No. |
Title and Author |
Area |
Country |
Page |
1 |
General Provident Fund accounting software system
-Firdaus Amin ; Rupak Kumar
In the present work a web based Software for GPF accounting system has been developed using ASP.NET and SQL Server2005 in order to fulfill all the user needs and more quickly than before. Present GPF System in several Departments is a manual system. The manual system has certain limitations such as manual calculation, ledger postings and generation of monthly & annual reports, which require lot of critical manpower and time. This is a web-based on local network (Intranet) system which adds new employee's ACR details with details of reporting & reviewing officers, updates or modifies the database according to the requirements and also generates the details based on searching under various categories. So any employee can see the account status and the GPF officer can easily get the job done without any error. GPF Accounting Software System (GASS) maintains all the information regarding GPF A/Cs and Employees. GASS is supposed to connect the different circles where every circle can maintain its own data and also share the information with the different circles. Read More...
|
computer engineering |
India |
1-3 |
2 |
Modeling and Simulation of a plate with piezo-patches as sensors/actuators using LQG modal control & comparison with classical controller
-Neeraj ; Deepak Chhabra
This work is aimed at the active vibration control of a flexible structures using piezoelectric material. A cantilever plate structure, which is supported at one end and free at another is taken as the flexible structure with piezoelectric materials as sensors and actuators. Sensors and actuators, which are square in shapes, are embedded to the parent structure. The active controller was designed to control first three modes of vibration of plate. First, the analysis for the transient vibrations in a cantilever plate structure was performed which was followed by the analysis of the same cantilever plate structure when embedded upon with a pair of sensor and actuator. The plate was discretized into small square elements (8x8) of identical size (2x2cm) in order to assign the different locations to sensors and actuators, which were assumed to be of the exact shape of the discretized plate elements. PID and LQG controllers are applied for attenuating the global structural vibration and comparisons between the both controllers are carried out. Read More...
|
Mechanical Engineering |
India |
4-13 |
3 |
Modeling and Simulation of a Plate with Piezo-Patches as Sensors/Actuators using H-Infinity Controller & Comparison with Classical Controller
-Monu Malik ; Deepak Chhabra
Vibration control of a smart structure is investigated by means of PID as well as H-infinity control schemes. The smart structure consists with a cantilever plate of aluminum of size (160mm x160mm) and piezo-patches of size 20mm x 20mm. Sensors and actuators, which are square in shapes, are embedded to the parent structure. The active controller was designed to control first three modes of vibration of plate. The plate was discretised into square elements of identical size in order to optimize the different locations to sensors and actuators, which were assumed to be of the exact shape of the discretized plate elements. A comparison work has been obtained between these two controllers on the basis of data precipitated in the MatLab. The experimental results showed that proposed controllers (PID & H-infinity) can suppress the effect of external disturbances in the plate. Read More...
|
Mechanical Engineering |
India |
14-23 |
4 |
Simplified IPad Ordering System for Hotels
-C.Goutham Thapa
Simplified Ipad Ordering System for Hotels is an IPad application based project. It will give restaurant customers access to menus of food items organized in categories. Customer will have quick access to menus of food and other items with simple navigation, up or down swipes to vertically scroll through food and other items. This application can be used in two ways. Customer also can access to the ipad or else the hotel waiter can serve over several tables with a single ipad. Once the order is done, the push message will be sent to the kitchen POS (point of sales). A push notification will be appear in the monitor available in the kitchen. The push message contains table no, list of item with needed ingredients. Customer can order multiple numbers of items with their choices. The ordered items contains item id, item quantity, table no, date & time and device id. It can overcome the human error while taking the order. The application have search bar option which helps the customer to search and select the items. Search bar makes easy of access to the needed items fast. Customers also can add the several items to their favorite block. Even feedback, like, unlike, email and printing options are available Read More...
|
computer science |
India |
24-26 |
5 |
Cost Effective and Innovative Housing Technology
-Ayush Srivastava
Shelter is amongst the three basic human needs but now-a-days, about two-third of the total Indian population does not have their own shelter. This two-third population belongs to the middle and lower income class. These people find it difficult to construct their houses at an affordable cost by using conventional construction technology. It is found in many cases that people serve their whole life constructing their own house, but fail. The mission and dream of these people can be achieved by appropriate use of cost effective and innovative construction technology. As a whole, the housing shortage of the country can be overcome within lesser funds, without compromising with the quality control and structural stability of the structure.
Note: This technology is only applicable for single or two storied buildings and can be applied in most of the soil and climatic conditions. Read More...
|
Civil Engineering |
India |
27-29 |
6 |
Secure and Scalable Sharing Of Personal Health Records (PHR) In Cloud Computing Using Multi Authority Attribute Based Encryption
-Gadwala Rakesh
Personal health records (PHR) is an emerging centric patient model of health information exchanges, which is often stored at a third party. Such as cloud providers so there is been better privacy provided by considering the personal health information's so that, they will no longer be accessible to the third party servers and other parties .So some specific issues like privacy exposure, scalability in key management, flexible access and efficient user revocation these process can be achieved. The stored data will be in the form of cryptography so here in the existing system it uses attribute based encryption (ABE) in order to maintain each patient's PHR file .so here we focus on multi authority attribute based encryption (MABE) to maintain the PHR for every clients in making modification of access policies or file attributes, supports efficient on demand user/attribute revocation and emergency scenarios. Extensive analytical and experimental results are presented which show the security, scalability and efficiency of our proposed scheme. Read More...
