No. |
Title and Author |
Area |
Country |
Page |
101 |
A Novel Penalized and Compensated Constraints Based Modified Fuzzy Possibilistic C-Means for Data Clustering
-K. Duraisamy
A cluster is a group of objects which are similar to each other within a cluster and are dissimilar to the objects of other clusters. The similarity is typically calculated on the basis of distance between two objects or clusters. Two or more objects present inside a cluster and only if those objects are close to each other based on the distance between them.The major objective of clustering is to discover collection of comparable objects based on similarity metric. Fuzzy Possibilistic C-Means (FPCM) is the effective clustering algorithm available to cluster unlabeled data that produces both membership and typicality values during clustering process. In this approach, the efficiency of the Fuzzy Possibilistic C-means clustering approach is enhanced by using the penalized and compensated constraints based FPCM (PCFPCM). The proposed PCFPCM approach differ from the conventional clustering techniques by imposing the possibilistic reasoning strategy on fuzzy clustering with penalized and compensated constraints for updating the grades of membership and typicality. The performance of the proposed approaches is evaluated on the University of California, Irvine (UCI) machine repository datasets such as Iris, Wine, Lung Cancer and Lymphograma. The parameters used for the evaluation is Clustering accuracy, Mean Squared Error (MSE), Execution Time and Convergence behavior. Read More...
|
DATA MINING |
India |
463-466 |
102 |
Analytical Study of Steel Fibre Reinforced Rigid Pavements Under Moving Loads
-Mohammed Maaz Salman ; Prof. Amaresh S. Patil
Nowadays, the application of steel fibers in concrete has increased gradually as an engineering material. The knowledge is not only necessary to provide safe, efficient and economic design for the present, but it also to serve as a rational basis for extended future applications. In this study, steel fibre reinforced rigid pavements are analyzed for stresses developed due to Moving loads & temperature differentials. Comparison of curling stresses in SFRC with conventional concrete is carried out. All the models are generated and analysis is carried out using the ANSYS software. Parametric study for the effect of change in slab length & slab thickness of pavements on curling stresses is also done. Curling stresses due to Linear & Non linear temperature distribution in top & bottom layer of SFRC pavement slabs are also calculated. Frictional stresses in SFRC due to uniform temperature differential are almost same as conventional concrete. Analysis results shows, SFRC develops more stresses as compared to conventional concrete & Non linear temperature distribution develops more stresses than linear temperature distribution. SFRC pavements are analyzed for Single axle moving loads for two different speeds. Results reveal that the loading stresses are higher, when the loads are at starting position of edge. Read More...
|
Civil Engineering |
India |
467-475 |
103 |
Character Associated and Path Analysis in Pigeon Pea [Cajanus Cajan (L) Millsp.]
-Ritesh Sharma ; Raveesh Kumar Gangwar; Vivek Yadav
Path coefficient and character association were studied in pigeon pea [Cajanus cajan (L) Millsp.]. Twenty strains for 10 quantities characters were evaluated for path coefficients (partitioned into direct and indirect effects) were estimated on yield and its contributing traits. Number of seeds per plant, plant height, 100 seed weight and days to maturity was observed. Seed yield had positive and significant phenotypic and genotypic association with plant height, biomass yield per plant, pods per plant, seeds per plant, days to maturity, days to flowering, seeds per pod, reproductive phase and seed yield per plant. Path analysis indicated the importance of number of seeds per plant, plant height, 1000 seed weight, days to flowering and number of pods per plant on seed yield suggesting to use these characters for genetic improvement in pigeon pea. Read More...
|
Genetics and Plant Breeding |
India |
476-478 |
104 |
Speed Control of BLDC Motor with Four Quadrant Operation Using dsPIC
-Savitri Medegar ; Assistant Professor M. S. Aspalli
Brushless DC (BLDC) motor drives are becoming more popular in industrial and traction applications. Hence the control of BLDC motor in four quadrants is very vital. The flexibility of the drive system is increased using digital controller. In this paper the PWM signals for driving the power inverter bridge for BLDC motor have been successfully implemented using a dsPIC controller and the motor can be controlled in all the four quadrants without any loss of power .Energy is conserved during regenerative braking period. The digital controller dsPIC, is advantageous over other controller, as it combines the calculation capability of digital signal processor and controlling capability of PIC microcontroller to achieve a precise control. Simulation of the proposed model is done by using MATLAB/Simulink. Read More...
|
ELECTRICAL ENGINEERING |
India |
479-484 |
105 |
Study of Case-Based Reasoning System
-Shilpa Dahiya ; Mohita Gupta
Case–Based Reasoning is a problem solving paradigm that in many respects is fundamentally different from other major AI approaches. Instead of relying solely on general knowledge of a problem domain, or making associations along generalized relationships between problem descriptors and conclusions, CBR is able to utilize the specific knowledge of previously experienced, concrete problem situations (cases). A new problem is solved by finding a similar past case, and reusing it in the new problem situation. A second important difference is that CBR also is an approach to incremental, sustained learning, since a new experience is retained each time a problem has been solved, making it immediately available for future problems. The CBR field has grown rapidly over the last few years, as seen by its increased share of papers at major conferences, available commercial tools, and successful applications in daily use. A CBR tool should support the four main processes of CBR: retrieval, reuse, revision and retention. Read More...
