Current Issue Volume 2 Issue 5 May 2013 

Image description

 

Abstract— 

Heterogeneous catalyst of transesterification is gaining more support because of the friendly nature of the catalysts, easy separation from the products, their reusability and less process water require. This paper present the efficacy of some of the common solid catalysts for biodiesel production. Many researchers have developed different solid base/acid catalysts for transesterification of vegetable oil in order to replace the conventional homogeneous catalysts that have a lot of limitations. The performances of some of these heterogeneous catalysts with appropriate vegetable oils are reviewed in this paper. K/KOH/ϒ.Al2O3 has yielded 84.5% biodiesel from rapeseed oil, X/Y/MgO/ϒ. Al2O3 yielded 96.1% biodiesel from jatropha curcas oil, SO4/TiO2.nH2O and SO4/Zr(OH)2 yielded 90% biodiesel from cotton seed oil. CaO, SrO, Ca(OCH3)2 and Ca(OCH2CH3)2 yielded 95% biodiesel from soybean oil.  ZnO, /, and have good yield of biodiesel with palm kernel oil and coco nut oil. Heterogeneous catalysis is a process intensification. 

 

[Download Full Text Article]

Image description

Title : OPTIMAL BANDWIDTH ASSIGNMENT FOR MULTIPLE DESCRIPTION CODED VIDEO

Authors : Naveen kumar, Jaishree Tripathi, Rachana Dubey Mr. Abhishek  Srivastava

 

Abstract

In video streaming over multicast network,user bandwidth requirement is often heterogeneous possibly with orders of magnitude difference (say, from hundreds of kb/s for mobile devices to tens of mb/s for high-definition TV).Multiple descry ption coding (MDC) can be used to address this bandwidth heterogeneity issue. In MDC, the video source is encoded into multiple independent descriptions. A receiver, depending on its available bandwidth, joins different descriptions to meet their bandwidth requirements.An important but challenging problem for MDC video multicast is how to assign bandwidth to each description in order to maximize overall user satisfaction. In this paper,we investigate this issue by formulating it as an optimization problem, with the objective to maximize user bandwidth experience by taking into account  then coding inefficiency due to MDC.

We prove that the optimization problem is NP-hard. However, if the description number is larger than or equal to a certain threshold(e.g., if the minimum and maximum bandwidth requirements are100 kb/s and 10 mb/s, respectively, such threshold is seven descriptions), there is an exact and simple solution to achieve maximum user satisfaction, i.e., meeting all the bandwidth requirements. For the case when the description number is smaller, we present an efficient heuristic called simulated annealing for MDC bandwidth assignment(SAMBA) to assign bandwidth to each description given the distribution of user bandwidth requiremen.We evaluate our algorithm using simulations. SAMBA achieves virtually the same optimal performance based on exhaustive search .By comparing with other assignment algorithms, SAMBA significantly improves user satisfaction. We also show that, if the coding efficiency decreases with the number of descriptions, there is an optimal description number to achieve maximal user satisfaction.

 

[Download Full Text Article] 

Image description

Title : EVALUATION OF EYE GAZE INTERACTION

Author : Miss A W. Chorey

 

Abstract-

Eye gaze interaction added simple and convenient way to communicate with computer. With a growing number of computer devices around us, and the increasing time we spend for interacting with such devices, we are strongly interested in finding new interaction methods which ease the use of computers or increase interaction efficiency. Eye tracking seems to be a promising technology to achieve this goal. In this paper, I present two experiments that evaluate an interaction technique. The results show that algorithm, which makes use of knowledge about how the eyes behave, preserves the natural quickness of the eye. Eye gaze interaction is a reasonable addition to computer interaction and is convenient in situations where it is important to use the hands for other tasks. It is particularly beneficial for the larger screen workspaces and virtual environments of the future, and it will become increasingly practical as eye tracker technology matures.

 

[Download Full Text Article]

Image description

Title : PERFORMANCE ANALYSIS OF WEB SERVICES BY USING J METER PERFORMANCE TOOL

Authors : Nitin Kumar Verma*, Dr. Neeta Singh, Rishi Gautam

 

Abstract:- 

In this paper we have discussed web services performance and compares the performance differences of web services development approaches in java, Soap API and business logic EJB, is use POJO for access request and pass this object request with data server or server, response back to client which is time consuming in middle layer. Hibernate gives the solution by mapping data directly with data server or server. After developed that application, we have analyzed web services performance by using Apache J Meter web  services performance analysis tool that configure IP request address of web services in the form of SOAP xml format and get a response from web services in term of throughput, standard deviation, error, average, median. WSDL contains the information like request for service, IP address and port number of called web services. Performance analyses result can be used to make appropriate choice for developing and optimizing mechanism to web services environment.

 

 

[Download Full Text Article]

Image description

Title : SPEED CONTROLING USING DISTANCE DETECTOR IN MOVING VEHICLE

Authors : Amit Kumar Dimha1, Vijay Kumar1 and John Singh. K2

 

Abstract– 

Many accidents may be saving if emergency service detector can detect the distance between upcoming object with running vehicle, and alert the controller. This paper is proposed to provide compatibility in Doppler radar and Speedometer with EDR. This Doppler radar will monitor speed of a vehicle and compare with the inbuilt detect system of speed. We set different parameter for speed according to object availability in path and set speed criteria according to them. For measuring the distance between vehicle and object we use PLD that coupled with microcontroller.

