Muthu Subramanian. V, Ram Venkat Srikar Reddy. B, Ramakrishnan. M, Infant Arockia Raj. M
Optimal PID Controller Designing for Uncertain Bioreactor Using BFO Algorithm
Muthu Subramanian. V, Ram Venkat Srikar Reddy. B, Ramakrishnan. M, Infant Arockia Raj. M
— Bioreactor plays major role in chemical, biochemical and pharmaceutical industries. The final product quality in a bioreactor depends mainly on the control system employed to supervise and regulate the process. In this article, modified Bacterial Foraging Optimization (BFO) algorithm supported PID controller design is attempted for the bioreactor operating at unstable steady state region. Weighted sum of multiple objective functions is considered as the cost function, which directs the BFO algorithm to find the optimal controller parameters. In this work, an uncertainty of ± 10% is assigned in the process model constraints such as process gain (K), time constant (τ) and delay time (θ). The BFO algorithm based search finds the minimal and maximal values of controller parameters such as Kp, Ki and Kd. The competence of the proposed method has been confirmed through a simulation work. The results show that, the proposed method provides smooth performance in effective reference tracking with minimal error values.
MeghaRani Raigonda, Vidyashree S Valsan Malashree S Valsang
An IOT Based Framework for Group Monitoring and Irrigation Control
MeghaRani Raigonda, Vidyashree S Valsan Malashree S Valsang
vToday’s world is more dependent on the web application as it really helps people to do the work much faster and easier from anywhere on the corner of the globe. Hence, we have proposed the system which is a web based real-time application used for the development of automatic irrigation control and to help the farmer in improving the productivity of the crops. Because the system is automated there is no need of visiting the agricultural land by the farmer personally to provide the sufficient water to the crops and the system will also give the message to the farmer about the environmental conditions, so that farmer can take decision about the crops productivity and watering service. Results shows that the system is cost-effective because there is no extra expenditure required for getting and visualizing the information about environmental conditions of the agricultural field and this system will helps the farmer to increase the productivity without any effort.
A Cloud Based Automatic Recovery and Backup System with Video Compression
Megha Rani Raigonda, , Tahseen Fatima
Cloud Computing is process of hosting remote services over the internet. It provides data recovery easily .The system is having a persistent local backup which checks out periodically changes of data in the user folder. The compression technique is also the main objective of the system as to reduce the bandwidth which it takes for storing and accessing data from the cloud. The local backup process which is in the system itself where all the data of the user is stored securely. Video files are compressed automatically by the software known as FFMPEG and new copy of video file with compression is stored in to the local backup. The storage is over the cloud in the Microsoft one drive which has to be activated before storing data and retrieving data. The user data is updated each time and data backup is also present for the files added, deleted or modified. The one drive where the data is stored and accessible anytime and anywhere across the world. The user of data is the only authorized person to access the data. The sharing of data is possible and also the graph of various compressed and uncompressed file can be analyzed for the purpose of saving bandwidth. Data is protected both in local backup and stored over the cloud for automatically retrieving it. The result provides that the data security is given by maintaining two backups through which data can be easily retrieved with compressing videos to save the bandwidth
A Survey On Various Phishing Detection And Prevention Techniques
Prof. Gayathri Naidu .
Now a day’s phishing attack has become one of the most serious issues faced by internet users, organizations and service providers. In phishing attack attacker tries to obtain the personal information of the users by using spoofed emails or by using fake websites or both. The internet community is still looking for the complete solution to secure the internet from such attacks. This paper presents an overview about various phishing attacks and various techniques to protect the information from the phishers.
A Novel Digital Watermarking Approach for Accurate Authentication Using of Integer Wavelet Transform Coefficients
P.Sayanna1, B. Laxmi priya
The prominence of digital image processing domain has been increased from last few decades due to its advanced research areas such as medicine, biometrics, military, robotics etc. In this work an important issue has taken as area of research i.e. protecting the privacy information from the unauthenticated users either as accidental or incidental ways. Although tremendous progress has been made in the past years but still protecting the privacy information is concerned area in the field of security. A novel image authentication scheme for gray scale images are implemented in this work and the process of the embedding digital watermark is carried by performing the quantization process on the image. The novel things implemented in the proposed work is detection of tampered parts of the image and to detect minute modification of an image and to embed the watermark mid frequency band of a second level DWT transform was used. An approximation of the original image based on LL band was stored as a recovery mark for restoration of the image. Watermarked image has achieved a good PSNR value of 40 dB compared to original cover image. Restored image quality was also very good with a PSNR of more than 35 dB compared to unmodified watermarked image even when 25% of the received image is cropped. Finally the simulation results reveals that the proposed method provides the reliable balance between fidelity of the watermarked image and the quality of the restored image.
To Identify a Torque Controller System Approximating a Neural Network Based on Model Reference Technique
Priyaranjan Mandal, Binay Biswas
In this paper, a system of a torque controller assembly, using a split field winding dc motor, controls the sliding movement of an object, is proposed. This system is identified using the neural network (NN) based model reference technique. At first, a neural network, called plant identification neural network controller (PINNC) is configured by learning the behavior of the torque controller assembly through training the network. The ‘process of learning’ uses a method of training (trainlm) to train the network. Then the outputs of the proposed system and this PINNC are compared. The knowledge of this comparison is given as feedback to a second neural network controller, called NN-plant or neural network model reference controller (NNMRC). The NNMRC is configured by learning the behavior of a reference model system, provided to it. The ‘process of learning’ uses a method of training (trainbfgc) to train this network.
The plant identification neural network controller (PINNC) drives the neural network model reference controller (NNMRC) and controls the output of the NNMRC. Ultimately, the neural network model reference controller (NNMRC) or NN-plant identifies the proposed system, the torque controller assembly reliably and successfully
This paper gives a new design of Acoustic Doppler Current Profiler (ADCP). It basically works on the principle of Doppler Effect. Development of Acoustic Doppler Current Profiler is given. Types of ADCP’s are depending on mounting are horizontally mounted ADCP’s and vertically mounted ADCP’s. Frequency shift measurement is the basic thing in ADCP. There are various algorithms available for frequency measurement of ADCP. Some are given in this paper. So this paper gives a detailed study of Acoustic Doppler Current Profiler. Only some components are required for the design. Further range of penetration is dependent on the type of ultrasonic sensor used. As we go on changing the sensor performance parametric will also change.
Solving nQueen problem using modified Rakhya’s approach for parallel system
Loveleen Kaur, Prateek Gupta
The Nqueen problem is to place N queens on an NxN chessboard such that no two queens attack each other. Traditionally, algorithm has been written for serial computation recent advances in software and hardware allow parallelism. This paper investigate the possibility of finding the solutions of Nqueen problem by recently introduced Rakhya’ method modified to run on parallel system.
Neural Network based Weather Prediction Model towards Ideal Crop Selection
Mrs. Swaroopa Shastri , Arati K Gunge
Weather prediction system is one of the main important applications in agricultural field and it has been technologically and scientifically challenging problem around the world from the past few decades. Many of the crops depend upon ideal weather condition for example tea plants are very sensitive to sun light. If the tea plants are exposed to direct sun light or temperature beyond 32 degree centigrade the tea plants get die. In the same way if there is huge rain fall before Jawar crop, the crop might get damaged, similarly if the humidity is extremely high the cotton crop gets damaged, but we focus on only temperature, by seeing the temperature value only the farmers know which crop would be suitable for which weather condition. If a former knows that next year temperature will be quite high during the time of a particular crop, farmers might opt for another crop, without knowing that if farmer goes for same crop that crop might be damaged. In this project we will overcome from that problem, weather prediction system is very important to help the farmer to analysis before plan the seeds to know which crop would be better for the specific weather, not only the weather but also what type of soil is suitable for which crops is also considered. Data mining techniques can be used for predicting the weather forecast.