|
Computer Engineering |
India |
485-488 |
106 |
Multiple Minimum Support Implementations with Dynamic Matrix Apriori Algorithm for Efficient Mining of Association Rules
-Vintee Chaudhary
Data mining can be defined as the process of uncovering hidden patterns in random data that are potentially useful. The discovery of interesting association relationships among large amounts of business transactions is currently vital for making appropriate business decisions. Association rule analysis is the task of discovering association rules that occur frequently in a given transaction data set. Its task is to find certain relationships among a set of data (itemset) in the database. It has two measurements: Support and confidence values. Confidence value is a measure of rule’s strength, while support value corresponds to statistical significance. There are currently a variety of algorithms to discover association rules. Some of these algorithms depend on the use of minimum support to weed out the uninteresting rules. Other algorithms look for highly correlated items, that is, rules with high confidence. Traditional association rule mining techniques employ predefined support and confidence values. However, specifying minimum support value of the mined rules in advance often leads to either too many or too few rules, which negatively impacts the performance of the overall system. This work proposes a way to efficiently mine association rules over dynamic databases using Dynamic Matrix Apriori technique and Multiple Support Apriori (MSApriori). A modification for Matrix Apriori algorithm to accommodate this modification is proposed. Experiments on large set of data bases have been conducted to validate the proposed framework. The achieved results show that there is a remarkable improvement in the overall performance of the system in terms of run time, the number of generated rules, and number of frequent items used. Read More...
|
Computer Engineering |
India |
489-500 |
107 |
Dynamic Analysis of RC Multi-storeyed Building - A Comparative Study
-G. Murali ; M. Lakshmi, B. Divya; A. Angeline Getrude Nancy; A. Venkatesan; K. Karthikeyan
In India with a seismic moderate zone, the equivalent static force method to estimate the seismic force, subsequent vulnerability and behavior of RC building under seismic load is inadequate. The main goal of this paper is to show how the modal analysis can contribute to the understanding the behavior of building using Response Spectrum Method. In this study, Dynamic Analysis of four storied Reinforced Concrete building was investigated using Staad pro and Etabs software packages. For this, Response Spectrum Method was used to evaluate the base shear, frequency, modal mass participation and the mode shapes of the building have been plotted for 15 frequencies. Seismic Zone 3 has been considered and base shear was calculated as per the procedure recommended by IS 1893-2002. The results shows that only slight variation in frequencies and modal participation factors was observed as each software has its own way of considering the mass. Read More...
|
Civil Engineering |
India |
501-502 |
108 |
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
-G.Sharada ; Dr.Renuka Devi S.M
Due to the extensive use of digital media applications, multimedia security and copyright protection has gained tremendous importance. Digital watermarking is a technology used for the copyright protection of digital applications. Image watermarking is used to hide the special information into the image and to later detect and extract that special information. Watermarking can be implemented both in spatial and frequency domain. In this paper frequency domain techniques were experimented. The methods compared in this paper are image watermarking using singular value decomposition (SVD) based and image watermarking using discrete wavelet transform (DWT) and Pseudo random sequence. Our experiments show that former technique have low peak signal to noise ratio (PSNR) value and also requires cover data at the detection where as in the later case we don’t require cover data and PSNR value is good. Read More...
|
Electronics and Communication Engg |
India |
503-506 |
109 |
A Secure Chaotic Communication System
-Mr. Pravin S. Mawale ; Ms. Vrushali Shirpurkar; Prof. Gouri Halde; Prof. Sony Chaturvedi
New generation communication networks are moving towards autonomous wireless infrastructures which are very popular in the application of multimedia broadcasting and mobile communication where N numbers of data are transfer through the wireless network every day. In such applications security of transmitted signal is very important in wireless communication network. So the proposed work creates a methodology to increase the security of the data and communication using chaotic encryption algorithm to transfer the data from the wireless network. A proposed new structure is based on coupling of chaotic system. We combine the text message with the chaotic signals to reduce the attack and improve the security of the data. The performance of BER in AWGN channel are verified and analyzed with MATLAB toolbox. Read More...
|
Electronics & Communication Engg |
India |
507-510 |
110 |
Data Mining in Multi-Instance and Multi-Represented Objects
-Ajay Aggarwal ; Mohammad Danish
In multi-instance learning, the training set comprises labeled bags that are composed of unlabeled instances, and the task is to predict the labels of unseen bags. In this part, a web mining problem, i.e. web index recommendation, is investigated from a multi-instance view. In detail, each web index page is regarded as a bag, while each of its linked pages is regarded as an instance. A user favoring an index page means that he or she is interested in at least one page linked by the index Read More...
|
Computer Science |
India |
511-513 |
111 |
Fake Multi Biometric Detection using Image Quality Assessment
-R. Brindha ; V. Mathiazhagan
In the recent era where technology plays a prominent role, persons can be identified (for security reasons) based on their behavioral and physiological characteristics (for example fingerprint, face, iris, key-stroke, signature, voice, etc.) through a computer system called the biometric system. In these kinds of systems the security is still a question mark because of various intruders and attacks. This problem can be solved by improving the security using some efficient algorithms available. Hence the fake person can be identified if he/she uses any synthetic sample of an authenticated person and a fake person who is trying to forge can be identified and authenticated. Read More...
|
ELECTRONICS AND COMMUNICATION ENGINEERING |
India |
514-519 |
112 |
Problems Causing due to Chemical Pesticides and its Effect on Environment
-Raveesh Kumar Gangwar ; D. V. Singh; Swati Tyagi; Vikas Kumar; Pranjali Sharma
Agriculture has been facing the destructive activities of numerous pests like insects, weeds and fungi, from time immemorial, leading to radical decrease in yields. To encounter these problems and for protection of the crops application of pesticides is primary and old method. The pesticides residues create severe problems as cause toxicity to humans and warm-blooded animals. Include the development of insecticide resistance, resurgence, secondary pest outbreak and use-cancellation or de-registration of some insecticides due to human health and environmental concerns. Pesticides pollution is categorized into diffuse and point sources. Diffuse contamination via leaching, runoff, drainage and drift usually contributes only the smaller part of pesticide pollution of surface and groundwater. However, point sources or farmyard activities are significant contributors to pesticide pollution of surface water. This article reviews the different type of pesticides and its effect of on environment. Read More...
