In a computer architecture Cache memory have been introduced to balance performance and cost of the system. To improve the performance of a cache memory in terms of hit ratio and good response time system needs to employ efficient cache replacement policy. In this paper we proposed and implemented a novel cache replacement policy which predicts future request of a block depending upon its access pattern. Algorithm uses the concept of inter-reference recency of a block to detect access pattern and uses history of response time for efficient replacement. Result shows novel cache replacement policy has low response time and high hit ratio comparatively to other policy. Proposed policy concludes that it reduces response time and improves hit ratio.
Design and Analysis of Integrated Electronic Ballast for HID Lamps Featuring HPF
M Vijay Shanthil, Dr M Sushama
This paper proposes high-power-factor electronic ballast for metal-halide (MH) lamps. In the proposed circuit, two buck–boost converters and a buck converter are integrated with a full-bridge inverter by sharing the four active switches of the full-bridge inverter. Two active switches are switched at high frequencies, while the other two are switched at lower frequencies. The buck converter is used to step down the DC-link voltage of the full-bridge inverter and filter out the high-frequency components to drive lamps with a low-frequency square-wave (LFSW) current. The buck–boost converters are operated at discontinuous-conduction mode to perform the function of power-factor correction (PFC) to ensure almost unity power factor at the input line. By tactful arrangement of diodes, the DC-link capacitors are discharged in parallel; this helps to operate the high-frequency active switches at a high duty ratio, achieving a small peak value of the PFC-converter current and correspondingly smaller conduction losses. Detailed operation modes and the design equations are provided. Prototype electronic ballast for a 70 W MH lamp is built and tested. Experimental measurements have proven that the proposed electronic ballast has the advantages of high-power factor and being free of acoustic resonance. By integrating the active switches of the converters and the inverter, the proposed electronic ballast is advantageous in terms of cost-effectiveness and high energy-conversion efficiency
In the present time, MANET is one of the current areas a nd it established excellent devotion due to its capabilities of configuration and maintenance. Whereas quick research work supposed as supportive situation and attentive on the problems such as wireless channel security. It has become a major concern to deliver secure connection between nodes in an unfriendly situation. Latest wireless study specifies that the wireless MANET offerings the higher security difficult than underwired or wireless network. There is collection of mobile ad hoc network. Even though it has several benefits over the traditional wired networks.. In the current work I m going to introduce the PKI model with Elliptical Curve digital Signature in MANET for making it more secure and stable from attacks.
Data dissemination Issue and protocol in WSN a survey
Savita Saini, Arvind Kumar
There are a few special features of WSN like restricted battery life, bound computing routing capabilities etc. for the reason that of these particular features of wireless sensor networks, routing algorithms of mobile ad-hoc networks are not appropriate. The current data dissemination system is not energy-efficient for this problem several algorithms and routing protocols are used over the past decade. There are many protocols are used to determine the best way for energy utilization in wireless sensor networks. This paper tries to study most of the data dissemination protocol used in WSN. Finally most of the protocols will categorized and analyzed. We try to design an algorithm which keeps in account the battery life of nodes and uses more and more nodes with better battery life.
Generation Of A Scenic Image By Tacking Multiple Images
G R Suma , Dr. V.Venkatesh
Image tacking is the process performed to generate one scenic image from a series of smaller, overlapping images. The quality of image stitching is measured by the similarity of the stitched image to each of the input images, and by the visibility of the cease between the stitched scenic images. Image processing techniques involved with treating the image as a two-dimensional signal and applying standard signal processing techniques to it. Image tacking presents different stages to render two or more overlapping images into a ceaseless stitched image. Scale Invariant Feature Transform (SIFT) algorithm is applied to perform the detection and matching control points step and Random Sample Consensus (RANSAC) algorithm is a general parameter estimation approach designed to find the best matching points are used In this process .
ENHANCING SECURITY IN PALM PRINT RECOGNITION SYSTEMS USING ENCRYPTION ALGORITHMS
Shikha Wadhwa, Monika Malhotra
Nowadays, the use of biometric characteristics (e.g., palmprints, irises, fingerprints) is incrementing for individual recognition and many applications of biometrics are already available. Biometrics recognition has many advantages over the traditionally used methods (e.g., password, smart card), because biometric characteristics cannot be shared or forgotten, as it is inherently associated with the individual.
The main focus of Biometrics authentication system is on revocability, security, privacy, accuracy and privacy. In this fast developing communication world, one of the essential requirement is security of biometrics information. In this paper, a biometric authentication system with 2-way security is being proposed, which basically concerns with user’s privacy, network security, trust issues, template protection, and accuracy. Encryption of biometric details is done twice. That’s why; we called the system two way secured. None of the extra information is being disclosed to any unsafe network or any server’s database about the biometrics or user. Two different encryption algorithms are used at the client and server side. Modified version of RSA algorithm, i.e., RSA-2 algorithm is used at one side which is a public key cryptography and other encryption algorithm used is private key cryptography, 3DES algorithm.
No restrictions are possessed on the biometric data used in the proposed approach and it is also applicable for different biometrics (palm print, face, iris, and finger print). An additional layer of security in authentication is being provided by using two way encryption schemes when compared with existing systems.
These instructions Vibration of a smart beam is being controlled by using opposite directional force to the structure. Now a day’s active vibration control is frequently being used in aircraft, submarine, automobile, helicopter blade, naval vessel. In this a smart plate with one pair of piezoelectric lamination is used to study the active vibration control. The smart plate consists of rectangular aluminium beam modelled in cantilever configuration with surface bonded piezoelectric patches. In this case, disturbance is produced using exciter. The piezoelectric sensors are used to detect the vibration. Simultaneously, feedback controller sends correction information to the actuator that minimizes the vibration. The study uses ANSYS-11 software to derive the finite element model of the smart plate. Based on this model, the optimal sensor locations are found and actual smart beam is produced. In this experiment a suitable control methodology is find by which the controller gain optimizes to get more effective vibration control with minimum control input.
Water Quality Prediction Using Data Mining techniques: A Survey
Shoba G, Dr. Shobha G
Data Mining is the set of activities used to find new, hidden, or unexpected patterns in data. Many organizations are now using these data mining techniques. Research in data mining continues growing in business and in learning organization over coming decades. Data mining methods may be classified by the function they perform or by their class of applications. Using this approach, four major categories of processing algorithms and rule approaches emerge: 1) Classification, 2) Association, 3) Sequence and 4) Cluster. This paper explores various data mining techniques like Artificial Neural Network, Back propagation, MLP, GRNN, Decision Tree etc. used in prediction of water quality. This survey focuses on how data mining techniques are used for water quality Prediction is analyzed
Design of 2.5 GHz Phase locked loop using 32nm CMOS technology.