In this paper we examine the use of data mining techniques for predicting the temperature, rainfall, humidity, wind speed, visibility and pressure. This can be obtained by using Multilayer Artificial Neural Network and also we use Median Filtering Techniques and we have to take the previous year weather data from 2005 to 2015 from agricultural department. A Predictive Neural Network model is developed for the weather prediction and the result is compared with real data. This information is helpful for the farmers before seeding the crop to get good yield out of particular crop.
Combination of Modified Clipping Technique and Selective Mapping for PAPR Reduction
R. SHIVAJI, PATNAM GAYATHRI
Orthogonal frequency division multiplexing (OFDM) offers high data rate and supports high data rate applications. Although OFDM has advantages over traditional communication models but it frequently suffers from PAPR. PAPR is concerned area in OFDM from two decades and vast amount of research is carried out in literature. Selective Mapping remains as effective PAPR reduction approach and in proposed method a modified clipping technique along with selective mapping is used to reduce the PAPR reduction in efficient way. Experimental shows better results over traditional state of art methods.
Enhancement of BER and PSD of OFDM Signals with PAPR Reduction Using Linear Companding Transform
Kalluri Ravi Kumar K.V.Acharyulu
v
Orthogonal frequency division multiplexing (OFDM) is a popular modulation/multiplexing scheme offers high data rates It is considered as multicarrier transmission scheme supports future generation wireless as well as wire line communication systems.. OFDM frequently suffers from high Peak to Average Power Ratio (PAPR) which eventually increases the Analogue to Digital and Digital to Analogue convertors complexity levels and reduces HPA (RF) efficiency. Various Peak to average power ratio (PAPR) reduction schemes have been proposed in the past and companding is the popular PAPR reduction which is inserted after modulation in the OFDM system. Although companding scheme provides better results but simultaneously its presence as extra operation increases the bit error rate. In this paper a novel piecewise linear companding scheme is implemented to reduce the PAPR impact and control the companding distortion in the OFDM system. The piecewise linear companding scheme reduces the peak to average power ratio by clipping the amplitudes over the companded peak amplitude and compensate the power by linearly transform the signal amplitudes which are close to the companded peak amplitude. Finally the simulation result yields the better spectral efficiency and batter BER performance while mitigating the companding distortion better way the PAPR is reduced in accurate way.
Optimized PAPR Reduction Approach by Partial Approximate Gradient Constellation Algorithm for Better Efficiency
G. Swetha Sumera Afreen
In the OFDM communication system, the main disadvantage factor is Peak Average to Power Ratio (PAPR) which limits the performance of the overall system. To limit this factor in the OFDM system there are so many techniques that depends on the nature of the system like clipping, Partial transmission, Selective mapping, Companding transform etc, In this paper, a combinational approach is proposed for peak-to-average power ratio reduction in orthogonal frequency division multiplexing . The key idea of the proposed scheme is to apply partial transmit sequence and approximate gradient project schemes .These two schemes are applied in parallel on two equal halves of subcarrier in an OFDM standard. On one half, partial transmit sequence minimizes the PAPR of OFDM symbols through disjoint sub blocks and optimized phase factor. Approximate gradient project extends the outer constellation points of OFDM symbols dynamically within margin-preserving constraints to reduce the peak magnitude of symbols model ,on the other half. The simulation results show that a reduced PAPR and optimal BER rate of the OFDM system. The data rate is improved and also the computational complexity is reduced when our proposed scheme is compared with the partial transmit sequence scheme
Image Enhancement Approach for Digital Applications Based On Generalized Histogram Equalization Model
C. Anusha, L. Laxmi
In this paper, we have a tendency to propose a generalized leveling model for image improvement. supported our analysis on the relationships between image bar chart and distinction improvement white reconciliation, we have a tendency to initial establish a generalized leveling model desegregation distinction improvement and white reconciliation into a unified framework of protrusive programming of image bar chart. We have a tendency to show that several image improvement tasks may be accomplished by the projected model exploitation totally different configurations of parameters. With 2 shaping properties of bar chart remodel, specifically distinction gain and nonlinearity, the model parameters for various improvement applications may be optimized. We have a tendency to then derive associate degree best image improvement formula that in theory achieves the most effective joint distinction improvement and white reconciliation result with trading-off between distinction improvement and tonal distortion.
A Simple Clutter Canceling Circuit and Background Noise Algorithm Based On Microwave Life Detection System
K. Anuradha , M A Zeba Tabassum
Thousand of persons are being killed as a cause of earthquake. The disaster in the Dhaka City may claim thousands of lives due to Earthquake. It is said if survivors are found and rescued earlier the numbers of victims will be lower. There is no end to the number of lives lost as the result of such disasters as landslides, collapsed tunnels and avalanches. The microwave life detection system is developed for the search and rescue of victims trapped under the rubble of collapsed building during the earthquake or other disasters. In this project, an ultra-sensitive compact portable microwave life-detection device is introduced and implemented with promising results. By utilizing Doppler effect-based systems, vital signs such as heartbeats and breathing can be detected and can be used for finding survivors under earthquake rubble, injured soldiers on battlefields and as lie detection device. This device is tested in both simulated and realistic situations, and it can accurately detect crucial signs of life through highly dense construction materials of about 1.5m thick and standard density materials of about 10m while operating at 1.15GHz center frequency.
The Rural Banking introduced in villages to give good and better services to the people for the development of their agriculture sector or to help for their small-scale business. The banking sector in India has witnessed a complete transformation both in its functioning and delivery of services to their customers.The banking services in rural areas helps in developing economic factor that changed the profile of the village and the life of its residents. The rural banking plays a major role in the economic development of a country cannot be overlooked. The main goal is based on Cloud computing to help rural banking. Today technology being the main driving force for businesses has made banking customers to sit back at home and run their accounts without walking into the banks for anything and everything. As the advancement of technology has taken place with immense use of internet, mobile phones and online bill payments banking sector in India has a new facet altogether. The cloud computing is one of the developing technology which is being use by all industrial domain in the IT field. In this paper, I proposed the concept of using cloud computing to develop a banking system for rural areas. It considers various factors such as lack of devices and amenities in rural areas and provides efficient functionality to fulfil those gaps. It uses the latest variations of cloud computing technology for filling in the various technological gaps in village areas.The new technologies had made banks to offer new services and products to its customers, which would help improve economic activities.
Dynamic Cluster Head Selection Mechanism For Wireless Sensor Networks
Lakshmeesha P Dr. Shiva Murthy G
For data transmission in wireless sensor networks (WSNs), routing is the main course. Many routing algorithm have been proposed for effective data transmission. For data transmission, dynamic cluster selection is necessary to create in the network. Dynamic cluster selection is performed based on energy level of node. Node with higher energy becomes cluster head, after cluster head node is selected; cluster head collects the data from every member of the cluster and forwards that to base station. Cluster head is rotated based on energy level. Proposed mechanism confirms data transmitted effectively and energy efficiency of the node increase. It is implemented using simulator NS2.34 along with TCL script.