|
Agricultural Sciences (Entomology) |
India |
520-522 |
113 |
Kinetics and Mechanism of Protection of Thiamine from Phosphate Radical
-Biyyala Sreedhar Rao ; M. Anad Rao
The rates of photo oxidation of thiamine in presence of peroxydiphosphate (PDP) has been determined by measuring the absorbance of thiamine at 264 nm spectre metrically. The rates and quantum yields of oxidation. Of thiamine by phosphate radical anion have been determined in the presence of different concentrations of caffecic acid. Increase in (caffeic acid) is found to decrease the rate of oxidation of thiamine suggesting that caffecic acid acts as an efficient scavenger of PO4-2 and protects thiamine from it. Phosphate radical anion compacts for thiamine as well as caffeic acid the rate constant for phosphate radical anion with caffeic acid has been calculated to be 1.3059 X 10-8 litres mol-1.s-1. The quantum yields of photo oxidation of thiamine have been calculated from the rates of oxidation of thiamine and the light intensity absorbed by PDP at 264 nm. The wave length at which PDP is activated to phosphate radical anion. From the results of experimentally determined quantum yields (exp+) and the quantum yields calculated (cal) assuming caffeic acid concentration and corrected for PO.-4. Scavenging by caffeic acid are also found to be greater than experiment values. These observations suggest that thiamine radicals are repaired by caffeic acid in addition to scavenging of phosphate radical anions. Bansal and Fessenden have used sulphate radical anion (So4) a strong electro phillic radical to create radical cation in uracil and substituted uracils. In the paper we report the results on the protection of thiamine from phosphate radical anion by caffeic acid the rate constant of PO.-4 reaction with caffeic acid has been evaluated. Further an attempt has also been made to evaluate the extent of repair of thiamine radicals by caffeic acid. Read More...
|
PHYSICAL CHEMISTRY |
India |
523-525 |
114 |
Improving Network Security in MANETS using IEEACK
-Renil P. Kurian ; Anoop E. G.
Mobile ad hoc networks (MANETs) have attracted much attention due to their mobility and ease of deployment. However, the wireless and dynamic natures render them more vulnerable to various types of security attacks than the wired networks. The major challenge is to guarantee secure network services. We have identified the inadequate nature of EAACK in scenarios of link breakage, source maliciousness and partial packet dropping and hence we propose an improved algorithm called improved EAACK to tackle the security issues. High mobility of MANET nodes contributes to frequent link breakages in the network, which leads to path failures and route discovery processes. Route discovery is initialized through a broadcast mechanism usually. But, the overheads created through this cannot be neglected. The simulation results show that IEEACK scheme can prevent attacks from malicious nodes and improve the security performance of the whole network, especially in terms of the packet delivery ratio, the average end-to-end delay, the routing packet overhead and detection ratio of malicious nodes. Read More...
|
CSE |
India |
526-530 |
115 |
Solar Interplanetary and Geomagnetic Activity in Solar Cycle 23
-Dr. B. K. Tiwari ; B. R. Ghormare
The main features of solar cycle 23, sun enters a period of intermediate and weak solar activity in terms of sunspot number. Based on the observation from Omniweb data centre for solar- interplanetary data , geomagnetic activity and monthly mean count rate of cosmic ray intensity (CRI) variation data from Oulu / Moscow/ Keil neutron monitors (Rc=0.80 GV , Rc=2.42 GV and Rc=2.29 GV,) during solar activity cycle 23 . The phase of minimum solar activity began in May 2005 and lasted for 4.5 years the unprecedented duration of the relative sunspot numbers falls. It is observed that the strength of the interplanetary magnetic field has been falling off to new low levels, and reduces the GCR entering inner- heliosphere and it is also found that SSN positive correlated with Kp and Ap and sunspot number, 10.7 cm solar radio flux, were inverse correlated with monthly mean count rate of cosmic ray intensity. Read More...
|
PHYSICS SCIENCE |
India |
531-532 |
116 |
Effect of Solar Variability on the Helioshphere and Cosmic Rays
-Dr. B. K. Tiwari ; B. R. Ghormare
Solar variability controls the structure of the heliosphere and produce changes in cosmic ray intensity. Based on the observation from Omniweb data centre for solar- interplanetary data and yearly mean count rate of cosmic ray intensity (CRI) variation data from Oulu / Moscow neutron monitors (Rc=0.80 GV & Rc=2.42 GV) during 1996-2014 . It is observed that the sun is remarkably quiet and the strength of the interplanetary magnetic field has been falling off to new low levels , reduces the GCR entering inner- heliosphere and it is high anti-correlation (-0.78) between sunspot number & GCR flux. It is also found that 10.7 cm solar radio flux, velocity of solar wind and the strength and turbulence of the interplanetary magnetic field were positive correlated with each other and inverse correlated with count rate of cosmic ray intensity. Read More...
|
PHYSICS SCIENCE |
India |
533-535 |
117 |
An Experimental Investigation on Strength Characteristics of Concrete with Partial Replacement of Silica Fume and Metakaolin with Cement on M-30 Grade of Concrete
-Mohammad Imteyazuddin ; Prof. Syed Arafath
One of the approaches in improving the durability of concrete is to use blended cement materials such as fly ash, silica fume, slag and more recently, metakaolin. By changing the chemistry and microstructure of concrete, pozzolans reduce the capillary porosity of the cementitious system and make them less permeable to exterior chemical sources as well as reducing the internal chemical incompatilities such as alkali-silica reaction. The concrete industry is known to leave an enormous environmental footprint on Planet Earth. First, there are the sheer volumes of material needed to produce the billions of tons of concrete worldwide each year. Then there are the CO2 emissions caused during the production of Portland cement. Together with the energy requirements, water consumption and generation of construction and demolition waste, these factors contribute to the general appearance that concrete is not particularly environmentally friendly or compatible with the demands of sustainable development. Thus, use of these supplementary cementitious materials can reduce the effects of cement causing severe environmental impact. This study presents the results of different mechanical properties of concrete such as compressive strength, split tensile strength and flexural concrete by partially replacing cement with metakaolin and silica fume. The replacement of metakaolin is varied from 10%, 15%, 20% and 25% and silica fume from 6%, 8% and 10%. The property of concrete in fresh state that is the workability is also studied during the present investigation. The optimum doses of silica fume and metakaolin in combination were found to be 6% and 15% (by weight) respectively, when used as part replacement of ordinary Portland cement. Read More...
