano fluid flow past inclined, oscillating permeable flat plate with radiation, heat source and suction. It is found that velocity and Diffusion increases for both kind of chemical reactions. Read More...
|
Mechanical Engineering |
India |
672-676 |
168 |
Study of Image based Cryptography Techniques and Security Facilities
-Swati ; Reecha Sharma(Assistant Professor)
Network security in today’s world is an important issue among all who share their important images via internet. This security is possible by cryptography. Cryptography, a word with Greek origin means “secret writingâ€. Cryptography is an art of hiding data and transforming messages or images to make them secure and immune to attacks. Cryptography mangles the images. This can be done by so many methods and techniques. Cryptography offers many types of security facilities to send data on insecure channel. Basically, this paper proposing the techniques of cryptography of images which have been used till and security services offered by cryptography. Read More...
|
Electronics and communication Engineering |
India |
677-679 |
169 |
Mouse Gesture Recognition using Back Propagation Neural Network
-Shivani Jaryal ; Dimple Arya
To Understand Mouse motions are often exhibit as a pattern recognition weakness. So as to convey pictorial messages to a receiver, a mouse expresses motion patterns referred to as gestures; these patterns area unit variable however dissimilar associated have an associated significance. The Pattern recognition by any processor or machine are often executed via varied ways like Hidden Markov Models (HMM), Linear Programming (LP) and Neural Networks (NNs). Every technique has its own advantages and disadvantages. This paper reviews why using ANNs particularly is best suited to analyzing mouse gesture patterns. All implementation work is carried out in MATLAB (Matrix Laboratory) could be a problem-oriented language and interactive surroundings for numerical computation, image, and programming. MATLAB is de facto normal for analyzing information, developing algorithms, and making models and applications. The research proposed work uses Techniques like Vector Quantization, Genetic Algorithms and Neural Networks; therefore such work is implemented using Neural Networks toolbox (NNTool).In certain scenarios, we have successfully demonstrated that Neural Networks can be used for the Gesture recognition in with more than 99.7% success rate. Read More...
|
Computer Engineering |
India |
680-683 |
170 |
Analysis and Study of Different Tunnel Diode Devices
-Gaurav Patel ; Vimal Kumar Mishra; Dr. R.K. Chauhan
This paper includes the principle of tunnelling and designing or construction of the different tunnel diode devices such as conventional or Esaki tunnel diode, nanowire tunnel diode, tunnel diode using heterostructures and resonant interband tunnel diodes. Read More...
|
Electronics and Communication Engineering |
India |
684-686 |
171 |
MATLAB Implementation of New True-Motion Estimation Technique and its Application to Motion-Compensated Temporal Frame rate up conversion
-MADHUKUMAR R K ; SARIKA TALE
In multimedia communication video plays an importance, because it gives the very perfect flow of frames or image for our visual effect with good realistic view experience. So in this paper gives a new low complexity true motion estimation technique is introduced for video processing application, like motion-compensated temporal frame rate up conversion (MCTFRUC) or motion compensated temporal frame interpolation (MCTFI).In basically main role of motion estimation is to produce the motion vectors for reduce the temporal redundancy. Where as in this paper explains true motion estimation which is mainly used to track the motioned object as closely as possible by imposing the explicit and/or implicit smoothness constraints on block matching algorithm. To get the good interpolated frames the dense motion vector field is obtained for both forward and backward motion vectors is applied by adding both. Then the performance parameter is calculated and is produced, at last the good quality of video frame is produced with smoothly. Read More...
|
Electronics and Communication Engineering |
India |
687-692 |
172 |
A Recent Secure Intrusion Detection System for MANETS
-Bindhu Madhavi P ; Nagendra M
As global trend changes from wired network to wireless network in the present days. This wireless network extends scalability and mobility features to serve many possible applications . Mobile Adhoc Network(MANET) is one of the critical application among all contemporary wireless networks. Compare to other traditional network, MANET does not have any fixed network infrastructure; every node in mobile network works as both transmitter and receiver. Intermediate nodes must communicates with each other, if only having same communication range. Otherwise, they relay messages onto the their neighbors. In MANET network each node having self configuring ability, that made it popular among critical mission applications. MANET vulnerable to malicious attackers due to its an open medium network and wide distribution of nodes. In this case, it is crucial to present secure intrusion-detection mechanisms to protect MANET from such attacks. In this paper, we propose and implement a new secure intrusion-detection system designed for MANETs. Compared to contemporary network approaches, it demonstrates higher malicious- behavior-detection rates in certain circumstances using DSA. Read More...