Miss.A.V.Manwatkar, Assistant Prof.V.B.Padole
Nowadays, multi-band frequency synthesizers are very popular for their compatibility. Low power designs is a very hot topic in electronic systems. Phase locked loop is an excellent reserarch topic. Power is the amount to function or generating out energy. This means that it is way of measuring how fast a function can be carried out.So power is one of the important parameter
This paper presents the design and simulation of an area efficient chip layout of 2.5GHz fractional –N phase locked loop for bluetooth application using VLSI technology .This fractional N-PLL is designed using latest 32nm technology, which offers high speed performance at low power. Loop filter and sigma delta modulator are the most important factors in improving the performance of the system. Among variety of frequency synthesis techniques, phase locked loop (PLL) represents the dominant method in the wireless communications industry.
Analysis and comparison of various edge detection technique
Ashish Chaudhary, Mr. Sahil Raheja, Mayank Pandey
The main problem in image processing is to find out the correct boundaries or edges of any object for clearly identifying it. To characterize the boundaries and edge detection is not an easy task in image processing and it become very difficult when image is noisy. Edges are significant local or sharp change of intensity in an image and it occur on the boundary between two different regions in an image. It means that if the edge of any object can be identified accurately and all of the object can be located then basic properties such as area shape can be measured. Edge detection of an image significantly reduces the amount of irrelevant data and filters out the useless information while preserving the main structural properties of any object. It is very crucial to have a better understanding of edge detection algorithm. Many techniques of have been developed for edge detection. This paper tries to provide a comparison of different edge detection schemes that fall in three main categories of edge detectors: Gradient based edge detectors, Laplacian based edge detectors and Non-derivative based edge detectors. Pratts figure of merit is used to compare quantitatively results of edge maps for a synthetic image at various levels of noise. Results of real life image are analyzed qualitatively. Non-derivative based edge detector SUSAN gives the best results even in presence of noise.
Assessment of the Effects of Surface And Subsurface Moisture On ADO-AFAO Road Pavement Failure In Ekiti-State, Nigeria
Abe, O.E., Olulope, O.R
Effects of surface and subsurface moisture on highway pavement failure in Ado-Afao Ekiti road were evaluated to determine the major causes of the deterioration of the pavement. Samples of soil were collected at five different locations along along Ado-Afao Ekiti road and the following geotechnical tests were conducted on the samples; sieve analysis, permeability, compaction, CBR, Triaxial and Atterberg limits. The results showed that the soils have liquid limit ranging from 15.8% - 17.6%, are non-plastic, linear shrinkage ranging from 0% to 3%, maximum dry density ranging from 3180g/cc to 3448 g/cc, optimum moisture content ranging from 8.2 to 9.2%, cohesion ranging from 9g/cc to 50g/cc, angle of friction ranging from 80 to 130, CBR value from 10.6 to 30.2, coarse material ranging from 65.1% to 69.9% while the fine material ranging from 30.1% to 34.9% and the permeability ranging from 3.69x10-2 x 5.8710-2m/s. All the soils are classified as organic silt of medium compressibility containing less plasticity according to Casangrade and A-2-6 (silty soil) of fair to poor rating in terms of possible use as subgrade material according to AASHTO classification. The CBR values of all samples of the soil are low compared to the standard value of 80. The permeability of the soil is high, therefore, the soil is unsuitable for road construction. The strength of the soil will further be reduced when there is rise in the level of water table and this can cause failure of the pavement upon the application of pressure
Friction Stir Welding – Process Parameters and its Variables: A Review
G.C.Jadhav, R.S.Dalu
Friction Stir Welding (FSW) was invented by Wayne Thomas at TWI (The Welding Institute), and the first patent applications were filed in the UK in December 1991, that utilizes a non-consumable rotating welding tool to generate frictional heat and plastic deformation at the welding location; there by, affecting the formation of a joint while the material is in the solid state. Friction stir welding (FSW) is the latest technology in the area of metal joining and is perhaps the most promising of all the welding processes. A lot of research has been carried out in this area but most of the initial work has been done on low temperature softening materials like aluminium alloys. Friction Stir Welding (FSW) has become a major joining process in the railway, aerospace, auto industries and ship building industries especially in the fabrication of aluminium alloys. The process uses a spinning non-consumable tool to generate frictional heat in the work piece. This paper looks at the review, on friction stir welding process, various welding variables like tool rotation, transverse speed, tool tilt, plunge depth and tool design, for the welding of aluminium alloys or various dissimilar alloys. Applications are also described.
Comparative Evaluation of Wireless Ad-Hoc Networks Routing Approach
Singh Shalini , Rajpoot Jyoti
Wireless Ad-hoc Sensor Networks (WSN) is a recent advanced technology of computer networks and electronics. The WSN are increasingly becoming more practicable solution to many challenging applications. The wireless ad hoc sensor networks depend upon the sensed data, which may depend upon the application and various operations require different algorithms for their routing from one point to another. This paper presents a comparative analysis of routing protocols in ad-hoc sensor networks. This paper will study the working of some well-known routing protocols like DSDV, ADOV, DSR AND IMEP.
The most important characteristic is the dynamic topology, which is a consequence of node mobility. Nodes can change their positions quite frequently, which mean that we need a routing protocol that quickly adapts to topology changes. The nodes in an ad-hoc network can consist of laptops and personal digital assistants and are often very limited in resources such as CPU capacity, storage capacity, battery power and bandwidth. This means that the routing protocol should try to minimize control traffic, such as periodic update messages. Instead the routing protocol should be reactive, which means it only calculates routes upon receiving a specific request.
Effective Resource Management Based on Flexible Workload Technique in Cloud
V.RakeshDevi M.E.
The resource management is the main problem in the cloud. Anchor used for fetching stable matching policies when mapping the virtual machine’s to physical servers and clients and the operators are mapping virtual machine’s to physical servers based on the preferences of the user request. In the proposed system, Anchor is the many to one stable matching with heterogeneous resources needs to server. The system used in the large-scale resources management system based on the workload traces. To realize with diverse set of policy goals with good performance. In the system bandwidth estimation algorithm to estimate the data bandwidth of the particular uploading data and the downloading data in the various cloud resources. In the every cloud server’s offer services different from other resources. So, the virtual node can formed and enhance the services and rectify the network based resources problems and give the optimal solutions to the various cloud based resources. The cloud can scaled among different resources and give the effective services in the cloud environment
This paper contributes towards quality education to young school goers of primary and secondary education through their teachers by making them capable to contribute in the global information society and knowledge economics at affordable cost. It also provides teachers with skills to enable them to use ICT as a tool. For this primary and secondary teachers from rural India-core of education should be equipped with this technology eradicating fear from their minds about the new technology. As they will learn and become familiar with the environment, it will lead to more and more student to learn. This will captivate the community towards this programme. The complete courseware of this programme will be provided to the teacher in CBT/Web form Multimedia rich courseware for blended learning/teaching is assisted by classroom delivery also (lesser classroom delivery).The salient features are value addition and opportunity to learn new software packages concurrently with on-going studies and work. In this program we have trained 600 primary teachers from government school of Zilla Parishad.
