Review: Performance Estimation of Best Ad Hoc Routing Protocol with Trust Mechanism in MANET
Anil Kumar , Gaurav Banga
A MANET is a type of ad-hoc network that consists of wireless mobile nodes communicates with each other without using wires, a fixed infrastructure, central administration and which establishes route from source to destination. In Mobile Ad-hoc Network (MANET), each node can freely move in any direction and every node also act as router as they forward traffic for other nodes. So, various routing protocols such as AODV, DSR, DSDV and OLSR are designed for routing in ad-hoc networks. This paper analyzed the literature of routing protocols which are discussed by comparing the various routing protocols on the basis of different schemes.
Image fusion is to reduce uncertainty and minimize redundancy. It is a process of combining the relevant information from a set of images, into a single image, wherein the resultant fused image will be more informative and complete than any of the input images. Till date the image fusion techniques were like DWT or pixel based. These conventional techniques were not that efficient and they did not produced the expected results as the edge preservance, spatial resolution and the shift invariance are the factors that could not be avoided during image fusion. This paper discusses the implementation of two categories of image fusion. The Stationary wavelet transform (SWT), and Principal component analysis (PCA). The Stationary wavelet transform (SWT) is a wavelet transform algorithm designed to overcome the lack of translation-invariance of the discrete wavelet transform (DWT). Whereas The Principal component analysis (PCA) is a statistical procedure that uses an orthogonal transformation to convert a set of observations of possibly correlated variables into a set of values of linearly uncorrelated variables called principal components. To overcome the disadvantages of the earlier techniques used for image fusion a new hybrid technique is proposed that works by combining the SWT and PCA i.e. stationery wavelet transform and principal component analysis. This hybrid technique is proposed to obtain a better efficient and a better quality fused image which will have preserved edges and its spatial resolution and shift invariance will be improved. This hybrid technique will produce better fusion results. The image obtained after fusion using proposed technique will be of better quality than the images fused using conventional techniques.
Mr. Nithin Kumar , Ms. Nidhi K N , Mr. Sachin Acharya T
A Survey on SDN: An Unprecedented approach in Networking
Mr. Nithin Kumar , Ms. Nidhi K N , Mr. Sachin Acharya T
Software Defined Networking (SDN) is an emerging architecture in the field of networking in which the control plane and forwarding plane of traditional networking devices (e.g. Switches, Routers) are decoupled. The network-wide traffic flow can be directly programmed. SDN plays an important role in today’s enterprises and applications with drastically changing requirements which are monitored and adapted by the change in traffic flows through the networking devices. This survey paper on SDN provides an outline on the standard communication interface, characteristics of SDN and the pros and cons that are associated with SDN architecture.
Gesture recognition and pattern recognition are advancing at an exponential rate in the passing years. Hand gesture recognition has been a fascinating research area. Hand gesture recognition system provides us a novel, natural, innovative user friendly way of communication with the computers. Gesture recognition has varied area of application including human computer interaction, sign language, game playing etc. Hand gesture recognition have enormous in human computer interaction and robotic machineries. Today interfaces between human and computer are mouse and keyboard are but in near future hand and eye gestures would replace it. Through this application we can identify the number of fingers of our hand. We can trigger on event using predefined gesture scenarios. Hand gesture recognition also provides a low cost interfaces device for interacting with objects in virtual environment using hand gestures. Keywords: Event triggering, Hand Gesture Recognition, OpenCV, HCI(Human Computer Intraction).
The dropped-call rate (DCR) is the fraction of the telephone calls which, due to technical reasons, were cut off before the speaking parties had finished their conversational tone and before one of them had hung up (dropped calls) This fraction is usually measured as a percentage of all .CDR is defined as the ratio of abnormal disconnect of calls to total calls established. The performance of a TSP relating to call drop is assessed through this parameter. The benchmark set by TRAI for CDR is <2%.Since the CDR for the service area as a whole does not reveal the extent of number of areas or localities where the CDR is poor, the Authority is monitoring another parameter called “Worst affected cells” in which the call drop rate exceeds 3% during cell busy hour, averaged over a month for a service area ” provides a much more localised view of the network. In this paper we have suggested a forced handoff method (Directed Retry)for cells going down due to weak transmission plan or other reason to reduce call drops
Image Compression using Multilayer Feed-Forward Artificial Neural Network with Levenberg Marquardt.
