Eisa Bashier M. Tayeb, , A. Taifour Ali, Albager Alkhir H. Ali,
Extraction of Electrical Power Transformer Parameters
Eisa Bashier M. Tayeb, , A. Taifour Ali, Albager Alkhir H. Ali,
In this paper the VISUAL BASIC language is used to design an interactive program that helps in understanding of transformers theory, as well as demonstrating its internal construction, getting its operating characteristics and the equivalent circuit elements. The program helps in minimizing the computational time especially in case of complicated hand calculation and facilitates an easy way for explaining extracting the transformer parameters.
Comparative study of C, Objective C, C++ programming language
aurav Jindal , Pooja Khurana, Tanu Goel,
The C programming language was derived in the early 1970s as a system implementation language for the nascent UNIX operating system. It is derived from the type-less language BCPL. The extension in standard ANSI C i.e., adding concept of classes, object, etc developed a new language known as Objective-C. After few years C adapts some features of Objective-C and a language come into existence known as C with classes, later it is known as C++. This paper studies about the languages, influence of one language to another and comparative study of the languages.
An Explanatory Study of the Parameters to Be Measured From EMG Signal
Ruchika, Shalini Dhingr Shalini Dhingra
Electromyography (EMG) is the analytical study of electrical activity produced by skeletal muscles. EMG is an example of modern human computer interaction which can be used in the field of medicines and engineering. Through this paper we are going to discuss about standard parameters which can be used to analyse EMG-Surface EMG (SEMG) /surface scanning EMG signals because these parameters reflects the physiological activity of the motor unit. In this paper, we will also discuss the history of EMG, types of EMG, characteristics of EMG signal, muscles involved in movements of hand, parameters which are used to analyse EMG signal, variety of applications where EMG signals can be used. This paper will provide the researchers a good understanding of EMG signal and its analysis. This knowledge will help them to develop more powerful and efficient applications. Keywords— EMG (Electromyography), Muscles of Hand, Standard Parameters, Threshold Detection, Applications.
Analysis of Solar PV cell Performance with Changing Irradiance and Temperature Pradhan Arjyadhara1, Ali S.M2, J
Pradhan Arjyadhara, Ali S.M, Jena Chitralekha,
Solar energy is most readily available source of energy. It is Non polluting and maintenance free. To make best use of the solar PV systems the output is maximized either by mechanically tracking the sun and orienting the panel in such a direction so as to receive the maximum solar irradiance or by electrically tracking the maximum power point under changing condition of insolation and temperature. The overall performance of solar cell varies with varying Irradiance and Temperature .With the change in the time of the day the power received from the Sun by the PV panel changes. Not only this both irradiance and temperature affect solar cell efficiency as well as corresponding Fill factor also changes. This paper gives an idea about how the solar cell performance changes with the change in above mentioned factors in reality and the result is shown by conducting a number of experiments.
Iris Recognition based on Pupil using Canny edge detection and KMeans Algorithm
Chinni. Jayachandra, H.Venkateswara Reddy,
In eye authentication process, the pupil detection is most crucial step to recognize the eye. In eye, iris and sclera are used as the previous inputs using to recognize the eye with different mechanisms like segmentation combining with different versions. The inner edge in the eye is not a normal circle, which may create problem in accurate recognition. In segmentation process, if the image is having less texture then it leads to iris legacy. In this paper, we concentrate only on pupil to recognize the eye. To find the edges in the image we propose canny edge detection method, to reduce the noisy data in the image and detecting the edges. After detecting edges, those images are stored in CASIA database. Secondly, the K- means method is to identify the nearest pupil edge images from the database for the given input image. The results show that identifying pupil is better method to recognizing the eye and raising the recognition accuracy.
