Advancement in Heterogeneous Catalysis of Triglycerides for Biodiesel Production
H. Ibrahim
Heterogeneous catalyst of transesterification is gaining more support because of the friendly nature of the catalysts, easy separation from the products, their reusability and less process water require. This paper present the efficacy of some of the common solid catalysts for biodiesel production. Many researchers have developed different solid base/acid catalysts for transesterification of vegetable oil in order to replace the conventional homogeneous catalysts that have a lot of limitations. The performances of some of these heterogeneous catalysts with appropriate vegetable oils are reviewed in this paper. K/KOH/ϒ.Al2O3 has yielded 84.5% biodiesel from rapeseed oil, X/Y/MgO/ϒ. Al2O3 yielded 96.1% biodiesel from jatropha curcas oil, SO4/TiO2.nH2O and SO4/Zr(OH)2 yielded 90% biodiesel from cotton seed oil. CaO, SrO, Ca(OCH3)2 and Ca(OCH2CH3)2 yielded 95% biodiesel from soybean oil. ZnO, 2 2 4 SO / SnO - /, and 2 2 4 SO / ZrO - have good yield of biodiesel with palm kernel oil and coco nut oil. Heterogeneous catalysis is a process intensification.
Naveen kumar, Jaishree Tripathi, Rachana Dubey Mr. Abhishek Srivastava
Optimal bandwidth assignment for multiple description coded video
Naveen kumar, Jaishree Tripathi, Rachana Dubey Mr. Abhishek Srivastava
In video streaming over multicast network,user bandwidth requirement is often heterogeneous possibly with orders of magnitude difference (say, from hundreds of kb/s for mobile devices to tens of mb/s for high-definition TV).Multiple descry ption coding (MDC) can be used to address this bandwidth heterogeneity issue. In MDC, the video source is encoded into multiple independent descriptions. A receiver, depending on its available bandwidth, joins different descriptions to meet their bandwidth requirements.An important but challenging problem for MDC video multicast is how to assign bandwidth to each description in order to maximize overall user satisfaction. In this paper,we investigate this issue by formulating it as an optimization problem, with the objective to maximize user bandwidth experience by taking into account then coding inefficiency due to MDC. We prove that the optimization problem is NP-hard. However, if the description number is larger than or equal to a certain threshold(e.g., if the minimum and maximum bandwidth requirements are100 kb/s and 10 mb/s, respectively, such threshold is seven descriptions), there is an exact and simple solution to achieve maximum user satisfaction, i.e., meeting all the bandwidth requirements. For the case when the description number is smaller, we present an efficient heuristic called simulated annealing for MDC bandwidth assignment(SAMBA) to assign bandwidth to each description given the distribution of user bandwidth requiremen.We evaluate our algorithm using simulations. SAMBA achieves virtually the same optimal performance based on exhaustive search .By comparing with other assignment algorithms, SAMBA significantly improves user satisfaction. We also show that, if the coding efficiency decreases with the number of descriptions, there is an optimal description number to achieve maximal user satisfaction.
Eye gaze interaction added simple and convenient way to communicate with computer. With a growing number of computer devices around us, and the increasing time we spend for interacting with such devices, we are strongly interested in finding new interaction methods which ease the use of computers or increase interaction efficiency. Eye tracking seems to be a promising technology to achieve this goal. In this paper, I present two experiments that evaluate an interaction technique. The results show that algorithm, which makes use of knowledge about how the eyes behave, preserves the natural quickness of the eye. Eye gaze interaction is a reasonable addition to computer interaction and is convenient in situations where it is important to use the hands for other tasks. It is particularly beneficial for the larger screen workspaces and virtual environments of the future, and it will become increasingly practical as eye tracker technology mature
PERFORMANCE ANALYSIS OF WEB SERVICES BY USING J METER PERFORMANCE TOOL
Nitin Kumar Verma Dr. Neeta Singh, Rishi Gautam
In this paper we have discussed web services performance and compares the performance differences of web services development approaches in java, Soap API and business logic EJB, is use POJO for access request and pass this object request with data server or server, response back to client which is time consuming in middle layer. Hibernate gives the solution by mapping data directly with data server or server. After developed that application, we have analyzed web services performance by using Apache J Meter web services performance analysis tool that configure IP request address of web services in the form of SOAP xml format and get a response from web services in term of throughput, standard deviation, error, average, median. WSDL contains the information like request for service, IP address and port number of called web services. Performance analyses result can be used to make appropriate choice for developing and optimizing mechanism to web services environment.
SPEED CONTROLING USING DISTANCE DETECTOR IN MOVING VEHICLE
Amit Kumar Dimha, Vijay Kumar, John Singh. K
Many accidents may be saving if emergency service detector can detect the distance between upcoming object with running vehicle, and alert the controller. This paper is proposed to provide compatibility in Doppler radar and Speedometer with EDR. This Doppler radar will monitor speed of a vehicle and compare with the inbuilt detect system of speed. We set different parameter for speed according to object availability in path and set speed criteria according to them. For measuring the distance between vehicle and object we use PLD that coupled with microcontroller.