 

[Download Full Text Article]

Image description

Title : A REVIEW ON RIPPLE CURRENT REDUCTION TECHNIQUE WITH ACTIVE POWER FILTER

Authors : Tembhurnikar Gaurav1, Gajare Pankaj2, Wani Nilesh3, Patil Nitin4

 

 

Abstract— 

This paper presents the estimation of ripples by using analytical method in active power filters .This method is based on an average model of PWM voltage source inverter. The formulae for the ripple magnitude are derived for single-phase and three-phase three-leg structures. Numerical examples for filters generating third and fifth order harmonics are presented. The reactive component of fundamental harmonic is considered as an example. A ripple current reduction method is proposed that does not require additional switching devices. A current ripple having twice the frequency component of the power supply is generated in the dc part when a single-phase pulse width-modulated inverter is used for a grid connection. The current ripple causes shortening of the lifetime of electrolytic capacitors, batteries, and fuel cells. Without increasing the number of switching devices, the proposed circuit realizes a dc active filter function because center tap of the isolation transformer is connected to the energy buffer capacitor.In addition, the buffer capacitor voltage is controlled by the common-mode voltage of the inverter. The features of the proposed circuit, control strategy, and experimental results are described, including the result of ripple reduction, to approximately 20% that of the conventional circuit

 

[Download Full Text Article]

Image description

Title : CASE STUDY ON TRANSFORMER TRIPPING AFTER COMMISSIONING & OIL SPALSH OUT

Authors :Shubham vyas

 

Abstract-

Transformer supplied on 28/01/2011, erection completed on 03.10.2012, Oil filtration & circulation completed and pre commissioning test completed successfully.

An oil sample is taken for BDV, PPM measurement& it came 82 KV &13PPM which was excellent for 132KVclass transformer. Transformer successfully charged on 0620 Hrs dt. 09.10.2012 & load increases gradually, when the transformer reaches on load of 41.2MW. It was observed thattransformer tripped on pressure relief device at 1358 Hrs on same date.

 

[Download Full text Article]

Image description

Title : APPLICATION OF GENETIC ALGORITHM FOR SWITCH LEVEL FAULT FINDING IN INTEGRATED CIRCUITS

Authors :Lalit A. Patel, Sarman K. Hadia, Parthesh R. Mankodi                                                           

 
Abstract- 

The paper describes an approach for the generation of deterministic test pattern generator logic. This approach employs a genetic algorithm that searches for an acceptable practical solution in a large space of implementation.  Its effectiveness (in terms of result quality and CPU time requirement) for circuits previously unmanageable is illustrated. The flexibility of the new approach enables users to easily trade off fault coverage and CPU time to suit their needs

 

[Download Full Text Article]

Image description

Title : CONTENT-BASED IMAGE RETRIEVAL VIA VECTOR QUANTIZATION

Author : Tejas P. Kokate, Sanket S. Kulkarni, Virendra S. Ravalji, Deepak B. Waghchaure

 

Abstract:- 

Image retrieval and image compression are each areas that have received considerable attention in the past. In this work, we present an approach for content-based image retrieval (CBIR) using vector quantization (VQ). Using VQ allows us to retain the image database in compressed form without any need to store additional features for image retrieval. The hope is that encoding an image with a codebook of a similar image will yield a better representation than when a codebook of a dissimilar image is used. Experiments performed on a color image database over a range of codebook sizes support this hypothesis by considering spatial relationships as well and retrieval based on this method compares well with previous work.

To effectively utilize information stored in a digital image library, effective image indexing and retrieval techniques are essential. This paper proposes an image indexing and retrieval technique based on the compressed image data using vector quantization (VQ). By harnessing the characteristics of VQ, the proposed technique is able to capture the spatial relationships of pixels when indexing the image. Experimental results illustrate the robustness of the proposed technique and also show that its retrieval performance is higher compared with existing color-based techniques. One of the key roles of Vector Quantization (VQ) is to compress the data about the image database. In the past years, many improved algorithms of VQ codebook generation approaches have been developed. In this paper, we present a snapshot of the recent developed schemes. The discussed schemes include LBG, enhance LBG (ELBG).

 

[Download Full Text Article]

Image description

Title : TECHNIQUES OF DEFEATING STEGANOGRAPHY: A STATE OF ART SURVEY 

Authors : Vishwajeet Singh1, Mohd Aman2, Vaibhav Gupta3,Mayank Parashar4

 

Abstract

Steganography is a useful tool that allows covert transmission of information over an overt communications Channel. Combining covert channel exploitation with the encryption methods of substitution ciphers and/or one time pad cryptography, Steganography enables the user to transmit information masked inside of a file in plain view. The hidden data is both difficult to detect and when combined with known encryption algorithms, equally difficult to decipher.