|
Computer Science & Engineering |
India |
693-697 |
173 |
SUSTAINABLE AND ECONOMICAL CONCRETE BY USING MANUFACTURED SAND AND MINERAL ADMIXTURE
-Bhaveshkumar M. Kataria ; Dr. Jayesh A. Shah; Vyom B. Pathak
Concrete is one of the most widely used construction materials in the world. However, the production of Portland cement, an essential constituent of concrete, leads to the release of signiï¬cant amounts of CO2, a greenhouse gas GHG; production of one ton of Portland cement produces about one ton of CO2 and other GHGs. The environmental issues associated with GHGs, in addition to natural resources issues, will play a leading role in the sustainable development of the cement and concrete industry during this century.A sustainable concrete structure is constructed to ensure that the total environmental impact during its life cycle, including its use, will be minimal. Sustainable concrete should have a very low inherent energy requirement, be produced with little waste, be made from some of the most plentiful resources on earth, produce durable structures, have a very high thermal mass, and be made with recycled materials. Sustainable concrete have a small impact on the environment. Concrete must keep evolving to satisfy the increasing demands of all its users. This paper is based on experimental study carried out to obtain Sustainable Concrete by using Manufactured sand as replacement of River Sand and Mineral Admixtures (Metakeolin and Fly ash) as replacement of Cement in Concrete Read More...
|
Civil Engineering |
India |
698-702 |
174 |
Analysis of Hops Length in Wireless Sensor Networks
-pathan adamshafi ; G.manikanth raju
Wireless sensor networks are provided with a limited source of power. The lifetime of such net-works is an overwhelming matter in most network applications. This lifetime depends strongly on how efficiently such energy is distributed over the nodes especially during transmitting and re-ceiving data. Each node may route messages to destination nodes either through short hops or long hops. Optimizing the length of these hops may save energy, and therefore extend the lifetime of WSNs. In this paper, we propose a theorem to optimize the hop’s length so to make WSN power consumption minimal. The theorem establishes a simple condition on hop’s length range. Computer simulation when performing such condition on Mica2 sensors and Mica2dot sensors reveals good performance regarding WSNs energy consumption. Read More...
|
computer science & engineering |
India |
703-706 |
175 |
Social inclusion and communications a review of the literature
-Saiprasanth.M ; Mr.Arthik Daniel Das
The social interactions within the users who use such live streaming service needs to be spontaneous. The cloud computing technology has triggered enormous opportunities to facilitate the mobile live streaming of the multimedia contents with an extended support to interact with the users. The quality of service (QOS), storage and sharing are some of the issues that have to be addressed in order to provide a mobile social television in a cloud environment. The cloud technology effectively handles some of these issues by assigning proxies for the mobile users. These proxies (surrogates) for the users, operates on the base of trans-coding mechanism. Also the PAAS and IAAS cloud services are keys in providing such an effective interaction based live streaming. Read More...
|
Department of Computer Engineering |
India |
707-711 |
176 |
MOBILE DATABASE SYSTEM
-K.Vishnuvardhan
The popularity of the mobile database is increasing day by day as people need information even on the move in the fast changing world. This database technology permits employees using mobile devices to connect to their corporate networks, hoard the needed data, work in the disconnected mode and reconnect to the network to synchronize with the corporate database. With the advent of mobile databases, users can load up their smart phones and Personal Digital Assistant (PDA) with mobile databases to exchange mission-critical data remotely without worrying about time or distance. In this scenario, the data is being moved closer to the applications in order to improve performance and autonomy. This paper focuses on the management issues and challengesfaced with mobile database. Read More...