Mr. Gade M.R, Asst. Proff. Deshpande A.S
This paper presents a neural networks as image processing tools for image compression, present a direct solution method based neural network for image compression. Digital images require large amounts of memory for storage. Thus, the transmission of an image from one computer to another can be very time consuming. By using data compression techniques, it is possible to remove some of the redundant information contained in images, requiring less storage space and less time to transmit. To observe and compare the different algorithms of image compression and Levenberg marquardt is best as compare to other algorithms.
On the Underlying Mathematical and Quantum Structures of Quantum Cryptography
Ajey Dilip Gotkhindikar
Quantum cryptography is a novel approach to provide secure communication, based on the laws of physics. It offers perfect security for the communication between two authorized parties, while assuming very high computational capacity for the eavesdropper, who may be attempting to intrude into this communication. It provides a very high rate of intrusion detection as against the classical systems. Classical cryptography is built on a fundamental assumption that it is difficult to invert some of mathematical functions, in a limited time, with the use of efficient computing resources. While, quantum cryptography is based on formidable laws of nature, making it less prone to attack. With the advent of quantum computing, boundaries between various subjects like quantum physics, computer science and mathematics are getting reduced. In the early seventies, Steven Wiesner made pioneering efforts in the field Quantum Cryptography. In its present form, Quantum Cryptography depends on two essential principles of Quantum Mechanics. One is that no information is available without causing disturbance in the system and other is Principle of No-Cloning. In this paper we present some of fundamental aspects of Quantum Cryptography and the underlying structures that makes it a credible option for providing perfect security of information
Classification Study of Sound and Image Events Using Event Detection Systems
DR. G.Murugaboopathy , R.Rajan
For intelligent systems to make best use of the audio modality, it is important that they can recognize not just speech and music, which have been researched as specific tasks, but also general sounds in everyday environments. To stimulate research in this field we conducted a public research challenge: the IEEE Audio and Acoustic Signal Processing Technical Committee challenge on Detection and Classification of Acoustic Scenes and Events (DCASE). In this paper, we report on the state of the art in automatically classifying audio scenes, and automatically detecting and classifying audio events. We survey prior work as well as the state of the art represented by the submissions to the challenge from various research groups. We also provide detail on the organization of the challenge, so that our experience as challenge hosts may be useful to those organizing challenges in similar domains. We created new audio datasets and baseline systems for the challenge; these, as well as some submitted systems, are publicly available under open licenses, to serve as benchmarks for further research in general-purpose machine listening.
Anushree Priyanka Baviskar, Pooja Dalimbe , Sneha Dhaswadikar4, S V Athawale
Defence Mechanism to Mitigate DDoS Attack For Wireless LAN
Anushree Priyanka Baviskar, Pooja Dalimbe , Sneha Dhaswadikar4, S V Athawale
In today’s world one of the major challenge to defense against Distributed Denial of Service (DDoS) Attack. We cannot completely avoid DDoS attack but we can reduce the DDoS attack. In IP traceback schemes, the victim can identify the sources of an attack and can block them. However, these methods react to the attack once it is completed. This means the critical resource of the victim already have been consumed by the attacker and reached the goal of blocking the access to the victim. To overcome this problem of existing IP traceback scheme, defense mechanism against DDoS flooding attacks have been proposed based on existing Deterministic Flow Marking (DFM) IP traceback method. The fundamental issue worried with discovery frameworks is IP spoofing. This paper proposes a bundle marking plan which checks the data into IP header field of the packet to beat the issue of IP spoofing. The marked data is utilized to remake the IP location of the entrance router joined with the attack source at the distinguishing end. The work is sent in the programmable router progressively and the attack source recognition systems are completed. It will improve the performance of the legitimate traffic.