|
computer science |
India |
30-31 |
7 |
Mitigation of Short Term Voltage Variations Using PV Based Dynamic Voltage Restorer
-Avinash Maurya ; K. G. Upadhyay
One of the most important issues for power companies and users is to maintain the quality of power .Voltage sag, voltage swell and interruption comes under short term voltage variations. In order to mitigate these variations, a custom power device called dynamic voltage restorer (DVR) is used.Its basic function is to inject the voltage difference (difference between pre-sag & sag voltage ) to the power line in such a phase so that it can maintain the pre-sag or pre-swell voltage condition in the load side with in few milliseconds. In this paper, a PV based dynamic voltage restorer (DVR) has been proposed to mitigate voltage sag, swell and interruptions on a low voltage residential distribution system. The PV based DVR can recover sags up to 0.1 pu, swells up to 1.9pu. Otherwise, it work as an uninterruptable power supply (UPS) when the utility grid fails to supply. This PV based DVR comprises of PV system with MPPT controller, boost converter, PWM voltage source inverter, series injection transformer & semiconductor switch. Modeling and simulation has been done in MATLAB software. The simulation result shows that proposed DVR works effectively to mitigate voltage sag, swell and interruptions. Read More...
|
Electrical Engineering |
India |
32-36 |
8 |
Review on Image Denoising using DWT Algorithm
-Bela ; Ankita Mittal
The prime focus of this thesis is related to the pre processing of an image. The pre processing being worked upon is the de noising of images. In order to achieve this in terms of the concerned work, wavelet transforms have been applied: Discrete wavelet transform and EEMD. In this thesis, a new technique which is combination of Enhanced Empirical Mode Decomposition (EEMD), has been presented along with the standard wavelet thresholding techniques like soft and hard thresholding. And a comparative analysis of different combinations of the suggested threshold values and thresholding techniques has been carried out very efficiently. A new constraint, of either thresholding the low pass components or keeping them as such before applying the inverse DWT has also been added. This has been done in order to find more possible combinations that can lead to the best denoising technique. Read More...
|
Electronics & Communication Engineering |
India |
37-41 |
9 |
Image Denoising using DWT-EEMD Algorithm
-Bela ; Ankita Mittal
The massive amount of data required for images is a primary reason for the development of many sub areas within the field of computer imaging such as image segmentation and compression. Whatever may be the way of transmission, the data tends to get noisy and thereby the further processing does not lead to good results. Hence, it is very essential to keep the data close to originality. In order to achieve this in terms of the concerned work, wavelet transforms have been applied: Discrete wavelet transform and EEMD. In this thesis, a new technique which is combination of Enhanced Empirical Mode Decomposition (EEMD), has been presented along with the standard wavelet thresholding techniques like hard thresholding to denoise the image. Read More...
|
Electronics & Communication Engineering |
India |
42-45 |
10 |
Design, Modification, Analysis of a Tractor Driven Container Lifting Device Used for Solid Waste Management
-Navin Kumar Bansal ; Prof. U.V. SHAH
For transport of solid waste the concerned authority need to decide the type of vehicles to be procured and the system of transportation to be adopted. In all mega cities and municipal corporations’ HCV chassis are used for loading and unloading the containers having size more than 5.5 cubic meters. But for all towns and Nagarpalikas these may not be preferred due to space limitations and narrow size roads. So here tractor driven lifting device may be used which will lift up to 4.5 cubic meter containers. They can use containers of up to 4 to 4.5 cubic meters capacity, which will make optimum use of the tractors. The objective of this dissertation is to design, modify and analyses the existing design parameter, to identify the parameter which affecting the performance of the device and by conducting survey from end users, manufacturer to know the problems associated with the existing device. Based on the survey and study new improved optimum utilization and convenient design will be suggested for easy operation and less maintenance. Read More...
|
Mechanical Engineering |
India |
46-48 |
11 |
Car Speed Control Using Bluetooth
-Firdaus Amin ; Rupak Kumar
In the current scenario the world is plagued by accidents which are primarily due to human errors in judgment and hence thousands of lives are lost. These accidents can be avoided if only there was a mechanism to alert the driver of approaching danger. This can be done by monitoring the distance between nearby cars and alerting the driver whenever the distance becomes too short. This is precisely the aim of this paper. In this paper we propose the use of Bluetooth Technology by which we can check the speed of the car whenever it comes dangerously close to any other vehicle up front, thereby saving very many lives. Read More...
|
computer engineering |
India |
49-50 |
12 |
Enhancement of IP Mobility in Vehicular Communication Networks
-G.MOUNIKA ; B.SUSHMITHA ; M.VAISHALI; C.H.PRITHVI; N.GOVINDA RAO
Vehicular communication networks have emerged as a promising platform for the deployment of safety and infotainment applications. The stack of protocols for vehicular networks will potentially include Network Mobility Basic Support (NEMO BS) to enable IP mobility for infotainment and Internet-based applications. However, the protocol has performance limitations in highly dynamic scenarios, and several route optimization mechanisms have been proposed to overcome these limitations. A qualitative comparison among the existent IP mobility solutions that optimize NEMO BS in vehicular networks is provided. Their improvements with respect to the current standard, their weaknesses, and their fulfillment of the specific requirements are also identified. Read More...
|
COMPUTER SCIENCE ENGINEERING |
India |
51-52 |
13 |
Skewed Prognostic Load Prediction Strategy in Mobile Cloud Computing
-Dishant Agrawal ; SP Singh
In Mobile Cloud Computing (MCC), load balancing is essential to distribute the local workload evenly across all the nodes either statically or dynamically. A high level of user satisfaction and resource utilization ratio can be achieved by ensuring an efficient and fair allocation of all computing resources. In the absence of proper load balancing strategy/technique the growth of MCC will never go as per predictions. The appropriate load balancing helps in minimizing resource consumption, implementing fail-over, enabling scalability, avoiding bottlenecks. We introduce the concept of "skewness" to measure the unevent utilization of a server. By minimizing skewness, we can improve the overall utilization of servers in the face of multi-dimensional resource constraints. We design a load prediction algorithm that can capture the future resource usages of applications accurately without looking inside the VMs. The algorithm can capture the rising trend of resource usage patterns and help reduce the placement churn significantly. Read More...