This paper discusses the functional areas in the field of Steganography, how Steganography works, what Steganography software is commercially available and what data types are supported, what methods  and automated tools are available to aide computer forensic  investigators  and information security professionals in detecting  the use of Steganography , after detection has occurred, can  the embedded message be reliably extracted, can the embedded data be separated from the carrier revealing the original file, and finally, propose  some methods to defeat the use  of  Steganography even if it cannot be reliably detected

 

[Download Full Text Article]

Image description

Title : FINGERPRINT, RETINA AND FACIAL RECOGNITION BASED MULTIMODAL SYSTEMS

Authors : Sachin Dwivedi, Shrey Sharma, Vishwa Mohan, Khatana Arfan  Aziz

 

Abstract:- 

Biometrics is automated methods of identity verification or identification based on the principle of measurable physiological or behavioral characteristics. Their characteristics are unique and not duplicable or transferable. This paper mainly focuses on a multimodal that comprises of retinal scan, facial recognition and fingerprint scan. Being a very convenient and user friendly way of authentication it is preferred much these days but at the same time it must be secure and reliable enough to meet various security attacks. A biometric system is a system which recognizes the human characteristics and trails, which is use for identifications and access control.The recognition is done on the bases of physiology and behavior characteristics. A unimodal biometric system is one which has only the limited accuracy. So as to improve the accuracy and security of biometric systems researchers came up with the idea of the multi modal biometric system. A multi modal biometric system integrates the results of two or more biometric trails. This paper deals with the multimodal biometric system.

 

[Download Full Text Article]

Image description

Title : A FUTURE APPROACH FOR HUMAN FACE IDENTIFICATION 

Authors : Kumar.P.J1, Anandharaj.G2 and Chithra.J3

 

Abstract :-

Human Face Identification is an Information technology that identifies the positions of human faces in bits of images. It recognizes Human facial properties and eliminates everything else, such as animals, cars and bodies. It plays an important role in video surveillance, smart cards, protection, Face Databases, Access control and Human Computer Identification.

Human face is one of the most significant features to detect persons in an image. As sufficient luminous information is not available in the existing approach, we propose a new method to identify various colors of human face. The proposed methodology identifies how to reveal human face from the background image.

 

[Download Full Text Article]

Image description

Title : SOFT COMPUTING METHODOLOGIES IN BIOINFORMATICS AND ITS ADVANCE TOWARDS BIOLOGICA DNA

Authors :1Dr.Tryambak A. Hiwarkar, 2Sridhar Iyer

 

Abstract:- 

Bioinformatics is a promising and innovative research field in 21st century. Despite of a high number of techniques specifically dedicated to bioinformatics problems as well as many successful applications, we are in the beginning of a process to massively integrate the aspects and experiences in the different core subjects such as biology, medicine, computer science, engineering, chemistry, physics, and mathematics.

Bioinformatics is a fast growing field in the scientific community. It involves a wide range of problems, for example, DNA sequence analyses, RNA secondary structure predictions, phylogenetic analyses and microarray analyses.

Recently the use of soft computing tools for solving bioinformatics problems have been gaining the attention of researchers because of their ability to handle imprecision, uncertainty in large and complex search spaces. The paper will focus on soft computing paradigm in bioinformatics.

 

[Download Full Text Article ]

Image description

TiTle : UTILIZATION OF BAGASSE IN PULP AND PAPER MANUFACTURE IN NIGERIA

Authors : Ibrahim H1, Bugaje I.M2,.Famuyide O. O3 andMohammed I.A4

 

Abstract— 

Large quantity of bagasse is produced annually and not much use is made of them except as waste. This investigation was carried out in an effort to search for raw materials to replace the presently imported long fibre pulp in Nigeria. Bagasse was macerated and the properties of its pulp were evaluated. Sample sheets of paper were produced using hand sheet method and were duly tested for tearing resistance, tensile strength and burst strength. The pulp has fairly long fibre length of 2.071mm. Its papers posses high tearing resistance of 1226.25mN and tear factor 125.00m2 but low tensile strength of 6.50Nm/g and burst strength of 57.5kPa. Therefore its paper products can be used for writing and printing applications.

 

[Download Full Text Article]

Image description

World Wide Web is a huge repository of web pages and links. It provides huge information for the Internet users. The growth of web is tremendous as approximately one million pages are added daily. Users’ accesses are recorded in web logs. Because of the tremendous usage of web, the web log files are growing at a faster rate and the size is becoming huge. Web data mining is the application of data mining techniques. Extraction of user behavior is an important work in Web Mining. Web Usage Mining applies mining techniques in log data to extract the behavior of users. Today most of the banks are entered in the web world. They are launching various online facilities day to day for customers. This paper presents the browsing behavior of the user in banks websites and the quality measurement factors of the website. In this study we have analyzed log server of three major public sector banks i.e. State Bank of India, Bank of Maharashtra and Bank of Baroda and three major private sector banks i.e. ICICI bank, HDFC bank and Federal bank. The obtained results can be used in different applications like, site modifications, business intelligence, system improvement, and web personalization and useful to tell, how to provide customer with more exactly needed and accurate on line information to improve banking activities and achieve business goal

 

[Download Full Text Article]

Image description

Title :PERFORMANCE ANALYSIS OF RICIAN FADING CHANNELS USING M-PAM MODULATION SCHEME IN SIMULINK ENVIRONMENT

Authors : Sunil Kumar.P#1, Dr.M.G.Sumithra#2, Ms.M.Sarumathi#3

 