|
Civil Engineering |
India |
536-541 |
118 |
Adsorption Studies of Hexavalent Chromium Removal on Activated Carbon Derived from Helianthus Annuus (Sunflower Cob)
-Roopadevi ; Prof. Shashikant R. Mise
the present study deals with removal of hexavalent chromium from aqueous solution using low cost activated carbon prepared from helianthus annuus cob. In adsorption solute present in dilute concentration in liquid or gas phase is removed by contacting with suitable solid adsorbent so that the transfer of component first takes place on the surface of the solid and then into pore of the solid. Batch adsorption studies were conducted by varying the contact time, adsorbent dosage & pH. Read More...
|
environmental engineering |
India |
544-545 |
119 |
Adsorption Studies of Arsenic Removal on Activated Carbon Derived from Delonix Regia (Gulmohar Sees Pods)
-Annapurna ; Prof. Shashikant R. Mise
the present study deals with removal of arsenic from aqueous solution using low cost activated carbon prepared from Delonix regia (Gulmohar seed pods). In adsorption solute present in dilute concentration in liquid or gas phase is removed by contacting with suitable solid adsorbent so that the transfer of component first takes place on the surface of the solid and then into pore of the solid. Batch adsorption studies were conducted by varying the contact time, adsorbent dosage & pH. Read More...
|
Environmental engineering |
India |
546-547 |
120 |
Study and Comparison of Corrosion Resistant Materials used in Automotive Silencers
-Mayuri Chourey ; Dr. Rohit Rajvaidya
Silencers of an automobile is having great problems when it is subjected to corrosion. So the need of corrosion resistant materials for the silencer is increasing day by day. In this paper different corrosion resistant materials are used for design of silencers and then the silencers are analyzed for different stresses introduced in the silencer both produced thermally and mechanically. Then the materials are rated accordingly. Read More...
|
mechanical engineering |
India |
548-550 |
121 |
Methylenetetrahydrofolate Reductase Gene (MTHFR_677CT) Associated with the development of depression
-Sanskriti Upasna ; Rinki Kumari; Aruna Agrawal; Dipankar Karmakar; G. P. Dubey
Globally, Depression is widespread neuropsychiatric disorders affecting around 5% of the population and has been described as millennia linked with neurobiology showing association with direct neuro-chemicals and biochemical incredible factors, interact with "gene-gene", "gene-environment" as long as a scaffold potential for better exploration. The aetiology of depression is still unknown but believes to be the interaction between gene and environment including some of the other factors responsible for development of depression. The PCR-RFLP analysis of MTHFR (C677T) gene showed 0.45% in CT (heterozygous) genotype in patients of depression in comparison to controls (0.15%), suggesting increased risk of depression in those individuals. However, the odd ratio was also calculated at 95% confidence interval for MTHFR C677T gene which revealed non- significant difference between cases and control, may be because of small sample size. Read More...
|
Bio medical Research and diagnosis |
India |
551-553 |
122 |
Rorschach Based Security for Smartphones
-Arnov Sinha
As the market and demand of smartphones is growing exponentially day by day. The need for security of personal and business data increases as well. Today smart phones are amongst the biggest target by individuals with malicious intent to gain access to data. The need arises for new security methods to come up for the protection of information. The paper presents intuitive and perception based security using Rorschach inkblot like images. These are used to authenticate a user to access their personal data in their android smart phones. Read More...
|
Computer Science |
India |
554-557 |
123 |
Restful Webserver Based Domotic Home Using Power over Ethernet
-M. M. Sonakatale ; A. S. Gundale; P. D. R. Patnaik
This paper presents the way to provide Ethernet internet connectivity and power to microcontroller based embedded systems. This system uses arduino board to store the main application source code, web pages and TCP/IP stack which is a vital element of the system software. An Ethernet controller chip, ENC28J60 is used to handle the Ethernet communications and it is interfaced with the microcontroller using SPI protocol. The site can be viewed on any system with Internet/LAN connection by configuring the specific IP address. There are several I/O pins available at the microcontrollers which are used to interface with lights, fans, curtains, Motors and relays for monitoring and controlling DC appliances. Nowadays, Internet has spread worldwide and most of the internet connections use Ethernet as media for data transfer. In industries or in home appliances, most of the time we need to monitor and control using microcontrollers. Once we enable Ethernet interface to such systems, we can communicate with them remotely over the internet. At the same time power which require to run the device is provided by using power over Ethernet technology which minimize the cable requirement and wastages of copper conductors. The concept of the "Internet of Things" has tied in closely with the popularization of home automation. Ethernet provides inexpensive, relatively high speed network access to individual users and low delay that can support many applications. This implementation is an attempt to connect an embedded device to an Ethernet Using Ethernet based system we can control various home appliances from anywhere across the world. Read More...
|
Electronics Engineering |
India |
558-560 |
124 |
Design and Implementation of Low Power DSP Core with Programmable Truncated Vedic Multiplier
-Mathew George ; Reneesh C. Zacharia
The programmable truncated Vedic multiplication is the method which uses Vedic multiplier and programmable truncation control bits and which reduces part of the area and power required by multipliers by only computing the most-significant bits of the product. The basic process of truncation includes physical reduction of the partial product matrix and a compensation for the reduced bits via different hardware compensation sub circuits. These results in fixed systems optimized for a given application at design time. A novel approach to truncation is proposed, where a full precision vedic multiplier is implemented, but the active section of the truncation is selected by truncation control bits dynamically at run-time. Such architecture brings together the power reduction benefits from truncated multipliers and the flexibility of reconfigurable and general purpose devices. Efficient implementation of such a multiplier is presented in a custom digital signal processor where the concept of software compensation is introduced and analyzed for different applications. Experimental results and power measurements are studied, including power measurements from both post-synthesis simulations and a fabricated IC implementation. This is the first system-level DSP core using a high speed Vedic truncated multiplier. Results demonstrate the effectiveness of the programmable truncated MAC (PTMAC) in achieving power reduction, with minimum impact on functionality for a number of applications. On comparison with the previous parallel multipliers Vedic should be much more fast and area should be reduced. Programmable truncated Vedic multiplier (PTVM) should be the basic part implemented for the arithmetic and PTMAC units. Read More...