|
Computer Science & Engineering |
India |
53-57 |
14 |
The Development of Grid Computing with Encryption Techniques and Public Key Infrastructure (PKI)
-G. Lakshmi Preya ; M. Narayanan
Grid computing is considered as a special request for dealing out the data storage space of several number of computers. Secure logging, key management, allocation and credential life span and renewal is needed for better performance in the grid based systems. Parallel type of processing is also done in Grid computing system. Grid Security Infrastructure (GSI) gives Globus Toolkit and also Public Key Infrastructure (PKI) is considered to be the proposed work. Encryption techniques namely Symmetric encryption, asymmetric encryption are proposed for providing best security and develop the performance to the highest level. Symmetric encryption, asymmetric encryption encrypts and decrypts the message in the successful way. This concept is proposed for the grid security. Read More...
|
Computer Science and Engineering |
India |
58-61 |
15 |
Emotion and Sentiments analysis in Social Media Communication (Text)
-SARFARAZ AHMAD ; MD. TABREZ NAFIS
People when they speak, interact and write convey emotions. The life is an emotion. Emotions play a key role in any kind of decision in affective, social or business area. The emotions are manifested in verbal, facial expressions but also in written texts. Nowadays, with the growth of internet and social media like facebook twitter , many humans interact, in textual manner with each other in large , and exchange ideas, opinions in the web channel or web communities. Emotions in text are very important if we consider that textual interface with the computer is one of the most used. Emotions are treated largely in affective computing that focuses on improving the interaction between user and computer. People express emotions as part of everyday communication. Emotions can be judged by a combination of cues such as facial expressions, prosodies, gestures, and actions. Emotions are also articulated by written texts. Inspired by works in sentiment analysis, this paper explores approaches to automatic detection of emotions in text. I draw from emotion theories in the fields of psychology and linguistics, and use natural language processing and machine learning techniques for automatic emotion detection. In this paper, I describe studies and experiments in manual and automatic recognition of expressions of the six basic emotions (Ekman, 1992) – happiness, sadness, anger, disgust, surprise, and fear – in text form. Read More...
|
computer science |
India |
62-67 |
16 |
A Survey on Simulation Method for Wave Propagation in Fiber Brag Greeting
-Chintan G Patel ; Chirag P Patel
In recent years, many research and development projects have focused on the study of fiber Bragg gratings. Fiber Bragg gratings have been used in the field of sensors, lasers and communications systems. Commercial products that use fiber Bragg gratings are available. On the other hand, in the field of software development, object-oriented programming techniques are also becoming very popular and powerful. For fiber Bragg grating problems, widely used theories and numerical methods such as the coupled-mode theory and the transfer matrix method will be applied in the analysis, modeling and simulation. The coupled-mode theory is a suitable tool for analysis and for obtaining quantitative information about the spectrum of a fiber Bragg grating. The transfer matrix can be used to solve non-uniform fiber Bragg gratings. Two coupled-famode equations can be obtained and simplified by using the weak waveguide approximation. The spectrum characteristics can be obtained by solving these coupled-mode equations.
Uniform, chirped, apodized, discrete phase shifted and sampled Bragg gratings have already been simulated by using the direct numerical integration method and the transfer matrix method. The reflected and transmitted spectra, time delay and dispersion of fiber Bragg gratings can be obtained by using this simulation program. At the same time, the maximum reflectivity, 3dB-bandwidth and centre wavelength can also be obtained. Read More...
|
Electronics and communication |
India |
68-71 |
17 |
vector controlled in induction motor drive
-Patel Swati Gauravkumar ; Patel swati Gaurav kumar; Rutul mehta
Vector control is the most popular control technique of AC Induction Motor. Induction motors are the most widely used electrical motors due to their reliability, low cost and robustness. However, induction motors do not inherently have the capability of variable speed operation. Due to this reason, earlier dc motors were applied in most of the electrical drives. But the recent developments in speed control methods of the induction motor have to their large scale use in almost all electrical drives. Also Direct Torque Control method have been used because of its simplicity and very fast torque and flux control response for high performance IM drive application. Read More...
|
Electrical Engineering |
India |
72-74 |
18 |
A Descriptive Study Of Challenges, Opportunities And Models in Cloud Computing
-Sruthi.K ; Sruthi.k; Fahad Iqbal; Dr.D.Venkata Subramanian
Nowadays the most commonly used technique as known by all is cloud computing. The tumor of cloud computing is very agreeable. There are also so many problems arising day by day in the environment. Anything and everything which are used by more people are to be tested day by day for an environmental cause and improved so that natural resources should not be continuously wasted. This paper contains a short restatement of cloud computing and greener stages. Read More...
|
Computer Science Engineering |
India |
75-77 |
19 |
Picture Registration on FPGA Platforms
-V. Surendar
Picture selection may be a computationally focused procurement inside the remedial imaging space that places stringent needs on execution and memory organization capability. This paper makes frameworks for mapping the picture selection orders on the configurable gear underneath time of time execution requests. Developing the arrangement of homogenized parameterized dataflow, that gives a profitable formal model of style and examination of supplies and workstation code for marker methodology procurements, we have a tendency to make novel procedures for identifying with and examining the fittings style house when mapping picture enlistment computations on the configurable gear. Our systems end in Associate in nursing calm framework for business off execution and configurable supplies stake use maintained the commitments of a given order. Maintained inclinations that we've got chose when applying these methods, we have a tendency to conjointly favoring a completely extraordinary development displaying that allows quickly-reconfigurable picture selection. This organized blueprint can tune its data taking care of structure adaptively maintained appropriate parts of the information pictures. Critical words Dataflow HPDF Image enrollment Reconfigurable architectures. Read More...