Malware Attacks on Smart Phone, Its Limitation & Evolution to Detect New Techniques
Miss Nita B. Thakkar Miss Dhara N. Darji,
We are currently moving from the Internet society to a mobile society where more and more access to information is done by previously dumb phones. As a result, mobile security is no longer immanent, but imperative. In this paper it shows the various ordinary attacks on Smartphone & the drawback of the techniques at the it show one way to detect the various kind of attacks
Recently the cloud computing has been gaining significant importance in almost all the fields. In this survey we discuss the limitations and opportunities of deploying data management issues on cloud computing platforms. A cloud database management system is a distributed database that delivers computing as a service. The various issues related to security that has to be offered by the Database as a service is studied. Various operations such as Scaling, provisioning, performance tuning, privacy and backup. This study also reveals about consistency rationing and various adaptive policies.
Subhro Paul, * SujaySarkar SurojitSarkar, Pradip Kumar Saha Gautam Kumar Panda
By Dynamic Voltage Restorerfor Power Quality Improvement
Subhro Paul, * SujaySarkar SurojitSarkar, Pradip Kumar Saha Gautam Kumar Panda
Voltage sag and swell is big problem in power system. Sensitive load has a severe impact on itself due to voltage sag and swell. Dynamic Voltage Restorer (DVR) is a power customed device used in power distribution network. Matlab is an advanced simulation software used for effective modelling and simulation of DVR. Compensation for the control of voltage in DVR based on dq0 algorithm has been discussed here. To appropriately control the control targets for compensation voltage control, firstly the power circuit of a DVR systrm is analysed. The design is simple. The Simulation results are carried out by Matlab/Simulunk to verify the performance of the proposed method.
Multiuser Channel Measurements For Wireless Localization
While transmitting information over multipath channels, multiple access interference cannot be easily eliminated. However, it is possible to design detectors that estimate the channel parameters accurately. The conventional detector may be unable to recover the transmitted information from the weaker users. The need for accurate parameter estimates in the presence of multiple access interference (MAI) has led the development of joint multiuser detectors/parameter estimators. These estimates are subsequently used for subscriber location estimation. Accurate and cost effective cellular localization would enable a diverse variety of new applications in the areas of tracking and tracing, access to emergency services, increased safety, monitoring, leisure, sports and entertainment. In this paper, the detector based on divided difference Kalman filter (DDF) algorithm in a closely spaced multipath fading channel is being investigated and analyzed for asynchronous direct-sequence (CDMA). The estimated delay is used to radio location purposes. The numerical analysis augmented by extensive simulations show that the proposed DDF based detector is simpler to implement, and more resilient to near-far interference in CDMA networks and is able to track closely spaced paths.
Similarity Analysis Of Images Using Content Based Image Retrieval System
S.Pavani , T.Venkat Narayana Rao, Deva Shekar,
The content based image retrieval (CBIR) is one of the digital image processing system. Most of the available image search tools are based on textual explanation of images. In these tools, images are manually annotated with keywords and then retrieved using text-based search means. This method would not produce promising results. The goal of CBIR is to extract visual features and display the required image. This paper aims to introduce the problems and challenges concerned with the design and the creation of CBIR systems, using SBIR. With the help of the existing methods, a possible solution how to design and implement a task specific descriptor, which can handle the informational gap among a sketch and a colored image, making an opportunity for the efficient search hereby. The results show that the sketch-based system allows users a shrewd access to search-tools. This technology can be used in several applications such as digital libraries, crime prevention, and photo sharing sites. Such a system has great value in apprehending suspects and identifying victims in forensics and law enforcement. A possible application is matching a forensic sketch to a gallery of mug shot images. This paper focus on retrieval of images based on the visual content of the query picture, which demands on the quite wide methodology spectrum on the area of the image processing.
N-Nodeset Importance Representative based Outlier Detection for Categorical Data
H.Venkateswara Reddy, S.Viswanadha Raju,
The proportionate increase in the size of the data with increase in space implies that clustering and hence outlier detection a very large data set becomes difficult and is a time consuming process. Sampling is one important technique to scale down the size of dataset and to improve the efficiency of clustering. After sampling, allocating unlabeled objects into proper clusters is impossible in the categorical domain. To address the problem, Chen employed a method called MARDL to allocate each unlabeled data point to the appropriate cluster based on NIR (Node Importance Representative) and NNIR (N-Nodeset Importance Representative) algorithms. This paper took off from Chen’s investigation and analyzed and proposed a method for outlier detection using NNIR by finding the resemblance between an unlabeled data point and a cluster. The cluster at which the unlabeled data point gives maximal resemblance is compared with the outlier threshold values to identify the data point appropriate cluster label or an outlier. This paper also proposed a method to find outlier threshold values for all the exiting clusters.