A multilevel inverter is a power electronic device that is widely applied in industries for high voltage and high power applications, with the added remuneration of low switching stress and lower total harmonic distortion (THD), hence dropping the size and volume of the passive filters. Multilevel inverter machinery has emerged recently as a very important alternative in the area of high power medium-voltage control and also for improving the total harmonic distortion by reducing the harmonics. Generally, the poor quality of voltage and current of a conventional inverterfed induction machine is obtained due to the presence of harmonics and hence there is a significant level of energy losses. The objective of this paper is to obtain a 3-level output, which is acquire by a three phase three level diode clamped multilevel inverter (MLI) fed induction motor drive. This paper presents the simulation result and implementation of three phase three level multilevel inverter (MLI) fed induction motor Drive.
Tamper Detection in Database using Forensic Analysis
Suraj Dhanawe, D.B Hanchate
Tampering of database can be determined through cryptographically hash functions. Hash functions determines only the tampering of data but forensic analysis functions determines only the tampering of data but forensic analysis can help to detect when data is tampered, what data is tampered and ultimately who and why. This paper presents a forensic analysis algorithm which is more efficient than forensic algorithms. It provides a solution set (all possible location of detected tampering.) and provides complete features of the solution set and its cardinality
A Combine Approach of Compression And Encryption For Image Transmission
Suchitra Dubey
In recent years, the development and demand of multimedia product is growing increasingly fast. This is a contribution to insufficient bandwidth of network and storage of memory device. When we send any image over the network it consumes more time. This is due to the huge size of the image file as compared to the text file. One more factor, which is security, should be considered while transmission. Compression can reduce the data redundancy to save more hardware space and transmission bandwidth and encryption can provide security.
Compression and encryption algorithms can be classified into two main categories: Independent encryption and compression technique and joint encryption and compression technique. Joint encryption and compression technique is employed to enable faster and secured transmission of image data.
DNA Samples Processing Using Dry Block Heating System
Pratima Bhalerao, Sharad Jogdand
The emerging studies and researches are based on the science platform of samples of DNA which need to perform various experiments for new findings in researches and their implementations. The analysis of DNA samples is carried out in various labs under controlled temperature environment. Barcoding lab and research facility provide barcoding training to researchers and facilities for them to work on their DNA samples and data generation. There is a necessity of maintaining the required temperature for specific amount of time which is favourable for experiment. A need of controlled environment for the various experiments is necessary for having the maximum accuracy in respective researches done with DNA samples. The controlled environment should have the desired specifications which are suitable for carrying out all multiple experiments on the samples which also should have an additional feature of continuously monitoring, controlling as well as agitating. There are many devices which perform same function but the major difference occurs is the cost. In this paper, we are proposing a dry block heating system which is a compact device which provides a wide range of temperature for the various applications carried out in DNA labs. The efficiency of such devices can be calculated according to the uniformity of temperature inside the chamber and the accuracy of the temperature sensor. A variable agitator provides continuous agitations to samples which avoids the formation of the precipitate during the heating of the samples. Micro-tubes are used which are crystal clear and hold the samples in it which are then processed in the device according to individual experiment. This device is mainly useful for the small scale industries which have low capital and can prove beneficial for new researchers.
Importance of String Matching in Real World Problems
Kapil Kumar Soni, Rohit Vyas, Amit Sinhal
String Matching is the classical and existing problem, despite the fact that the real world aspects belonging to the research field of computer science. In this domain one or several strings called “Pattern” is to be searched within a well-built string or “Text”. String matching strategies or algorithms provide key role in various real world problems or applications. A few of its imperative applications are Spell Checkers, Spam Filters, Intrusion Detection System, Search Engines, Plagiarism Detection, Bioinformatics, Digital Forensics and Information Retrieval Systems etc. This paper is inclusive of analyzing nutshells about string matching along with its long-ago contributory details in an assortment of real world applications.
Ms. Sonali M. Khairnar, Prof. Sanchika Bajpai, Shital Salve, Vijayshri Ingale
A survey on Filtering Annoying Posts From OSN User Walls
Ms. Sonali M. Khairnar, Prof. Sanchika Bajpai, Shital Salve, Vijayshri Ingale
One of the most essential issue in today’s Online Social Networks (OSNs) is to provide users the ability to have full control on the messages which are showed on their own secretive space to avoid that unwanted content is which is being displayed. Till the date, OSNs provide little support to this requirement. To fill the gap, we suggest a system that permitting all the OSN users to have a direct access control on the messages displayed on their walls in social networks. Spamming remains parsimoniously feasible because promoters have no operating costs beyond the management of their mailing lists, and it is difficult to hold senders responsible for their mass mailings. Because the barrier to entry is so low, spammers are numerous, and the volume of unsolicited mail has become very high. This is achieved through a flexible rule-based system, that allows users to customize the filtering criteria to be applied to their walls, and a Machine Learning-based soft classifier automatically labeling messages in support of content-based filtering.
Enhancement of lifetime using different Protocols in wireless sensor network
Amandeep Kaur, Jatinder Singh
Increasing lifetime in wireless sensor networks is a major challenge because the nodes are equipped with low power battery. For increasing the lifetime of the sensor nodes energy efficient routing is one solution which minimizes maintenance cost and maximizes the overall performance of the nodes LEACH (Low-Energy Adaptive Clustering Hierarchy), a clustering-based protocol that utilizes randomized rotation of local cluster base stations (cluster-heads) to evenly distribute the energy load among the sensors in the network. Incorporates data fusion into the routing protocol to reduce the amount of information that must be transmitted to the base station. In addition, LEACH is able to distribute energy dissipation evenly throughout the sensors, doubling the useful system lifetime for the networks we simulated. Also we call the proposed protocol as RESIDUAL ENERGY EFFICIENT PROTOCOL as modification in the basic LEACH protocol in terms of residual energy (ratio of energy in current round to total energy of the network) of nodes. Since LEACH has many drawbacks, many researchers have tried to make this protocol performs better by improving cluster head selection algorithm by several parameters. LEACH stochastic cluster head selection algorithm is extended by adjusting the threshold T (n). Considering these parameters, simulation results shows that the proposed protocol REAP 1 and REAP 2 could better reduce energy consumption and prolong lifetime of the wireless sensor network with respect to the parameters FND (First Node Dies), HND (Half Node Dies) and LND (Last Node Dies) comparative to LEACH , NEAP-1 and NEAP -2.