|
information technology |
India |
78-80 |
20 |
Design and implementation a Low Power RISC Processors
-Mohahmmed Wassiuddian Sheikh ; Dheeraj Jain
RISC or Reduced Instruction Set Computer is a design philosophy that has become a mainstream in Scientific and engineering applications. Increasing performance and gate capacity of recent FPGA devices permits complex logic systems to be implemented on a single programmable device. The most important feature of the RISC processor is that this processor is very simple and support load/store architecture. The important components of this processor include the Arithmetic Logic Unit, Shifter, Rotator and Control unit. In this paper, we propose a 16-bit non-pipelined RISC processor, which is used for signal processing applications. The processor consists of the blocks, namely, program counter, clock control unit, ALU, IDU and registers. Also compare it with another proposal of 16-bit pipelined RISC processor using VLIW architectures. This processor is especially used for both D.S.P applications and general purpose applications. Reduced instruction is the main criteria used to develop in this processor. Advantageous architectural modifications have been made in the incrementer circuit used in program counter and carry select adder unit of the ALU in the RISC CPU core. Read More...
|
Electronics and Communication Engineering |
India |
81-84 |
21 |
Performance evaluation of an OFDM-based LMDS using measured channel models
-Rahul Porwal ; R.K.Vyas
Orthogonal Frequency Division Multiplexing (OFDM) is a multi-carrier system where data bits are encoded to multiple sub-carriers, while being sent simultaneously. This results in the optimal usage of bandwidth. The principles of OFDM modulation have been around since 1960s. However, recently, the attention toward OFDM has grown dramatically in the field of wireless and wired communication systems. A set of orthogonal sub-carriers together forms an OFDM symbol. To avoid ISI due to multi-path, successive OFDM symbols are separated by guard band. This makes the OFDM system resistant to multi-path effects. The main advantage of this transmission technique is their robustness to channel fading in wireless communication environment. This is reflected by the adoption of this technique in applications such as digital audio/video broadcast (DAB/DVB), wireless LAN (802.11a and HiperLAN2), broadband wireless (802.16) and xDSL. The main focus of this paper is to design IFFT and FFT blocks which are used in transmitter and receiver of the blocks diagram of OFDM system. The methodology used is the IFFT/FFT(DIT) with radix-2 butterfly algorithm. The design unit also consists of modulation and demodulation for mapping technique. Read More...
|
Electronics and Communication Engineering |
India |
85-87 |
22 |
A Low Power Multiplication and dividing Technique using Radix
-Raj kumar Agarwal ; Dheeraj Jain
The general objective of this paper is to develop methods to reduce the power consumption of arithmetic modules, while maintaining the delay unchanged and keeping the increase in the area to a minimum. Here we illustrate some techniques for a radix-4 divider realized in 0:6_m CMOS technology and compare it with radix-8. We obtained a power consumption reduction of 35% with respect to the standard implementation. The techniques used here should be applicable to a variety of arithmetic modules which have similar characteristics. Read More...
|
Electronics and Communication Engineering |
India |
88-90 |
23 |
Switching Table Based Direct Torque Control of Induction Motor Drive
-Saurabh Sharma ; Sandeep Kumar Gautam
Among all control methods of induction motor drive Direct Torque Control is very good because control process is independent of rotor circuit parameters and also there is no requirement of speed sensor. DTC has been used for smooth steady state and transient performance of induction motor. This paper presents simulink model of switching table based DTC of an Induction Motor drive , various waveform of electromagnetic torque, mechanical speed, stator currents of induction motor are also shown. Read More...
|
ELECTRICAL ENGINEERING |
India |
91-95 |
24 |
MULTI-RADIO FREQUENCY INTERFERENCE IN UNLICENSED BANDS
-Adil Ahmad ; Dr. Rajender Kumar sharma
The increasing density and data rate of unlicensed band wireless devices has led to significant inter- and intra-radio interference problems Multiple competing standards such as the IEEE 802.11b/g, Bluetooth and ZigBee, all of which operate in the 2.4 GHz ISM band, can interfere with each other when used in typical indoor environments, potentially causing significant performance degradation. This thesis aims to characterize different types of heterogeneous interference in the 2.4 GHz unlicensed band and develop techniques to diagnose interference related problems. We have discussed in this report the different type of topology and spectrum band used in unlaced radio frequency. We have described the planning method of 2.4 GB wifi network to avoidance of the interference and collision of the traffic. We have used the latest toll of insider to scan the different radio frequency coming from the other device and strength of the signal of the device. We have created the various set up channel interference and measured the through put by the Netper sec software. Validation experiments show that broad auto-classification of multi-radio interference in terms of congestion, slow links, inter AP interference and Bluetooth interference. Read More...
|
Electrical Engineering |
India |
96-99 |
25 |
Quaternions Implementation Benefits for Simulation of Unmanned Aerial Vehicles and Satellite Motion
-Petar Getsov ; Svetoslav Zabunov
The current paper describes how quaternions are used successfully and effectively in simulations of unmanned aerial vehicles (UAVs) and satellite motion through definition of the UAV airframe or satellite body as a rigid body. By such means the authors try to raise interest among students and scientists in the mathematical formalism of quaternions that was very popular more than 100 years ago, but was replaced by vectors and matrices. Nevertheless, quaternions benefits make them valuable in numerous tasks, among others the numerical integration of rigid body motion dynamics equations.Simulations, part of the current project, can be viewed on http://ialms.net/sim/ web address. Read More...
|
Computer 3D Simulations of Tasks in Theoretical and Analytical Mechanics |
Bulgaria |
100-102 |
26 |
Implementation of Position Sensorless Control Based On Coordinate Transformation For Brushless DC Motor Drives
-SHIVANAND N SONNAD ; MANISH.G.RATHI
This paper presents a novel method for sensorless brushless dc(BLDC)motor drives, Based on the characteristics of the back electromotive force(EMF), the rotor position signals would be constructed. It is intended to construct these signals which make the phase difference between constructed signals and back EMF controllable, then rotor position error can be compensated by controlling the phase difference angle in real time. In this paper, the rotor position detection error is analyzed. Experiments are implemented on a 16F877A Microcontroller chip as a control core to demonstrate the feasibility of suggested sensorless control. Read More...