This paper presents the estimation of ripples by using analytical method in active power filters .This method is based on an average model of PWM voltage source inverter. The formulae for the ripple magnitude are derived for singlephase and three-phase three-leg structures. Numerical examples for filters generating third and fifth order harmonics are presented. The reactive component of fundamental harmonic is considered as an example. A ripple current reduction method is proposed that does not require additional switching devices. A current ripple having twice the frequency component of the power supply is generated in the dc part when a single-phase pulse width-modulated inverter is used for a grid connection. The current ripple causes shortening of the lifetime of electrolytic capacitors, batteries, and fuel cells. Without increasing the number of switching devices, the proposed circuit realizes a dc active filter function because center tap of the isolation transformer is connected to the energy buffer capacitor.In addition, the buffer capacitor voltage is controlled by the commonmode voltage of the inverter. The features of the proposed circuit, control strategy, and experimental results are described, including the result of ripple reduction, to approximately 20% that of the conventional circuit
CASE STUDY ON TRANSFORMER TRIPPING AFTER COMMISSIONING & OIL SPALSH OUT
Shubham vyas
Transformer supplied on 28/01/2011, erection completed on 03.10.2012, Oil filtration & circulation completed and pre commissioning test completed successfully.
An oil sample is taken for BDV, PPM measurement& it came 82 KV &13PPM which was excellent for 132KVclass transformer. Transformer successfully charged on 0620 Hrs dt. 09.10.2012 & load increases gradually, when the transformer reaches on load of 41.2MW. It was observed thattransformer tripped on pressure relief device at 1358 Hrs on same date.
Lalit A. Patel Sarman K. Hadia , Parthesh R. Mankodi
APPLICATION OF GENETIC ALGORITHM FOR SWITCH LEVEL FAULT FINDING IN INTEGRATED CIRCUITS
Lalit A. Patel Sarman K. Hadia , Parthesh R. Mankodi
The paper describes an approach for the generation of deterministic test pattern generator logic. This approach employs a genetic algorithm that searches for an acceptable practical solution in a large space of implementation. Its effectiveness (in terms of result quality and CPU time requirement) for circuits previously unmanageable is illustrated. The flexibility of the new approach enables users to easily trade off fault coverage and CPU time to suit their needs.
Tejas P. Kokate Sanket S. Kulkarni, Virendra S. Ravalji Deepak B. Waghchaure,
CONTENT-BASED IMAGE RETRIEVAL VIA VECTOR QUANTIZATION
Tejas P. Kokate Sanket S. Kulkarni, Virendra S. Ravalji Deepak B. Waghchaure,
Image retrieval and image compression are each areas that have received considerable attention in the past. In this work, we present an approach for content-based image retrieval (CBIR) using vector quantization (VQ). Using VQ allows us to retain the image database in compressed form without any need to store additional features for image retrieval. The hope is that encoding an image with a codebook of a similar image will yield a better representation than when a codebook of a dissimilar image is used. Experiments performed on a color image database over a range of codebook sizes support this hypothesis by considering spatial relationships as well and retrieval based on this method compares well with previous work. To effectively utilize information stored in a digital image library, effective image indexing and retrieval techniques are essential. This paper proposes an image indexing and retrieval technique based on the compressed image data using vector quantization (VQ). By harnessing the characteristics of VQ, the proposed technique is able to capture the spatial relationships of pixels when indexing the image. Experimental results illustrate the robustness of the proposed technique and also show that its retrieval performance is higher compared with existing color-based techniques. One of the key roles of Vector Quantization (VQ) is to compress the data about the image database. In the past years, many improved algorithms of VQ codebook generation approaches have been developed. In this paper, we present a snapshot of the recent developed schemes. The discussed schemes include LBG, enhance LBG (ELBG).
ishwajeet Singh, Mohd Aman , Vaibhav Gupta ,Mayank Parashar,
TECHNIQUES OF DEFEATING STEGANOGRAPHY: A STATE OF ART SURVEY
ishwajeet Singh, Mohd Aman , Vaibhav Gupta ,Mayank Parashar,
Steganography is a useful tool that allows covert transmission of information over an overt communications Channel. Combining covert channel exploitation with the encryption methods of substitution ciphers and/or one time pad cryptography, Steganography enables the user to transmit information masked inside of a file in plain view. The hidden data is both difficult to detect and when combined with known encryption algorithms, equally difficult to decipher. This paper discusses the functional areas in the field of Steganography, how Steganography works, what Steganography software is commercially available and what data types are supported, what methods and automated tools are available to aide computer forensic investigators and information security professionals in detecting the use of Steganography , after detection has occurred, can the embedded message be reliably extracted, can the embedded data be separated from the carrier revealing the original file, and finally, propose some methods to defeat the use of Steganography even if it cannot be reliably detected
Sachin Dwivedi, Shrey SharmaVishwa Mohan , Khatana Arfan Aziz
FINGERPRINT, RETINA AND FACIAL RECOGNITION BASED MULTIMODAL SYSTEMS
Sachin Dwivedi, Shrey SharmaVishwa Mohan , Khatana Arfan Aziz
Biometrics is automated methods of identity verification or identification based on the principle of measurable physiological or behavioral characteristics. Their characteristics are unique and not duplicable or transferable. This paper mainly focuses on a multimodal that comprises of retinal scan, facial recognition and fingerprint scan. Being a very convenient and user friendly way of authentication it is preferred much these days but at the same time it must be secure and reliable enough to meet various security attacks. A biometric system is a system which recognizes the human characteristics and trails, which is use for identifications and access control.The recognition is done on the bases of physiology and behavior characteristics. A unimodal biometric system is one which has only the limited accuracy. So as to improve the accuracy and security of biometric systems researchers came up with the idea of the multi modal biometric system. A multi modal biometric system integrates the results of two or more biometric trails. This paper deals with the multimodal biometric system.