Secure Reliable Reactive Routing Enhancement In Wireless Sensor Networks
Akash Joshi , Dr. Shiva Murthy G
Rendering reliable and efficient communication along with security under losing channels is one among the major technical challenges in wireless network, especially in industries with vital and severe environments. In this task, illustrated a scheme to raise the resilience to link dynamics for Wireless Web, R3E is designed to enhance existing reactive course-plotting protocols to provide reliable and energy-efficient packet delivery against the unreliable cordless links by utilizing the local path diversity. Security is the major challenge with the R3E approach. Security with R3E is to be rendered with the range of the threshold, calculated at every node in the network. Proposed mechanism confirms reliable and secure path from source to destination by removing malicious nodes in the network
Numerical Solution of Tenth Order Boundary Value Problems by Petrov-Galerkin Method with Quintic B-splines as basis functions and Septic B-Splines as weight functions
S. M. Reddy .
In this paper a finite element method involving Petrov-Galerkin method with quintic B-splines as basis functions and septic B-splines as weight functions has been developed to solve a general tenth order boundary value problem with a particular case of boundary conditions. The basis functions are redefined into a new set of basis functions which vanish on the boundary where the Dirichlet, the Neumann, second order derivative and third order derivative type of boundary conditions are prescribed. The weight functions are also redefined into a new set of weight functions which in number match with the number of redefined basis functions. The proposed method was applied to solve several examples of tenth order linear and nonlinear boundary value problems. The obtained numerical results were found to be in good agreement with the exact solutions available in the literature.
Numerical Solution of Eighth Order Boundary Value Problems by Petrov-Galerkin Method with Quintic B-splines as basic functions and Septic B-Splines as weight functions
S. M. Reddy .
In this paper a finite element method involving Petrov-Galerkin method with quintic B-splines as basis functions and septic B-splines as weight functions has been developed to solve a general eighth order boundary value problem with a particular case of boundary conditions. The basis functions are redefined into a new set of basis functions which vanish on the boundary where the Dirichlet, the Neumann and second order type of boundary conditions are prescribed. The weight functions are also redefined into a new set of weight functions which in number match with the number of redefined basis functions. The proposed method was applied to solve several examples of eighth order linear and nonlinear boundary value problems. The obtained numerical results were found to be in good agreement with the exact solutions available in the literature.
Anil Kewat,Arvind Kumar Sharma P.C.Gupta, P. N. Srivastava
Evaluating the Performance of Ant Colony Algorithm for the Solution of Constraint Based Traveling Salesman Problem
Anil Kewat,Arvind Kumar Sharma P.C.Gupta, P. N. Srivastava
Soft Computing is the use of inexact solution to computationally hard tasks such as the solution of NP-Complete problems.TSP is a combinatorial optimization problem. In this paper TSP problem has been solved by using ACO. The major drawback of ACO is that it traps in local optima. In order to find an optimal solution for TSP problem the presented paper proposes an improved ACO which produces better result.
A Review on Performance of Database Systems Azfar Inayat Khan
Azfar Inayat Khan
Presently most of the researchers focus on works in the area of pattern recognition, computer networks, mobile computing, information security, image processing, data mining, bio inspired computing, theoretical computer science and cloud computing. Research in the area of data modelling for relational databases has trimmed down considerably.
Since research in the area of data modelling for relational databases has trimmed down considerably, it has been comprehended that the fissure between user expectation and product delivered, in database systems design and development, has to be diminished. The field of modelling and design of databases is vast, with a surplus of methodologies as well as techniques, but designers need authentic guidelines that can be used for designing proficient database management systems. This paper reviews the different techniques used to perk up the performance of databases.
A DWT-DCT-SVD Based Enhancement Technique for Low Contrast Satellite Images
Neha Gupta, Ashutosh Kharb, , Seema Kharb
Satellite images are used in many applications such as astronomy, geographical information system and geosciences. They are having narrow range of brightness values and contain low dynamic region of intensity values thus there is a need for enhancement. The paper presents a contrast and brightness enhancement approach based on Discrete Wavelet Transform, Discrete Cosine Transform and Singular Value Decomposition (DWT-DCT-SVD) technique for quality improvement of low contrast satellite images. The input image is decomposed into four frequency sub bands through DWT of each band R, G and B of input image. DCT is applied to LL band of DWT to protect illumination information and then obtains singular value matrix of low frequency components of DCT and finally, it reconstructs the enhanced image by applying IDWT, IDCT and ISVD. Singular value matrix gives intensity information of particular image and any change in singular values directly change in image intensity. The experimental results show superiority of proposed technique in terms of PSNR, MSE, Mean and Variance over other techniques
Implementation of IOT Based Health Care Solution Based on Cloud Computing
B. Padmavathi , Subia Tazeen Rana
The IoT plays an important role in healthcare applications, from managing chronic diseases at one end of the spectrum to preventing disease at the other. The Internet of Things (IoT) has made it possible for devices around the world to acquire information and store it, in order to be able to use it at a later stage. However, this potential opportunity is often not exploited because of the excessively big interval between the data collection and the capability to process and analyze it. In this paper, an intense research has been carried out to explore the role of IoT healthcare delivery and also analyze the realistic opportunities of it. Finally high-end cloud computing technology based IoT framework is proposed to find the health care solutions in healthcare industry in reliable manner.
Review on Reactive Power Compensation in Short Transmission Line
Rachana Chavan Rakesh Singh Lodhi
Flexible AC Transmission Systems (FACTS) devices is the most advanced devices for power flow control in short transmission line, medium transmission line and long transmission line. Awareness of power quality and power flow is big deal in power system because voltage sags, swells, harmonics etc. are the various power quality problem as well as power flow problem. Short transmission line are considered as uncompensated short transmission line and then compensated short transmission line with different FACTs devices are Reviews. Review of reactive power compensation through different research review and author. These papers are focused on problem related to reactive power compensation.
Survey on Relay and Beam forming Spectrum Sharing Cognitive Radio Networks
V. Bindusri (M.tech.) M. Vijaya Lakshmi
v
This is about relay based CRN and beamforming spectrum sharing CRN. In relay based CRN the cognitive nodes which are far away from primary user (PU) may not be able to detect the PU due to severe fading in channel. To improve the efficiency of spectrum sensing we propose a cooperative communication scheme based on cognitive relaying. In beamforming spectrum sharing two conflicting challenges are how to maintain the interferences generated by the CRN to the primary n/w below an acceptable threshold level while maximizing the sum-rates of the cognitive radio network. We present two beamforming methods, modified zero forcing beamforming and transmit receive beamforming .the zero forcing beamforming is modified by adding the channel gain between the cognitive radio base station and the primary user to meet the two conflicting goals, the orthogonality of transmit beam in MIMO beamforming by Gram-schmidt method achieves the first goal that the primary user is interference free to satisfy the second goal, self interference is reduced by the constrained minimization of the mean output array of cognitive receivers. To reduce complexity of the system, the number of cognitive radio users must be limited.
Keywords: MIMO, Beamforming, Cognitive radio, Cooperative communication
There are many devices present which help to interact with the computer like a mouse, keyboard, and mice. Those devices also called as Human Computer Interaction (HCI) device. Our main intention is to develop Human Computer Interaction device to use efficiently .Where we have tried to control mouse event like left click, right click and moving pointer position using the color detection. The color detection is done using the web camera.
A Study On Cloud Robotics Architecture, Challenges and Applications
G.Arunajyothi, .
We extend the computation and information sharing capabilities of networked robotics by proposing a cloud robotic architecture. The cloud robotic architecture leverages the combination of an ad-hoc cloud formed by machine-to-machine (M2M) communications among participating robots, and an infrastructure cloud enabled by machine-to-cloud (M2C) communications. Cloud robotics utilizes an elastic computing model, in which resources are dynamically allocated from a shared resource pool in the ubiquitous cloud, to support task offloading and infor-mation sharing in robotic applications. We propose and evaluate communication protocols, and several elastic computing models to handle different applications. We discuss the technical challenges in computation, communications and security, and illustrate the potential benefits of cloud robotics in different applications.
A Survey of Energy Efficient Clustering Algorithms in Wireless Sensor Networks
Vishal Singh .