|
ELECTRICAL ENGINEERING |
India |
103-106 |
27 |
Effect on Strength of Concrete Incorporating Cotton Fiber and Silica Fume
-Saurabh Arvindbhai Jaiswal
Aim of this study to determine Compressive strength and Flexural strength of M20 grade concrete with use of cotton fiber and silica fume. Conflow-SP is used to improve the workability of concrete which is based on Sulphonated naphthalene polymers. Efforts for improving the performance of concrete over the past few years suggest that cement replacement materials along with mineral & chemical admixtures can improve the strength characteristics of concrete. Silica fume can be utilized to produce high strength and durable concrete composites. The Concrete specimens were cured on normal moist curing under normal atmospheric temperature. The Compressive strength determined at 7 and 28 days and Flexural strength at 28 days. The addition of Cotton fiber by the weight of concrete shows an increase strength property and Silica fume as cement replacement material shows early long term strength. This system that is Ordinary Portland Cement - Cotton fiber - Silica fume concrete was found to increase the Compressive and Flexural strength of concrete on all ages when compared to concrete made with Cotton fiber and Silica fume. Read More...
|
(CASAD-ME) CIVIL ENGINEERING |
India |
107-109 |
28 |
Empirical Investigating Online Fraud Victimization
-Dr.S.Mohamed Iliyas ; V.Saranya
Offline, crime and resulting victimization is not individual incidence. It is also hampered or encouraged by the community in which it is situated. Are community characteristics relevant for victimization online? This paper presents a small sample study that examines whether economic, structural, and cultural characteristics of a community explain the incidence of Craigslist-based scams. How to avoid the scam depend upon the craigslist, deal locally, buy and sell locally with security system and find the product location and then proceed the transaction, with cash payment. Read More...
|
Computer Engineering |
India |
110-111 |
29 |
SOLID WASTE MANAGEMENT
-RAMESH H SHETH
Nowadays climate change especially global warming is one of the serious environmental issues. The evidence of global warming has raised humans' concern regarding environmental problems, and a part of global warming results from inappropriate waste management. Waste is an important contributor to co2 emissions in the world. It is therefore necessary to reduce the amount of biodegradable municipal waste going to land fill as to prevent or reduce the negative effects of land filled waste on the environmental and human health. There is a real need for alternative waste treatments to deal with the above requirements. The purpose of this research paper is to discover the best alternative treatment for reducing municipal waste going to land fill and to assess the alternative treatment from the view point of carbon foot print. Read More...
|
Environmental Engineering |
India |
112-119 |
30 |
Analysis of Lung Nodules using texture analysis in Medical Images
-Anisha M. Lal ; D. Aju
Texture is an important property of the image. Texture analysis techniques play a vital role in medical imaging to automatically extract parameters that are used to classify the normal and abnormal tissues. Lung cancer is a terminal disease that primarily affects the lungs. However, lung cancer can spread to other tissues and organs through the lymph nodes or the blood stream if not detected early and treated. There are several diagnostic methods of imaging technology that are used by radiologists in the detection of lung cancer, and most lung cancer is detected by routine chest X-rays for other issues before any signs or symptoms of lung cancer arise. Image analysis based on texture feature of an image is still a complex and challenging problem, and hence texture feature based technique is the approach which has been selected for analysis of medical images. Here an analysis is done on lung nodules using texture analysis in various medical images. Mostly this paper concentrates on Chest X-rays images and CT scan images of lung. Read More...
|
Computer Engineering |
India |
120-124 |
31 |
Fuel Emission Reduction By Optimization Of Collection Routes Using Gis
-Suganya S, Jostin P. Jose
Local authorities constitute worldwide the main providers of waste management services. Waste collection and transport is responsible for a large fraction of the total waste management costs, EU policy requires that waste is treated to recover materials and energy prior to disposal and this increased level of service needs to be provided at the minimum possible cost, as the public will not be able to bear large increases in its waste charges. Municipalities are therefore under increased pressure to optimize their services, both in terms of quality and costs. Geographic Information System (GIS) technology provides an advanced modeling framework for decision makers in order to analyze and simulate various spatial problems, including various waste management aspects. In this study a methodology for the optimization of the waste collection and transport system, is developed. GIS technology is used to improve the efficiency of waste collection and transportation of waste collection bins, by locating the exciting routes and time. From the Results, it is known that the proposed scenario considerably reduction in fuel emission,(gases such as co2 ,o2 ,hydrocarbon and co) ,time, travel distance .Abstract explanation should be Times New Roman, Font Size 10, Single line spacing, Italic, Text alignment should be justify, should contain at least 250 words. Abstract explanation should be Times New Roman, Font Size 10, Single line spacing, Italic, Text alignment should be justify, should contain at least 250 words. Abstract explanation should be Times New Roman, Font Size 10, Single line spacing, Italic, Text alignment should be justify, should contain at least 250 words. Abstract explanation should be Times New Roman, Font Size 10, Single line spacing, Italic, Text alignment should be justify, should contain at least 250 words. Abstract explanation should be Times New Roman, Font Size 10, Single line spacing, Italic, Text alignment should be justify, should contain at least 250 words. Abstract explanation should be Times New Roman, Font Size 10, Single line spacing, Italic, Text alignment should be justify, should contain at least 250 words. Read More...