 

Abstract:-

The World Wide Web has had an extremely significant impact on access to information and information services. Web-based applications are influencing many domains such as business, commerce, banking and learning. The Web has simplified access to information and information services, enabling a variety of users with different backgrounds, social situations, and so on to participate. The increasing complexity of such applications calls for engineering methods for  developing efficient high quality software applications with all the appropriate performance, features and services which are required. Applications and information which are provided on the Web according to the ‘one size fits all’ approach are not appropriate to such a heterogeneous environment. Adaptive Web-based applications are an alternative to the traditional “one-size fits-all” static approach in the development of applications. Thus a distinctive feature of such an adaptive application is its ability to adapt itself to certain conditions 

 

[Download Full Text Article]

Image description

Title : PRODUCT LIFE CYCLE MANAGEMENT IN AUTOMOTIVE ENTERPRISES

Authors : 1 X.Charles * and 2dr.Partha Sarathi Chakraborthy

 

Abstract— 

This paper proposes Data and Process Management to facilitate the Teamwork in a collaborative product Development with internet and intranet support system environment. Nowadays very high competition in Global marketing with global & local customers. So, we need to increase the Manufacturing process globally. To implement these processes will require integrating people, process, machine and computers. The total development is meant for customer satisfaction as per customer specifications. PDM PORTAL is an integrated, information approach to all aspects of  product, from customer’s, manufacturing deployment and maintenance with finished product.PDM PORTAL suites enable accessing, updating, manipulating and reasoning about customer, process and product Globally-Locally. This integration takes place through well accepted human and electronics protocols. So, try to introduce the new concept to integrate PDM, ERP, CRM and SCM (Product Data management, Enterprise resource planning, Customer relations management, and  Supply chain management – product, processes, customer and Web Protocol Development. For this integration time to be reduced to develop the product and time to market as per customer satisfaction and this trend expected in next generation. The Data and Product Process to get and Distributed geographically. PECS implementation in enterprises is aimed at delivering products faster making Product development process more systematic as per customer requirements. PECS system includes storage , Inventory, processing of Design information and manufacturing Data in an engineering organization with Product  Centric approach. We develop architecture for Product Master Data [PMD] that includes CAD/CAM/CAE of Design and Manufacturing Process of Automobile Industry. Therefore we suggest through this support can access all design and manufacturing information in the enterprise must be Web-based because of its universal Data efficiently using with distributed Data. Using this scenarios and systems we will show effectively using PECS Tool support geographically access for Time to Market.

 

[Download Full Text Article]

Image description

Title : AN EXPLORING DYNAMIC NATURE ROUTING  TO INCREASE NLT AND LLT  IN MOBILE AD-HOC NETWORK

Authors :  Saranya. S1, Chandrasekaran.R2

 

Abstract:- 

In mobile ad-hoc network (MANET), a node may drain its power or diverge without giving any notice to its neighboring nodes. It causes changes in network topology, and thus, it significantly degrades the performance of a routing protocol. Several routing protocol studies are based on node lifetime and link lifetime. The main objective here is to evaluate the node lifetime and the link lifetime utilizing the dynamic nature, such as the energy drain rate and the qualified mobility estimation rate of nodes. These two performance metrics are incorporated by Route lifetime-prediction algorithm. The exponentially weighted moving average method is used to estimate the energy drain rate. The receiver can measure the signal strength when it receives the packets from sender in same power level and then it calculates the distance between two nodes by applying the radio propagation model. The proposed EDNR protocol outperforms the conventional DSR protocols and it is simulated using NS2.

 

[Download Full Text Article]

Image description

Title : ANDROID BASED PORTABLE ECG MONITOR

Authors :Jeevan vijay*, Sathisha M.S.,  Shivakumar K.M.

 

Abstract -

This project is a step towards the preventative healthcare for cardiac patients. It seeks to develop a smart mobile ECG monitoring system that continuously monitors what is happening around the subject when an arrhythmia event occurs.The problem we are facing now is the unexpected death of our loved ones because of the sudden heart attack. Because of the changing life style the heart attack rate is increasing day by day. The current heart attack death rate is about 25% of the total deaths in India. The main cause of heart attack death is the lack of medical care at the right time. This problem can be avoided by this project.Here I am presenting an android based portable ECG monitor. The patient will be wearing a small device which senses the ECG data. It will send the sensed data to the patient’s Android mobile through Bluetooth. The Android mobile will be having an application which will be running a heart attack detection algorithm. If any abnormalities are found the patient will be notified through an audible alarm and first aid techniques will be shown to the patient in the phone’s display. This first aid instruction will increase the chance of survival of the patient. A report of the ECG will be send to the patient’s doctor through email so that he can preparehimself for the treatment. And also a sms containing patient’s location (gps data) will be send to the hospital so that help can be given at the earliest even if the patient is travelling.

The goal is to provide early heart attack detection so that the patient will be given medical attention within the first few critical hours, thus greatly improving his or her chances of survival.