|
computer sceince & engineering |
India |
712-715 |
177 |
AN ALGORITHM FOR A SECURE PATH IN MOBILE AD HOC NETWORK
-GAURAV ; MOHD. SADIM
Mobile Ad hoc Networks (MANETs) consists of a group of wireless mobile nodes which exchange data dynamically among themselves without based on a fixed base station or a wired backbone network. The ad-hoc network provide lack of secure boundaries. The ad-hoc network may also provide some intrusion.Ad hoc is used to describe solutions that are developed on-the-fly for a specific purpose. Computing nodes (usually wireless) in an ad hoc network act as routers to deliver messages between nodes that are within their wireless communication range. Intrusion is one of the common problems in all networks in case of ad hoc network we face the same problem. When we have a dense sensor network with number of nodes and there is some important data is transferred over the network, there is the requirement of security. But in case of “Man in Middle†it is never easy to say a network is intruder safe. Even when the Intruder knows about the routing algorithms or the algorithm implementation it is quite difficult to handle the problem. We are providing the approach to transfer data from some path other than that common path. Read More...
|
Computer Engineering |
India |
716-720 |
178 |
Two-stage mixing approach(TSMA) versus Normal mixing approach(NMA) for concrete in terms of Compressive strength and Carbonation depth.
-Sandeep Uniyal ; Dr. Vanita Aggarwal
One of the major challenges of our present society is the protection of environment. Some of the important elements in this respect are the reduction of the consumption of energy and natural raw materials and consumption of waste materials. These topics are getting considerable attention under sustainable development nowadays. The use of recycled aggregates from construction and demolition wastes is showing prospective application in construction as alternative to primary (natural) aggregates. It conserves natural resources and reduces the space required for the landfill disposal[9]. A new concrete mixing method, that is the two-stage mixing approach (TSMA), was developed to improve the quality of RA concrete (RAC) by splitting the mixing process into two parts. The current paper describes the variation of compressive strength and carbonation depth by experimental analysis involving the modified mixing method with some amendments to the two-stage mixing approach by proportioning ingredients with the percentage of recycled coarse aggregates (RCA) and fly ash. Based on experimental works and results, improvements in strength to RAC were achieved with TSMA. The current paper describes the variation of compressive strength and carbonation depth by analyzing experimentally involving the modified mixing method with some amendments to the two-stage mixing approach by proportioning ingredients with the percentage of recycled coarse aggregates (RCA) and fly ash. Read More...
|
Civil Engineering |
India |
721-725 |
179 |
Implementation Of LDPC Encoder/Decoder For Multimedia Applications
-MANJUNATHA V G ; Mrs. RESHMA M
As technology grows error correction schemes also improved in communication system, but still facing some problems in the error detection and correction process. In this paper will discuss the LDPC Encoder scheme in MATLab simulation tool. Low Density Parity Check (LDPC) code is the linear error correcting code used in the spurious environment to correct the error occurring in the message data. We consider the multimedia file as input but we need information in digital form, So we are converting this multimedia file to digital form by using the analog to digital conversion algorithm. Here we use the LLR / Min sum algorithm to produce the LDPC encoding/decoding. This can be achieved by using the Matlab software. Here we can also plot graph of LDPC algorithm with respect to BER and Signal to noise ratio. This shows that implemented LDPC coder have less sensitivity to noise Read More...
|
Electronics & Communication Engineering |
India |
726-729 |
180 |
review on optical CDMA with fiber brag grating & without fiber brag grating
-Ranjan ; Ms. Ankita
Increase in the number of users increases the interference between the signals and decreases the bit error rate (BER). This sets a limit for number of users in the given bandwidth in optical fiber. To improve the bit error rate of the system uniform fiber bragg grating is used at transmitter and receiver end with same reflectivity. With distance, performance of OCDMA decreases. To check the effectiveness of FBG on OCDMA in optisystem simulink software, various lengths of optical fibre are taken and bit error rate is checked. Comparison of BER and various parameters of eye diagram is done with FBG and without FBG. Read More...
|
electronics & communication engineering |
India |
730-732 |
181 |
Authenticity for protecting Biometric Data: Facial Template and Iris Detection
-Harmanpreet kaur ; Shifali Singla
A biometric is defined as a unique, measurable, biological characteristic or trait for automatically recognizing or verifying the identity of a human being. Digital watermarks can be used to verify the authenticity or integrity of the original signal or to show the identity of its owners. The conventional digital watermarking schemes uses an arbitrary digital pattern as a watermark which has limitations in providing ownership of watermarking. The proposed technique of watermarking include combined watermark embedding and extraction using SVD (Singular Value Decomposition), DWT (Discrete Wavelet Transform) and DCT (Discrete Cosine Transform). The proposed technique is based on the face detection and iris detection for authenticity and ownership of original data. This proposed technique will give us the better results of security and better quality of data without any loss during transmission of data. Read More...