|
Electronic Engineering |
India |
561-565 |
125 |
Comparative Study on Phytochemical Screening and HPLC Analysis of Daucus Carota Pulp and Aerial Parts
-V. Kavitha ; N. Gunavathy
Phytochemical and biological screening is necessary for the isolation of functional groups which lead to the discovery of new active compounds. In the present work, the crude aqueous extract of Daucus carota were tested for phytochemical screening and HPLC analysis which indicated the presence of various class of bioactive secondary metabolite such as terpenoids, flavonoids, saponins, steroids and glycosides. HPLC analysis was performed to quantify the β-carotene content in pulp and aerial extract of Daucus carota. Read More...
|
natural science |
India |
566-569 |
126 |
Application of Image Retrieval Techniques to Understand Evolving Weather
-Konda Venkata Sasidhar ; T. Krishna Chaitanya
Multispectral satellite images provide valuable information to understand the evolution of various weather systems such as tropical cyclones, shifting of intra tropical convergence zone, moments of various troughs etc., accurate prediction and estimation will save live and property. This work will deal with the development of an application which will enable users to search an image from database using either gray level, texture and shape features for meteorological satellite image retrieval .Gray level feature is extracted using histogram method. The Texture feature is extracted using gray level co-occurrence method and wavelet approach. The shape feature vector is extracted using morphological operations. The similarity between query image and database images is calculated using Euclidian distance. The performance of the system is evaluated using precision Read More...
|
Electrical Engineering |
India |
570-573 |
127 |
High Speed Carryselect Adder
-G. Kishore ; P. Sunil kumar; S. Anil kumar
Highly -increasing requirement for mobile and several electronic devices want the use of VLSI circuits which are highly power efficient. The most primitive arithmetic operation in processors is addition and the adder is the most highly used arithmetic component of the processor. Carry Select Adder (CSA) is one of the fastest adders and the structure of the CSA shows that there is a possibility for increasing its efficiency by reducing the power dissipation and area in the CSA. This research paper presents power and delay analysis of various adders and proposed a 32-bit CSA that is implemented using variable size of the combination of adders, thus the proposed Carry select Adder (CSA) which has minimum Delay, and less power consumption hence improving the efficiency and speed of the Carry Select Adder. Read More...
|
electronics engineering |
India |
574-577 |
128 |
Simulation of Fuzzy Sliding Mode Controller for Indirect Vector Control of Induction Motor
-Minaz M. K. ; M. S. Aspalli
Because of the low maintenance and robustness induction motors have many applications in the industries. Most of these applications need fast and smart speed control system. This paper introduces a smart speed control system for induction motor using fuzzy Sliding mode controller. The fuzzy-logic with sliding mode speed controller is employed in the outer loop. The performance of Fuzzy Logic control technique has been presented and analyzed in this work. The fuzzy logic controller is found to be a very useful technique to obtain a high performance speed control. The indirect vector controlled induction motor drive involves decoupling of the stator current in to torque and flux producing components. The analysis, design and simulation of the fuzzy logic controller for indirect vector control of induction motor are carried out based on fuzzy set theory. The model is carried out using Matlab/Simulink. The simulation results shows the superiority of fuzzy sliding mode controller in controlling three phase Induction motor with indirect vector control technique. Read More...
|
Electrical Engineering |
India |
578-581 |
129 |
Messaging Gateway
-Rutuja Rajendra Desai ; Sajid Khan; Aaron Godinho; Ataur Rahman
MESSAGING GATEWAY large business edition is an easy to use email virus protection that delivers effective and accurate antispam protection with no user peer user fees and available as a VMware-based virtual appliance Messaging gateway large business edition can be implemented on your existing hardware making it one of the most affordable gateway appliance solutions available. Read More...
|
Technical |
India |
582-584 |
130 |
Removal of Methylene Blue from Aqueous Solution by Adsorption using Low Cost Activated Carbon Derived from Delonix Regia
-Syeda Yasmeen ; Prof. Shashikant R. Mise
The present study deals with removal of methylene blue (basic dye)from aqueous solution using a low cost activated carbon prepared from Delonix regia(gulmohar seed pods).Batch adsorption studies were conducted by varying the contact time adsorbent dosage and pH Read More...
|
Environmental Engineering |
India |
585-589 |
131 |
A Novel Approach of Fuzzy Based Semi-Automatic Annotation for Similar Facial Images
-A. Nithya ; K. Haridas
Auto face annotation is an important role for many real-world multimedia applications. Recently search based face annotation paradigm is one of the research challenge in computer vision and image analysis. In this paper, we present the problem is to annotate the most weakly labeled facial images are duplicate names, noisy and incomplete. To handle this problem we used an effective semi-automatic annotation methodology with unsupervised label refinement (ULR) approach for refining the labels in facial images by using some machine learning techniques and fuzzy clustering-based approximation algorithm is used to improve the scalability considerably. Finally to develop an optimization algorithm for solving a large scale learning task. The result of this proposed ULR algorithm can improve the performance than other ULR algorithms in weak label matrix. Read More...
|
Data mining |
India |
590-593 |
132 |
Recent Developments in Routing Algorithms for Achieving Elongated Life in WSN
-Richa Budhiraja ; Saranjeet Singh
Battery life is a key issue for an elongated life in WSN. Clustering of nodes is done to achieve the energy conservation in LEACH algorithm. The main objectives of clustering are equal distribution of energy and equal distribution of nodes in space so that less energy is consumed and early deaths of nodes can be delayed. In LEACH both of these objectives can’t be achieved. Further Max-Energy LEACH is able to achieve energy equi-distribution but not the space equi-distribution because CH can be selected from one region only leading to large energy consumption by nodes to send data to CHs. The clustering algorithm while doing its work should pay attention toward the number of nodes a cluster is having. If we can equi-distribute all nodes to cluster then we assume that it may lead to better energy efficiency. This paper discusses the recent developments in WSN in this direction. Read More...