Layer Based Secure Data Aggregation for Wireless Sensor Network
Deepitha, Manjunath C.R
Wireless sensor nodes are deployed to perform three main tasks: sensing, data processing and communication. Sensor nodes are usually constrained in energy, communication, storage, and computation capability, especially the ones powered by batteries, which cannot be replaced optionally. Due to the main characteristics of resource-constrained and battery-powered sensors in wireless sensor networks, energy consumption is always a major concern. Data aggregation is a method of collecting and aggregating the data to reduce the energy consumption and redundancy. Since data are transmitted through multiple hops security is very much essential. The proposed layered approach provides secure data aggregation by using slicing and mixing method and reduces the number of hopes required to transmit the data
Comparative Analysis of Various Fingerprint Image Enhancement Algorithms
Navjot Kaur, Gagandeep Singh, Sahil Vashist
There are various biometric features for personal identification but Fingerprints are today the most widely used biometric features for the same. Many automatic systems are there for fingerprint enhancement which is based on ridges and valleys. Automatic fingerprint recognition system is totally based on Fingerprint enhancement. It is necessary to choose the suitable enhancement technique for fingerprint, in order to reduce the post-processing part of the fingerprint recognition system. Different Fingerprint Enhancement techniques have been discussed in this work. These different methods are used by which the image quality is enhanced and Fingerprint Matching techniques are applied. These algorithms contribute to recognize the person and provide authenticity on the basis of physiological or behavioral characteristic possessed by the user. But, author’s focus is on the methods of enhancement. By having the proper analysis of all the existing methods and algorithms, author can review the literature of fingerprint image enhancement methods, so as to design a new advanced and modified method for the same. With the help of these techniques we can prepare a system which is helpful to enhance the watermarked fingerprints.
Implementation of Neural Network based Hand Gesture Recognition System
Neha V. Tavari, Prof. A. V. Deorankar
Communication is the means of exchanging information, views and expressions among different persons, in both verbal and non-verbal manner. Hand gestures are the non verbal method of communication used along with verbal communication. A more organized form of hand gesture communication is the sign language, which is the language of communication for deaf and dumb people. Most of these physically impaired communities are dependent on sign language translators to express their thoughts to rest of the world. This causes isolation of these people in society. Hence, Sign Language Recognition (SLR) is one of the most growing fields of research today. Hand gesture is an active area of research in the computer vision, mainly for the purpose of sign language recognition and Human Computer interaction. Here, I have developed a system for hand gesture recognition of Indian sign language, in which each alphabet and numbers of the english vocabulary is assigned a sign which is used by deaf and the dumb to communicate with each other. An artificial neural network based classification with error backpropagation algorithm is used for recognizing different signs and translate them into text and voice format. To implement this approach we have utilized a simple web camera to capture hand gesture images. Thus presenting a system that recognizes Indian sign language (ISL) based on hand gestures allows the user to interact with the system in natural way.
Proposed Algorithm for HCRUsing K-Means Clustering Algorithm
Meha Mathur, Anil Saroliya, Varun Sharma
India is a multi-linguisticcountry and Hindi is a national language of India. There is no such work has been done on offline recognition of Hindi characters so that the Hindi data is stored digitally and the paper work will reduce and the data also store safely for the long period of time because as we know that the data on the paper is not secure, paper may lost or may get faded. Therefore in this paper an algorithm is proposed torecognize the Hindi character optically using k-means clustering algorithm. HCR is not same as the English character recognition because Hindi characters are joined together with the shirorekha which is the line on the upper part of the characters and in English language there is no shirorekha. So in English there is no need to remove that shirorekha but for recognize Hindi character it is necessary.
K-means clustering algorithm is used for cluster the same data into their respective clusters and for classification.The objective of this paper is to provide a high performance OCR solution for Devanagari script that can help in exploring future applications such as navigation, for ex. traffic sign recognition in foreign lands etc.
In today’s world most of the communication is done electronic media. Data security plays vital role in such communication. Hence there is need to protect data from malicious attack. This can be achieved by cryptography. The earlier encryption algorithm was DES which has several loopholes such as small key size, sensible to brute force attack etc. These loopholes were overcome by AES algorithm. AES was announced by NIST (National institute of standard and technology) in November 2001. AES became the successor of DES algorithm because of its security, its ease of implementation, and low memory requirements.
There are three different versions of AES. Each of them has block length 128 bits and key length is 128, 192 and 256 bits
Pooja Ghadiali, Prachi Mehta, Sachin Nagda, Dharit Shah, Prof. Purva Raut, Prof. Anuja Nagare
Intelligent Course Timetable Scheduling Using Memetics
Pooja Ghadiali, Prachi Mehta, Sachin Nagda, Dharit Shah, Prof. Purva Raut, Prof. Anuja Nagare
A college timetable is a temporal arrangement of a set of lectures and classroomsin which all given constraints are satisfied. Hence, timetabling problem is one of the best examples of a Constraint Satisfaction Problem (CSP). Memetic Algorithm is one of the best techniques to solve the Constraint Satisfaction Problem(CSP) and it is a combination of standard genetic algorithm and hill climbing algorithm. In this paper Course Timetable Scheduling System (CTSS) is developed to solve Timetabling – Constraint Satisfaction Problemwhich makes use of Memetic algorithm.
Rich Internet Applications provides rich user experience owing to its advanced user interfaces and highly responsive design implementation. JavaScript, Ajax, Flash etc. are some of the widely used technologies to build such immense Rich internet applications. They offer great functionality to the applications in less lines of code. But on the flipside, it has the limitation, that Search Engines find it hard to index the contents of RIA.Temporary solutions does exists, but they are effective only up to some extent. This paper discuses some of the challenges faced by RIA developers to make their application Search engine friendly and some commonly followed workarounds to override these limitations. It also deeply examines these solutions and identify flaws or limitations of these methods, if any
Performance Analysis of Routing Protocols in Vehicular Ad Hoc Networks for Cbr Applications Over Udp Connections
Parul Gupta, Yogesh Chaba
In this paper, the performance of routing protocols DSDV, OLSR and AODV using performance metrics like Packet Delivery Ratio, Average End to End delay, Packet Loss Ratio and Average Throughput within Vehicular ad hoc networks for CBR applications over UDP connection has been analyzed. Network Simulator (NS-3.19) along with mobility model generated through Simulation of Urban Mobility (SUMO) tool is used for analysis. The results are analyzed by varying node density in the network. The comparison shows that reactive protocol AODV performs better as compared to DSDV and OLSR proactive routing protocols for vehicular ad hoc networks
Analysis of Performance for Data Center under for Private Cloud through Cloud Computing
Ankush Dhiman, Mauli Joshi
Cloud computing is a sort of technology that now aiming to power next generation data centers and to enable application service providers to lease data center capacities to deploy applications depending on user QoS (Quality of Service) needs. Adopting the cloud computing is like signing the new form of a website. In cloud computing, the GUI that controls it make is directly control the hardware resource and your application. But one of the difficult phase in cloud computing is to deploy in real environment. It is difficult to know the exact cost as well as requirement until and unless we own the service not only that whether it will support the existing applications that is available on traditional data center or had to design a new application for the cloud computing environment. Some of the parameters such as security issue, fault tolerance and latency are need to keen care before deploying that we can enable to know solely before implementation. But by using simulation, we can do the experiment before deploying it to real environment. Simulation provide a way to understand the real environment of cloud computing and after achieving the successful result we can commence deploying application in cloud computing environment. By exploiting the simulator, we can save the time as well as cost also.