|
Computer Engineering |
India |
733-735 |
182 |
An Implementation of Minimum Energy Channel Codes For NanoScale Wireless Communictions Using MAT Lab
-Mr. Chethan Kumar B ; Dr. Sarika Tale
It is essential to develop energy-efficient communication techniques for nanoscale wireless communications. In this Proposal, a new modulation and a novel minimum energy coding scheme (MEC) are proposed to achieve energy efficiency in wireless nanosensor networks (WNSNs). Unlike existing studies, MEC maintains the desired code distance to provide reliability, while minimizing energy. It is analytically shown that, with MEC, codewords can be decoded perfectly for large code distances, if the source set cardinality is less than the inverse of the symbol error probability. Performance evaluations show that MEC outperforms popular codes such as Hamming, Reed- Solomon and Golay in the average codeword energy sense. Read More...
|
Electronics Engineering |
India |
736-743 |
183 |
A Review comparison of different QAM in OFDM system
-REKHA SHARMA ; Ankita Mittal
To research is done on OFDM using different modulation. In this review paper we study the different level of QAM in OFDM system. In the paper (QAM4), QAM16, QAM64, QAM256 level of QAM I studied. The constellation diagram of different QAM is shown in this paper. From this constellation diagram we can estimate that lower level of QAM having low BER and higher level of QAM having higher level of BER. Read More...
|
Electronics and Communication Engineering |
India |
744-746 |
184 |
Embeded Based Health Monitoring System
-Anup kumar ; Anup kumar; Dr. Raju Yamanshetti
This paper proposes the remote monitoring of the health of the particular patient and collects vital parameters of the patient like Heartbeat, Body temperature, Spo2 level, BP and also assists paralyzed patients for their food and water with unique Eyeball Sensor embedded in it. It has been done in an android platform i.e. initially acquisition of sensor data, processing of data and transmitting these data into mobile, which announces the measured data by voice application and also if measured parameters are abnormal, then data can be transmitted to Hospital too. Thus a portable, less time to build and a low cost embedded health monitoring system with extra facility of sensors are very helpful in Health monitoring system Read More...
|
Electronics |
India |
747-750 |
185 |
INTEGRATION OF CAESAR CIPHER WITH REDEFENCE CIPHER FOR ENHANCING DATA SECURITY
-Randhir Kumar
In present period, there is momentous progress in earth of internet. Much Sensitive data can be shared through internet but this information sharing is susceptible to precise attacks. Cryptography was gave to solve these kinds of protection issues. It is an art for accomplished protection by encoding the plain text memo to cipher text. Substitution cipher and transposition cipher are the acquainted methods utilized for encoding. After Caesar cipher substitution and Redefence cipher transposition techniques are utilized individually, it is easy to crack the information. This paper suggests a hybrid method by combining substitution and transposition techniques. Combining Caesar cipher alongside Redefence cipher method can remove their fundamental flaw and produce a cipher text that is hard to crack. Read More...
|
Computer Science Engineering |
India |
751-753 |
186 |
EFFECTIVE IMAGE COMPRESSION USING BLOCK TRUNCATION TECHNIQUE
-PRIYA.V ; Dr.A.R.Mohamed Shanavas Msc,PGDCA,M.Phil,MEd,Ph.D
Block truncation coding (BTC) is a simple and fast lossy compression technique for digitized gray scale images. The key idea of BTC is to perform moment preserving (MP) quantization for blocks of pixels so that the quality of the image will remain acceptable and at the same time the demand for the storage space will decrease. It is a simple and fast algorithm which achieves constant bit rate of 2.0 bits per pixel. The method is suboptimal and divides the original images into small sub-images using a quantizer, taking more size and processing time. The aim is to adapt the sub images to reduce the number of gray. In block truncation coding an image is firstly segmented into n x n blocks of pixels. In the most cases the size is 4 x 4, but other sizes as 8 x 8 can also be used. Secondly, a two level output is chosen for every block and bitmap is also encoded using 1 bit for every pixel. This directly reduces the dimension without any resolution change. Read More...