To make the most of network lifetime in Wireless Sensor Networks (WSNs) the paths for data transfer are chosen in a manner that the total energy utilized along the path is minimized. To support high scalability and better data aggregation, sensor nodes are regularly assembled into disjoint, non overlapping subsets called clusters. Clusters create hierarchical WSNs which incorporate efficient utilization of limited resources of sensor nodes and thus extends network lifetime. The goal of this paper is to show a cutting edge review on clustering algorithms reported in the literature of WSNs. This paper presents various energy efficient clustering algorithms in WSNs.
Comparison Of Routing Protocols (DSDV, DSR and AODV) In Manets
Shikha Sharma Manish Mahajan
:A mobile ad hoc network (MANET) is a collection of mobile nodes that is joined through wireless medium forming rapidly changing topologies. MANET’s are infrastructure-less and can be set up anytime, anywhere. The survey of protocol properties has been conducted of various MANET routing algorithms and analyzed them. The routing algorithms are categorized into two i.e. proactive (table driven) and reactive (on demand). The algorithms considered are DSDV, DSR, and AODV. The comparison of these three routing protocols are based on the various protocol parameters such as Route Discovery, Network Overhead, Periodic Broadcast, Node overhead etc.
Sorting is used for arranging a data either in ascending order or descending order. I have discussed here in these paper about new Algorithm to solve the problem of sorting. The Algorithm to solve problem of sorting is on reference of BUBBLE sort technique. The procedure to sort the element is extremely different
Flight Recommendation System based on user feedback, weighting technique and context aware recommendation system
Mohit Tuteja .
In this paper, a recommender system for recommending flights to customers on the basis of user preferences, weightage technique and context aware system is proposed to help the consumers of service oriented environment to discover and select the most appropriate flight services from a large number of available ones. This recommender system provides the user with desired selection options, real-time information and recommends the user of itineraries that best fit his preferences, based on his previous purchases. These preferences are learnt from either explicit or implicit feedback provided by the user. But, past experiences show that that only a few numbers of users provide information about their preferences explicitly. The FRC uses implicit feedback to capture the preferences which are stored in the user’s profile for future personalized recommendations. The context aware method provides recommendations to the users regarding their environment and the details of the situation in which they are thus personalizing user’s experience. The proposed approach is yielded to overcome the problems caused by ignoring the contextual information. Most of the existing systems use the data from the individual user combined with the data from other users to make a recommendation. The current system only uses the data from the user to provide the feedback. This results in more personalized recommendation.
The content based approach, rather than looking for weight of one feature, calculates the over-all weight of the item in context, which is more important when the recommendation is based on several attributes. Hence this relates to comparing the current item against a case base and determining the overall weight and the status of the item in terms of recommendation.
Instrumentation Detailed Engineering (IDE) is a study which defines every technical and non technical aspects of project development. IDE follows Basic Engineering (BE) and Front End Engineering Design (FEED). It contains in detail diagrams and drawings for construction, civil works, Instrumentation, Control System, Electrical Facilities, Management of Suppliers, Schedule of Activities, Costs, Procurement of Equipment, Economic Evaluation and also Environmental Impacts before starting of construction of a project. Instruementation detailed engineering found to be the best method for plant commissioning and plant maintainence.
Numerical Solution of Fifth Order Boundary Value Problems by Petrov-Galerkin Method with Quintic B-splines as basis functions and Septic B-Splines as weight functions
S. M. Reddy .
This paper deals with a finite element method involving Petrov-Galerkin method with quintic B-splines as basis functions and septic B-splines as weight functions to solve a general fifth order boundary value problem with a particular case of boundary conditions. The basis functions are redefined into a new set of basis functions which vanish on the boundary where the Dirichlet type of boundary conditions are prescribed. The weight functions are also redefined into a new set of weight functions which in number match with the number of redefined basis functions. The proposed method was applied to solve several examples of fifth order linear and nonlinear boundary value problems. The obtained numerical results were found to be in good agreement with the exact solutions available in the literature.
Numerical Solution of Fourth Order Boundary Value Problems by Petrov-Galerkin Method with Quartic B-splines as basis functions and Sextic B-Splines as weight functions
S. M. Reddy ,
This paper deals with a finite element method involving Petrov-Galerkin method with quartic B-splines as basis functions and sextic B-splines as weight functions to solve a general fourth order boundary value problem with a particular case of boundary conditions. The basis functions are redefined into a new set of basis functions which vanish on the boundary where the Dirichlet type of boundary conditions are prescribed. The weight functions are also redefined into a new set of weight functions which in number match with the number of redefined basis functions. The proposed method was applied to solve several examples of fourth order linear and nonlinear boundary value problems. The obtained numerical results were found to be in good agreement with the exact solutions available in the literature.
Software testing is one of the most important phases of Software Development Life Cycle and main technique to find bugs and ensure the quality of the software. Software Testing can be conducted manually as well as automated. In manual testing, testing is done without any tool. In automation testing, testing is done with the help of automated testing tools. In recent times, agile development and testing are growing in popularity. Agile testing tools vary from project management tools to automated testing tools. In this paper, we have explained the detailed working of Agile Testing Framework (ATF). The ATF is about implementing the ideal automated testing environment in an agile organization, to deliver quality software, fast. The ATF Architecture can be used to easily integrate with continuous integration tools and best in class third-party testing tools to allow for accessibility, security, web consistency and full performance (front-end, middleware and load) testing.
Group User Revocation and Integrity Auditing Of Shared Data in Cloud Environment
P.Ayeesha Khan .
— So many investigations are made on safety issues and data integrity auditing for sharing the dynamic data. Cloud computing provides secure remote data auditing for storage purpose. But it does not provide secure from collision of cloud storage server and revoked and revoked group customers during user revocation in practical cloud storage system. In This paper, we determine the collusion attack within the existing plan and supply a competent public integrity auditing plan with secure group user revocation according to vector commitment and verifier-local revocation group signature. We design a concrete plan in line with the plan explanation. Finally, the safety and experimental analysis expose that, in comparison using its relevant schemes our plan can also be safe and effective
Optimization and Investigation of Mg-Alloy with MWCNT Nano-Composites for Connecting Rod Application
Akash Digamber Dhane Dr. Jayakumar Jayaraman
Today’s interest in magnesium alloys for automotive applications is based on the combination of high strength properties and low density. For this reason magnesium alloys are very attractive as structural materials in all applications where weight savings are of great concern.The automobile engine connecting rod is a high volume production, critical component. It connects reciprocating piston to rotating crankshaft, transmitting the thrust of the piston to the crankshaft. Every vehicle that uses an internal combustion engine requires at least one connecting rod depending upon the number of cylinders in the engine. As the purpose of the connecting rod is to transfer the reciprocating motion of the piston into rotary motion of the crankshaft. Connecting rods for automotive applications are typically manufactured by forging from either wrought steel or powdered metal.The objective of this paper is to optimization and fabrication of connecting rod using Mg-alloy material. Forged steel used to manufacturing the connecting rod presently. Connecting rod is modeled in Solide Works V13.and Model will be imported in ANSYS 13 for analysis. After analysis results will be comparing with experimentally in terms of stress, strain and deformation.The material will be prepared with stir casting process and hot extrusion process
Inference of User Image-Search Goals and Personalization Using Click Through Log
Aditi More , P. P. Joshi
Improving the image search engine relevance and user experience is very important to figure out user image search goals. When a user will enter a query to search an image, he should be displayed with relevant images. In proposed work, browsing history session information, bookmark data and visual information with image tags of user click through images or user feedback images are extracted. The session history is stored as click through log and the images are stored separately. This history and clicked and downloaded images by user is considered as implicit guidance, so that the personalized results can be presented to the user. From the browsing history, the URLs are visited for getting user domain keywords. By using these keywords and tags of images, user query specific topic mapping and query mapping is done. The proposed method performs Naive Bayesian classification on user clicked images to group them into relevant concepts. This classifier is tested on the images obtained as a result of user submitted, so that the user interesting images or goal images can be displayed as a result. A label wise clustering is used to display goal image results. The system is mainly for retrieving images using text-based queries. The main aim of the proposed work is an efficient image retrieval system to facilitates image search through user queries and improve user satisfaction by returning images that have a high probability to be downloaded by the user.