Human Face Identification is an Information technology that identifies the positions of human faces in bits of images. It recognizes Human facial properties and eliminates everything else, such as animals, cars and bodies. It plays an important role in video surveillance, smart cards, protection, Face Databases, Access control and Human Computer Identification. Human face is one of the most significant features to detect persons in an image. As sufficient luminous information is not available in the existing approach, we propose a new method to identify various colors of human face. The proposed methodology identifies how to reveal human face from the background image.
SOFT COMPUTING METHODOLOGIES IN BIOINFORMATICS AND ITS ADVANCE TOWARDS BIOLOGICAL DNA
Dr. Tryambak A. Hiwarkar, Sridhar Iyer
Bioinformatics is a promising and innovative research field in 21st century. Despite of a high number of techniques specifically dedicated to bioinformatics problems as well as many successful applications, we are in the beginning of a process to massively integrate the aspects and experiences in the different core subjects such as biology, medicine, computer science, engineering, chemistry, physics, and mathematics. Bioinformatics is a fast growing field in the scientific community. It involves a wide range of problems, for example, DNA sequence analyses, RNA secondary structure predictions, phylogenetic analyses and microarray analyses. Recently the use of soft computing tools for solving bioinformatics problems have been gaining the attention of researchers because of their ability to handle imprecision, uncertainty in large and complex search spaces. The paper will focus on soft computing paradigm in bioinformatics. Keywords: Nucleic Acid Sequence, Nucleotides, DNA Sequencing
Ibrahim H, , Bugaje I.M ,.Famuyide O. O Mohammed I.A,
UTILIZATION OF BAGASSE IN PULP AND PAPER MANUFACTURE IN NIGERIA
Ibrahim H, , Bugaje I.M ,.Famuyide O. O Mohammed I.A,
Large quantity of bagasse is produced annually and not much use is made of them except as waste. This investigation was carried out in an effort to search for raw materials to replace the presently imported long fibre pulp in Nigeria. Bagasse was macerated and the properties of its pulp were evaluated. Sample sheets of paper were produced using hand sheet method and were duly tested for tearing resistance, tensile strength and burst strength. The pulp has fairly long fibre length of 2.071mm. Its papers posses high tearing resistance of 1226.25mN and tear factor 125.00m2 but low tensile strength of 6.50Nm/g and burst strength of 57.5kPa. Therefore its paper products can be used for writing and printing applications
A KNOWLEDGE BASED METHODOLOGY TO UNDERSTAND THE USER BROWSING BEHAVIOR FOR QUALITY MEASUREMENT OF THE WEBSITES USING WEB USAGE MINING
Prof. Poonam Sawant Dr. R.V. Kulkarni
World Wide Web is a huge repository of web pages and links. It provides huge information for the Internet users. The growth of web is tremendous as approximately one million pages are added daily. Users’ accesses are recorded in web logs. Because of the tremendous usage of web, the web log files are growing at a faster rate and the size is becoming huge. Web data mining is the application of data mining techniques. Extraction of user behavior is an important work in Web Mining. Web Usage Mining applies mining techniques in log data to extract the behavior of users. Today most of the banks are entered in the web world. They are launching various online facilities day to day for customers. This paper presents the browsing behavior of the user in banks websites and the quality measurement factors of the website. In this study we have analyzed log server of three major public sector banks i.e. State Bank of India, Bank of Maharashtra and Bank of Baroda and three major private sector banks i.e. ICICI bank, HDFC bank and Federal bank. The obtained results can be used in different applications like, site modifications, business intelligence, system improvement, and web personalization and useful to tell, how to provide customer with more exactly needed and accurate on line information to improve banking activities and achieve business goal.
PERFORMANCE ANALYSIS OF RICIAN FADING CHANNELS USING M-PAM MODULATION SCHEME IN SIMULINK ENVIRONMENT
Sunil Kumar.P Dr.M.G.Sumithra Ms.M.Sarumathi
In a wireless mobile communication system a signal can travel from transmitter to receiver over multipath reflective paths. This phenomenon, referred to as multipath propagation, can cause fluctuations in the received signal’s amplitude, phase, and angle of arrival, giving rise to the terminology multipath fading. When a strong stationary path such as a line of sight path is introduced into the Rayleigh fading environment, the fading becomes Rice-distributed fading. Ricean fading is suitable for characterizing satellite communications and in some urban environments. In this paper, the performance analysis of Ricean Fading Channels using M-PAM Modulation Scheme is implemented using Simulink tool.