 

[Download Full Text Article]

Image description

Title : MINIMIZATION OF INTRA-CLUSTERERROR CRITERION FUNCTION USING IMPROVED K-MEANS

Authors :* Jain Sapna, Sharma Anu

 

Abstract :-

Data mining is the process of sorting through large database or data warehouse and extracting knowledge interested by the people. The extracted knowledge may be represented as concept, rule, law and model.Clustering is one such technique in data mining that partitions the data in meaningful clusters so that the distances of objects in the same cluster is as small as possible.Among the wide range of clustering algorithms,k-means is one of the most popular clustering algorithms. This paper presents animproved k-means algorithm using Euclidean distance method. The intra-cluster error criterion function minimizes significantly using the improved k-means algorithm. Moreover, the distribution of the data objects also improved and the results are verified over two datasets namely- letter image recognition dataset and the seeds datasets using improved k-means algorithm. The effectiveness of the algorithm is shown by comparing the results over standard k-means algorithm and the improved k-means algorithm.

 

 [Download Full Text Article]

Image description

Title : TWO LINK ROBOT CONTROLLERS BASED ON FUZZY TYPE-2 AND HIGHER ORDER SLIDING MODE

Authors :Ali Panjeshahi, Assef Zare, Saeed Balochian*

 

Abstract-  

In this paper, the multi-variable control of a two-link robot is considered. Industrial robots, such as robot of two degrees, are the high acceptance in industry and academic environments. They are also a classic problem in robotics for testing and evaluating the new controllers. In this research, two controllers based on fuzzy type 2 and higher order silding mode are employed for this case. The implementation of these controllers on robot models shows a proper tracking for each link.

 

[Downlload Full Text Artilce] 

Image description

Title : MODEL REFERENCE ADAPTIVE TECHNIQUE FOR SENSORLESS SPEED CONTROL OF INDUCTION 

Authors : T. Ravi kumar, Ch. Shankar Rao, Ravi Shankar

 

Abstract— 

This paper describes a Model Reference Adaptive System (MRAS) for speed control of the Induction Motor drive (IM) without a speed sensor. In this scheme an Adaptive Pseudoreduced-order Flux Observer (APFO) is used instead of the Adaptive Full-order Flux Observer (AFFO), an APFO is used for estimate the IM rotor speed and stator resistance, and these are used as feedback signals for the Field Oriented Control (FOC), which is a widely used control method for Induction Motor drive (IM). Simulation results show that the proposed scheme can estimate the motor speed under various adaptive PI gains and estimated speed can replace to measured speed in sensorless induction motor drives, this scheme is more efficient at very low speed, and also observed line currents, torque and speed under no-load and load conditions.

 

 [Download Full Text Article]

 

Image description

Title : BIOFUEL FOR SUSTAINABLE (AND ECO-FRIENDLY) ENERGY DEVELOPMENT

Authors : Ibrahim H.

 

Abstract

Biofuel is as old as the existence of man, made of three categories; solid, liquid and gas. Dried manure, charcoal and wood are well known solid biofuels .The liquid biofuels include; biodiesel, bioethanol, biobuthanol and biopropanol. The last three are called bioalcohols of which, biopropanol is the least commonly use in this group and biothenol the most. Biogases are methane and Syngas. Biodiesel can be produced by homogenous and heterogeneous catalysis with heterogeneous catalysis now found to be better process.  The liquid biofuels burn better than fossil fuels and therefore give engines longer lives. Bioethanol has higher octane rating than gasoline. Both biodiesel and bioethanol mix completely with conventional diesel and gasoline respectively. This review highlights the benefits of biofuels and their production.  

 

[Download Full Text Article]

Image description

Title :DESIGN AND FABRICATION OF FLUIDIZED-BED REACTOR

Athors :Suleiman Y., Ibrahim H*.,  Anyakora N.V., Mohammed  F., Abubakar A., Aderemi B. O., Okonkwo P. C.

 

Abstract

A fluidized-bed reactor was designed and constructed for practical demonstration of the fluidization of solid particles at different fluid flow rates. The bed of this reactor was sand particles of average size 1800 μm ,weighed 0.6 N and the fluidizing fluidwas air. Alternatively, the fluidizing fluid can be substituted for any given gas by connecting the desired gas cylinder to the blower. The height of the bed was 25 mm on a mesh of 1230 μm. An air blower was designed to supply air from the room to fluidize the bed.The shaftand discharge powers of the blower were18.8kW and its efficiency was 70%.  The minimum and maximum operating pressures were 0.1133 and 24.5262 mH2O and their corresponding velocities were 0.64 and 245.86 m/s respectively.This project was found suitable for undergraduates of Chemical Engineering  and related studies for improved knowledge and practical skill required for effective and optimal performance in meeting industrial needs towards improved service delivery. 