|
Electronics Engg. |
India |
594-599 |
133 |
Biodegradation of Profenofos Pesticide by Efficient Bacillus Cereus and Klebsilla Pneumonia Bacteria
-Y. Jayasri ; M. Dhananjaya Naidu
The objective of this study to examine potential for the degradation Profenofos pesticide by the bacteria and finding the optimum conditions of bacteria. The growth of the pesticide degrading bacteria was assessed in Mineral salt broth containing 25mg of pesticide at different level temperature levels (25°C,30°C, 35°C & 40°C) and pH levels ( pH 5, pH 6, pH 7 & pH 8) .The maximum growth rate of bacteria was recorded at 35°C and pH 6. Among the tow bacteria the bacteria Bacillus cereus utilized the pesticides effectively and showed maximum growth. Profenofos pesticide was biological degradable. Read More...
|
LIFE SCIENCE |
India |
604-606 |
134 |
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
-Richa Budhiraja ; Saranjeet Singh
this paper considered a multi-objective LEACH-C algorithm in the selection of Cluster Head (CH) in such a way so that its energy is used uniformly with load balancing among clusters for delayed disintegration of network. LEACH-C algorithm based single objective clustering approach has been replaced by multi-objective clustering approach where we not only considered the residual energy of nodes but the size of cluster in creating a cluster structure. The improved LEACH-C protocol has been compared with random LEACH and Max Energy LEACH or existing LEACH-C algorithm for energy equi-distribution and load balancing among clusters. Wireless sensor network (WSN) is simulated using a MATLAB programming and power consumption algorithms take into consideration all aspects of power consumption in the operation of the node. The modified LEACH-C routing protocol shows improvements in lifetime as well as in network disintegration criterion Read More...
|
Electronics Engg. |
India |
607-610 |
135 |
Clustering of Semantic Web to Develop Mashup of Web Services
-Shruti Gupta ; Salunke Avinash Nimba; Jaishankar N.
Semantic web refer to the web of data which construct meaningful data from unstructured and semi-structure data architecture. It allows data to be share and reuse across different platforms, frameworks and countries. So the clustering of the semantic web of data will provide effective solution for web of data access. And in today’s web, there are different web services which is develop across different frameworks and protocols. So this paper combines all the web services which are develop across different framework and protocols in one service. This represents the mashup of web services, it has used the content which is from more than one source and creates into single new service displayed in single GUI. So doing the clustering of semantic web of data will enhance the effectiveness of mashup of web services. Read More...
|
Computer Science And Engineering |
India |
611-614 |
136 |
Sensorless Speed Control of BLDC Motor
-Ambika D. ; M. S. Aspalli
Brushles DC motor are one type of motors that are rapidly gaining the popularity and are penetrating in industrial applications, home appliances, automotive, consumer, medical etc. Because of there many advantages such as high efficiency ,silent operation, compact form ,reliability, low maintenance (due to the absence of brushess), long operating life, high speed ranges etc. for the proper commution of current in inverter the rotar position information is necessary, this information is usually provided by the mechanical position sensors mounted within the motor. however it is well known that these position sensors have many drawbacks therefore a sensor less control of BLDC motor is developed which eliminates the sensing equipment ,reduces the cost of motor and increases the reliability of the BLDC motor. In this paper the position information is obtained from the zero crossing detection of the back EMF which is also called as the terminal voltage sensing method which is the simplest ,method of detecting the back EMF zero crossing ,here the motor voltages are sensed and give to the lowpass filter whose output is give to the ZCD which determines the zero crossing of the back EMF waveform and ZCD generates the signal required for the controller to provide the pulses for the inverter operation the controller used is a high performance controller(DSPic30F4011) which as both the features of microcontroller and digital signal processor .The complete model is simulated in MATLAB/SIMULINK software. the proposed hardware and simulation program are found to be efficient and the results are promising Read More...
|
Electrical Engineering |
India |
615-618 |
137 |
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
-Preeti ; Pardeep Kumar; Shanu Malhotra
One fundamental problem of WMNs with a limited number of radio interfaces and orthogonal channels is that the performance degrades significantly as the network size grows. This results from increased interference between nodes and diminished spatial reuse over the network. A WMN node needs to share a common channel with each of its neighbours in the communication range, requiring it to set up a virtual link. Moreover, to reduce network interference, a node should minimize the number of neighbours that it shares a common channel with. The objective of a channel assignment strategy is to ensure efficient utilization of the available channels (e.g., by minimizing interference) while maximizing connectivity in the network. However, since these two requirements are conflicting with each other, the goal is to achieve a balance between these two. The major constraints which need to be satisfied by a channel assignment scheme include fixed number of channels in the network, limited number of radios in mesh nodes, common channel between two communicating nodes, and limited channel capacity. Also, a channel assignment scheme should take the amount of traffic load supported by each mesh node into consideration. Read More...
|
electronic and comm.engg. |
India |
619-624 |
138 |
A Review Paper on Latest Biomedical Applications using Nano-Technology
-Y. Azain Abdul Kadhar ; S. Karthikeyan; S. Gowtham; S. Arvind Kumar; A. Deepak
At present, Nano technology has been improved in many ways but it had improved a lot in the case of Nano Medicine.It also plays a major role in engineering basis. The application of nano technology in medicine is called as Nano medicine. This paper explains the detail regarding Nano medicine. Nano technology has many molecular properties and applications of biological nano structure. These have physical, chemical and biological properties. These are mainly used to diagonize diseases from our body. Nano technology has special application in Nano medicine using Nano robot. This paper relates the use of Nano robots in surgeries. thes Nano robots are not oly safebut also faster. The size of these nano robot is 1-100nm.These use to cure many problems. Read More...
|
Electronics Engineering |
India |
625-627 |
139 |
Survey on Various Classification Techniques in Data Mining
-Abhinivesh M. ; Mayank ; Jaisankar N.
