No. |
Title and Author |
Area |
Country |
Page |
901 |
Modified Approach in Association Rule Mining to Find Rare Item set
-Krishna Patel ; Jignesh Vania
As datasets are huge and larger, it takes a longer computational time to produce association rules. To produce association rules with less computational time, one should start with big thinking. Most existing Association rule mining methods are developed for mining numerous patterns, A common property of this methods is that they find numerous itemset and discard rare or infrequent itemset. But In many real-world circumstances rare itemsets are of abundant interest and they deliver valued information. In literatures, different methods are used to find rare itemsets, still problem of memory requirement and computational time is there, Proposed approach reduces memory requirement and search space thus making an algorithm more efficient by minimizing Computational time. Read More...
|
Computer Science and Engineering |
India |
3638-3640 |
902 |
Low Sidelobed Radiation Characteristics of Linear Antenna Array using 'GA'
-Srinivasa Kiran Gottapu ; Siva Teja Gottapu
An antenna array is composed of many elements whose excitation amplitude and phase can be individually adjusted to yield a desired pattern. Element failures cause sharp variations in the failed intensity across the array increasing the side lobe level of the power pattern. The defective elements of an antenna array need not be replaced. Reconfiguration of the amplitude and phase distributions of the remaining elements can partially compensate for the failed elements and thus reduce the side lobe level. Numerical results are presented to illustrate the effectiveness of the method. Genetic algorithm(GA) and real coded GA methods are robust optimization techniques based in the natural genetic for the search in complex spaces. These algorithms are computationally simple and can be easily improved. Read More...
|
Electronics and communication engineering |
India |
3641-3647 |
903 |
Privacy Preserving Based on Random Projection using Data Perturbation Technique
-Ripal Patel ; Prof. Aniket Patel
Privacy preserving is a very popular technique because it permits sharing of privacy sensitive data for analysis purposes. So many privacy preserving techniques have already been studied. Existing techniques of privacy preserving data mining are used for static databases which are not suitable for data streams. Now a days, data streams which are new concept of data and which are different from the static data [1]. Here, if the data changes, then there is necessary to rescan the database. so, it takes more computation time and it has inability to respond the user. If data transformation is used then data accuracy is decreases. So, here necessary to develop system which preserve the privacy with accuracy. So, here privacy preserving data stream mining is an important issue. Read More...
|
Computer Engineering |
India |
3648-3653 |
904 |
Assessment of Hydrologic Impacts of Spatial Discretization in Koshi River Basin by GIS and HEC-HMS Semi - Distributed Model
-Er. Narayan Prasad Gautam
Most hydrological modeling are complex process to recognize due to immense spatial and temporal variability of catchment characteristics, vegetation distinctiveness, precipitation data, snow pack and number of concerned variables in modeling the physical processes. The hydrological models are useful for spatial and temporal extrapolation of hydrological data. These models help in admitting the conceptualization of governing hydrologic methods working in catchments. Hydrological models are mainly classified as lumped, semi-distributed and distributed models. The model describing catchment in terms of average spatial and temporal quantities is considered lumped model while describing spatially variable system are termed "distributed models". Hydrological models that fall between lumped and distributed is known as "semi distributed models". Semi-distributed hydrological models generally have advantages of short calculation time, low calibration needs and high model efficiency. The sensitivity of this model in simulating the rainfall runoff, as a role of sub basin descriptions, was investigated for the Koshi river basin by using digital elevation model, climate data, land use and soil type of Koshi watershed. The results showed that increasing the number of subdivision from 7 to 35, decreases hydrograph peak discharge, average stream flow, total runoff volume but increasing efficiency of model with increasing sub basin divisions. However this trend becomes less significant when number of subdivisions exceeds twenty-five subdivisions. Read More...