|
Computer Science |
India |
754-756 |
187 |
Compact Microstrip Antenna for Bandwidth Enhancement
-anju kamboj ; suresh khaleri
In this paper compact microstrip antenna for bandwidth enhancement has been proposed.In this microstrip antenna rectangular shaped slots have been cut on the patch for bandwidth enhancement .Rogers RO 4003 has been used as a substrate.The proposed antenna resonates at 3.1Ghz,4Ghz,4.9Ghz and 6.3Ghz VSWR≤2 in 4.8-5.10Ghz frequency band. Efficiency of this antenna is 97.97%.This antenna works for multiband and wideband applications. In this paper return loss, radiation pattern, VSWR, gain have been studied. Ansoft HFSS tool has been used for designing and simulation. It works for Wimax, satellite, Wireless applications (WLAN) and radar applications, medical applications. Read More...
|
ELECTRONICS & COMMUNICATION ENGINEERING |
India |
757-761 |
188 |
Analysis of Quarter Car Passive Suspension System with Non Linear Suspension Parameters.
-Shital P Chavan ; Prof. Dr. Sanjay H Sawant
Modeling the dynamic performance of an automobile car system is a complex task and forms an important step in the design of suspension system of an automobile. In this paper the stationary response of a quarter car vehicle model moving with a constant velocity over a rough road is considered for the performance study. Passive suspension system comprises spring and damper which actually behaves nonlinearly. For proper designing of suspension system, nonlinearities in suspension parameters must be considered. For this a simplified model by considering nonlinearity of suspension spring and suspension damper is developed. The results are obtained by using MATLAB Model and compared with linear quarter car passive suspension system. Read More...
|
Mechanical Engineering |
India |
762-764 |
189 |
Solid Waste Treatment Processes- A case study for Ahmedabad Municipal Corporation
-Ramesh H Sheth ; NIL
Nowadays climate change especially global warming has raised humans’ concern regarding environmental problem and a part of global warming results from inappropriate waste management. Waste is an important contributor to co2 emission in world. There is a real need to alternate waste treatment to deal with above requirement.This research paper sets out a methodology for discovering best waste treatment that reduces the generation of green house gas. This research paper also directs to estimate waste arising in Ahmedabad Municipal Corporation.for 20 years from the year 2011-2031 and to calculate co2 emission for a number of different waste management systems in the future. Read More...
|
Environmental Management |
India |
765-767 |
190 |
Removal of COD Using Leaves, Stem and Root of Mangifera Indica as Biosorbent
-Khushboo Bhavsar
Modern environmental legislation focuses more on prevention of pollution through control of hazardous materials and processes as well as on protection of eco-systems. A number of technologies have been developed over the years for the treatment of industrial wastewater esp. COD. Potential of biosorbent prepared of leaves, stem and root of two species of Mangifera indica as a commercial grade activated carbon was determined to remove COD from the wastewater. For this purpose a system of standardised batch absorbers under steady state conditions is used to study the effect of these media. The influence of contact time, adsorbent dosage, pH of the solution, initial COD concentration, temperature and adsorbent particle size on the rate of per cent COD reduction is evaluated. Biosorbents has shown quite effective adsorbent capacity for COD reduction from the textile wastewater. The results revealed 96-98% of COD reduction which makes it an attractive option for the treatment of textile wastewater. Read More...
|
Environmental Science |
India |
768-771 |
191 |
Effects of Copper Doping on Chalcogenide (Cadmium Sulfide) Thin Films by Chemical Bath Deposition Method
-R. Ganesh ; V. Senthil kumar; M. Raja ; K. Ravi kumar; J. Chandrasekaran
Chalcogenide cadmium sulfide (CdS), with various concentrations of Cu2+ (0.1, 0.2, 1 and 2M) - doped CdS thin films have been successfully synthesized by a chemical bath deposition (CBD) method. The synthesized thin films were characterized by UV–Visible absorption (UV–Vis), X-ray diffraction (XRD) and photoluminescence (PL) spectroscopy. The absorption peaks of the synthesized films were noticeably blue / red-shifted from the bulk material depends on the different Cu2+ molar concentration. The bandgap value of the films decreases within the Cu2+ concentration. The XRD analysis confirmed the formation of polycrystalline in nature for all samples. The average size of the particles ranged from 9.55 nm to 129nm. The decrease of luminescence intensity at the higher Cu2+ concentrations and Particles with increased Cu2+ concentrations had a red shift in their PL emission spectra. Read More...