PRODUCT LIFE CYCLE MANAGEMENT IN AUTOMOTIVE ENTERPRISES
X.Charles Partha Sarathi Chakraborthy
This paper proposes Data and Process Management to facilitate the Teamwork in a collaborative product Development with internet and intranet support system environment. Nowadays very high competition in Global marketing with global & local customers. So, we need to increase the Manufacturing process globally. To implement these processes will require integrating people, process, machine and computers. The total development is meant for customer satisfaction as per customer specifications. PDM PORTAL is an integrated, information approach to all aspects of product, from customer’s, manufacturing deployment and maintenance with finished product.PDM PORTAL suites enable accessing, updating, manipulating and reasoning about customer, process and product Globally-Locally. This integration takes place through well accepted human and electronics protocols. So, try to introduce the new concept to integrate PDM, ERP, CRM and SCM (Product Data management, Enterprise resource planning, Customer relations management, and Supply chain management – product, processes, customer and Web Protocol Development. For this integration time to be reduced to develop the product and time to market as per customer satisfaction and this trend expected in next generation. The Data and Product Process to get and Distributed geographically. PECS implementation in enterprises is aimed at delivering products faster making Product development process more systematic as per customer requirements. PECS system includes storage , Inventory, processing of Design information and manufacturing Data in an engineering organization with Product Centric approach. We develop architecture for Product Master Data [PMD] that includes CAD/CAM/CAE of Design and Manufacturing Process of Automobile Industry. Therefore we suggest through this support can access all design and manufacturing information in the enterprise must be Web-based because of its universal Data efficiently using with distributed Data. Using this scenarios and systems we will show effectively using PECS Tool support geographically access for Time to Market.
AN EXPLORING DYNAMIC NATURE ROUTING TO INCREASE NLT AND LLT IN MOBILE AD-HOC NETWORK
Saranya. S Chandrasekaran.R
- In mobile ad-hoc network (MANET), a node may drain its power or diverge without giving any notice to its neighboring nodes. It causes changes in network topology, and thus, it significantly degrades the performance of a routing protocol. Several routing protocol studies are based on node lifetime and link lifetime. The main objective here is to evaluate the node lifetime and the link lifetime utilizing the dynamic nature, such as the energy drain rate and the qualified mobility estimation rate of nodes. These two performance metrics are incorporated by Route lifetime-prediction algorithm. The exponentially weighted moving average method is used to estimate the energy drain rate. The receiver can measure the signal strength when it receives the packets from sender in same power level and then it calculates the distance between two nodes by applying the radio propagation model. The proposed EDNR protocol outperforms the conventional DSR protocols and it is simulated using NS2.
This project is a step towards the preventative healthcare for cardiac patients. It seeks to develop a smart mobile ECG monitoring system that continuously monitors what is happening around the subject when an arrhythmia event occurs. The problem we are facing now is the unexpected death of our loved ones because of the sudden heart attack. Because of the changing life style the heart attack rate is increasing day by day. The current heart attack death rate is about 25% of the total deaths in India. The main cause of heart attack death is the lack of medical care at the right time. This problem can be avoided by this project. Here I am presenting an android based portable ECG monitor. The patient will be wearing a small device which senses the ECG data. It will send the sensed data to the patient’s Android mobile through Bluetooth. The Android mobile will be having an application which will be running a heart attack detection algorithm. If any abnormalities are found the patient will be notified through an audible alarm and first aid techniques will be shown to the patient in the phone’s display. This first aid instruction will increase the chance of survival of the patient. A report of the ECG will be send to the patient’s doctor through email so that he can prepare himself for the treatment. And also a sms containing patient’s location (gps data) will be send to the hospital so that help can be given at the earliest even if the patient is travelling. The goal is to provide early heart attack detection so that the patient will be given medical attention within the first few critical hours, thus greatly improving his or her chances of survival
MINIMIZATION OF INTRA-CLUSTERERROR CRITERION FUNCTION USING IMPROVED K-MEANS
Jain Sapna, Sharma Anu
-Data mining is the process of sorting through large database or data warehouse and extracting knowledge interested by the people. The extracted knowledge may be represented as concept, rule, law and model.Clustering is one such technique in data mining that partitions the data in meaningful clusters so that the distances of objects in the same cluster is as small as possible.Among the wide range of clustering algorithms,k-means is one of the most popular clustering algorithms. This paper presents animproved k-means algorithm using Euclidean distance method. The intra-cluster error criterion function minimizes significantly using the improved k-means algorithm. Moreover, the distribution of the data objects also improved and the results are verified over two datasets namely- letter image recognition dataset and the seeds datasets using improved k-means algorithm. The effectiveness of the algorithm is shown by comparing the results over standard k-means algorithm and the improved k-means algorithm.