|
Civil Engineering |
Nepal |
3654-3661 |
905 |
Experimental Investigation of Mechanical and Tribological Behavior of Al 6061- Tio2 Processed By Powder Metallurgy Technique
-Sumanth H R ; Anil Kumar G.; Madhusudhan
Metal matrix composites have created distinct interest as of late adding to the strength to weight proportion, stiffness, good ductility, excellent corrosion resistance, availability and low cost good creep resistance & fatigue properties over that of conventional engineering materials. This is the reason past the extended requirement for advancement of composites with unique properties. Powder metallurgy is an ideal method for production of MMCs because of the capability of process to produce near net shapes with minimal material waste associated with production. Tribological and mechanical properties have a noteworthy part in production of MMC's utilized extensively in automotive and aviation industries. The present investigation is an attempt made to disperse nano sized silicon carbide particles in Al 6061 base alloy by powder metallurgy technique and study its effect on wear properties of Al 6061 alloy. Addition of Titanium Dioxide particulate reinforcement has been varied from 5% 10% & 15% by weight of base alloy. Powder metallurgy composite specimens fabricated were machined according to test standards the tribological and mechanical properties has been examined and compared with that of base material Al6061 alloy significant improvement in wear properties, hardness is noticeable with increased volume wt% of TiO2. Read More...
|
MECHANICAL MACHINE DESIGN |
India |
3662-3665 |
906 |
Image Segmentation of Medical Images using Automatic Fuzzy C-Mean Clustering
-Padmini Umorya ; Rajesh Singh
We presented a new method for image segmentation which is based on automatic fuzzy c-means clustering algorithm for medical images. It segments the image for better visibility. In the level set segmentation, the key curve is found via solving an optimization problem wherever a cost function is reduced, but its disadvantage of this technique is to fix iteration at the time of execution. In the proposed technique, there is no need to fix the iteration value, it takes automatically iteration value and segment the image. The experimental results show the best result in terms of normalized cross correlation, normalized absolute error and execution time. In the process of clustering , it partition the image into a number of clusters and give the segmented image. Read More...
|
Computer Science |
India |
3666-3671 |
907 |
Secure Authentication using Visual Passwords
-Dayyala Gowthami ; J.Sravanthi
Key logging or keyboard catching is the action of copy (or logging) the keys hit on a keyboard, normallyin a private way so that the distinct utilizing the keyboardis insensible that their doings are being observed. It similarly has remarkablyreliable uses in inquiries ofhuman-computer interaction.We show how cautious visualization summary can advance the security as well as the suitability ofauthentication. We propose two visual authenticationprotocols: one is a one-time-password protocol, and the otheris a password-based authentication protocol. Our approach for honest arrangement: we had the capacity attain to an anomalous state of ease of use while satisfyingrigorous securitynecessities. Read More...
|
Computer Science |
India |
3672-3676 |
908 |
Reduction in Retrieval Time in CBIR using Mapreduce
-Krishna Parekh ; Narendra Limbad
In CBIR main problem is to extract the image features that effectively represent the contents of an image in a database which may be difficult to use, using single feature. Whereas with combination of different features it would give efficient results. The different combination used maybe color-edge; color-shape-texture; color-texture; shape-texture. With more features different aspects of an image could be represented. These type of combination along with Hadoop MapReduce on distributed database less retrieval time can be achieved. Image retrieval based on color, texture and shape is an emerging and wide area of research scope. In this paper we present a novel framework for combining all the three i.e. color, texture and shape information along with MapReduce and achieve higher retrieval efficiency. Read More...
|
Computer Engineering |
India |
3677-3679 |
909 |
Comparative Study of Behavior of Shear Wall with Different Percentage of Opening
-Pravin Dilip Deore ; Prof. Dr. Rajashekhar Talikoti
Shear walls are provided in high rise structures and structures located in higher seismic areas. The primary purpose of shear wall is to resist lateral forces arising due to earthquake or wind. Usually, architectural design leads to the existence of doors and windows within shear walls. This project is to study the effect of openings in shear wall on behavior of structural frames. A RCC medium rise building of 12 stories with floor height 3m subjected to earthquake loading in V Zone has been considered. Such building modeled with different type of lateral resisting system: complete shear wall, shear wall with opening. Results of the analyses showed a substantial decrease in terms of strength of the wall for shear walls with openings. Also to study the displacement at various levels with the different percentage or size of opening provide in shear wall. This study verified large lateral displacements and ductility for shear walls with openings in comparison with complete shear wall. The displacement increases gradually from ground floor to top floor with increase in percentage of openings. If openings are required in shear wall detailed analysis of structure is essential as it may lead to erratic increase in forces on columns. Read More...
|
Structural Engineering |
India |
3680-3682 |
910 |
Stop Sounds: A Review
-Lokhande Neha Avinash ; Gharge Anuradha P.