 

[Download Full Text Article]

Image description

Title : POWER QUALITY IMPROVEMENT USING 5-LEVEL FLYING CAPACITOR MULTILEVEL CONVERTER BASED DYNAMIC VOLTAGE RESTORER FOR VARIOUS FAULTS 

Authors : G. N V Sarath Babu , A.Naveen kumar ,Shaik Ansar

 

Abstract--

This paper presents the application of dynamic voltage restorers (DVR) on power distribution systems for mitigation of voltage sags, harmonics and imbalances at sensitive loads. The dynamic voltage restorer (DVR) has become popular as a cost effective solution for the protection of sensitive loads from voltage sags and swells. It would be advantageous that a DVR could also be used to compensate any steady state load voltage harmonics, since this would increase the Power Quality. The DVR, which is based on a five-level flying-capacitor voltage Source converter (VSC), has been proved suitable for the task of compensating voltage disturbances. The performance of the DVR depends on control technique involved. This paper presents the control system based on the so-called repetitive control. Unlike other control schemes with a comparable range of applicability, only one controller is needed to cancel out all three disturbances simultaneously, while exhibiting good dynamic performance. Simulation results are presented to illustrate and understand the performances of DVR in supporting load voltage. To evaluate the quality of the load voltage during the operation of DVR, Total Harmonic Distortion (THD) is calculated.


[Download Full Text Article]

Image description

Title : A NEW CONVERTER TOPOLOGY FOR HYBRID-ELECTRIC POWER PLANTS

Authors : A.Naveen kumar , Shaik Ansar, CH.V Ganesh  

 

Abstract

Environmentally friendly solutions are becoming more prominent than ever as a result of concern regarding the state of our deteriorating planet. This paper presents a new system configuration of the front-end rectifier stage for a hybrid wind/photovoltaic energy system. This configuration allows the two sources to supply the load separately or simultaneously depending on the availability of the energy sources. The inherent nature of this Cuk-SEPIC fused converter, additional input filters are not necessary to filter out high frequency harmonics. Harmonic content is detrimental for the generator lifespan, heating issues, and efficiency. The fused multi input rectifier stage also allows Maximum Power Point Tracking (MPPT) to be used to extract maximum power from the wind and sun when it is available. An adaptive MPPT algorithm will be used for the wind system and a standard perturb and observe method will be used for the PV system. A new Operational analysis of the proposed system will be discussed in this paper. Simulation results are given to highlight the merits of the proposed circuit.

 

[Download Full Text Article]

Image description

Title : COLOUR FACE RECOGNITION:A NOVEL  RECOGNITION METHOD 

Authors :Indu H Menon1, M.Ramesh2 & Punal M Arabi3

 

Abstract- 

This paper presents an novel approaches to the detection and recognition of human face and describes an efficient real time colour face recognition system which tracks a subject’s head and then recognizes the person by comparing local texture features of the face  to those of  know individual. This approach treats face recognition in different colour spaces other than RGB. We have implemented the face detection system using skin colour detection. To avoid the illumination problem and pose constraints in face recognition, two face descriptors are used,i.e., so called colour local Gabor wavelets (CLGWs) and local colour vector binary patterns(LCVBPs). These features are used along with eigen-faces for better recognition. The  framework provides the  ability  to learn to recognize in a unsupervised manner.

 

[Download Full Text Article]

Image description

Title : REVIEW ON TECHNOLOGY TO MEASURE SPEED OF CRICKET BALL AND BAT

Authors : Baljinder Kaur , Amandeep kaur

 

Abstract

Today, Cricket is a very popular game worldwide. Cricket is a bat and ball game played between two teams of 11 players on a roughly circular field. It involves a bowler, a batsman and fielders. The bowler bowls to the batsman and tries to get him out while the batsman tries to score and hitting a ball. In cricket two factors are too much important and these factors are hitting speed & bowling speed. In this paper we look at various techniques that have been used to propose in recent years to measures the speed of bat and ball in cricket. This paper gives introduction about cricket in section 1. Section 2 tells the various methods suggested to measure speed in cricket. Finally section 3 concludes the paper.

 

[Download Full Text Article]

Image description

Title : EDUCATIONAL ENVIRONMENTS AND WEB MINING

Authors : Quadri M N

 

Abstract-

At the present time, education environments have two types. These are traditional and virtual education environments. In both the area, one of the important problems is habit analysis and evaluation. In traditional education systems, habit analysis is done easily through observation techniques, whereas in virtual ones analyzing students’ attitudes and habits is a significant problem. Web mining applications, used in providing meaningful information from meaningless habits and surfing in web environments, is the way to overcome this problem. In this study, web mining applications in virtual education environments were formed in accordance with descriptive research method. In conclusion, how web mining is used in education environments was discovered.

 

[Download Full Text Article] 

Image description

Title : A NEW APPROACH FOR LOAD BALANCING IN CLOUD COMPUTING

Authors : S. Mohana Priya, B. Subramani

 

Abstract:

Cloud computing is built on the base of distributed computing, grid computing and virtualization. The eminence of the place of cloud computing in future converged networks is incontestable. It is due to the obvious advantages of the cloud as a medium of storage with ubiquity of access platforms and minimal hardware requirements on the user end. The scalability, high availability, load balancing, cost, performance are some major issues. Cloud computing environments provide scalability for applications by providing virtualized resources dynamically. Moving applications to a cloud computing environment triggers the need of scheduling as it enables the utilization of various cloud services to facilitate execution. In the proposed algorithm it uses the active monitoring load balancing algorithm and resource aware scheduling algorithm for improved resource utilization and scheduled load balancing for high performance in cloud systems. 