TWO LINK ROBOT CONTROLLERS BASED ON FUZZY TYPE-2 AND HIGHER ORDER SLIDING MODE
Ali Panjeshahi, Assef Zare, Saeed Balochian
In this paper, the multi-variable control of a two-link robot is considered. Industrial robots, such as robot of two degrees, are the high acceptance in industry and academic environments. They are also a classic problem in robotics for testing and evaluating the new controllers. In this research, two controllers based on fuzzy type 2 and higher order silding mode are employed for this case. The implementation of these controllers on robot models shows a proper tracking for each link.
MODEL REFERENCE ADAPTIVE TECHNIQUE FOR SENSORLESS SPEED CONTROL OF INDUCTION MOTOR
T. Ravi kumar, , Ch. Shankar Rao, Ravi Shankar
This paper describes a Model Reference Adaptive System (MRAS) for speed control of the Induction Motor drive (IM) without a speed sensor. In this scheme an Adaptive Pseudoreduced-order Flux Observer (APFO) is used instead of the Adaptive Full-order Flux Observer (AFFO), an APFO is used for estimate the IM rotor speed and stator resistance, and these are used as feedback signals for the Field Oriented Control (FOC), which is a widely used control method for Induction Motor drive (IM). Simulation results show that the proposed scheme can estimate the motor speed under various adaptive PI gains and estimated speed can replace to measured speed in sensorless induction motor drives, this scheme is more efficient at very low speed, and also observed line currents, torque and speed under no-load and load conditions.
BIOFUEL FOR SUSTAINABLE (AND ECO-FRIENDLY) ENERGY DEVELOPMENT
Ibrahim H.
Biofuel is as old as the existence of man, made of three categories; solid, liquid and gas. Dried manure, charcoal and wood are well known solid biofuels .The liquid biofuels include; biodiesel, bioethanol, biobuthanol and biopropanol. The last three are called bioalcohols of which, biopropanol is the least commonly use in this group and biothenol the most. Biogases are methane and Syngas. Biodiesel can be produced by homogenous and heterogeneous catalysis with heterogeneous catalysis now found to be better process. The liquid biofuels burn better than fossil fuels and therefore give engines longer lives. Bioethanol has higher octane rating than gasoline. Both biodiesel and bioethanol mix completely with conventional diesel and gasoline respectively. This review highlights the benefits of biofuels and their production.
Suleiman Y., Anyakora N.V. MohammeD f Abubakar A., Aderemi B. O., Okonkwo P.C
DESIGN AND FABRICATION OF FLUIDIZED-BED REACTOR
Suleiman Y., Anyakora N.V. MohammeD f Abubakar A., Aderemi B. O., Okonkwo P.C
A fluidized-bed reactor was designed and constructed for practical demonstration of the fluidization of solid particles at different fluid flow rates. The bed of this reactor was sand particles of average size 1800 μm ,weighed 0.6 N and the fluidizing fluidwas air. Alternatively, the fluidizing fluid can be substituted for any given gas by connecting the desired gas cylinder to the blower. The height of the bed was 25 mm on a mesh of 1230 μm. An air blower was designed to supply air from the room to fluidize the bed.The shaftand discharge powers of the blower were18.8kW and its efficiency was 70%. The minimum and maximum operating pressures were 0.1133 and 24.5262 mH2O and their corresponding velocities were 0.64 and 245.86 m/s respectively.This project was found suitable for undergraduates of Chemical Engineering and related studies for improved knowledge and practical skill required for effective and optimal performance in meeting industrial needs towards improved service delivery.
POWER QUALITY IMPROVEMENT USING 5-LEVEL FLYING CAPACITOR MULTILEVEL CONVERTER BASED DYNAMIC VOLTAGE RESTORER FOR VARIOUS FAULTS
G. N V Sarath Babu , A.Naveen kumar , Shaik Ansar
This paper presents the application of dynamic voltage restorers (DVR) on power distribution systems for mitigation of voltage sags, harmonics and imbalances at sensitive loads. The dynamic voltage restorer (DVR) has become popular as a cost effective solution for the protection of sensitive loads from voltage sags and swells. It would be advantageous that a DVR could also be used to compensate any steady state load voltage harmonics, since this would increase the Power Quality. The DVR, which is based on a five-level flying-capacitor voltage Source converter (VSC), has been proved suitable for the task of compensating voltage disturbances. The performance of the DVR depends on control technique involved. This paper presents the control system based on the so-called repetitive control. Unlike other control schemes with a comparable range of applicability, only one controller is needed to cancel out all three disturbances simultaneously, while exhibiting good dynamic performance. Simulation results are presented to illustrate and understand the performances of DVR in supporting load voltage. To evaluate the quality of the load voltage during the operation of DVR, Total Harmonic Distortion (THD) is calculated.