Index Terms—Click through log, User Profiles, Goal images, Image search goals.
A Mobile Ad-Hoc Network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on continual basis. Due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is the Black Hole Attack. In this paper, we give an algorithmic approach to focus on analysing and improving the security of AODV, which is one of the popular routing protocols for MANET. Our aim is on ensuring the security against Black hole attack. The proposed solution is capable of detecting & removing Black hole node(s) in the MANET at the beginning. Also the objective of this paper is to provide a simulation study that illustrates the effects of Black hole attack on network performance.
Previously the works done on MANETs focused mainly on different security threats and attacks such as Impersonation, Wormhole, Jellyfish, and Intrusion detection. Attack of black hole is required on routing protocols AODV, OLSR and TORA. And also check which protocol performs better against black hole attack. There is a need to address all these types of protocols under the attack, as well as the impacts of the attacks on the MANETs. We want to analyse Black Hole attack in MANETs using AODV, OLSR and TORA which are reactive, proactive and hybrid protocol respectively in nature.
Praveen Kumar Ramtekkar Shyam P. Dubey , Mohammad Shahid Nadeem
Improving the Performance of Information Collection Using Social Networks with Online Sampling
Praveen Kumar Ramtekkar Shyam P. Dubey , Mohammad Shahid Nadeem
This paper concentrates on improving the performance of information collection from the neighborhood of a user in a dynamic social network. By introducing sampling based algorithms to efficiently explore a user’s social network respecting its structure and to quickly approximate quantities of interest. It introduces and analyzes variants of the basic sampling scheme exploring correlations across the samples. As online social networking emerges, there has been increased interest to utilize the underlying network structure as well as the available information on social peers to improve the information needs of a user. Models of centralized and distributed social networks are considered to implement this algorithm.
This algorithm can be utilized to grade items in the neighborhood of a user, assuming that information for each user in the network is available. Using real and synthetic data sets, this work validates the results of analysis and expresses the efficiency of algorithms in approximating quantities of interest. The methods described are general and can probably be easily adopted in a variety of strategies aiming to efficiently collect information from a social graph.
Virtual Machine Migration in Cloud Data Centers for Resource management
Chandramouli Reddy Suchithra R
Cloud computing delivers the computing services over the internet. Cloud services help individuals and organization to use data that are managed by third parties or another person at remote locations. Virtual Machine (VM) is an emulation of a particular computer system. In cloud computing, Virtual machine migration is a useful tool for migrating Operating System instances across multiple physical machines. It is used to load balancing, fault management, low-level system maintenance and reduce energy consumption. There are various techniques and parameters available for VM migration. This paper presents the various virtual machine migration techniques. Many cloud data centers have problems in understanding and implementing the techniques to manage, allocate and migrate the resources in their premises. The consequences of improper resource management may result into underutilized and wastage of resources which may also result into poor service delivery in these data centers. Resources like; CPU, memory, Hard disk and servers need to be well identified and managed.
Risk Analysis and Estimation of Schedule Using Monte Carlo Simulation
Heena Kashyap Nitika Bansal and Meenu Gupta
Unwanted schedule risk and improper estimates divert a project from achieving the goal of on-time successful delivery due to the presence of uncertainties. Most of the projects get delayed or cancelled due to this. So, using Monte Carlo Simulation technique a simulator is implemented in this paper which simulates the activity durations for analyzing schedule risk and providing reliable estimates of time.
Anjali Krishnan N, Lekshmi vijayan , Priyanka P , Renya Reji Minu Lalitha Madhavu
A Survey on Mobile Wireless Network
Anjali Krishnan N, Lekshmi vijayan , Priyanka P , Renya Reji Minu Lalitha Madhavu
Mobile computing is a promising technology that is used to transmit data, voice and video through a computer or any other wireless enabled devices and there is no fixed physical link between the devices. Mobile networking is a technology that enables wireless data connection and it avoid the costly process of introducing cables. We conduct a survey based on various aspects of mobile wireless networks. The various aspects are video multicast, workload dissemination, routing and scheduling and node failures.
A Voltage Controlled PV Inverter for a Certs Microgrid
T Sateesh *, P Bapaiah**
The Photovoltaic (PV) sources are more compatible for Microgrids because of their ability to internally aggregate and balance with other renewable sources. The conventional grid connected PV inverters are basically current source controlled so unable to control ac voltage or frequency. The PV inverter using the Consortium for Electric Reliability Technology Solutions (CERTS) concepts can control ac voltage and frequency but have a major problem with load transients. The over loaded PV micro source causes dc bus voltage collapse and finally resulting in an ac voltage drop during the load transients. A photovoltaic inverter is capable of operating in both island and grid-connected mode by means of a reconfigurable control scheme. This paper presents an efficient control strategy which causes the PV inverter to act as voltage source to maintain stable dc bus voltage under load transients. With this PV inverter control configuration, it is shown that the PV micro source can operate as a voltage source in the CERTS microgrid.
This paper will give a new type of laws, which will belong to soft mathematical morphology. These laws correspond to a property called duality in soft mathematical morphology, which is discussed in a new way.. It means this property is thoroughly discussed by the author. It can be said that the laws are also new laws. So it is named by the name of the author.
Data streams” is defined as class of data produced over “text, audio and video” channel in uninterrupted form. The streams are of unlimited length and may consist of ordered or unordered data. With these features, it is hard to store and process data streams with simple and static strategies. The processing of data stream poses four key challenges to researchers. These are countless length, concept-development, and concept-flow and feature development. Unlimited-length is because the amount of data has no limits. Concept- flow is due to sluggish changes in the theory of stream. Concept-development occurs due to existence of unfamiliar classes in data. Feature-development is due to development new features and deterioration of old features. To carry out any analytics data streams, the translation to knowledgeable form is important. The researcher in past have anticipated different strategies, most of the research is focused on difficulty of unlimited -length and concept-flow. The research work offered in the paper describes a well-organized string based methodology to process “data streams” and manage the challenges of unlimited length, concept-development and concept-flow. Subject areas Data mining, Machine learning.
Prototype for MEMS Based Assistance for Physically Disable People
Girish Santosh Bagale , Amit Ashok Solanki
Wheelchairs are used by the people who cannot walk due to physiological or physical illness, injury or any disability. Recent development promises a wide scope in developing smart wheelchairs. The present article presents a gesture based wheelchair which controls the wheelchair using hand movements. The system is divided into two main units: Mems Sensor and wheelchair control. The Mems sensor, which is connected to hand, is an 3-axis accelerometer with digital output (I2C) that provides hand gesture detection, converts it into the 6- bit digital values and gives it to the PIC controller.The wheelchair control unit is a wireless unit that is developed using other controller.
The Comparative Study on Public Key Algorithm using RSA AND OAEP
E.Vinithra , N.Hyrunnisha
The cryptography algorithms use of real security applications. These applications tend to be too complicated, exposing too much detail of the cryptographic process. Users need simple inherent security that doesn’t require more of them simply clicking the secure checkbox. Cryptography is a first abstraction to separate specific algorithms from generic cryptographic processes in order to eliminate compatibility and upgradeability problems. The core idea is enhance the security of RSA algorithm. In this dissertation public key algorithm RSA and enhanced RSA are compared analysis is made on time based on execution time.