GIS Based Application in Education for Aurangabad city
Pathan Amin khan B.
Education is the basic fundamental of any country. The purpose of this paper is to examine the different categories of schools in Aurangabad city, Maharashtra, India. It checks the compatibility of GIS with education facilities. We classified four different categories of schools in Aurangabad city, mapped them using Google Earth and KML. The categories of schools are classified on medium of the schools. We traced these all schools with their exact longitude and latitude and detail information about the particular school is also shown using Google Earth API. In this paper some management levels are used by assigning some random points anywhere in Aurangabad city. Due to that people get the best schools information from that random point which is nearer. We have assigned some ranking to the schools according to their facilities, infrastructure, admission status, outcome etc. So the people can see covered area about the particular school and area where actual schools are required.
Feature Extraction of Linear Objects from Remote Sensing Image (RSI) Using Gradient Filters
Dr. S. Murugan
Extraction of linear features from Remote Sensing Image (RSI) has found many applications as in urban planning, disaster mitigation and environmental monitoring. There were many previous studies in this field appreciating the significance of statistical operators to extract linear features. But in RSI domain, it has a different significance as it involve handling a large data set of multiband data involving complexities in terms of spectral, spatial and temporal domain. Most of the objects in nature were not easily discernable and extracted as they were often contaminated or mixed with other objects and might influence the spectral character of the object. This may be less in urban environment as they exhibit more or less uniform spectral behavior where as in natural setting it may exhibit complex spectral behavior. Present study demonstrates such complexities in extracting linear features in different setting – urban and coastal area – using first order derivative gradient filters.
Association Rule Classification based on Multi-Dimensional Data Cubes
Dr. K.Kavitha .
Data mining facilitates the discovery of unrevealed trends from huge datasets. Data warehouse is a key technology for complex data analysis automatic knowledge extraction and decision making. Multi-dimensional database permits the data for efficient and appropriate storage. The dimensional table holds all different attributes and dimensions. Detecting the hidden association between the items are limited in OLAP. Researchers have proposed many ideas to reduce the limitations. This paper presents an approach called Association rule classification for Multi-Dimensional dataset. This proposed work detects the hidden association form OLAP and also categorize the rule sets effectively.
Poonam P. Bhamare , Prof. Prakash P. Rokade, Prof. Devyani P. Bhamare
Message Communication A New Approach
Poonam P. Bhamare , Prof. Prakash P. Rokade, Prof. Devyani P. Bhamare
With the increase in smart phone users and communication through messaging. In all smart phones there are various applications (apps) which can be used for communication with each other. But many of these apps are sending text data in plain text format through network. When using such apps in a public Wi-Fi network, anybody can able to sniff incoming and outgoing messages. Data compression is a common requirement for most of the computerized applications. There are number of data compression algorithms, which are dedicated to compress different data formats. Even for a single data type there are number of different compression algorithms, which use different approaches. Mobile communication devices have become popular tools for gathering and disseminating information and data. This paper proposes an efficient data compression technique by doing some modification to Huffman Coding. The aim of this paper is to compress data to send through Android based mobiles to optimize bandwidth.
Malayalam Character Recognition using Discrete Cosine Transform
Saidas S. R., Rohithram T, Sanoj K. P
This paper describes a feature extraction method for optical character recognition system for handwritten documents in Malayalam, a South Indian language. The scanned image is first passed through various preprocessing stages of operations like noise removal, binarization, thinning and cropping. After preprocessing projection profiles of each character is found. 1- D Discrete Cosine Transform (DCT) of projection profiles used as a feature. A multilayer artificial neural network (ANN) with logsig activation function is used for classification. The promising feature of the work is that successful classification of 44 handwritten characters.