Dynamic Classification is an information mining (machine learning) strategy used to anticipate bunch participation for information cases. In this paper, we show the essential arrangement systems. A few significant sorts of arrangement technique including induction, Bayesian networks, k-nearest neighbor classifier, case-based reasoning, genetic algorithm and fuzzy logic techniques. The objective of this review is to give a complete audit of distinctive characterization procedures in information mining. Read More...
|
computer science |
India |
628-632 |
140 |
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing Multiradio Multichannel in Wireless Mesh Network
-Preeti ; Pardeep kumar; Shanu Malhotra
By virtue of their robustness, cost-effectiveness, self-organizing and self-configuring nature, WMNs have emerged as a new network paradigm for a wide range of applications, such as public safety and emergency response communications, intelligent transportation systems, and community networks. It is anticipated that WMNs will not only resolve the limitations of wireless ad hoc networks, local area networks (WLANs), personal area networks (WPANs), and metropolitan area networks (WMANs) but also significantly improve such networks’ performance. One fundamental problem of WMNs with a limited number of radio interfaces and orthogonal channels is that the performance degrades significantly as the network size grows. This results from increased interference between nodes and diminished spatial reuse over the network. In this paper, it is proposed to evaluate the performance of two different channel assignment schemes namely common channel assignment (CCA) and centralized tabu-based search algorithm under WCETT routing protocols for varying traffic load in terms of packet delivery ratio, throughput, average end to end delay and routing overhead using NS2 network simulator. WCETT protocol uses the weighted sum of the cumulative expected transmission time and the maximal value of efficient channels among all channels. Read More...
|
electronic and comm.engg. |
India |
633-639 |
141 |
Follow Me Robot Technology
-Abhinav Gupta
The Follow-me bot is primarily humanoid with multiple degrees of freedom(one you might have seen in Real steel movie by Hugh Jackman). From the get go site, it has all the earmarks of being much the same as any other humanoid robot however the true contrast comes in when we go inside its working system. Follow-me bot lives up to expectations and follow the rules guideline for remote human type robot interface. It will take client's body movement as info and move much the same as him/her. It's more like offering sight to the robot and it'll mimicries client's movement. Dissimilar to another humanoid robot, the controller in this present bot's structural planning is the client himself. Controllers can steer correspond with the machine simply depending on body developments, and along these lines control the activities of remote robot progressively, coordination, and harmonization. The outline is a synthesis of new human movement catch strategies, sagacious executor controltechnique, system transmission, different sensor combination innovation. The name 'Follow-me bot' is utilized on the grounds that much the same as our follow-me, it'll move definitely in the same manner as we seem to be. This paper quickly portrays all the portions of the humanoid robot utilizing Kinect engineering. Read More...
|
Mechatronics |
India |
640-642 |
142 |
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithm
-Renu Sharma ; Mamta Narwaria
Digital watermarking is one of the proposed solutions for copyright protection of multimedia data. A watermark is a form of image or text that is impressed onto paper, which provides evidence of its authenticity. A digital watermark is digital data embedded in some host document so as to later prove the ownership of the document. Digital image watermarking refers to digital data embedding in images. Robust image watermarking systems are required so that watermarked images can resist geometric attacks in addition to common image processing tasks, such as JPEG compression. Least Significant Bit (LSB) watermarking, is one of the most traditional method of watermarking which changes the LSB of individual pixels in correlation with the watermark. However, pure LSB scheme provides a fragile watermarking technique which is not acceptable in practical applications. Also, robustness against geometric attacks, such as rotation, scaling and translation, still remains one of the most challenging research topics in pixel based image watermarking. In this paper, a new pixel-based watermarking system is proposed, in which a binary logo is embedded, a bit per pixel, in the pixel domain of an image. The LSB based watermarking is then quantized using QIM, augmented with genetic algorithm to produce a watermarking scheme which is highly robust against geometrical attacks. Read More...
|
Computer Engineering |
India |
643-650 |
143 |
Artificial Intelligence and Stock Marketing
-Aditya Goel ; Abhinav Gupta
Business sagacity is turning into a significant pattern in money related world. One such range is securities exchange knowledge that makes utilization of information mining strategies, for example, affiliation, grouping, fake neural systems, choice tree, hereditary calculation, master frameworks and fuzzy rationale. These strategies could be utilized to anticipate stock value or exchanging indicator naturally with adequate exactness. In spite of the fact that there has been a loads of exploration done here , still there are numerous issues that have not been investigated yet furthermore it is not clear to new analysts where and how to begin . Information mining could be connected on over a significant time span monetary information to create examples and choice making framework. This paper gives concise review of a few endeavors made via scientists for stock expectation by concentrating on securities exchange dissection furthermore characterizes another exploration space to comprehend the sagacity of stock exchange. This alludes as stock exchange brainpower, which is to create information mining strategies to help all parts of algorithmic exchanging furthermore recommend various exploration issues in stock knowledge identified with guaging& its exactness. Read More...
|
Artificial Intelligence |
India |
651-653 |
144 |
A Translation Device for the Vision Based Sign Language
-M. Akilan ; K. Ganesh Kumar; R. Arvind; B. N. Ajai Vikash; P. Dass
The Sign language is very important for people who have hearing and speaking deficiency generally called Deaf and Mute. It is the only mode of communication for such people to convey their messages and it becomes very important for people to understand their language. This paper proposes the method or algorithm for an application which would help in recognizing the different signs which is called Indian Sign Language. The images are of the palm side of right and left hand and are loaded at runtime. The method has been developed with respect to single user. The real time images will be captured first and then stored in directory and on recently captured image and feature extraction will take place to identify which sign has been articulated by the user through SIFT(scale invariance Fourier transform) algorithm. The comparisons will be performed in arrears and then after comparison the result will be produced in accordance through matched key points from the input image to the image stored for a specific letter already in the directory or the database the outputs for the following can be seen in below sections. There are 26 signs in Indian Sign Language corresponding to each alphabet out which the proposed algorithm provided with 95% accurate results for 9 alphabets with their images captured at every possible angle and distance. Read More...