Compatibility of Border Meeting of Two Layers Protocol (BGP Version 4) With IPV6
Yashpal Yadav, Madan singh , Vikas Kumar
This paper deals with issues, which network designers, would have to deal with once IPV6, which is the layer 3 Internet Protocol of the future comes into mass existence. IPV6 will have compatibility issues with most of the existing routing protocols especially with Border Gateway Protocol (BGPV4), which is a layer 7 protocol on which the backbone of the Internet runs. BGP Version 4 is an interdomain routing protocol. The primary function of BGP is to provide and exchange network reachability information between Autonomous Systems (AS).
Design of Advance and Robust Vehicle Security System with Accident Monitoring
Mohammed Shakeeb Ahmed Syed Gilani Pasha
This proposed work is an attempt to design and implement advanced and robust vehicle security system using GPS and GSM system to prevent robbery and to analyze the exact location of vehicle. The safety of the vehicle is very significant. This project is designed using GPS and GSM technology and accelerometer. The system contains GPS module, GSM modem, Infrared sensors, DTMF tone decoder, ARM 7 microcontroller, relay switch and accelerometer.GPS system tracks the location of vehicle, GSM system is used for duplex communication. The preventive measures like fuel supply cutoff, engine ignition cutoff electric shock system (installed on steering wheel) and paint spray system are installed in the vehicle which is controlled by user GSM Mobile. Traffic accidents are one of the leading causes of deaths. An important indicator of survival after an accident is the time between the accident and emergency medical personnel dispatched to the accident spot. By reducing the time between an accident occurrence and dispatch of the responders to the scène, mortality rates can be reduced, thereby we can save lives. In this project, the main application is early accident detection and its notification to the concerned emergency Centre. By using accelerometer accident notification can be achieved. Accelerometer can automatically detect traffic accident and immediately notify to central emergency centre, by using GPS co-ordinates we can reach to the location and rescue one’s life. This complete system is designed taking into consideration low range vehicles to provide extreme security to their vehicles and life.
Shortest Path Detection among the Clustering Nodes
B. Jaya Lakshmi .
The main objective of this paper is to select the module first we need to provide source and destination addresses at source and destination IP address filed respectively .Next we need to select the node that needs to be sent to destination using the select button. If we want to know the shortest path among the clustering nodes first all the nodes will be sent to destination by selecting the node at server side .server side node will be sent to receiver side where we can calculate the time and speed. previous existing system consumes more time. To overcome this problem I am calculating the shortest time between the nodes.In this module I am selecting the destination for sending the node at server side. If the current node is not in the destination again browse the node and selecting the path then it will display shortest path among the nodes.
Privacy Secured and Share with the Destination in Cloud
P.Veneela , S.Vikram Phaneendra
--- Cloud computing refers to applications and services that run on a distributed network using virtualized resources and accessed by common Internet protocols and networking standards. Cloud computing takes the technology, services, and applications that are similar to those on the Internet and turns them into a self-service utility. Without adequate privacy protection, the system can be easily misused, e.g., to track users target them for home invasion. introduce LocX, a novel alternative that provides significantly-improved location privacy without adding uncertainty into query results or relying on strong assumptions about server security. Our key aim is to apply secure user-specific, distance-preserving coordinate transformations to all location data shared with the server. The friends of a user share this user’s secrets, so they can apply the same transformation to destination. This allows all location queries to be evaluated correctly by the server, but our privacy mechanisms guarantee that servers are unable to see or infer the actual location data from the transformed data or from the data access. show that LocX provides privacy even against a powerful adversary model, and we use prototype measurements to show that it provides privacy with very little performance overhead, making it suitable for today’s mobile devices.
Arduino based real time driver drowsiness detection and mobile alert system using bluetooth
Lestin Jills Joseph Dr. Lokesha .M
The goal of this propose design is to detect drowsiness in drivers to prevent accidents and to improve safety on the highways. A method for detecting driver drowsiness/sleepiness is developed on Arduino microcontroller board based on Atmega328P for real-time monitoring. The readings taken from different sensors used in this project can be seen in an Android based mobile device. It has an MQ-2 alcohol gas sensor to detect alcohol, if consumed by the driver and a relay circuit to stop him from performing the drive if alcohol consumed. The output from the relay activates the GSM module which sends a message to the driver family. MPU-6050 Micro-Electro-Mechanical-System (MEMS) accelerometer to read the head nodding conditions combined with a gyroscope and a temperature sensor to know the temperature inside the vehicle. The system is also able to monitor the driver physiological conditions such as heart pulse rate, eye blink detection using pulse sensor and eye blink sensor respectively. The alarm will be activated when the driver has consumed alcohol or driver head nods frequently or heart pulse rate goes above the limit or when driver eyes get closed. The microcontroller communicates with the android mobile through HC-05 Bluetooth module connected on the board. The android mobile is provided with the facility to view continuous readings from the sensors connected to the system along with the warning status messages through an android software based application installed in the end device.
An Aggressive Scheme for Identifying Replicas in Limited Time
K.V. Yasodha
We advise two novel, progressive duplicate recognition calculations namely progressive sorted neighborhood method (PSNM), which performs best on small , almost clean datasets, and progressive obstructing (PB), which performs best on large and incredibly dirty datasets. Duplicate recognition is the procedure of determining multiple representations of same real life organizations. Today, duplicate recognition techniques have to process ever bigger datasets in ever shorter time: maintaining the caliber of a dataset becomes more and more difficult. We present two novel, progressive duplicate recognition calculations that considerably boost the efficiency to find duplicates when the execution time is restricted: They increase the gain from the overall process inside the time available by confirming most results much sooner than traditional approaches. Comprehensive experiments reveal that our progressive calculations can double the amount efficiency with time of traditional duplicate recognition and considerably enhance related work. Progressive obstructing is really a novel approach that develops upon an equidistant obstructing technique and also the successive enlargement of blocks. Like PSNM, additionally, it presorts the records to make use of their rank-distance within this sorting for similarity estimation.
Index Terms — Duplicate detection, entity resolution, progressiveness, data cleaning.
Cluster Based Data Dissemination Protocol In VANET
Garima Dhawan, Shilpa Nagpal
Vehicular Ad-hoc Network (VANET) in the recent years have emerged as a most attractive topic for researchers and automotive industries due to their tremendous potential to improve traffic safety, efficiency and other added services.The routing in VANET is the most challenging part of research.. Research in the field of Vehicular ad-hoc network technology has provided us with a new chapter in the world of wireless communication. In this paper we are propose a cluster based routing approach for VANET and compare its performance with existing routing protocols. This new approach will have an aim to minimize end to end delay and increase the overall network throughput. NS2 is used to conduct simulation.
A Review on Removal of Salt And Pepper Noise From Digital Images
Kanhaiya, Mr. Paruraj
Image restoration is the process of restoring degraded images which cannot be taken again or the process of obtaining the image again is costlier. We can restore the images by prior knowledge of the noise or the disturbance that causes the degradation in the image. Image restoration is done in two domains: spatial domain and frequency domain. In spatial domain the filtering action for restoring the images is done by directly operating on the pixels of the digital image. In frequency domain the filtering action is done by mapping the spatial domain into the frequency domain by taking fourier transform of the image function. By mapping the image into frequency domain an image can provide an insight for filtering operations. After the filtering, the image is remapped into spatial domain by inverse fourier transform to obtain the restored image. Different noise models were studied. Different filtering techniques in both spatial and frequency domains, were studied and improved algorithms were written and simulated using matlab. Restoration efficiency was checked by taking peak signal to noise ratio (psnr) and mean square error(mse) into considerations.