Design and fabrication of low cost intelligent wheelchair
Pradeep Kumar Rattewal, Parteek Kumar
A novel approach is proposed in this paper to impart intelligence to a low cost smart wheelchair based on embedded system. The sensors give the perceiving power to the wheelchair and scientific inference engine in the microcontroller gives the intelligent power of decision making and its implementation to the wheelchair. This approach is very effective as it does not involve the wastage of the computational and working power of PC/Laptop, rather by using the microcontroller based specific system we have saved the operating power as well as the cost involved in designing. This paper constitutes the circuit diagram of the proposed prototype of the intelligent wheelchair with the algorithms for decision making, table of comparison of features and the cost of the final product.
Seyed Vahid Sanei Mehri, Ehsan Akhtarkavan, Saeed Erfanian
Distributed Segment Tree Using MapReduce
Seyed Vahid Sanei Mehri, Ehsan Akhtarkavan, Saeed Erfanian
In this paper we aim to propose an efficient method to implementing a distributed segment tree. For this purpose we use MapReduce which is a powerful tool in parallel data processing to divide the task among P separate processors. We will exploit parallel processing in order to decrease the time complexity of segment tree implementation and range queries.
The paper deals with the applicability of GA to clustering and compares it with the standard K-means clustering technique. K-means clustering results are extremely sensitive to the initial centroids, so many a times it results in sub-optimal solutions. On the other hand the GA approach results in optimal solutions and finds globally optimal disjoint partitions. Fitness calculated on the basis of intra-cluster and inter-cluster distance is the performance evaluation standard in this paper. The experimental results show that the proposed GA is more effective than K-means and converges to more accurate clusters.
Enhancement of Blur Detection for Digital Images using Circular Averaging Filter
Landge Rupali Yashwant, Rakesh Sharma
Digital photos are massively produced while digital cameras are becoming popular; however, not every photo has good quality. Blur is one of the conventional image quality degradation which is caused by various factors like limited contrast; inappropriate exposure time and improper device handling. Blurry images make up a significant percentage of anyone's picture collections. So, an efficient tool is requiring for detecting blurry images and labeling or separating them for automatic deletion in order to preserve storage capacity. There are various methods to detect the blur from the blurry images some of which requires transforms like DCT or Wavelet and some don’t require transform. A new technique is presented which automatically detect blurry images and separate them for later processing. The method will find out key points for both original and filtered image by using SIFT algorithm. After that calculate variance value for both the key points. Draw and analyse the plotted graph to determine whether the image is blurry or not. According to the type of image whether it is sharp or blur it is save in respective folder for later processing and also calculate time needed for processing.
Poornima G P., Yashaswini T2 Kavitha K.M, T.R.Narasimhegowd
Role of Fault Current Limiter in Power System Network
Poornima G P., Yashaswini T2 Kavitha K.M, T.R.Narasimhegowd
This paper presents an overview of fault current limiters Fault current limiters (FCL) in electrical power systems offer the opportunity to reduce short-circuit stresses to the system in the case of faults. But as electrical power systems are normally operated without faults most of the time, FCLs must not have negative effects during these periods of normal operation. Usage of renewable energy to meet demand without proper synchronization will result in power quality problems like voltage sag, swell etc. Fault Current Limiters offers a possible solution to the electrical network
An Effective Algorithm For Image Compression Using SCWP
Mrs. Malashree G, Mrs.Rehna V J
In the conventional sub band /wavelet decomposition is performed on the spatial-domain image. But here may be using a decomposition Technique where the sub band decomposition is performed on the global DCT spectrum of the image. That is, the two-dimensional spectrum rather than the image is represented by a sum of basis functions, each weighted by the transform coefficients. The spectral sub band decomposition is then used as the basis for a new image coder, building on the spectral condensed wavelet packet (SCWP) algorithm. Ironically, this method is may expected to have lower arithmetic complexity than conventional sub band/wavelet coders that directly decompose a time or spatial domain signal. This new method may have lower complexity and higher compression performance.image coding, the sub band
In this paper, we focus on D=2, the next best value to that of the complete network, and proceeding to somewhat larger (constant) values leading to more economical networks. We show that perfect difference networks (PDNs), which are based on the mathematical notion of perfect difference sets, offer a diameter of 2 in an asymptotically optimal manner. In other words, PDNs allow O (d2) nodes when nodes are of degree d, or, equivalently, have a node degree that grows as the square-root of the network size. The symmetry and rich connectivity of PDNs lead to balanced communication traffic and good fault tolerance for wired network.
Image compression Using Thresholding Techniques i.e Global Thresholding , By Level Thresholding addresses the problem of reducing the amount of data required to represent a digital image. The rapid development of high performance computing andcommunication has opened up tremendous opportunities forvarious computer-based applications with image and videocommunication capability. However, the amount of data requiredto store a digital image is continually increasing andoverwhelming the storage devices. The data compression becomes the only solution to overcome this. Image compression is the representation of an image in digital form with as few bits as possible while maintaining an acceptable level of image quality .The redundancy can be removed to achieve compression of the image data i.e., the fundamental components of compression are redundancy and
irrelevancy reduction. The basic measure of the performance of a compression algorithm is the compression ratio, which is defined by the ratio between original data size and compressed data size.
Higher compression ratios will produce lower image quality and vice cersa is also true.
To develop the consortium three bacterial strains were used namely, Pseudomonas aeruginosa, Bacillus subtilis and Serratia marscecens. Among the three Serratia marscecens yielded high quantity of biosurfactant obtained after partial purification. Emulsification activity was determined from 0h to 96h for Poly aromatic hydrocarbon (against Petrol, Diesel, Mobil oil, Kerosene) and vegetable oils (Mustard oil, Soybean oil, Coconut and Jasmine oil). Among the hydrocarbons most efficient emulsification by three bacterial strains and consortium was seen for mobil oil then kerosene and petrol while diesel was least emulsified but consortium biosurfactant emulsified Diesel and was stable till 96h. Among vegetable oils highly emulsified oil was mustard and soy bean followed by Coconut and Jasmine. The study revealed the emulsification capacity of biosurfactant from consortium for poly aromatic hydrocarbons and vegetable oils.