Modern knowledge bases contain huge data with complex relations between the attributes. From these sort of databases obtaining satisfactory results is troublesome task. Use of traditional predefined query interfaces during this sort of databases doesn't provide satisfactory results. projected system generates query interface forms with user participation. User will provide feedback by click through therefore capturing user’s preference. Query form is adaptive since it dynamically refined until user gets satisfactory results.
Control algorithm for SISO case using F O S with modeling in Simulink
Mr. Arunkumar G. , Dr. T.C.Manjunath
Vibration control plays a very important role in the modern day world especially in control of earthquakes & in aerospace engineering. With reference to this, research is being carried out in this exciting field of smart intelligent structures. Control of vibrations in smart intelligent structures for a single input single output case using fast output sampling method is presented in this paper using the modeling done in Matlab-Simulink environment. The model is run & the simulation results are observed on the scopes. The simulation results show the effectiveness of the method presented in this paper, how the vibrations are suppressed in a shorter time.
Smart Power Generation Using Radio-Frequency Waves
Mrs.A.Sudha, M.P.Vishnu, R.Deepan, M.Ra
The aim of our project is to analyze the amount of power that may be harvested from the encircling surroundings and processed to realize levels of energy that are sufficient to charge up low power electronic circuits and devices. Radio-Frequency energy gather holds a promising future for energizing low power electronic devices in wireless communication circuits and Extended for top power necessities. This project presents RF energy gather system that may harvest energy from the close surroundings at the downlink frequency vary of GSM-900 and GSM-1200 bands. Energy gather may be key techniques that may not be overcome the barriers that forestall the important world preparation of wireless Sensor networks (WSNs). Specially, solar power gather has been unremarkably wont to overcome this barrier. We tend to develop an RF energy gather WSN Circuit to indicate the effectiveness of RF energy gather for the usage of a WSN. The RF energy gather technique is effective in long amount measure applications that don't need high power consumption
Sensorless Sensing with WiFi device free human detection
M.Prashant, Ramesh Krishnan
Can WiFi signals be used for sensing purpose? The growing PHY layer capabilities of WiFi has made it possible to reuse WiFi signals for both communication and sensing. Sensing via WiFi would enable remote sensing without wearable sensors, simultaneous perception and data transmission without extra communication infrastructure, and contactless sensing in privacy-preserving mode. Due to the popularity of WiFi devices and the ubiquitous deployment of WiFi networks, WiFi-based sensing networks, if fully connected, would potentially rank as one of the world’s largest wireless sensor networks. Yet the concept of wireless and sensorless sensing is not the simple combination of WiFi and radar. It seeks breakthroughs from dedicated radar systems, and aims to balance between low cost and high accuracy, to meet the rising demand for pervasive environment perception in everyday life. Despite increasing research interest, wireless sensing is still in its infancy. Through introductions on basic principles and working prototypes, we review the feasibilities and limitations of wireless, sensorless, and contactless sensing via WiFi. We envision this article as a brief primer on wireless sensing for interested readers to explore this open and largely unexplored field and create next-generation wireless and mobile computing applications.
A Novel Topology for Network Intrusion Detection with Anomaly Detection
1M.Prashant, 2Ramesh Krishnan
Intrusion detection has become an essential element of network administration thanks to the huge range of attacks persistently threaten our computers. Ancient intrusion detection systems area unit restricted and do not give a whole resolution for the matter. They look for potential malicious activities on network traffics; they generally succeed to search out true security attacks and anomalies. However, in several cases, they fail to observe malicious behaviors (false negative) or they fireplace alarms once nothing wrong within the network (false positive). Additionally, they need thorough manual process and human professional interference. Applying data processing (DM) techniques on network traffic information may be a promising resolution that helps develop higher intrusion detection systems. Moreover, Network Behavior Analysis (NBA) is additionally associate degree effective approach for intrusion detection. During this paper, we tend to discuss DM and NBA approaches for network intrusion observation and recommend that a mix of each approach has the potential to detect intrusions in networks additional effectively.