 

[DownLoad Full Text Article]

Image description

Title : COMPARISON OF XP AND SCRUM PROJECT MANAGEMENT TOOLS

Authors : *Heena, Raj Kumari

 

Abstract -

Abstract—A Software project varies in size depending upon the need. One of the aspect is to manage these projects i.e. Project Management. Various software’s /tools are available for managing the projects. This paper focuses on the comparison between tools for managing the projects based on Agile methodologies namely Scrum and XP(Extreme Programming).

 

[Download Full Text Article]

Image description

Title : INTEGRATION OF 2D SECURE BARCODE IN IDENTITY CARDS: WITH ADDITIONAL SECURITY FEATURES

Authors : Manisha Bajpai,  Arun Prakash Agrawal

 

Abstract – 

In this paper, we extend our previous approach to develop an ID card management system that integrated 2-dimensional Barcode which is responsible to produce secure and reliable identification cards. In our previous [1] work we made use of only photograph of the holder, in order to make it secure from being forged. This time we have extended our approach and it uses photo as well as signature and the identity documents of the holder of the ID card. In this extended approach the system will capture more information including photo and signature and will dynamically generate an image of 2D barcode containing the information provided and will affix this barcode image an ID card. This card will be used to validate and authenticate the holder. Main advantage of using 2D Barcode is its data encoding capacity, 2D Barcode is able to encode up to 500 bytes per square inch.

 

[Download Full Text Article]

Image description

Title : EMPIRICAL ANALYSIS OF CORRELATION BETWEEN C&K METRICS AND TESTABILITY

Authors : Jaspreet kaur,  Raj Kumari

 

Abstract--

Software quality is very crucial in the development of software systems.Software Metrics help in identifying potential problem areas and finding the problems in those areas decreases the cost. C&K metric suite is one of the well known and most popular metric suites known for measuring the design of object oriented programs. As we know that testing determines the conformance of the software’s implementation to its specification so it is one of the important phases in object-oriented systems. This paper focuses on the analysis of  the impact of  various C&K metrics on testing. 

 

[Download Full Text Article]

Image description

Abstract-

In this paper we suggest an efficient compression and encoding coding performance based on Integer multi wavelet transform of medical application. This method reduces the Mean Square coefficients and increases the peak signal to noise ratio in the code block due to the transmission purpose. By using this coding technique the compressed data and encoded  bit stream are all  suited for progressive transmission. By the experimental results show that the proposed algorithm gives better quality, if the images using integer multi wavelets compared to that of the other wavelets transforms. The parameter of the system has been evaluated based on Compression Ratio (CR), peak signal to noise ratio (PSNR) and mean square error (MSE).

 

[Download Full Text Article]

Image description

Title : HIGH SPEED MULTICAST DISTRIBUTION SCHEME FOR MOBILE ADHOC NETWORKS USING DATA MINING TECHNIQU

Author : 1G.vijay, 2E. Karthiga, 3I. Rajalakshmi

 

Abstract- 

To secure multicast communications, security services such as authentications data integrity, access control and group confidentiality are required   The proposed algorithm several key distributions approaches proposed multicast clustering is dividing the groups in to several sub groups ,an entity called Local Controller (LC) manage each subgroup which is responsible for local key management within the cluster. Thus ,after Join or Leave procedures ,only members with in concerned cluster are affected by re-keying process ,the local membership dynamism of a cluster does not affect the other cluster of the group This concept is established in This paper by using one of the Data Mining  Techniques Viz Clustering  

 

[Download Full Text Article] 

Image description

Title : THE TUNABLE PATH SELECTION BY USING ONION ROUTING NETWORK

Authors : 1M.Lakshmi, 2S.Amutha,3S.Saranya, 4T.Tamilmani

 

Abstract-

The Tor anonymous communication network uses self-reported bandwidth values to select routers for building tunnels. Since tunnels are allocated in proportion to this bandwidth, this allows a malicious router operator to attract tunnels for compromise. Although Tor limits the self-reported bandwidth, it uses a high maximum value, effectively choosing performance over high anonymity for all users. We propose a router selection algorithm that allows users to control the tradeoff between performance and anonymity. We also propose an opportunistic bandwidth measurement algorithm to replace self-reported values that is more sensitive to load and more responsive to changing network conditions. Our mechanism effectively blends the traffic from users of different preferences, making partitioning attacks difficult. We implemented the opportunistic measurement and tunable performance extensions and examined their performance both through simulation and in the real Tor network. Our results show that users can get dramatic increases in either performance or anonymity with little to no sacrifice in the other metric, or a more modest improvement in both.

 

[Download Full Text Article]

Image description

Title : COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

Authors : Mr.Upendra kumar Karheriya, Mr.Bharat raj pandey

 

Abstract-

Mobile ad hoc networks (MANET) represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self organize into arbitrary and temporary ad hoc network topologies. A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols designed to accommodate the needs of such self-organized networks do not address possible threats aiming at the disruption of the protocol itself. In this paper In this paper, we compare we compare and evaluate the performance metrics Ad-hoc On-demand Distance Vector (AODV) routing protocol, Ad-hoc On-demand Multipath Distance Vector (AOMDV) routing protocol. This paper investigates all these routing protocols corresponding to packet delivery fraction (pdf), end to end delay, Packet loss. The ns-2 simulation results showed that AODV has better performance compare to AOMDV routing protocol mobile ad-hoc network.