Design and simulation of dual stacked microstrip patch antenna used in wireless communication
Ayushi Aggarwal, Sarika Khurana, Wazir
The purpose of this paper is to present designing and simulation of circular microstrip patch antenna. The return loss, gain and radiation pattern are analyzed and optimization is performed by making dual stacked circular microstrip patch antenna.FR4 is used for designing purpose which is easily available and having low cost. it is able to achieve a return loss of -41.9637dB for dual stacked microstrip antenna from -23.0774dB for simple circular microstrip patch antenna.The increase in gain of 4 dB occur.
GOOD PAYLOAD DEFORMATION FOR REVERSIBLE DATA HIDING IN MILITARY AND MEDICAL APPLCATION
Pavithrra.S, Regina.B
In reversible data hiding, the data value are modified by some rules and the exact data can be re-stored after the extraction of data on the receiver system. Here optimal rule value under payload criteria is done by using iterative algorithm .it calculates the estimated embedded image-original image.the estimated image are modified according to the optimal value transfer. The images are divided in to the subsets. A receiver was successfully able to extract and recover the original content in the subsets on inverse order. Hence good payload distortion can be achieved
Islanding Detection Analysis in Wind Turbine Units Based On Voltage, Frequency and Negative Sequence Components
Shwetha C , kavitha K. M , Satyanarayan rao R.D
In this paper a new islanding detection method based on voltage, frequency and negative sequence components are used for the islanding detection analysis in wind turbine units. The proposed method is based on processing of the rate of change of q-axis component of voltage and accelerates of change of frequency and negative sequence component of the voltage and current signals are analyzed through wavelet transform. The proposed techniques are tested on islanding and possible non-islanding condition such as normal operation; sudden load change and tripping of other DG’s etc. The studies reported in this paper are based on time-domain simulations using MATLAB/SIMULINK MODEL.
Implementation of Unsupervised Clustering Using Geometric Approach
Ms. Ayushi Laud, Prof. Ritesh Shah
Various medical sciences, educational, scientific research works are depends upon data clustering. Clustering is an application of data mining and knowledge processing which used find the data pattern using visual pattern analysis. Using this technique, data based on their attribute distance is mapped over space to find the pattern of data available. Clustering is type of unsupervised learning technique where no class level is available to utilize as feedback parameter for error correction. In this paper a study based on cluster analysis is provided. This includes study of k-mean clustering scheme, and outlier detection algorithm technique and performance enhancement using outlier technique, after concluding them we propose a geometric distance based clustering scheme. This technique is implemented using MATLAB simulator for experiment and academic research purpose, the implemented technique is works over numerical and the estimated results are provided in the further sections.
Near Field Communication for Transferring Files between Pair of Supported Devices
Mr. Pritesh Upadhyaya, Ms. Foram Gandhi
We explore new ways in which Near Field Communication (NFC) can be used on smart phones. NFC allows for Contextual Application Invocation (CAI)—the execution of code on the phone as a result of our environment. We can launch applications because of contextual information we learn from another transaction on our phone, or we can associate with a context virtual token to recall at a later time. We can also pass context from one phone to another so the devices can interact in a multi-party session.
Novel Technique to Detect and Isolate Black hole Attack in MANET
Barleen Shinh
The mobile nodes can establish the route from source to destination when they want. In DSR routing protocols many loop hole are there, these loop holes can give arise to different type of active and passive attacks which are triggered by various inside and outside malicious nodes. Among all the type of attacks, black hole attack is the most common of attack which is possible in DSR protocol. Black hole attack is the denial of service attack. Many algorithms had been proposed to prevent this attack. In this paper, we are proposing modifications in traditional DSR protocol to prevent black hole attack.
Rushing attack prevention algorithm for manet using random route selection to make DSR and AODV more efficient
Aakanksha Jain, Dr. Samidha Dwivedi Sharma
Mobile ad hoc network(MANET) is a self deployed system of nodes which are free to mobile any where in the network. MANET does not require fixed infrastructure or centralized administration such as base station or access node. Nodes in the network work as host as well as router to forward the data via wireless links. Multiple senders and receiver are involved in the communication because no direct connection between the nodes as result of this security is essential in the MANET. Rushing attacks is also a type of security major in the MANET. Rushing attack cause the node to keep is isolate and scarce legitimate user in the MANET. In the MANET multicasting is widely used in multicasting one source node send data to many nodes as consequence of this multicasting transmission cost is reduced. But major drawback here is that while sending packets to multiple nodes mobile ad hoc network become unprotected because any node can be malicious node. There are different type of attacks in the MANET for example rushing attack, black hole attack, jelly fish attack, neighbor attack.This paper is based on rushing attack. In rushing attack the attacker quickly forward the packet in order to get easily access the route discovery path so that the attacker easily get the information of the network and resist all other valid node to get correct information. Once the route established between attacker and the destination all the information received by the destination will false or tempered. In MANET once the established every time data transmission path will be the same.
In this paper we have proposed Rushing Attack Prevention Algorithm For MANET Using Random Route Selection to make DSR and AODV more efficient. This is time based approach also. This algorithm has removed some drawback of DSR and SDSR algorithm and it can be more efficient.
Determining K-most demanding products using data mining technique
Sonal K. Bang, Prof. P. N. Kalavadekar
This paper formulates a problem for production plan as k- most demanding products (k-MDP). Given a set of customers demanding a certain type of products with multiple attributes, a set of existing products of the type, a set of candidate products that company is able to offer, and a positive integer k, it helps the company to select k products from the candidate products such that the expected number of the total customers for the k products is maximized. One greedy algorithm is used to find approximate solution for the problem. Attempt is also made to find the optimal solution of the problem by estimating the expected number for the total customers of a set of k candidate products for reducing the search space of the optimal solution.
Human mind can process one item at a time and has limitation about capability to relate decision to large amount of background information and can not handle multiple conditions and action situation. Modeling and simulation solve these problems efficiently. It extends understanding of how to build effective and efficient design, evaluation, and operation of new model. The active use of modeling and simulation in various areas are the cause of its popularity in design of engineering and industry. Significant progress has been observed in modeling and simulation over the last few decades, however, many challenging issues remain unresolved, and the current trends tend to use combination of nature-inspired algorithms and surrogate-based techniques for modeling.
This paper will analyses the issues and challenges in modeling and simulation in different application areas and discuss important topics for further research and the gaps between theory and applications in different application areas.
Embedded zero tree wavelet(EZW) coding is a very effective and computationally simple technique for image compression. Here we present a new and different implementation based on set partitioning in hierarchical trees(SPIHT).It is based on the principles of partial ordering by magnitude with a set partitioning sorting algorithm, ordered bit plane transmission and exploitation of self similarity across different scales of an image wavelet transform. The image coding results calculated from actual file sizes and images reconstructed by the decoding algorithm are either comparable to or surpass previous results obtained through much more sophisticated and computationally complex methods. In addition, the new coding and decoding procedures are extremely fast, and they can be made even faster, with only small loss in performance, by omitting entropy coding of the bit stream by arithmetic coding. It can be used for future still and moving image coding systems. Additional features required for this include fidelity and resolution scalability, region of interest enhancement, random access decoding, resilience to errors due to channel noise or packet loss, fast encoding and/or decoding speed and low computational and hardware complexity.