Provable Data Possession at Untrusted Cloud Storage server
Mr. Vitthal Raut , Prof. Dr. Suhasini
Cloud computing is an upcoming technology, which offers various services. The services include infrastructure, platform or software services. The service provided by the cloud is over the internet. In the Cloud, the services are available quickly. The cloud has high demand in the market. Most of the organisation or user prefers their storage as on cloud storage and which is located at the remote place. The user has no control over the cloud storage data. The cloud computing uses the resources like Memory, storage and processor, which are not physically present at the user's location, rather they are located outside the premises and managed by a service provider. The user can access the resources via the Internet. The main focus of this paper is to check data integrity of file which is stored on remote cloud storage with less communication overhead.
Efficient Instant Fuzzy Search With Proximity Ranking And Query Logs
Prof. Sushilkumar N. Holambe, z Bhagyashri
Instant fuzzy search is important developing technique from which users can find results character by character with better search experiences. The results must have high speed, good relevancy score and also good ranking functions used to get top results. Many functions are used to consider proximity of keywords which ultimately gives good relevancy score. In this paper, proximity information is used to ranking query results with which gives good time and space complexities. Many previously proposed techniques are used to achieve proximity ranking into instant fuzzy search. Most of the techniques firstly compute results and rank then according to some ranking functions, but if the dataset used is large then it takes time to compute all results and its very time consuming. At this state early termination technique is used to minimize space and time complexity. In this paper, incremental computation algorithm is used to overcome all drawbacks of previous systems and compute relevant results. Also query logs are used which are very useful for most of query suggestion systems, which ultimately reduces time complexity efficiently. The experimental results are computed to show space, time complexity and quality of results.
Convective heat transfer in Water Functionalized Carbon Nanotube Flow past a Static/Moving wedge with heat source/sink
G.Venkataramanaiah, Dr.M.Sreedhar Babu
“The MHD flow and convective heat transfer from water functionalized CNTs over a static/moving wedge in the presence of heat source/sing are studied numerically. Thermal conductivity and viscosity of both single and multiple wall carbon nanotubes (CNTs) within a base fluid (water) of similar volume are investigated to determine the impact of these properties on thermo fluid performance. The governing partial differential equations are converted into nonlinear, ordinary, and coupled differential equations and are solved using bvp4c Matlab solver. The effects of volume fraction of CNTs and magnetic and wedge parameters are investigated and presented graphically. The numerical results are compared with the published data and are found to be in good agreement.
In the contemporary era, Data is the most valuable resource that is used in day to day life from an individual to large organizations. Database contains useful and confidential information so it becomes necessary to protect it from any unauthorized access. Any unauthorized user can try to perform unauthorized activities at unauthorized time on sensitive data. So to prevent the database from any misuse, different security mechanisms are applied to the database to make it secure. This paper focuses on the challenges and security mechanisms in database.
Analysis of PV Cell-based DG involving Improved Power Quality Converter for voltage control
P. Velmurugan* , B. Baskaran and G. Iru
The research investigated the impact on the power system with an extensive penetration of photovoltaic (PV) generation. A model of PV generation suitable for studying its interactions with the power system was developed. The dynamic response of a PV generation system to rapid changes in irradiance was investigated. An aggregated model of grid-connected PV generation was built, and it was used for simulating the integration of PV generation on a large-scale. Voltage control technique was investigated by simulation. Distributed Generation (DG) units are connected to the grid increasing nowadays for several reasons. Most DG units are relatively small and connected to the distribution network. A large part of the DG units connected to the grid via power electronic converters. The main task of the converters is to convert the power that is available from the prime source to the correct voltage and frequency of the grid. The general objective of this paper is to investigate how the power electronic converters can support the grid and solve power quality problems. An IEEE-5 bus system considered for this work to validate the power electronic converter using MATLAB/ Simulink.