 

[Download Full Text Article]

Image description

Title : RAKE MANAGEMENT SYSTEM (RMS): OPERATIONAL ASPECT OF FREIGHT OPERATIONS INFORMATION SYSTEM (FOIS) FOR INDIAN RAILWAYS (IR)

Authors : Agarwal, Seema

 

Abstract: 

This paper explores need, development and main features operational subsystem of FOIS for IR which is called Rake Management system. It is a system for management and control of freight movement that also assists managers to optimize asset utilization. It has main advantage of providing real time data for wagons/ rake for proper decision making. The paper also explores advantages and certain shortcomings in the interface mechanisms and future integration with latest technologies.

 

[Download Full Text Article]

Image description

Title : OUTLIER TEST FOR CATEGORICAL DATA BY USING HYPERGRAPH DEVIATION COMPARISON

Authors : H. Venkateswara Reddy 2S. Viswanadha Raju 3B. Suresh Kumar 4C. Jayachandra

 

ABSTRACT

Outlier detection is one most important issue in recent years. Outlier detection is the process of detecting errors in data. The recent methods are mostly based on the Numerical data, but these methods are not suitable in real time data such as web pages, business transactions etc., which are known as Categorical data. It is difficult to find outliers in categorical data. In this paper, we propose an approach to find outliers that is Comparison of Deviations. In Comparison of deviation method, hyper graph is used to calculate the deviations of each object in the database. After comparing all deviations which are having most negative term that objects are treated as outliers. 

 

[Download full text article]

Image description

Title : AUTOMATED ASSESSMENT SYSTEM FOR SOURCE CODE

Authors : Sumeet H. Pardeshi,  Amit M. Morvekar, Hemkant B. Gangurde, Mahesh D. Gangod

 

ABSTRACT--

Generally programming contests are managed, monitored and judged manually which tends to be a major defect, thus leading contest to be more time consuming and complex to judge. The proposed project aims at developing a system wherein the participants can login to an online system and upload their codes and automated system will judge their programs. Judge aspect and Participant aspect are the two main views of system. Students can work on problem, compile their solutions and submit them to the online system. They will get the feedback about the code whether it is acceptable or specific error specifications if any. Judges can view the current status of code submission and rankings accordingly, which they can use to evaluate the work. Automated Assessment System for Source Code (AASSC) aims at providing fair evaluation of source codes be in programming contest, or online practical exams held as a part of university curriculum. Unlike other competitive products in market, which rank contest based on timing and number of submissions only, proposed system uses some benchmarking metrics for analysis of code and thus yielding a fair outcome.  Plagiarism by students is the biggest emerging threat which this proposed system tries to tackle. System aims at identifying the plagiarized source code, thus leading to a more fair evaluation and helping to improve the quality of programming among the students. 

 

[Download Full Text Article]

Image description

Title : VIGART APPLICATION TO ASSIST ASD CHILDREN

Authors : Miss A W. Chorey, Dr. A. D. Gawande

 

Abstract 

Children with Autism Spectrum Disorder (ASD) are often characterized by inadequacy in social communication skills. In recent time, many assistive technologies, particularly Virtual Reality, have been investigated to promote social. It is well known that children with ASD demonstrate atypical viewing patterns during social interactions and thus monitoring eye-gaze can be valuable to design intervention strategies. While several researchers have used eye-monitoring technology to track eye-gaze for analysis, there exists no real time system that can monitor eye-gaze dynamically and provide customized feedback. Researchers are increasingly employing technology to develop more feasible, accountable, and individualized intervention tools to address core vulnerabilities related to autism. The study states the development and preliminary application of a Virtual Reality (VR) technology aimed at facilitating improvements in social communication skills for adolescents with autism. Virtual Interactive system with Gaze-sensitive Adaptive Response Technology (VIGART) is capable of delivering individualized feedback based on a child’s dynamic gaze patterns during VR-based interaction. I present preliminary data from the usability study of this technological application for six adolescents with autism and discuss potential future development and application of adaptive Virtual Reality technology within an intervention framework.

 

[Download Full Text Article]

 

Call For Paper

VOLUME 06. ISSUE 04 [April 2017]

IJECS invites authors to submit manuscripts Reporting original engineering research, computer science , original article, research article, case report, systematic reviews, or educational Innovations for publication for the Current issues. Types of manuscripts suitable for IJECS include: Engineering Science, Computer Science, Educational Innovation, Brief Report, Reviews on Teaching In keeping with high quality scholarship

Read More

Online Submission

If any difficulty you can also submit to: This email address is being protected from spambots. You need JavaScript enabled to view it..in

ace.pngarx.pngcit.pngcomp.pngcross.pngdoaj.pngicn.pngino.pngres.pngresbib.pngsci.pngscic.pngscics.pngulrich.pngur.png

FaceBook

About Us

The“International Journal of Engineering  and computer science”(IJECS™) is an international online journal in English published monthly. The aim of IJECS is to publish peer reviewed research and review articles in rapidly developing field of engineering science and technology

Address

Address : 20 manglam vihar Mandsaur

State : Madhya Pradesh

Country : INDIA

Phone :+91 (777) 189 36 00

Email: editor@ijecs.in

Go to top