Development of Image Processing Algorithm for Array processor
Sangeeta C. Vetal , Prof. A.S. Shirsat
Mathematical morphology is a well known image and signal processing technique. However, most morphological tools such as Matlab are not suited for strong real-time constraints. This paper address this problem through hardware implementation on Array processor.This paper gives the algorithm of morphological image processing on FPGA/ Array Processor.
Multiband OFDM based Ultra Wideband (UWB) system combines OFDM modulation technique with a multi banding approach, which divides the spectrum into several sub-bands, whose bandwidth is approximately 500MHz in order to meet with FCC requirements. This approach of multibanding introduces orthogonality in the frequency domain and also longer impulse radio pulses in each band are obtained. OFDM based system is very sensitive to timing and frequency offsets, the received constellation is slightly different from transmitted constellation due to processing delay and additional delay introduced from the channel. So Multiband-OFDM (MB-OFDM) is one of the promising candidates for short-range high data-rate UWB communications. It combines Orthogonal Frequency Division Multiplexing (OFDM) with the multi-band approach enabling UWB transmission to inherit all the strength of OFDM technique which has already been proven for wireless communications. In this paper overview of OFDM is discussed and UWB-OFDM system is studied and analyzed
Analysis of Load Flow Study Using Pso And Compensate The System Using Facts Device
Sushil Kumar, Seraj Ahmad , Aziz Ahmad
Load flow study is one of the important part of power system network because all the power flow parameters we can find out by this study .There are many methods to solve the load flow problems but accuracy and speed are the main problems in all techniques. By using the PSO we can find the better accuracy and speed then another method. By using PSO techniques we find the optimal location in the system at which we can set the reactive power compensating device .The paper conclude analysis of a load flow system bus network and find out the optimal location at which voltage deviation is minimum and use the power electronics device and compensate the reactive power as per requirements.
The increase in use of automated fingerprint recognition puts on it a challenge of processing a diverse range of fingerprints. To make it supportive in consisting fingerprint detail extraction, quality control is required, which is used in identification/verification. Fingerprint verification is one of the most reliable personal identification methods and it plays a very important role in forensic applications like criminal investigations, terrorist identification and National security issues. Some fingerprint identification algorithm (such as using Fast Fourier Transform (FFT), Minutiae Extraction) may require so much computation as to be impractical. Because quality of fingerprints varies according to the user population’s ages and fingerprint quality has an impact on overall system performance, it is important to understand the significance of fingerprint samples from different age groups.
A Smart Energy Efficient Scheme for Dynamic Clustering in Wireless Sensor Network using Neural Networks
Sandeep Dhillon, Amandeep Singh
Wireless Sensor Networks (WSN) consists of large number of sensor nodes. The sensor nodes are battery powered devices, they communicate over a wireless medium and consumes energy during data transmission. In the past years various techniques have been proposed to reduce the battery consumption of wireless sensor networks. The previous approaches are based on the static clustering which follow the rules of LLC algorithm. In this paper, novel technique is been implemented which is based on the Dynamic clustering. The Cluster heads in each cluster have changed according to the network conditions. Dynamic clustering is being proposed in this paper which is based on the neural networks. The proposed technique is implemented in NS2 and simulation results show that novel technique will reduce network overhead and increase network lifetime.
Analysis on Emotional Intelligence Among Telecom Employees
Dr. Vikas Sharma, Rakesh Chib
The present research was carried out with the aim of assessing the Emotional Intelligence among employees of private and government telecom sector. The sample for the study comprised of 160 employed youths in telecom sector ( i.e 60 from BSNL and AIRTEL) of Jammu city. The sample was selected through multi stage sampling technique where the actual sample was selected randomly. The tool used for investigation was a standardized Emotional Intelligence scale developed by Chadha and Singh (2003). Results reveal that most of the sample youth had high to moderate level of emotional intelligence. There was a significant difference in level of emotional intelligence of employees among BSNL and AIRTEL, with more AIRTEL employees having higher levels of emotional intelligence than the employees of BSNL. Components wise analysis reveals that most of the sample youth had moderate level of emotional sensitivity and moderate to high level of emotional competency
Muhammed Asharaf.T.P, Manu Ramesh, Sankarnarayana Bhat.M
Design and implementation of High performance Bus Architecture using FPGA
Muhammed Asharaf.T.P, Manu Ramesh, Sankarnarayana Bhat.M
In any system on chip (SoC) a reliable and optimized communication protocol is inevitable. In SoC communication high performance, low power consumption and testability are essential. AMBA bus architecture is an SoC communication protocol that aims at high performance and low power consumption by partitioning based on the bandwidth with which the devices operate, within the system. In this paper we discuss about the design of two such buses AXI (Advanced Extensible Interface) and APB (Advanced Peripheral Bus) in a four master four slave system. The whole design is simulated and implemented in FPGA.
Soft Computing Techniques ABC, IABC and SFL Optimization Algorithms for 15 Unit Thermal Generating Systems
Mr. Ram Kumar Denjare, Mr. Amit goswami
this paper presents an analysis of Economic Load Dispatch (ELD) problem using various algorithms such as ABC, IABC and SFL algorithm in order to maintain a high degree of economy and reliability of the power system. The primary objectives of this paper is to develop flexible and extensible computational framework as MATLAB environment for implementing the various algorithms such as ABC ,IABC and SFL to solve economic load dispatch problem and analysis the Performance of various optimization algorithms on the basis of power generation(MW),computational time(sec) ,minimum generation cost(INR) and power loss(MW).
Pradeep Kumar Keshwani, Ravi Sankar Shukla, Apurva Agarwal
Performance Analysis of Mesh, Torus and Folded Torus under Broadcasting, using Distance Vector Algorithm
Pradeep Kumar Keshwani, Ravi Sankar Shukla, Apurva Agarwal
In this technological world of communication architecture, network on chip (NoC) is extensively used as communication architecture. Network on chip (NoC) topologies are becoming a backbone of communication architectures. It provides a good integration of enormous amount of storage on chip blocks as well as computational also. Network on chip handled the unfavorable conditions and it provides the scalability to the architecture. Mesh, Torus and folded torus architectures are most commonly used architecture for network on chip communication. Here, we compare the performance of Mesh, Tours and Folded torus network architecture on chip, on the basis of different parameters under broadcasting with the help of distance vector routing algorithm. To evaluate the performance of Mesh, Torus and folded torus network on chip in the simulation environment, we simulate the topology using Network Simulator (NS-2).