Stops are considered as one of the most important class of the phoneme classification. Their detection plays a vital rule in many speech recognition system applications and in psychoacoustic studies for accurate and reliable systems. They are characterized by multiple sub-phonetics events which are responsible for making them important and playing wide role towards their formation from the acoustic-phonetic prospective. This paper includes the factors that are responsible for the detection of the stops and the way in which they are classified. Read More...
|
Electronics and Communication Engineering |
India |
3683-3684 |
911 |
Qualification Level Analyzation for Cluster Head
-Syed Vazeed ; K.Siva tharun; N.Tharun Babu; Ms.Radhika Baskar
The wireless sensor networks combines sensing, computation, and communication into a single small device. These devices depend on battery power and may be placed in hostile environments replacing them becomes a tedious task. Thus improving the energy of these networks becomes important. Clustering in wireless sensor network looks several challenges such as selection of an optimal group of sensor nodes as cluster, energy is the most important consideration because the life time of the sensor node is limited by the battery it utilizes. Clustering is a separation of data into groups of similar objects. Each group called cluster consists of objects that are similar between themselves and dissimilar to objects of other groups. Cluster head is selected using fuzzy logic. By using fuzzy logic the qualification level of each sensor node being cluster head is elected. Simulation is carried out in mat lab and the performance is analyzed for various qualification levels. Read More...
|
Electronics and Communication Engineering |
India |
3685-3687 |
912 |
Implementation of Resource Selection & Integration of Data on Deep Web
-Sumit Patel ; Prof. Vinod Azad
Current information retrieval process concentrate in downloading web content and analyzing and indexing from surface web, exist of interlinked HTML pages. Information retrieval has limitations if the data is behind the query interface. Answer depends on the uncertainty party’s circumstance in classify to connect in dialogue and negotiate for the information .in this paper we proposed Approach, resource selection & integration of invisible web and show through our proposed algorithm is effective another algorithm. We show through the experiment result our algorithm more effective. Invisible web searching contributes to the development of a general framework. Read More...
|
Computer Science & Engineering |
India |
3688-3694 |
913 |
Human Age Estimation using Facial Landmarks
-Apoorva B S ; Santosh Kumar G
Human age can be inferred by distinct patterns emerging from facial appearance. Usually people wear makeup aimed at making them look very much beautiful, handsome and younger than real appearance making hard to predict the age. The photo of a person with makeup and without makeup can lead us into different answers because makeup affects the looks of the person by covering dark and red spots, wrinkle, discoloration area, breakouts and other undesirable areas on the face. In this paper, high quality images with and without makeup are collected from internet ranging from 35 to 55 years in age. Selecting 20 most important facial feature points manually using statically developed Active Appearance face model. The input image is subjected to pre-processing to make it suitable for further image processing.1D-Gabor filter are used for feature extraction. We use Local Gabor XOR pattern (LGXP) operator to encode Gabor phase and efficient in extraction of texture from facial images. Feed forward neural network for age estimation. Read More...
|
DIGITAL ELECTRONICS |
India |
3695-3698 |
914 |
Independent Component Analysis: A Review
-Pratika Tiwari ; Prof. Mitul Patel
ICA is solution of the fundamental problem in neural network research, also in other areas, that is to find a proper representation of multivariant data i.e. random vectors. This is linear transformation of original data. We can say that each component is representation of linear combination of its original variables. There are very well-known transformation methods like principal component analysis, projection pursuit and factor analysis. So Independent Component Analysis (ICA) is a method with help of which we can have a linear representation of nongaussian data so that the components are statistically independent. So, in this paper we see the basic theory and application of ICA. Read More...