Advanced Audio Compression For Lossless Audio Coding Using Ieee 1857.2
Fomazou N. Auristin, Samadhan D. Mali
Developed by IEEE-SA (Standard Association) and released in August 2013, IEEE 1857.2 is the latest standard for lossless audio compression. This recent standard for advanced audio coding (AAC) is an efficient lossless audio codec (coding decoding) technique, in improving audio quality for compression and decompression, optimizing bandwidth during transmission, saving storage space, it also speeds up the video and audio streaming, and others video and audio data. It defines a set of tools to support specific audio coding functions, including general audio coding and lossless coding. This project presents the algorithms for lossless audio coding communication, the higher efficiency of this standard and other assets such as compression ratio, encoding and decoding speed of this standard. Different types of audio files have compressed and the results show a good compression ratio (CR) which depends on audio file type, and good encoding and decoding speed.
Ensuring Security to Data on Cloud using Cryptography
Sabeena SK ,N Praveena ,Soumen Kumar Roy
— As the information created by the ventures that should be put away and used (e.g. messages, individual wellbeing records, photograph collections, charge reports, budgetary exchanges and so on) is quickly expanding information proprietors are inspired to outsourced their nearby complex information administration frameworks into the cloud for its extraordinary adaptability and monetary reserve funds. Distributed storage permits shoppers and organizations to utilize the application without establishment and access their own records at any PC with web access. In distributed storage, the information will be put away given by cloud administration suppliers (CSPs). Cloud administration suppliers must have a reasonable approach to ensure their customers information. In any case, in information security assurance and information recovery control is most testing exploration work in distributed computing. This paper basically concentrates on center secured distributed storage administrations i.e by encrypting the information it can store the data in securely.
Investigation on Microstructure and Mechanical Properties of Aluminum reinforced with MWCNT and Nano-SiC
Pritam Wagh, Dr.J.Jayakumar
Aluminum is most preferable structural material in the field of automotive and aerospace due to its properties such as strength, corrosion resistance and being light weight. So, to enhance mechanical properties of aluminum, attempts has been made to reinforce it with ceramic materials like Multi walled Carbon Nanotube (MWCNT), Silicon carbide (SiC), separately. This paper focuses on fabrication of Aluminum (Al) with dual reinforcement MWCNT- nanoSiC by powder metallurgy method and study of mechanical properties of composite as well as its microstructure
A Voltage Controlled PV Inverter for Certs Microgrid Applications
T Sateesh , P Bapaiah
- The Photovoltaic (PV) sources are more compatible for Microgrids because of their ability to internally aggregate and balance with other renewable sources. The conventional grid connected PV inverters are basically current source controlled so unable to control ac voltage or frequency. The PV inverter using the Consortium for Electric Reliability Technology Solutions (CERTS) concepts can control ac voltage and frequency but have a major problem with load transients. The over loaded PV micro source causes dc bus voltage collapse and finally resulting in an ac voltage drop during the load transients. A photovoltaic inverter is capable of operating in both island and grid-connected mode by means of a reconfigurable control scheme. This paper presents an efficient control strategy which causes the PV inverter to act as voltage source to maintain stable dc bus voltage under load transients. With this PV inverter control configuration, it is shown that the PV micro source can operate as a voltage source in the CERTS microgrid.
Trust Certificate Based Cluster Head Misbehaviour Detection And Isolation In Mobile Ad Hoc Networks
R. Murugan and L. Senbagamalar
Absence of any central co-ordination mechanism and shared wireless medium makes MANET more vulnerable to wide variety of attacks. In an internal attack, the attacker gains the normal access to the network and takes part in the network activities, either by some malicious impersonation to get the access to the network as a new node, or by directly compromising a current node and using it as a basis to conduct its malicious behaviors. In this paper, we developed an autonomous trust evaluation based cluster head misbehaviour detection and isolation in mobile ad hoc networks where the entire network is divided into hierarchical group of clusters, each cluster having a fully trusted Cluster Head (CH). As, CH, being an independent node that has mobility and autonomy behaviour, has the possibility that it may be vulnerable to DoS attacks. Hence, the assumption of CH being trusted cannot be considered. Therefore, ensuring the security of CH is essential which can be done by evaluating the trustworthiness of each CH. The trustworthiness of each CH is determined by its Group Leader (GL). In order to determine the cluster head and the group leader that are free from malicious attack, an autonomous trust evaluation is done for each CH to detect and isolate the misbehaving cluster head.
Comparative Analysis DWT and DFT Using Various Modulation Approaches to Improve BER Performance
Bairagoni Rajinikanth ,K.V. Murali Mohan
Although tremendous research has conducted on high speed communications but still number of research works which are reported in literature are fails to meet the real time requirement. The main drawbacks in the conventional communication techniques are low spectral efficiency, lack of high rate, interferences, etc. The OFDM communication model overcomes the drawbacks of conventional communicational model and offers the high data rate, and high spectral efficiency. Compared to conventional approaches the 4th generation Long term evolution application has better spectral efficiency in terms of accuracy and high data rate, the 4th generation Long term evolution approach is formed by the collaboration of OFDM and MIMO. Although OFDM has many advantages over FDM but it suffers from inter carrier interference and inter symbol interference when multiple carriers are used and due to this interferences loss of Orthogonality happens, in order to overcome these interferences usage of cyclic prefix has became mandatory. But usage of cyclic prefix shows huge negative impact on bandwidth efficiency as the cyclic prefix approach consumes nearly 20% of bandwidth and BER performance too affected. In this paper a novel wavelet based OFDM model is presented which is mainly intended to provide good Orthogonality and better spectral efficiency using various modulation techniques, the unique thing in the usage of wavelet based OFDM is it does not need any spectral efficiency and absence of the cyclic prefix increases bandwidth efficiency when bandwidth increases simultaneously spectral efficiency increases. Finally the usage of the wavelet based OFDM shows improved BER over conventional FDM communication model. The simulation results indicates the usage of wavelet based OFDM in place of DWT based OFDM in LTE and finally the comparison between wavelet based OFDM and DFT based OFDM
Implementation of Fault Tolerant Filter Based On Error Correction Codes for Digital Applications
Chilagani Sai Bhagath , Palaka Suresh
In today’s world there is a great need for the design of low power and area efficient high performance DSP system.FIR filter is considered to be the fundamental device in the broad application of wireless as well as the video and image processing system. With the aim of getting the reliable operation, these filters are protected using the Error correction Code. Filters are broadly used in dealing out with signal processing and communication systems. As the complexity of communications and signal processing systems increases, so does the number of blocks or elements that they have. In many cases, some of those elements operate in parallel performing the same processing on different signals. In this paper, the idea of applying coding techniques to protect parallel filters is addressed in a more general way. In particular, it is shown that the fact that filter inputs and outputs are not bits but numbers enables a more efficient protection. This reduces the protection overhead and makes the number of redundant filters independent of the number of parallel filters. The proposed scheme is first described and then illustrated with two case studies. Finally, both the effectiveness in protecting against errors and the cost are evaluated for an FPGA implementation.
Enhanced MODLEACH Using Effective Energy Utilization Technique For Wireless Sensor Network
Priyanka, Navjeet saini Sukhbeer singh
: As wireless sensor network applications are the emerging trend for the recent technologies. The wireless sensor network works on the backbone of the network called sensor nodes, a tiny device having different components, a sensor unit, an ADC (Analog to Digital Converter), a CPU (Central Processing Unit), a power unit and a communication unit. A wireless sensor network (WSN) consist of hundreds to thousands of low power multi-functional sensor nodes work in an unattended environment and have sense, computation and communication ability. The main aim of the sensor nodes is data communication, means transfer of data packs from one node to other with in the network. This communication is done using clustering and average energy of a node. Each cluster selects a leader called cluster head. The cluster heads CHs are selected on the basis of average energy and the probability. There are number of clustering protocols used for the cluster Head selection, The main concept is the life time of a network which depends upon the average energy of the node. In this work we proposed a model, which uses the residual energy for cluster head selection and LZW compression Technique during the transmission of data packets from CHs to base station. This technique improves the throughput and life time of network and saves the energy of node during transmission and helps to transfer more data in less energy consumption. The Proposed protocol is called COMPRESSED MODLEACH.