A NEW CONVERTER TOPOLOGY FOR HYBRID-ELECTRIC POWER PLANTS
A.Naveen kumar , Shaik Ansar, CH.V Ganesh
Environmentally friendly solutions are becoming more prominent than ever as a result of concern regarding the state of our deteriorating planet. This paper presents a new system configuration of the front-end rectifier stage for a hybrid wind/photovoltaic energy system. This configuration allows the two sources to supply the load separately or simultaneously depending on the availability of the energy sources. The inherent nature of this Cuk-SEPIC fused converter, additional input filters are not necessary to filter out high frequency harmonics. Harmonic content is detrimental for the generator lifespan, heating issues, and efficiency. The fused multi input rectifier stage also allows Maximum Power Point Tracking (MPPT) to be used to extract maximum power from the wind and sun when it is available. An adaptive MPPT algorithm will be used for the wind system and a standard perturb and observe method will be used for the PV system. A new Operational analysis of the proposed system will be discussed in this paper. Simulation results are given to highlight the merits of the proposed circuit.
COLOUR FACE RECOGNITION:A NOVEL RECOGNITION METHOD
Indu H Menon M.Ramesh Punal M Arabi3
This paper presents an novel approaches to the detection and recognition of human face and describes an efficient real time colour face recognition system which tracks a subject’s head and then recognizes the person by comparing local texture features of the face to those of know individual. This approach treats face recognition in different colour spaces other than RGB. We have implemented the face detection system using skin colour detection. To avoid the illumination problem and pose constraints in face recognition, two face descriptors are used,i.e., so called colour local Gabor wavelets (CLGWs) and local colour vector binary patterns(LCVBPs). These features are used along with eigen-faces for better recognition. The framework provides the ability to learn to recognize in a unsupervised manne
REVIEW ON TECHNOLOGY TO MEASURE SPEED OF CRICKET BALL AND BAT
Baljinder Kaur , A mandeep kaur
Today, Cricket is a very popular game worldwide. Cricket is a bat and ball game played between two teams of 11 players on a roughly circular field. It involves a bowler, a batsman and fielders. The bowler bowls to the batsman and tries to get him out while the batsman tries to score and hitting a ball. In cricket two factors are too much important and these factors are hitting speed & bowling speed. In this paper we look at various techniques that have been used to propose in recent years to measures the speed of bat and ball in cricket. This paper gives introduction about cricket in section 1. Section 2 tells the various methods suggested to measure speed in cricket. Finally section 3 concludes the paper.
At the present time, education environments have two types. These are traditional and virtual education environments. In both the area, one of the important problems is habit analysis and evaluation. In traditional education systems, habit analysis is done easily through observation techniques, whereas in virtual ones analyzing students’ attitudes and habits is a significant problem. Web mining applications, used in providing meaningful information from meaningless habits and surfing in web environments, is the way to overcome this problem. In this study, web mining applications in virtual education environments were formed in accordance with descriptive research method. In conclusion, how web mining is used in education environments was discovered.
A NEW APPROACH FOR LOAD BALANCING IN CLOUD COMPUTING
S. Mohana Priya , B. Subramani
Cloud computing is built on the base of distributed computing, grid computing and virtualization. The eminence of the place of cloud computing in future converged networks is incontestable. It is due to the obvious advantages of the cloud as a medium of storage with ubiquity of access platforms and minimal hardware requirements on the user end. The scalability, high availability, load balancing, cost, performance are some major issues. Cloud computing environments provide scalability for applications by providing virtualized resources dynamically. Moving applications to a cloud computing environment triggers the need of scheduling as it enables the utilization of various cloud services to facilitate execution. In the proposed algorithm it uses the active monitoring load balancing algorithm and resource aware scheduling algorithm for improved resource utilization and scheduled load balancing for high performance in cloud systems.
COMPARISON OF XP AND SCRUM PROJECT MANAGEMENT TOOLS
Heena, Raj Kumari Raj Kumari
A Software project varies in size depending upon the need. One of the aspect is to manage these projects i.e. Project Management. Various software’s /tools are available for managing the projects. This paper focuses on the comparison between tools for managing the projects based on Agile methodologies namely Scrum and XP(Extreme Programming).
INTEGRATION OF 2D SECURE BARCODE IN IDENTITY CARDS: WITH ADDITIONAL SECURITY FEATURES
Manisha Bajpai, Arun Prakash Agrawal
In this paper, we extend our previous approach to develop an ID card management system that integrated 2- dimensional Barcode which is responsible to produce secure and reliable identification cards. In our previous [1] work we made use of only photograph of the holder, in order to make it secure from being forged. This time we have extended our approach and it uses photo as well as signature and the identity documents of the holder of the ID card. In this extended approach the system will capture more information including photo and signature and will dynamically generate an image of 2D barcode containing the information provided and will affix this barcode image an ID card. This card will be used to validate and authenticate the holder. Main advantage of using 2D Barcode is its data encoding capacity, 2D Barcode is able to encode up to 500 bytes per square inch.