Performance analysis of Very Sparse Matrix Converter using ECSVM method
R. Natarajan*, B. Baskaran and G. Irus
Matrix converters are frequency converters which do not contain a direct current link circuit with passive components, unlike conventional frequency converters. Thus, matrix converters may provide a solution for applications where large passive components are not allowed, or a purely semiconductor-based solution provides an economically more efficient result than conventional frequency converters. The matrix converter (MC) is an alternative AC-AC power converter by connecting the direct input to output phases through bidirectional switches and without using any dc-link or energy storing element, therefore, is called an all-silicon converter. Two topologies of matrix converter are established such as linear topology and the indirect topology. This paper is devoting to presents the topology of the Very Sparse Matrix Converter (VSMC). The article is focused on Easy Commutation Space Vector Modulation (ECSVM) modelling applied to the very sparse matrix converter (VSMC).
Valuable information can be hidden in images, however, few research discuss data mining on them. Image retrieval means searching, browsing and retrieving images from image databases. There are two different methodologies for image retrieval i.e. text based image retrieval and content based image retrieval. Former one is obsolete. In latter one many visual features like texture, size, intensities, and frequency of pixels and color of image are extracted. In query-by-example search extracted featured are compared with stored ones. In this work an efficient for extracting image features is considered using intensity histogram of gray color image. Here in this general framework based on the decision tree for mining and processing image data. Pixel wised image features were extracted and transformed into a database-like table which allows various data mining algorithms to make explorations on it. Finally results of average gradient vectors are to be compared with previously stored one dimensional array of intensities to find similarities in image data.
A Robust and Oblivious Watermarking Method Using Wavelet Transform and Genetic Algorithm
Dr. K. Ramanjaneyulu, K.S.S. Manasa, G.
Watermark is embedded by modifying the third level mid frequency coefficients of the host image with multiple SFs. As many combinations of SFs are possible, it is difficult to obtain optimal solutions by trial and error method. Hence, in order to achieve the highest possible transparency and robustness, optimization of the scaling factors is necessary. This task employs Genetic Algorithm (GA) to obtain optimum SFs. GA can search for multiple solutions simultaneously over a wide range, and an optimum solution can be gained by combining the obtained results appropriately. The aim of the task is to develop an optimal watermarking technique based on DWT domain for grey-scale images. In this paper, a robust and oblivious image watermarking algorithm using maximum wavelet coefficient modulation is proposed. Simulation results show that performance of the proposed method is superior in terms of Peak Signal to Noise Ratio (PSNR) and Normalized Correlation Coefficient (NCC).
Recent Developments on Nanotechnology In Solar Energy
S. Bhrath Raghav, V. Dinesh
One of the biggest challenges for mankind in the century of 21 is use of alternative sources for nonrenewable, limited fossil fuels that tremendously contribute on the problem of global warming. In this challenge, solar energy production is rapidly becoming a vital source of renewable energy being developed as an alternative to traditional sources of power. For improving the efficiency of solar devices various approaches was intended but nanotechnology, a combination of chemistry and engineering, is viewed as new candidate for clean energy applications. Nanotechnology will bring significant benefits to the energy sector, especially to energy storage and solar energy. Improved materials efficiency and reduced manufacturing costs are just two of the real economic benefits that nanotechnology already brings these fields. This paper reviews recent advances on development of nanotechnology in the solar energy devices. Special emphases are given to solar cells based on nanostructure and nanodevices.