An effective and secure protection of sensitive information is the primary concerned in Communication systems or network storage systems. Never the less, it is also important for any information process to ensure data is not being tampered with. Encryption methods are one of the popular approaches to ensure the integrity and confidentiality of the protected information. However one of the critical vulnerabilities of encryption techniques is protecting the information from being exposed. To address these reliability problems, especially for large information content items such as secret images (satellite photos or medical images), an image secret sharing schemes (SSS) is a good alternative to remedy these types of vulnerabilities. With the rapid advancement of network technology, multimedia information is transmitted over the Internet conveniently. While using secret images, security issues should be taken into consideration because hackers may utilize weak link over communication network to steal information that they want. To deal with the security problems of secret images, various image secret sharing schemes have been developed. Because of the popular usage of images in network application in recent years, the way of sharing secret image has attracted wide attention. Noor and Shamir proposed first the idea of visual cryptography in 1994. The scheme provides an easy and fast decryption process that consists of Xeroxing the shares onto transparencies and then stacking them to reveal the shared image for visual inspection. The scheme which differs from traditional secret sharing does not need complicated cryptographic mechanisms and computations. Instead it can be done directly by the human visual system, without the aid of computers. However the generated noisy share may be suspicious to invaders and their scheme had 2n pixel expansion at best case. Visual cryptography scheme eliminates complex computation problem in decryption process, and the secret images can be restored by stacking operation. This property makes visual cryptography especially useful for the low computation load requirement. Iwamoto and Yamamoto in 2002, worked on an n-out-of-n visual secret sharing scheme for gray-scale images. They developed a secret sharing scheme that encodes grayscale images with a limited number of gray levels. The loss in the contrast is so large such that the recovered image is distorted. In other methods that construct a visual secret sharing scheme with a general access structure for plural secret images have been proposed .They have shown that most previous work of visual cryptography scheme for plural image suffered from the leak out of some information in each share about the other secret images of the scheme. The systems suffered from the deterioration of the image quality in addition to the weakness in the security and there are pixels R Yadagiri Rao International Journal Of Engineering And Computer Science 2:1 Jan 2013 (265-303) Page266 expansion step in all of method so needed some computation must be applied to reproduce the secret image. Taking limited bandwidth and storage into consideration two criteria pixel expansion and number of shares encoded is of significance. Smaller pixel expansion results in smaller size of the share. Encoding multiple secret images into the same share images requires less overhead while sharing multiple secrets. Meaningful shares avoid attention of hacker considering the security issues over the communication channels. To meet the demand of today’s multimedia.