|
Physics (Thin films) |
India |
772-775 |
192 |
Research & Development of Silicon Nanowire : Faster than Silicon Chip
-Sumit Bhatt ; Naresh Kumar Bhutani
Silicon nanowire (SiNW) is the renowned one dimensional material for future nanoelectronic applications. Nanowires are having unique capability to bridge the nanoscopic with macroscopic world and have already been demonstrated as main material for different energy conversion. Silicon nanowires (SiNWs) have been developed on the substrates of crystalline silicon, indium tin oxide and stainless steel, using a gold catalyst coating with a thickness of 200 nm via pulsed plasma enhanced deposition of chemical vapor. Also known as quantum wires, these connectors are used to connect tiny components together into very small circuits. SiNWs have been described as one of the promising building blocks for the nanodevices using in coming future such as field effect transistors, solar cells, sensors and lithium battery. During the past decade much progress has been made in this field and SiNWs have received much attention especially for applications in the semiconductor industry. There is no restriction how wide they can grow, but cannot grow more than a few nanometers in height. Read More...
|
Computer Engineering |
India |
776-779 |
193 |
SharePoint KM Educational Portal with Keyword Management
-Veena S. Pawar ; Prof. Seema Ladhe
This paper presents a layout on how to create a participative model for sharing and accessing knowledge and learning resources within your educational institution.We start with an overview of current approach of how knowledge and learning is managed within institutes today. This point out drawbacks arising when implementing sophisticated learning models. A Knowledge Management System based on the MS SharePoint Server 2010 platform is proposed, which provides several means in order to overcome such drawbacks.Our system assists to share information, communication, collaboration etc. The solution utilizes portal technology and digital assets management system. We also implement an auto-summarization for the documents, uploads on this portal. Text summarization is a process of reducing the size of a text while preserving its information content. In this paper, we use automatic text summarization technology that plays very important role in information retrieval and text classification, and will provide a solution to the problem of information overload. We propose a sentences clustering based summarization approach. It is useful when the document having number of pages.
This provides consistent, common platform for students / teachers to work, communicate, and share knowledge. Therefore it is well suited for specific educational processes in the departments. Along with this we also analyze specific key technical aspects of this platform.
Read More...
|
Computer Engineering |
India |
780-782 |
194 |
Network Security on Digital Security
-Purushoth Kumar T
Our objective is to provide the tools for certifying the origin of the file where it come from. When transferring important documents it is often necessary to certify in a reliable way who is actually the sender of a given document. One approach for certifying the origin of documents and files is by using the digital signature. The digital signing is a mechanism for certifying the origin and the integrity of transmitted information. In the process of digitally signing, additional information called digital signature is added to the given document, calculated using the contents of the document and some private key. At a later stage, this information can be used to check the origin of the signed document Read More...
|
Information Technology |
India |
783-785 |
195 |
Experimental study on Fly Ash, Wheat Straw Ash, Rice Husk Ash, Saw Dust Ash and Glass powder as a partial replacement of cement in Concrete and their Cost Analysis
-Rajendra Singh Dangi ; Dr. Y.P joshi
Different materials with pozzolanic properties such as fly ash. Condensed silica fume, blast furnace slag and rice husk ash have played an important part in the production of high performance concrete. During the late 20th century, three has been an increase in the consumption of mineral admixture by the cement and concrete industries[4]. The increasing demand for cement and concrete is met by the partial replacement for energy intensive Portland cement. Pozzolanic materials have long demonstration their effectiveness in producing high performance concrete. Artificial pozzolanas such as supplementary cementing material in many part of the world[2]. This work evaluates the compressive strength of rice husk ash (RHA, Wheat Straw Ash (WSA), Fly Ash, (FA), Glass powder (GP)as a partial replacement for OPC in concrete[1]. The main aim of this work is to determine the optimum %( 10, 20, 30) of Rice husk ash (RHA), Wheat Straw Ash (WSA), Fly Ash, (FA), Glass powder (GP) as partial replacement of cement for M40 grade of concrete[3]. In addition, results show that Rice husk ash(RHA), Wheat Straw Ash (WSA), Fly Ash, (FA), Glass powder (GP) as an artificial pozzolanic material has enhanced the durability of concrete.. Read More...