MEDICAL IMAGE COMPRESSION USING INTEGER MULTI WAVELETS TRANSFORM FOR TELEMEDICINE APPLICATIONS
Mr.E.PraveenKumar Dr.M.G.Sumithra
In this paper we suggest an efficient compression and encoding coding performance based on Integer multi wavelet transform of medical application. This method reduces the Mean Square coefficients and increases the peak signal to noise ratio in the code block due to the transmission purpose. By using this coding technique the compressed data and encoded bit stream are all suited for progressive transmission. By the experimental results show that the proposed algorithm gives better quality, if the images using integer multi wavelets compared to that of the other wavelets transforms. The parameter of the system has been evaluated based on Compression Ratio (CR), peak signal to noise ratio (PSNR) and mean square error (MSE).
: HIGH SPEED MULTICAST DISTRIBUTION SCHEME FOR MOBILE ADHOC NETWORKS USING DATA MINING TECHNIQUE
G.vijay, E. Karthiga, I. Rajalakshmi
To secure multicast communications, security services such as authentications data integrity, access control and group confidentiality are required The proposed algorithm several key distributions approaches proposed multicast clustering is dividing the groups in to several sub groups ,an entity called Local Controller (LC) manage each subgroup which is responsible for local key management within the cluster. Thus ,after Join or Leave procedures ,only members with in concerned cluster are affected by re-keying process ,the local membership dynamism of a cluster does not affect the other cluster of the group This concept is established in This paper by using one of the Data Mining Techniques Viz Clustering
THE TUNABLE PATH SELECTION BY USING ONION ROUTING NETWORK
M.Lakshmi , S.Amutha S.Saranya, T.Tamilmani,
The Tor anonymous communication network uses self-reported bandwidth values to select routers for building tunnels. Since tunnels are allocated in proportion to this bandwidth, this allows a malicious router operator to attract tunnels for compromise. Although Tor limits the self-reported bandwidth, it uses a high maximum value, effectively choosing performance over high anonymity for all users. We propose a router selection algorithm that allows users to control the tradeoff between performance and anonymity. We also propose an opportunistic bandwidth measurement algorithm to replace self-reported values that is more sensitive to load and more responsive to changing network conditions. Our mechanism effectively blends the traffic from users of different preferences, making partitioning attacks difficult. We implemented the opportunistic measurement and tunable performance extensions and examined their performance both through simulation and in the real Tor network. Our results show that users can get dramatic increases in either performance or anonymity with little to no sacrifice in the other metric, or a more modest improvement in both.
COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
Mr.Upendra kumar Karheriya, Mr.Bharat raj pandey
Mobile ad hoc networks (MANET) represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self organize into arbitrary and temporary ad hoc network topologies. A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols designed to accommodate the needs of such self-organized networks do not address possible threats aiming at the disruption of the protocol itself. In this paper In this paper, we compare we compare and evaluate the performance metrics Ad-hoc On-demand Distance Vector (AODV) routing protocol, Ad-hoc On-demand Multipath Distance Vector (AOMDV) routing protocol. This paper investigates all these routing protocols corresponding to packet delivery fraction (pdf), end to end delay, Packet loss. The ns-2 simulation results showed that AODV has better performance compare to AOMDV routing protocol mobile ad-hoc network.
RAKE MANAGEMENT SYSTEM (RMS): OPERATIONAL ASPECT OF FREIGHT OPERATIONS INFORMATION SYSTEM (FOIS) FOR INDIAN RAILWAYS (IR)
Agarwal, Seema
This paper explores need, development and main features operational subsystem of FOIS for IR which is called Rake Management system. It is a system for management and control of freight movement that also assists managers to optimize asset utilization. It has main advantage of providing real time data for wagons/ rake for proper decision making. The paper also explores advantages and certain shortcomings in the interface mechanisms and future integration with latest technologies
H. Venkateswara Reddy S. Viswanadha Raju B. Suresh Kumar 4C. Jayachandra
OUTLIER TEST FOR CATEGORICAL DATA BY USING HYPERGRAPH DEVIATION COMPARISON
H. Venkateswara Reddy S. Viswanadha Raju B. Suresh Kumar 4C. Jayachandra
Outlier detection is one most important issue in recent years. Outlier detection is the process of detecting errors in data. The recent methods are mostly based on the Numerical data, but these methods are not suitable in real time data such as web pages, business transactions etc., which are known as Categorical data. It is difficult to find outliers in categorical data. In this paper, we propose an approach to find outliers that is Comparison of Deviations. In Comparison of deviation method, hyper graph is used to calculate the deviations of each object in the database. After comparing all deviations which are having most negative term that objects are treated as outlier
Sumeet H. Pardeshi, Amit M. Morvekar Hemkant B. Gangurde , Mahesh D. Gangod
AUTOMATED ASSESSMENT SYSTEM FOR SOURCE CODE
Sumeet H. Pardeshi, Amit M. Morvekar Hemkant B. Gangurde , Mahesh D. Gangod
Generally programming contests are managed, monitored and judged manually which tends to be a major defect, thus leading contest to be more time consuming and complex to judge. The proposed project aims at developing a system wherein the participants can login to an online system and upload their codes and automated system will judge their programs. Judge aspect and Participant aspect are the two main views of system. Students can work on problem, compile their solutions and submit them to the online system. They will get the feedback about the code whether it is acceptable or specific error specifications if any. Judges can view the current status of code submission and rankings accordingly, which they can use to evaluate the work. Automated Assessment System for Source Code (AASSC) aims at providing fair evaluation of source codes be in programming contest, or online practical exams held as a part of university curriculum. Unlike other competitive products in market, which rank contest based on timing and number of submissions only, proposed system uses some benchmarking metrics for analysis of code and thus yielding a fair outcome. Plagiarism by students is the biggest emerging threat which this proposed system tries to tackle. System aims at identifying the plagiarized source code, thus leading to a more fair evaluation and helping to improve the quality of programming among the students.