Big Data Processing Using Hadoop in Retail Domain G
Goddilla NagarjunaReddy ,M.V.Jagannatha Reddy
In the ongoing situation, the volume of information utilized straightly increments with time. Long range interpersonal communication locales like Facebook, Twitter found the development of information which will be wild later on. So as to deal with the tremendous volume of information, the proposed strategy will prepare the information in parallel as little pieces in dispersed bunches what's more, total every one of the information crosswise over bunches to get the last handled information. In Hadoop structure, MapReduce is used to play out the errand of sifting, conglomeration and to keep up the productive stockpiling structure. The information are ideally refined utilizing collective sifting, under the expectation instrument of specific information required by the client. The proposed strategy is upgraded by utilizing the methods, for example, supposition investigation through regular dialect handling for parsing the information into tokens and emoticon based bunching. The procedure of information grouping depends on client feelings to get the information required by a particular client. The outcomes demonstrate that the proposed approach fundamentally builds the execution of multifaceted nature examination.
Index Terms: Big Data , Hadoop , MapReduce , Retail Domain .
Common Fixed Point Theorem Satisfying Implicit Relation On Menger Space.
Dr. M Ramana Reddy .
The main object of this article is to obtain fixed point theorem in the setting of probabilistic metric space using weak compatibility, semi compatibility and an implicit relation
Impact of Using E-learning Skills by Academic Staff Members in their Teaching at Some Saudi Universities
Dr. Mishal. Okla. Al-Shammari,
There has been a rapid increase in the use of information and communication technologies (ICTs) as teaching and learning tools in education. Electronic learning (E-learning) is fast becoming one of the most popular learning environments in the field of education in most universities globally, including in Saudi Arabia. The use of e-learning is now gaining common and popular approval, due to the fact that, as well as reducing classroom time it also creates its own impact on the stakeholders. The use of E-learning in the realm of education is a paradigm shift from traditional practice, brought about by technological development, such as the Internet and digital programmer-enabled mobile apps.
In addition, faculty members at many higher education institutions in the KSA are facing challenge in regards to the implementation of E-learning in their teaching. Hence, this paper will investigate the impact of use E-learning and ICT in the university level. A quantitative data approach was used with the analysis of 375 questionnaires. Validity and reliability of the questionnaire were checked and statistical treatments such as percentages, means, frequencies, standard deviation and analysis of variance (ANOVA) were conducted. The results from the quantitative data analysis identified statistically significant difference in favour of those who are holders of Ph.D. Degrees. Also, identified statistically significant difference in favour of those with between (15-24) years’ experience.
Phishing Detection in Websites Using Neural Networks and Firefly
Swetha Babu K.P, Dr.Radha Damodaram
Nowadays phishing become popular in the internet. Phishing is a website forgery where the attackers steal sensitive information of users like username, password, bank details and security details without the knowledge of users. Phishers are the one to create website same as the trusted website with the same content and designs of the trusted website. Phishing can be done through email, websites and malicious software to get intellectual information, business secrets or military information etc. In order to prevent user from phishing websites PhishShield application is used. It detects phishing website with replacing content by images based on heuristic solutions. In this application an URL is given as input and it gives the status of URL whether it is legitimate or unknown or phishing websites. In this few features are used to detect phishing websites but in the proposed system we considered more features including Google PageRank, Google Position, Alexa rank and other URL based features and its accuracy and performance can be improved by using neural networks where optimum weight is calculated based on firefly algorithm. The experimental results are conducted to prove that the proposed technique works more effectively than the existing technique in terms of accuracy, true positive rate, true negative rate, false positive rate and false negative rate.
In general, testing is one of the most important part of software development lifecycle (SDLC).Now a days, usage of internet is increasing rapidly, so it becomes necessity to test the websites. The web testing is more complicated as it involves different testing strategies and tools, because the tool has to support different characteristic properties and also different frameworks. So there is need to test websites as early as possible so that you will get require result in less time.
The main objective of our project is to develop a time and cost effective web testing environment using selenium grid and spot instances of AWS (Amazon Web Service) on cloud to reduce testing Time using selenium grid on multiple machines and to reduce testing Cost by use of lower cost spot instances of Amazon Web Services (AWS).
Risk Perception And Behavior Using In Mobile Security
Dr.M.Sornamageswari , C.Bathma
Security has long been a technical problem with technical solutions. Over time, it has become apparent that human behaviour is a major weakness in technical solutions. Extensive efforts have been taken to inform individuals about the threats and safeguards with which to protect against such threats. Organizations have developed awareness campaigns to enhance the security of employees. These awareness campaigns seek to provide employees with information about a threat as well as measures to take to prevent against the threats. This dissertation investigates the effectiveness of various security awareness message themes as well as the individual perceptions and characteristics that affect security behaviour. First, a survey study is conducted which measures perceptions surrounding security threats and safeguards. The analysis of the survey data builds a foundational understanding of how individuals assess and respond to technical security threats. Next, via awareness themes are evaluated through the use of targeted interventions with non-complying individuals presented awareness messages. The individual responses to interventions and surveys allow for the usage of personality data to inform both initial security safeguard behaviour as well as response behaviour to targeted awareness messages. Overall, the tested awareness methods were found to be somewhat effective. However, with the addition of individual information, analysis identified correlations with individual response. These correlations point to the importance of considering individual motivations and perceptions surrounding security threats and safeguards.
Mobile Security Awareness Efforts On User Behavior
Dr.M.Sornamageswari , C.Bathma
Security has long been a technical problem with technical solutions. Over time, it has become apparent that human behavior is a major weakness in technical solutions. Extensive efforts have been taken to inform individuals about the threats and safeguards with which to protect against such threats. Organizations have developed awareness campaigns to enhance the security behaviors of employees. These awareness campaigns seek to provide employees with information about a threat as well as measures to take to prevent against the threats. This dissertation investigates the effectiveness of various security awareness message themes as well as the individual perceptions and characteristics that affect security behavior. First, a survey study is conducted which measures perceptions surrounding security threats and safeguards. The analysis of the survey data builds a foundational understanding of how individuals assess and respond to technical security threats. Next, via awareness themes are evaluated through the use of targeted interventions with non-complying individuals presented awareness messages. The individual responses to interventions and surveys allow for the usage of personality data to inform both initial security safeguard behavior as well as response behavior to targeted awareness messages. Overall, the tested awareness methods were found to be somewhat effective. However, with the addition of individual information, analysis identified correlations with individual response. These correlations point to the importance of considering individual motivations and perceptions surrounding security threats and safeguards.
A Novel Metrics Based Technique for Code Clone Detection
Sushma , Jai Bhagwan
Nowadays, software development is a tricky and time-consuming task. In order to make the development easy, one uses the existing modules with or without little bit change. Modules which are used with or without change are called as code clones. In several places in case of same or different software, a clone can be used for development purpose. Without having care, copy and paste code can lead to inefficiency smell. This bad smell can be detected by finding and refactoring code clones. A clone can be detected by several existing techniques. In this paper, we present a metric based technique for code clone detection. The existing technique is able to detect method level clones only. We proposed the technique to detect module level clones using several metrics. Our technique is useful to find out type1 and type2 clones in software at modules level. For implementation purpose, we have developed a tool in Java named as JSCCD (JS Code Clone Detector) which can detect clones between Java files.