Determination of cloud adoption factor and Subordinate Virtual Cloud mechanism to overcome the performance issues in bigdata
Krishnamoorthy.V Guhan.A,Jai V
--Any large unstructured data sets with sizes beyond the ability of the software tools to manage and process within a tolerable elapsed time is rightly observed as bigdata. Cloud computing is delivery of on demand computing resources from application to data center over internet. Combining these two strong reliable platforms helps in tackling extraveneous real time problems and obtaining solutions for it. Cloud embedded bigdata supports inexpensive reliable storage and tools for analyzing structured and unstructured, semi streaming, click streaming and various types of data. The existing system tends to be more costlier because of cloud deployment costs and it is not elastic in nature. The subjective nature of cloud delivery to incoming data streams pulls back the efficiency of the system. The paper aims to minimize the cost for cloud adoption by determining the cloud adoption factors from Net present value computation and derives a mathematical expression for ‘α’(Cloud adoption factor). It also addresses the issues that affect the performance issues of bigdata by implementing subordinate virtual cloud mechanism to overcome the addressed bottlenecks.
Overcoming Circumstances Caused by Jammer Using Time Interval / Sampling Method
D. Dhayalan R. Preethi
The timing pathway is a fully-organized pathway for exchanging the ideas in which they are encoded by the timing within events. Absolutely, whilst a jammer has the power to disorganize the data gathered in the stormed packets. Timing data is not able to be jammed. As long as on a blocked pathway the data can deliver to the acceptor and achieve their results. The transmission located in the wireless midway is determined by the familiar attack called as jamming attack. Below this attack, because the knot join with the jammer have contrary interests, their communications can be designed by the method of game theory.
Correspondingly, in this summary a game theoretic imitation of the interplay among nodes with the help of timing pathways to attain flexibility to jamming intrusion along with a jammer copied and guessed. Especially, the Nash equilibrium is analyzed in some kinds of time period, singleness, and merging below best response dynamics. Moreover, the case in whatever the interacting nodes decide their plan of action join with the jammer respond correspondingly is designed and estimate as a stackelberg game, by in the view of a pair the perfect and imperfect acquaintance of the jammers efficiency function. It will show the collision of network framework on the arrangement performance.
Powering Nation means developing nation as powerful nation. It depends on energy. Energy is the chief gauge of all of categories work done by human beings and nature. Energy sources are of two genuses there are renewable and non-renewable. Examples of renewable sources are solar, wind, hydropower, tidal hydropower and geothermal energy. These are generally sustainable and environmentally friendly. Non-renewable sources are extracted or created after considerable damage to the environment. Examples are coal, petroleum, natural gas and nuclear power. Geothermal energy is an unimpeded source of energy and is available from earth crust. Maneuver of geothermal energy resource is a swap resource for conventional energy resources. Geothermal energy is a clean energy resource. It not only produces electricity but also has many applications like space heating, drying, industrial processes. In USA and New Zealand the usage of geothermal energy is very high. In India the convention of geothermal energy is in burgeoning juncture.
The rapidly advancing mobile communication technology and the decrease in costs make it possible to incorporate mobile technology into Smart Home systems. We propose a mobile and internet based Smart Home system that consists of a mobile phone with android capabilities, an internet based application, and a home server. The home appliances are controlled by the Arduino which receives commands from the server computer, which operates according to the commands received from the mobile application via the wireless network or the internet. In our proposed system the home server is built upon a Wi-Fi technology which receives commands from the client and the command is processed via Arduino, which allows a user to control and monitor any parameters related to the home by using any Andriod capable smart phone or via the internet. This paper presents an innovative low cost design and implementation of automated control based on weather conditions, appliance control, and, home security together with the design of android application to enable the smart phone to send commands and receive alerts through the server based system.
The data security in cloud is an important issue. The important data can be stored in cloud and the security of that data is totally dependent on cloud. The data might be uncovered by the malicious third party user because of wireless connection between client and cloud without proper authentication and protection. In this paper we figure out the different security issues with the cloud . When the data is stored in cloud the data should be properly managed and cloud have to provide a proper security to the data. In this paper discussing the different type of issues with the cloud and also possible policies are mentioned here that we can take care of those issues while discussing about the security provided by the cloud.