|
Electronics Engineering |
India |
654-658 |
145 |
Comparative Study and Designing of Different Radiating Patch in Microstrip Patch Antenna
-Shivani Chourasia ; Dr. Soni Changlani; Miss. Pooja Gupta
Microstrip patch antennas are low profile , conformable, easy, inexpensive, and versatile in terms of realization and are thus been widely used in a various useful applications. This paper discusses different microstrip patch antennas designed over an operating frequency range 1.5 GHz using the substrate material Flame Retardant 4 (FR-4) lossy which has a dielectric constant of 4.3. These circuits were designed using Computer Simulation Technology (CST) Microwave Studio. The parameters such as return loss, efficiency and directivity are simulated, analyzed and compared. Read More...
|
Electronics and Communication Engineering |
India |
659-663 |
146 |
Facial Emotions Based PC Access for The Benefit of Autistic People
-K. Ganesh Kumar ; R. Arvind; M. Aravind; S. Karthikeyan; P. Dass
Face recognition refers to an individual's understanding and interpretation of the human face especially in relation to the associated information processing in the brain. Autism Spectrum Disorder (ASD) is a comprehensive neural developmental disorder that produces many deficits including social, communicative and perceptual. Individuals with autism exhibit difficulties in various aspects of facial perception, including facial identity recognition and recognition of emotional expressions. Autism Spectrum Disorders (ASD) are characterized by atypical patterns of behaviors and impairments in social communication. Traditional intervention approaches often require intensive support and well-trained therapists to address core deficits. People with ASD have tremendous difficulty accessing such care due to lack of available trained therapists as well as intervention costs. Thus a Human Facial Emotions based image processing system is to be developed which processes autistic people’s expressions and enables them to access PC applications based on their expressions. Read More...
|
Electronics Engineering |
India |
664-667 |
147 |
Heliospheric Modulation of CRI Due to Solar Activity
-Dr. B. K. Tiwari
The main features of solar cycle 23, sun enters a period of intermediate and weak solar activity in terms of sunspot number. Based on the observation from Omniweb data centre for solar- interplanetary data , geomagnetic activity and monthly mean count rate of cosmic ray intensity (CRI) variation data from Oulu / Moscow/ Keil neutron monitors (Rc=0.80 GV , Rc=2.42 GV and Rc=2.29 GV,) during solar activity cycle 23 . The phase of minimum solar activity began in May 2005 and lasted for 4.5 years the unprecedented duration of the relative sunspot numbers falls. It is observed that the strength of the interplanetary magnetic field has been falling off to new low levels, and reduces the GCR entering inner- heliosphere and it is also found that SSN positive correlated with Kp and Ap and sunspot number, 10.7 cm solar radio flux, were inverse correlated with monthly mean count rate of cosmic ray intensity Read More...
|
Physics |
India |
668-670 |
148 |
Solar activity indices and their Impact on Helioshphere and GCR Modulation
-Dr. B. K. Tiwari
Solar variability controls the structure of the heliosphere and produce changes in cosmic ray intensity. Based on the observation from Omniweb data centre for solar- interplanetary data and yearly mean count rate of cosmic ray intensity (CRI) variation data from Oulu / Moscow neutron monitors (Rc=0.80 GV & Rc=2.42 GV) during 1996-2014 . It is observed that the sun is remarkably quiet and the strength of the interplanetary magnetic field has been falling off to new low levels , reduces the GCR entering inner- heliosphere and it is high anti-correlation (-0.78) between sunspot number & GCR flux. It is also found that 10.7 cm solar radio flux, velocity of solar wind and the strength and turbulence of the interplanetary magnetic field were positive correlated with each other and inverse correlated with count rate of cosmic ray intensity. Read More...
|
Physics |
India |
671-672 |
149 |
A Wireless Methodology of Heart Attack Detection
-P. Bobby Keerthan ; K. Ganesh Kumar; R. Arvind; S. Arvind Kumar; P. Dass
The wrist watch with Heart Attack Detection is equipment that is used daily to indicate heart condition, to detect heart attack and to call for emergency help. It was designed specially to help patients with heart disease.This includes three common sub units. They are Circuit, Analysis Algorithm, and Bluetooth Communication. The first one is to wear on the wrist of the patient to captures the abnormal heart beat waves from the victim and the alternate methods are installed under the stick. This project is based on the previous project “Wireless Heart Attack Detector with GPS†of Fall 2004 [1]. we consider a big improvement in reducing the complexity of the project greatly, in saving power consumption of the project to run much fewer codes and in making the project to run at a faster time. No wire is attached to the wrists. In our project, the ECG waveform is transmitted wirelessly from the wrists to the watch. This gives the user great flexibility while the program is switched on and running. User can drive safely, can use restroom easily and can function normally like without the project. Previous project had the wire connection. All the hardware on the walking watch would have been strapped to the wrists. This will not make the project functional and marketable. Our project is completely portable. Heart condition is displayed in our project. The previous project did not inform the user about his heart condition. We display the heart condition through two LEDs as low-risk (alert level between 4 and 6) and high risk (alert level between 7 and 9). The user can know their heart condition and take proper action to avoid the fatal moment. Proper action could be slowing down and taking a rest. Read More...
|
Electronics Engineering |
India |
673-676 |
150 |
Review of Development done in Computerization of Electrical Specifications for Transformers using CAD
-VIVEK PATHAK
In the past, the process of preparation of Electrical Specification for Transformers was carried out by drafting in AutoCAD and Transformer Design calculations were done manually based on output data obtained from Disintegrated Transformer Design programs. In today's competitive environment, where design cycles have reduced drastically, it becomes imperative to fully computerize the Electrical Specification Document Generation for Transformer Design to speed up the whole design process. Read More...
|
Mechanical Engineering |
India |
677-679 |