|
civil |
India |
125-131 |
32 |
Modified Active Monitoring Load Balancing Algorithm in Cloud Computing Environment
-Vikas Kumar ; Shiva Prakash
In Cloud Computing (CC), load balancing is essential to distribute the local workload evenly across all the nodes either statically or dynamically. A high level of user satisfaction and resource utilization ratio can be achieved by ensuring an efficient and fair allocation of all computing resources. In the absence of proper load balancing strategy/technique the growth of CC will never go as per predictions. The main focus of this model paper is on proposing an efficient load balancing algorithm that has the ability to reduce the data center processing time, overall response time and to cope with the dynamic changes of cloud computing environments. The traditional load balancing Active Monitoring algorithm has been modified to achieve better data center processing time and overall response time. The algorithm proposed in this paper efficiently distributes the requests to all the VMs for their execution, considering the CPU utilization of all VMs. Read More...
|
Computer Science & Engineering |
India |
132-135 |
33 |
MOBILE PROTECTION VICTIMISATION VOICE VERIFICATION
-R.Rubesh kumar
Cellular communication business has developed leaps and bounds to become the core of day to day science. Mobile phones is that the spirit of cellular business. the quantity of mobile phones users is rising exponentially. however the privacy of user and security of mobile phones leftovers a difficult question. Theft of mobile phones has become the attention catching business for offender. There ought to be a reliable methodology of protective the instrument from thief. My paper proposes a brand new innovative, reliable, trick proof precautions for mobile phones victimization VOICE VERIFICATION. Voice verification is that the identification of a personal identity victimization speech because the spotting quality. The voice of the user is processed employing a digital gesture processor that is that the prime a part of a mobile. we have a tendency to are programming this DSP to implement this safety technique. For most a resourceful voice record of the user is formed. This record is hold on within the Flash read-only storage that is out there within the mobile. Then whenever the user speaks through the mobile phones a part of the speech sample is taken and hold on. This processed voice of the user is compared with the first folder to examine the identity of the user. If the user is allowed, he's allowed to continue his speak. If not the transmission is cut unexpectedly by creating the DSP in inactive state. Therefore the mobile is being shielded from any extralegal user. Not with standing the mobile phones was purloined or lost it won't be helpful for the other individual. The programmability of DSP and generality of Voice based mostly classification has given our methodology a twin advantage. Our set up demands neither external hardware nor additional price. The on top of methodology cause no hardship for the user not like this safety systems. This methodology may be adopted universally altogether models of Mobile phones and mobile phones for cover. Read More...
|
information technology |
India |
136-138 |
34 |
Evolution in manufactured neural systems
-P.Patricia Rosary ; Mr.Arthik Daniel Das
This paper shows an application of evolutionary inquiry methodology to fake neural systems. Here, we can recognize among three sorts of development in fake neural systems, i.e. the development of association weights, of architectures, and of learning tenets. We survey every sort of development in subtle element and examine basic issues identified with diverse advancements. This article focuses on discovering the suitable method for utilizing evolutionary calculations for upgrading the manufactured neural system parameters. Read More...
|
Department of Computer Engineering |
India |
139-141 |
35 |
ROBUST WATERMARKING OF COLOR IMAGES USING RST INVARIENT FEATURES
-Renu Sharma ; sachin sharma
Watermark refers to digital data embedded in cover data with an intent of copyright protection or proof of ownership. In case of image watermarking, the robustness of watermarks to geometric attacks is considered to be the most challenging design requirements for watermarks. Geometric attacks like Rotation, Scaling and Translation (RST attacks) can desynchronize the location of the watermark and hence cause incorrect watermark detection. In this paper, a new color image watermarking scheme for copyright protection is proposed. This scheme utilizes the features of the image which are invariant under rotation, scaling and translation of images. Moments and functions of moments have been extensively employed as invariant global features of images in pattern recognition. The proposed work utilizes Hu's invariant moments for watermark generation. The same can be detected and extracted at the detector to serve for copyright protection. The moments are invariant against image rotation, scaling and translation. Thus, the proposed watermarking scheme is robust against RST attack. Original unmarked image is not required at the detector for watermark detection and extraction. Thus, the proposed scheme provides a way for blind watermarking. The simulation is done using MATLAB and results are compared with existing techniques of invariant feature based watermarking schemes. Comparison of the results are presented which shows a considerable improvement in Peak Signal to Noise Ratio. Read More...
|
Computer Engineering |
India |
142-149 |
36 |
2D IMAGE COMPRESSION USING DCT + DWT TRANSFORM AND COMPARISON WITH OTHER TRANSFORMS
-Rohit Kumar ; Dr. Sukhwinder Singh
Image compression is a process to remove the redundant information from the image so that only essential information can be stored to reduce the storage size, transmission bandwidth and transmission time. The essential information is extracted such that it can be reconstructed without losing quality and information of the image. In this paper, image compression has been done by the method using DCT and DWT transforms. The comparison of the this combined DCT + DWT method has been done with the previous techniques available i.e. DCT and DWT and it was found that the results of the proposed algorithm are much better than alone DCT and DWT algorithms in terms of peak signal to noise ratio (PSNR), mean square error (MSE) and compression ratio (CR). Read More...
|
computer science engineering |
India |
150-154 |
37 |
Evaluating the short comings of edge detection techniques
-Manpreet Kaur ; Spardha Sethi
Edge detection is one of the imperative concerns of vision transforming, in this paper; various traditional edge detection techniques are explored. Edge detection segments a given image where more honed change exists i.e. the limits of given object of locale of interest. It has been discovered that the majority of the current techniques has dismissed the utilization of colors while discovering the edges yet in numerous applications a district could be sorted based upon the shade. This paper has demonstrated that the greater part of the current techniques falls flat if there should arise an occurrence of complex foundation images. Read More...