Children with Autism Spectrum Disorder (ASD) are often characterized by inadequacy in social communication skills. In recent time, many assistive technologies, particularly Virtual Reality, have been investigated to promote social. It is well known that children with ASD demonstrate atypical viewing patterns during social interactions and thus monitoring eye-gaze can be valuable to design intervention strategies. While several researchers have used eye-monitoring technology to track eye-gaze for analysis, there exists no real time system that can monitor eye-gaze dynamically and provide customized feedback. Researchers are increasingly employing technology to develop more feasible, accountable, and individualized intervention tools to address core vulnerabilities related to autism. The study states the development and preliminary application of a Virtual Reality (VR) technology aimed at facilitating improvements in social communication skills for adolescents with autism. Virtual Interactive system with Gaze-sensitive Adaptive Response Technology (VIGART) is capable of delivering individualized feedback based on a child’s dynamic gaze patterns during VR-based interaction. I present preliminary data from the usability study of this technological application for six adolescents with autism and discuss potential future development and application of adaptive Virtual Reality technology within an intervention framework.
E-VOTING is a term used to encompass the various techniques applied, through which the electorate or voters can express their intentions electronically. It entails the use of electronic voting equipment, phones, Personal Data Assistants (PDA), online voting etc. The adoption of e-governance strategy in electioneering processes (using Nigeria context- 36 states) will effectively reduce cost as well as enhancing election activities. What makes an e-voting model acceptable is its ability to properly authenticate voters and provide a secure means through which a voter can express his/her franchise. Adopting biometrics authentication is regarded as an effective method for automatically recognizing, with a high confidence, a person’s identity. This paper therefore, proposes Self-Monitoring Analysis and Reporting E-Voting Simulation Model (SMARESiM), a design model of an evoting system leveraging on Biometric Encryption (BE) viz Biometric key Binding (BKB) which is a secured strategy that entails fusing of biometrics with cryptographic schemes. The main objective of this research is to improve on the already existing E-voting models by fusing and adopting biometric and cryptographic techniques as well as using a secure transmission channel for confidential datasets of a voting process. This work develops a simulation model of an E-voting system which adopts relevant algorithms and mathematical equations with emphasis on biometric security schemes. The simulation of a prototype model of the electronic voting system would be developed using Proteus 7.6 application software (a simulation model). Relevant algorithms and flow models are presented while developing the SMARESiM with PROTEUS ISIS coded in Assembly Language. The prototype model would consist of electronic kiosk polling booths (two e-booths) that are all networked to the state electoral collection center and two state collection centers (in this model) are networked to the national electoral collection center via a VPN backbone. The proposed SMARESiM uses a Virtual Private Network (VPN) as the means of communication between the various polling booths and collection points. The VPN platform provides a fast, safe and reliable means of transmitting data over the internet. The results of validation show that the proposed model facilitates the adoption of E-governance in the developing countries
ISCLOUD V.1.0: AN INTERACTIVE CLOUD SHOPPING CART BASED ON SOFTWARE AS A SERVICE COMPUTING MODEL WITH HYBRID CRYPTOGRAHIC ALGORITHM
,kafor KC Udeze CC, Okafor CM
Online Shopping Cart Access Control presents a new security concerns for cloud computing applications in general. Contemporarily, these solutions (Online Shopping Cart) now leverages on Cloud Computing Software as a Service, Platform as a Service, and infrastructure as a Service delivery models viz: Cloud Web Hosting,Cloud Hosting, Reseller Web Hosting, Business Web Hosting, Dedicated Instances, and Web Hosting Business solutions. Shopping Carts can now be dedicated to providing customers with the most reliabile web order as well as web hosting services in real time. Candidate models like X-cart, S-cart Now by Amazon Services,Cubecart,Zen Cart, aspdotnetstorefront,WDL and Mal’s E-commerce among others leverages on the potential benefits associated with today’s e-commerce. Most e-Commerce proposals in literature lacks adequate security integration and trust, making online transactions vulnerable at large. This paper presents ISCloud V.1.0, an interactive cloud shopping cart based SaaS with Hybrid Cryptography in which a fast high-quality symmetric-key and public key encryption algorithm is used for access authentication. In context, the generated symmetric key is used for integrity encryption for the authentication access in ISCloud V.1.0 SaaS model. For service trust by customers,a Secured Socket layer Certificate authority (domain validation) will be acquired from a trust Certificate Authority at its deployment. The design methodology and service framework is detailed in the body of this paper. PhP,XAMPP Apache and MySQL is used for a prototype implementation.