|
Electronics and Communication Engineering |
India |
3699-3701 |
915 |
A Hybrid Page Rank Algorithm for Web Pages
-Abhishek Sharma ; Arun Solanki
In the past, the World Wide Web has taken a rapid growth and search engines are the most popular ways of finding any kind of information on it. There are many cases, where the users are having so many web pages where they need to find there solutions in response to the searched query. Generally there are not many users that go beyond the first few pages. Hence the search engines face a challenge on how to provide the best meaningful web pages in response for a user query. In spite of having so many page rank algorithms used by the search engines, the pages that are needed by the users may actually get lost in the tremendous amount of information returned by the search engines. The users that use the search engines are not expert in the domain of search engines, hence the information need to be grouped that is provided by the web pages so that they can navigate the information quickly. Hence the analysis of the pages importance would be done by various matrices and enable the representation of interactions between pages in the form of a network. And finally the analysis of what is the efficiency of rank values of the pages using the proposed system and existing system is carried out. For this purpose, algorithms from the discipline of graph theory are applied, including the Dijkstra’s algorithm for impact analysis, Page Rank and Weighted Page Rank algorithm for calculating the rank values of each web page are used. The weighted page rank algorithm is used to find the page rank of the web pages and with the help of Dijkstra’s algorithm an optimal path is decided on the basis of in-links and out-links. The Dijkstra’s algorithm gives the direction to the Weighted Page Rank algorithm to calculate the page rank values of the pages. This research proposed a Hybrid Page Rank System (HPRS). The HPRS system is composed of three modules User Interface, Operation module and Knowledge Base. The tools used are visual basic server and SQL server database and the framework on which the system is implemented is dot net. The proposed system is implemented in asp.net language. The result of the research compares the rank values of the existing and the proposed system. The performance is calculated for each page simultaneously, is done between the existing Page Rank Algorithm and the Hybrid Page Rank Algorithm. The proposed system gives more efficient rank values of the pages than the existing algorithm. Read More...
|
search engine |
India |
3702-3708 |
916 |
GPSS Simulation of Inventory with Periodic Review
-Krishnamoorthy.A ; Prabakaran.N; Kannadasan.R; Naresh.K
The objective of present work is to model and simulate a inventory with periodic review using GPSS simulation tool. To achieve this task the problem statement is prepared to build the model and programmed using GPSS codes. Finally they are executed to analyze and interpret results-general data and statistics-that explains the behavior of the system Read More...
|
computer science engg |
India |
3709-3711 |
917 |
Effective ATPG Framework to Test Liveness and Performance of Network
-Tushar Khelge ; Prabadevi B
The distributed and complex nature of the network makes difficult to debug and trace the actual fault in network. Network administrators depend on primary tools such as ping and traceroute to troubleshoot the problems in the network. Liveness of the network purely depends on the links and the nodes in network. To test the liveness of the network an effective Automatic Test Packet Generation framework is introduced in this paper. ATPG is an automated and systematic approach for testing and debugging the network. ATPG reads the router configurations and generates a device-independent model. This framework generates a minimum set of test packets to recognize each and every link in the network. Generated test packets are sent periodically to test failures in the network, and after detecting the failure a separate mechanism triggered to localize the fault. ATPG can detect both functional and performance problems. The performance is measured by measuring the throughput, end to end delay, data packet received and the packet delivery ratio. Read More...
|
Networking |
India |
3712-3715 |
918 |
Secure Communication in Low SNR using MIMO Technique
-G.Ugesh ; B.Ashok; B.N.Ajai Vikash; Sitadavi Bharatula
Secure transmission of confidential messages is an important issue in communication systems as a result of wireless channels offer a shared medium notably favourable to eavesdropping. MIMO technique is used to avoid attenuation and to enhance data rate. By finding the bit energy which is minimum the energy efficient is to be analyzed needed for secure and reliable communications. secrecy is achieved once the transmitter and the receiver can communicate guaranteeing that eavesdropper gets zero bits of knowledge. Read More...
|
Electronics And Communication |
India |
3716-3718 |
919 |
An Incrementally Deployable Network Architecture to Support both Data-Centric and Host- Centric Services
-R.Revathi
Most Internet cartage is associated with applications area users are absorbed in the data and not in the antecedent area the abstracts reside. On the added hand, the accepted Internet architecture is host-centric rather than data-centric. This motivates a new network architecture that can calmly abutment both data-centric and host-centric services. In this paper, we call in detail an accomplishing of an incrementally adaptable Data-Centric Network Architecture (DCNA) for the Internet. DCNA is based on the inclusion of a bushing band amid the appliance band and the carriage band and the appropriate interfaces to calmly affix these layers. In accession to getting data-centric and incrementally deployable, the proposed DCNA can finer abutment mobility, multihoming, and affluence the acceptance of new applications and networking technology. Read More...
|
Information Technology |
India |
3719-3723 |