Virtual Dressing Room Implementation Using Body Image –Clothe Mapping
Ahmad al -Qerem
with recent advance in web technology, many online shopping websites have been emerged. Despite its advantages, however, online shopping presents certain drawbacks. One drawback is that it may be difficult for a person to visualize how a given article would look if worn by that person-owing to the rich variation in body size and shape, hair and skin color, etc., in the human population. Testing the fitness of clothes is highly important for both customer and trader. Our approach concentrate on how the selected garment fitted the user’s body and how it will be appear as if he/she in real world. This was carried out by identifying critical points on garment and user’s body dimensions using image processing techniques. In this paper, an application for mitigating the virtual dressing room was designed, implemented and tested.
Nishita Agrawal, S.S Mungana, Dr. Prashant W. Nemade
Application of Multi-Atlas Segmentation in Image Processing
Nishita Agrawal, S.S Mungana, Dr. Prashant W. Nemade
Multi-atlas based method is commonly used in image segmentation. In multi-atlas based image segmentation, atlas selection and combination are considered as two key factors affecting the performance. Recently, manifold learning based atlas selection methods have emerged as very promising methods. However, due to the complexity of structures in raw images, it is difficult to get accurate atlas selection results only measuring the distance between raw images on the manifolds. Although the distance between the regions to be segmented across images can be readily obtained by the label images, it is infeasible to directly compute the distance between the test image (gray) and the label images (binary). Here is a small try to solve this problem by proposing a label image constrained atlas selection method, which exploits the label images to constrain the manifold projection of raw images. Compared with other related existing methods, the experimental results on prostate segmentation showed that the selected atlases are closer to the target structure and more accurate segmentation were obtained by using our proposed method.
We present a multi-atlas-based framework for accurate, consistent and simultaneous segmentation of a group of target images. Multi-atlas-based segmentation algorithms consider concurrently complementary information from multiple atlases to produce optimal segmentation outcomes. When segmenting a group of target images, most current methods consider these images independently with disregard of their correlation, thus resulting in inconsistent segmentations of the same structures across different target images.
Design of Instruction Fetch Unit and ALU for Pipelined RISC Processor
Sarika U. Kadam1, Samadhan D. Mali2
Pipelining is a concept which improves the performance of processor. A five stage pipelined RISC processor has stages as instruction fetch, decode, execute, memory, write back. RISC has a simpler and faster instruction set architecture. The aim of paper is to design instruction fetch unit and ALU which are part of RISC processor architecture. Instruction fetch is designed to read the instructions present in memory. ALU is in the execution stage of pipelining which performs all computations i.e. arithmetic and logical operations. Xilinx 8.1i is used to simulate the design using VHDL language
Mrs. Y. Asina begum Mrs. G. Deepalakshmi M.Sc., M.Phil,
Improving The QOS In MANET Using Dynamic Efficient Power Consumption Based Congestion Control Scheme
Mrs. Y. Asina begum Mrs. G. Deepalakshmi M.Sc., M.Phil,
: The Mobile Ad hoc Networks are considered as a new paradigm of infrastructure-less mobile wireless communication systems. Routing in MANETs is considered as a challenging task due to the unpredictable changes in the network topology, Nodes can dynamically join and leave the network without any warning and All nodes in network are energy dependent and efficient energy utilization is one of the important criteria in MANET. In this research work, propose the Dynamic Efficient Power Consumption Congestion Control Scheme (DEPCCCS) for congestion control and improving the quality of service in mobile network. The dynamic behavior of network connection is not maintained for long time. In a mobile network nodes are not aware about their energy status, some situation routing packets are consumes more energy. In this paper, the DEPCCCS is incorporated in the routing protocol to reduces that possibility of destination finding by maintain the record of location of each node in network respect to wireless base station is used. The central base station stores locations of the mobile nodes in a position table. The proposed protocol dynamically calculates every nodes energy status and their current location and speed for the minimum energy consumption for mobile nodes. And also the proposed scheme presents congestion control and power consumption.By simulation results, shown that our proposed technique attains better delivery ratio and throughput with less delay and energy consumption when compared with the existing technique