*Er. Ravi Verma, Er. Manoj Kumar Khinchi, **Rajesh Saini,
A Secure Address Allocation Scheme for Wireless Area Distributed Communication Network
*Er. Ravi Verma, Er. Manoj Kumar Khinchi, **Rajesh Saini,
As deployed Grids increase from tens to thousands of nodes, Peer-to-Peer techniques and protocols can be used to implement scalable services and applications. The Address allocation model is a novel approach that helps the convergence of wireless network and Grid environments and can be used to deploy information service in Grids. A Deterministic peer serves a single Virtual Organization (VO) in a Grid, and manages metadata associated to the resources provided by the nodes of that VO. In our proposed research work we need to connect each other to form a peer network at a higher level. This paper examines how the proposed architecture can be used to handle membership management and resource discovery services in a multi-organizational Grid. A simulation analysis evaluates the performance of a resource discovery protocol; simulation results can be used to tune protocol parameters in order to increase search efficiency. As we know that data transmission by the electronic signals are growing very highly so the fault tolerance are making so difficult by performing the proposed address resolution scheme we can get the desired result in wireless area network
Signal Scrambling Techniques for PAPR Reduction in OFDM Systems
Maan Singh, Vijay Kumar,
In recent years, the communication industry has started focusing on fourth generation (4G) mobile communication systems. It is expected that 4G will provide a comprehensive and secure IP solution where voice, data, and multimedia can be offered to users at “anytime, anywhere” with higher data rates than previous generations. To improve spectrum efficiency and achieve as high as 100Mbps wireless transmission rate, 4G requires more advanced communication techniques to be employed. Multiple input multiple output (MIMO) and orthogonal frequency division multiplexing (OFDM) have, therefore, been adopted due to their superior performance. However, OFDM has few disadvantages; with the key one is high ratio of peak power of signal to average power is called peak-to-average power ratio; abbreviated as PAPR. It is preferred to have a minimum PAPR, as it will allow a higher average power to be transmitted for a fixed peak power; and thus, improving the overall signal to noise ratio at the receiver. Therefore, this paper investigates two signal scrambling techniques, namely, selected mapping (SLM) and partial transmit sequence (PTS) for the purpose of reducing PAPR. From the analysis, it is inferred that PTS method provides a better PAPR reduction performance compared to SLM method. However, the transmitter and receiver complexity is very high. Thus in practical applications, a tradeoff needs to be made between good performance and auxiliary information. It is also found that SLM algorithm is more suitable if system can tolerate more redundant information; otherwise, PTS algorithm is more acceptable when complexity becomes the first considering factor.
Large Swarms of Intelligent Robots can be used for a wide range of tasks. There exists a plethora of challenging applications in swarm robotics and they are emerging with technology and time. Swarm Robotics is a rapidly developing new emerging technology. Swarm Robotics has potential for a variety of challenging applications ranging from military environment, disaster relief, health care and other commercial applications. This paper deals with related domains of Swarm Robotics, their comparison and various emerging and challenging applications.
Optimize Security solution for mobile agent security: A Review
Sachin Upadhye, P.G.Khot,
The field of agents has many diverse researchers, approaches and ideas, which has helped to create one of the more dynamic research areas in recent years. Mobile agents are enjoying a lot of popularity and are destined to influence research in distributed systems for the years to come. Thus far, technology has been instrumental in disseminating new design paradigms where application components are not permanently bound to the hosts where they execute. Mobile agents are gaining in complexity as they evolve and are now widely used in e-commerce. All phases of a business transaction, such as negotiating and signing contracts can be done using mobile agents. In this paper, we provided a brief introduction to the recent researches & developments associated with the field of mobile agents, highlighting various security threats, also touching the weakest hot-spots of the field which need to be nurtured. This paper also focuses on the optimization of computation cost for agent platform, which appears due to complex security operations. Traditionally, a security manager is integrated within an agent platform, which performs these operations for every mobile agent visiting the platform. To reduce the security costs at the agent platform, a detached security manager is used, which performs complex security operations on behalf of multiple agent platforms. The paper is structured as follows. Section 1 Introduction to multi agent system and security. Section 2 briefly describes the characteristics of agents and Security Services. In section 3 we will discuss some security threats and countermeasures and in last section describes some recent research aimed at enhancing the security of mobile agent systems
Manufacturing capacity building baseline survey on Small to Medium Enterprises (SME’s) : A case study of Hire Engineering Co. in Zimbabw
Kumbi Mugwindiri, IgnatioMadanhire,
This study was undertaken to investigate the aspects to be considered in coming up with manufacturing capacity building baseline for Small to Medium Enterprises (SMEs) firms in the engineering production field. The various competencies, skills and framework required has been highlighted for possible meaningful production of this sector. The enhancing industry policy to spearhead this has been suggested to grow such businesses from the equipment provision and operational point of view.
This research study highlights energy savings that could be realized in an organization through various energy management options to reduce energy expenditure through efficient use of available energy resources.Energy audits were done as reference point for monitoring progress of measures put in place. It also reveals many opportunities for savings in coal usage, steam utilization and correction of electrical power factor. At the same time conserving the environment by reducing emission of greenhouse gases which pollute the environment.