|
Computer Science and Engineering |
India |
155-164 |
38 |
study of AES implementation on FPGA by using Rijndael algorithm
-Lal Bahadur ; Bhupendra Badoniya
Cryptography was and still is one of the hot research areas. The growing demand for cryptography arises from the desire to secure networks and data against potential intruders. With the use of more handheld wireless devices and increasing networking and wireless data transfer, the issue of security is being addressed from many different directions. The National Institute of Standards and Technology (NIST) selected the Rijndael algorithm as a new Advanced Encryption Standard (AES) [1] in 2001. This standard was first developed for secure data encryption/ decryption for high-end applications. This paper presents a comprehensive survey on the use of Field programmable Gate Array (FPGA) in cryptographic applications as well as recent Research and Development (R&D) trends in this area. We discuss the advantages and drawbacks of FPGA for cryptographic applications. We then describe some countermeasures to overcome these drawbacks. Finally, we do a brief survey on Advanced Encryption Standard (AES) / Rijndael and Elliptic Curve Cryptography (ECC) algorithm implementations on FPGAs. Read More...
|
Electronic Security |
India |
165-168 |
39 |
Web Based Surveillance and Human Detecting Robot Using PIR Sensor
-Dhayagonde Sharad B ; Dr. Dixit Shantanu K.
In this paper, we have developed a platform to remotely control surveillance robot controlled over web network. It will enable us to monitor the activities in the remote and sensitive areas such as naxalite areas and etc. This will provide great advantage and ease in monitoring with wireless control and surveillance. The proposed system uses Microcontroller, Raspberry Pi, Pyroelectric Passive Infrared (PIR) Sensor and other elements. This system uses PIR sensor to detect human beings in the near surroundings of the robot. The camera on the robot can be moved upward and downward direction and also in the horizontal direction. Raspberry Pi is used to establish wireless connection with the robot and the user who uses the web page to control the robot and monitor the surroundings and detect the human beings. The range of operation is not limited as long as there is internet connection available in the area. Also we can use military frequency in the remote areas of border. This robot can be sent into the areas of surveillance where it is not possible to traverse the area. Read More...
|
Electronic Engineering |
India |
169-171 |
40 |
Determination of Tensile Stress by Varying Percentage of E-Glass Fiber in Epoxy Composites
-Ravinder Singh Chauhan ; Rakesh Rathee
The aim of the study is to predict the tensile stress of composite material on UTM Machine with ASTM D 638 Method. In this experiment by varying the percentage of E-Glass Fiber in Epoxy resin is done. There were five specimen each of 5% E-Glass Fiber and five specimen each of 10% E-Glass Fiber with one percent hardener (Araldite).The dimensions of specimen length 150 mm, width 20 mm, thickness 6 mm. Read More...
|
Mechanical Engineering |
India |
172-176 |
41 |
FPGA Implementation of an Integrated Vedic Multiplier Using Verilog
-Kaveri Hatti ; Dr Raju Yanamshetti
An integrated Vedic multiplier is special type of multiplier architecture, based on the length of the input bits architecture selects the appropriate multiplication sutra, is proposed. Aim of the multiplication sutras is to reduce the partial products, all the partial products are generated in single step, summing of these partial products results in final product. This reveals a speedup of proposed multiplier than the conventional multiplier. Read More...
|
Electronics Engineering |
India |
177-181 |
42 |
GPS using Parallel Computing
-JOHNY PREMKUMAR.S
Traditionally, software has been written for serial communication: To be run on a single computer having a single central processing unit(CPU). A problem is broken into a discrete series of instructions. Instructions are executed one after another. Only one instruction may execute at any moment in line. Read More...
|
parallel computing |
India |
182-183 |
43 |
DESIGN CONSIDERATION FOR SPECIFIC PROFILE ON EARTHEN POT MAKING
-Roshan R.Shrirao ; Roshan R.Shrirao; Dr.C.C.Handa; Sanket D.Thakre
This paper presents, "Design Consideration and Calculation For Specific Profile on Earthen Pot Making". For which we consider literatures reviews &some of them are explained in our previous paper, "Methodology For Specific Profile on Earthen Pot making" so in that the next step is design consideration for actual process of earthen pot making is possible. In which we considered pair of spur gear, pair of bevel gear, shaft, freewheel, turntable. Read More...
|
Mechanical Engineering |
India |
184-186 |
44 |
Finite Element Modeling for Stress and Failure Analysis of Different types of Laminated Composite Structures with Cut-Out
-umesh c k ; H.V.Lakshminarayana
The structural elements of composite materials are normally fabricated by lamination process, in whicha number of laminae are oriented in a predetermined manner in order to form a laminate. This paper presents the results of an investigation into stress analysis and progressive failure analysis of a laminated composite rectangular panel with circular cut-out subjected to axial tension, a laminated composite square plate with a central circular cut-out subjected to lateral pressure and a cylindrical shell with circular cut-out under axial tension. The powerful analysis and post processing capability in ANSYS software is exploited. Significant results are graphically presented and discussed in this paper. Read More...
|
Mechanical engineering |
India |
187-192 |
45 |
ROBUST SPREAD SPECTRUM BASED PATCHWORK AUDIO WATERMARKING
-Avni Gupta ; Rakesh Sharma
Digital Watermarking refers to hiding digital data in digital content with intent to enable copyright protection and illegal distribution. Digital audio watermarking deals with embedding digital information in an imperceptible manner in the host audio signal. Audio watermarking involves much more complex techniques to embed watermark in view of superiority of Human Auditory System (HAS) over Human Visual System (HVS). Spread Spectrum watermarking embeds the watermark in frequency domain, thereby providing a much more robust and invisible watermarking scheme as compared to time domain watermarking, which is comparatively fragile. It turns out that digital watermark embedding in audio signals in any domain results in audible disturbances in the original audio signal. To compensate for these unwanted disturbances in audio files, audio watermarking techniques are to be augmented with Frequency Masking (FM) techniques. It turns out that PAFM creates an imbalance in the number of positive and negative chips that are used to modulate the watermark, and consequently, it introduces error in correlation test. This paper proposes a robust audio watermarking technique based on the patchwork algorithm. Peak Signal to Noise Ratio (PSNR) is evaluated as a function of embedding capacity and robustness. PAFM is analyzed as a function of the threshold limit for embedding of watermark bits. The proposed method provides an optimized way to embed watermark using spread spectrum technique, with a detector of minimal complexity and maximum achievable efficiency. MABLAB is used to simulate the technique and results are derived. PSNR is used as a quality metric for evaluation of the results. Read More...