|
Civil Engineering |
India |
786-790 |
196 |
Robotics With Snake
-Rushikesh .J
Research on snake-like robots expands the fields of application of robots.Based on control area network(CAN) bus technologies,we control the snake-like robots.They can use to search for survivals in shambles,of earthquake,fire.Its maximal distance of communication is 10 km,while calculating bit rates is up to 1 mbps.monitoring system which is connected to the control system through wireless communication.microcontrollers (MCU) are applied to our robort control system and snake-arm robot is a slender hyper-redudant manipulator.the high number of degrees of freedom allows the arm to “snake†along a path or around an obstacle. the master module consists of a 16-bit MCU,a wireless communication module and a sensor part.The snake robotics is used in various military uses,these are navigate very confined spaces used to search for people trapped in collapsed bulidings Read More...
|
Robotics |
India |
791-793 |
197 |
Miniaturized Circular Shaped Patch Antenna for C/X Band Applications
-Mamta Rao Kalwa ; Naresh Kasnia
In this paper circular shaped stack patch antenna has been proposed. In this slots have been cut on the patch for size miniaturization.FR-4 epoxy has been used as a substrate. The proposed antenna resonates at 6.28 GHz, 7.3 GHz, 8.54 GHz and10.18Ghz VSWR≤2 in 5.9-10.7 GHz frequency band. This wideband antenna works for multiband applications. In this paper return loss, bandwidth, radiation patterns, VSWR, gain have been studied. Ansoft HFSS tool has been used for designing and simulation. Efficiency of proposed antenna is 86%.It works for Wimax, satellite (6.2-7.2 GHz), Wireless applications (WLAN) and radar applications, medical applications Read More...
|
Electronics and communication engineering |
India |
794-798 |
198 |
How Stemming Help to Track Bugs in Bug Tracking System
-PANKAJ KUAMR ; Mr. ARCHIT KUMAR
In this paper we analyze theoretically how steaming help to track bugs in bug tracking system (BTS). Stemming is very important part of natural language processing (NLP). NLP is used to find bug related terms by reading line by line text summary that is given by Users, developer, and testers. The Bug Tracking System (BTS) is use to maintain bug related database with important attributes i.e. ID, Product, Component, Assignee, Status, Resolution, Summary, Changed Time and Category. The data is collected from various sources such as end users, testers and development teams. When bug is reported by bug reporters to a Bug Tracking System, the reporters required to label the bug reports as Security Bug Reports (SBR) or not i.e. Not Security Bug Reports (NSBR). It is necessary to prioritize the SBRs, to fix first then NSBRs. But, what happen when reporters misclassify the SBR as NSBR? It’s may cause serious problems to our system if we not fix SBR in specific time. So, to identifying NSBR is SBR we use text-mining of summary reports given in summary attribute with respect to considered attributes of product, component, resolution and state. So, with the help stemming we compact the terms by removing the grammatical form of the words. These compressed data term more understandable form. By this way we get best security related words. That help to find what actually our report is SBR or NSBR. Read More...
|
Computer Science and Engineering |
India |
799-801 |
199 |
A Novel Design of Microstrip Antenna for Satellite Application
-Monika Nagpal ; Naresh Kasnia
In this paper Micro strip antenna is proposed. FR-4 epoxy is used as a substrate .The proposed antenna resonates at 6.7, 7.85 GHz, VSWR<2 in 5.65-8.4Ghz frequency band.This antenna works for wideband applications. In this paper return loss, radiation pattern, VSWR, gain have been studied. Ansoft HFSS tool is used for designing and simulation. It works for satellite (6.1-7.1GHz ) application. Read More...
|
electronics and communication |
India |
802-804 |
200 |
Design and Implementation of Binary to IEEE754 64-bit Floating Point Converter using Verilog
-Srinivas V ; Harshitha B
Floating point numbers are used in many applications due to their dynamic representation capabilities in digital signal processing. The main objective of the work is to design and implement a binary to IEEE 754 floating point converter for representing 64 bit double precision floating point values. The converter at the input side of the floating point unit module helps to improve the overall design and reduces the complexity of manually converting the binary numbers into IEEE 754 format numbers. Hence the method solves the problems in occurrence of human errors to an extent in direct feeding of IEEE 754 format numbers to the FPU module.The modules are written using Verilog and are then synthesized for Xilinx Virtex 5 FPGA using Xilinx Integrated Software Environment(ISE) design suite 14.2
Read More...
|
Electrronics Engineering |
India |
805-807 |