|
Information System and Security |
India |
194-203 |
46 |
A Review of Intrusion Detection System Using Fuzzy K-Means and Naive Bayes Classification
-Aman Mudgal ; Rajiv Munjal
Intrusion Detection Systems (IDSs) are proposed to improve computer security because it is not feasible to build completely secure systems. In particular, IDSs are used to identify, assess, and report unauthorized or unapproved network activities so that appropriate actions may be taken to prevent any future damage. Intrusion Detection System is classified on the basis of the source of Data and Model of Intrusion. There are some challenges faced by the Intrusion Detection System. Fuzzy K-Mean and Naive Bayes classification are the approaches through which the challenges can be overwhelmed. Anomaly in the Anomaly based Intrusion Detection System can be detected using various Anomaly detection techniques. Dimension Reduction can be done using Principle Component Analysis. Support Vector Machine can be used to specify the classifier construction problem. The paper describes the various approaches of Intrusion detection system in briefly. Read More...
|
Computer Science & Engineering |
India |
204-208 |
47 |
ROBUST WATERMARKING OF GRAYSCALE IMAGES USING FEATURE EXTRACTION AND DWT
-Rekha Bhandari ; Neha Janu
The rapid advancement and extensive growth in communication technology is creating a critical need to develop novel methods and techniques to protect copyright, ownership, authentication and content integrity of digital media. An efficient solution to this kind of problem is digital watermarking of multimedia. A watermark refers to a visible or invisible digital data to be embedded in a cover data so as to provide copyright protection at time when need arises. Numerous watermarking and steganographic methods have been presented in the literature and several watermarking software packages have been developed in past decades. Still robustness and security of watermark against a variety of attacks is one of the most important issues to be solved. In this paper, grayscale 8 bit images are considered for watermark embedding. However, techniques are proposed so that the method is directly applicable for watermarking of color images. Discrete wavelet transform is used to provide robustness and Noise Value Function (NVF) and Arnold Scrambling is used to provide security. Watermark generation is done using LL band of NVF function of original image. The watermark is then subjected to Arnold Transform to introduce randomness, thus enhancing security and improving PSNR. Embedding is done in low frequency LL band of original image. Inverse Discrete wavelet Transform is then computed to obtain the watermarked image. The results are evaluated by applying number of attacks on the watermarked image. Read More...
|
Information System and Security |
India |
209-215 |
48 |
TORRENT BASED EMBEDDED SYSTEMS
-L.DHANUSH
Today's world is filled with virtually infinite number of embedded systems from smallest toys, to mobile phones and even automobiles. Even though the processing power of these embedded systems has increased several folds over the years, the limited processing power still remains as a drawback for the embedded systems for complex applications and multitasking. In the n future these embedded systems will be highly interconnected with each other via internet. This paper deals with developing a new idea for efficient use of the processing power of these interconnected embedded systems to overcome the limitations in the processing power of the embedded systems. Read More...
|
ELECTRONICS AND COMMUNICATION ENGINEERING |
India |
216-217 |
49 |
Effect of Activators on partially purified alpha-amylase produced by Brevibacillus borstelensis R1
-Dr.K.Suribabu ; Dr.K.Suribabu; Prof.K.P.J Hemalatha
The alpha-amylase produced by Brevibacillus borstelensis R1 has a number of applications in many fields such as bakery industry, food preparations, automation dishwashing, ethyl alcohol dual fermentation, sago and rice industrial effluent treatment, sewage water treatment, fodder production, laundry and textile industries. The effect of activators such as CaCl2, MgCl2, MgSO4, NaCl, CaCO3 and CaSO4 on partially purified enzyme activity was studied. All the activators studied enhanced the activity of the enzyme when compared with the control. The percentage of increase in α-amylase activity when treated with (0.5M CaSO4), (0.5M CaCO3), (0.5M NaCl), (0.5M CaCl2), (0.2M MgS04) and (0.1M MgCl2) was 23.72%, 22.03%, 21.08%, 20.53%, 18.8% and 5.93% respectively. Read More...
|
Industrial Biotechnology |
India |
218-221 |
50 |
DESIGN AND IMPLEMENTATION PEAK POWER OFDM TRANSMITTERS WITH RANDOM RESIDUALS FREQUENCY OFFSET
-ANKITA MAHESHWARI ; Mahesh Kumar Porwal
OFDM is a multicarrier modulation technique in which a high rate bit stream is split into N parallel bit-streams of lower rate and each of these are modulated using one of N orthogonal sub-carriers. OFDM is robust to multi-paths fading and delay because it has high data transmission capability with high bandwidth efficiency that's why it has recently been applied in wireless communication systems. It is highly sensitive to frequency offset introduced by the wireless channels and causes loss of orthogonality and amplitude reduction of OFDM signal and lead to Inter Carrier Interference (ICI). There are two deleterious effects caused by frequency offset one is the reduction of signal amplitude in the output of the filters matched to each of the carriers and the second is introduction of ICI from the other carriers a main problem in OFDM is its vulnerability to frequency offset errors due to which the orthogonality is destroyed that result in Inter carrier Interference (ICI). ICI causes power leakage among subcarriers thus degrading the system act. Here in this paper, ICI cancellation structure in MIMO-OFDM which performs better than standard OFDM system. Later we proposed Self cancellation method in MIMO OFDM to enhance the performance of the system by reducing the BER for different values of signal to noise ratio (SNR). Read More...
|
Electronics and Communication Engineering |
India |
222-226 |