Constraint Satisfaction Algorithm to Improve Energy Loss & Ber for Indoor Mobile Network
Monika Rani, Mrs. Tulika Das
When the network environment is defined then some physical properties of network are set such as propagation type, spectrum type etc. These properties control the network communication. This propagation method deals with the channel selection, channel sensing and to perform the effective communication over the network. There are number of constraints that affect the communication over a network. To achieve the effective output from the network, it is required to define network under defined constraints. These all constraint depends on type of network, its topology and the type of communication performed in that network. The presented work is focused on the communication analysis for an indoor mobile network. This is an adhoc network that is limited to a small area such as a room or the building. The network is congested having a small range of communication for each node. In such network, the communication strength depends on the propagation type used in the network. There are number of such propagation methods to provide effective communication over the network. To achieve the effective communication, an effective propagation must be selected for the communication. These propagation methods also affected from different network, environmental and communication parameters. To optimize the indoor communication network by setting up some channel specific constraints under different parameters. The work is about to perform the effective deployment in case of channel noise and disruption analysis. The presented work will be performed on three different models, they are: ray-leigh indoor propagation model,friis model,log distance shadowing model. The work is about to reduce the BER while performing the communication in indoor network under different distance and density constraints.
Wavelet-Based Image Compression and its Application
Prerna Maheshwari, Pooja Chaturvedi
Image compression addresses the problem of reducing the amount of data required to represent a digital image. The objective of this paper is to evaluate set of wavelet for image compression. Image compression using wavelet transforms result in an improved compression ratio. Wavelet transformation is the technique that provides both spatial and frequency domain information. These properties of wavelet transform greatly help in identification and selection of significant and non –significant coefficients amongst the wavelet coefficients. DWT (Discrete Wavelet Transform) represent image as a sum of wavelet function (Wavelet) on different resolution levels. So, the basis of wavelet transform can be composed of function that satisfies requirement of multi resolution analysis. The choice of wavelet function for image compression depends on the image application and content of image. A review of the fundamental of image discussed important features of wavelet transform in compression of images. It also reduces the amount of time required for image to be sent over Internet or download from web page. After this process, whenever the original image is required, then the compressed image is decompressed to construct the original image or an approximation of it.
Augmented Reality(AR) aims at merging the real and the virtual in order to enrich a real environment with virtual information. Augmentations range from simple text annotations accompanying real objects to virtual environment of real life objects inserted into a real environment. In the latter case the ultimate goal is to make it impossible to differentiate between real and virtual objects. Several problems need to be overcome before realizing this goal. Amongst them are the rigid registration of virtual objects into the real environment. The key technology of Augmented reality includes displaying, registration and tracking, interactive, etc, among them , registration and tracking is most important technology. In this paper, we will demonstrate the algorithm for tracking a object from a real world and augmenting it on a virtual environment.
Critical Analysis of Various Parallel Scheduling Algorithms
Shreya Sharma
In this paper, we have discussed various parallel scheduling algorithms and there drawbacks. Out of static scheduling algorithms the Dynamic Critical Path (DCP) Algorithm is the best algorithm. It has an admissible time complexity, is economical in terms of the number of processors used and is suitable for a wide range of graph structures. But multiprocessor scheduling problem is NP-complete in nature even with simplifying assumptions, and becomes more complex under relaxed assumptions such as arbitrary precedence constraints, and arbitrary task execution and communication times. Therefore, a Genetic approach based algorithm was proposed with an objective to simultaneously meet the goals of high performance, scalability, and fast running time known as Parallel Genetic Scheduling (PGS) algorithm. And even outperforms DCP algorithm best known in terms of performance and time complexity.
A Pattern Recognition System To Improve Quality Assurance For Manufacturing Industries Using Image Processing
Madhu Thapa
In various domains of engineering image processing is being used widely. In the manufacturing industry for example manufacturing of finished products like wooden furniture and other finished products, human eyes are required to check the quality and standard of the finished product. We have proposed a system in which the quality of finished products is monitored by the image processing system. We have used various features of image processing system like morphological operations and image segmentation process to analyze the product images and raise an alarm for the particular product if some defect is found in the finished quality of the product. For example in a paint shop where different panels of the cars are being painted, it is very difficult for the human eyes to find any discrepancy in the quality and texture of painted panels. Hence, an image processing system can be used to find any kind of discrepancy in an efficient manner. Our proposed work will help in optimizing the conventional methods of quality assurance for various products and will also help in cutting down the cost of human resource for a manufacturing plant that manually check the quality and standard of products. We will de developing and implementing the system in real time and will use the MATLAB software for the development of proposed software.
A Review paper on compressive modulation in digital communication using OFDM
Lokendra Singh, Anuj Sharma
In the present time bandwidth efficiency is one of the most important parameter to measure different modulation scheme in digital communication. Due to the separation of waveforms of all the existing modulation schemes in time domain it becomes difficult to improve their bandwidth efficiency. Hence it was become very important for researchers to proposed such a scheme that able to improves the bandwidth efficiency of our existing modulation schemes to make them more reliable as per their increasing demands. Latest study in the same field results a new scheme named as Compressive Modulation (CM) which combines Compressive Sensing (CS) with traditional BPSK pattern that leads to highly improved bandwidth efficiency of traditional BPSK. In the current work we are going to use the CS theory with traditional OFDM to make it more bandwidth efficient than traditional one.
Android Based Patient Critical Health Monitoring and Notification System
Yashashwini Mathad, Sandeep Karnam
Healthcare environments today have turned to be technology-oriented. Also mobile devices and their usage has increased manifold in recent times. This paper presents the design and development of Android mobile application for patient healthcare. A body area network is a wireless network of biomedical sensors that are around to a human body. The aim of wireless body area network (WBAN) is to facilitate continuous recording and monitoring of a person’s health condition and transfer it over a long-distance communication network. The parameters sensed by the individual devices are to be transferred onto a mobile phone or a tablet via wireless network. This data is then gathered, stored, check for threshold and then sent to the physician for continuous monitoring of the patient’s health condition. The physician can thus access the patient’s health status on the go and this will help the patient to get immediate attention in life-threatening situations.
PID-Controllers Tuning Optimization with PSO Algorithm for Nonlinear Gantry Crane System
Diep D.V., Khoa V.V
In this paper, three PID controllers for anti-swing, rope length and position control of a gantry crane is designed based on the parameters tuning method by particle swarm optimization (PSO). The method searches the PID parameters that realizes the expected step response of the plant. The PID parameters are computed by PSO-based PID tuning method according to the obtained model. Simulation results have demonstrated satisfactory responses with the proposed controllers under conditions based on control system performances
Gauss Legendre Quadrature Formulas for Polygons Using an All Quadrilateral Finite Element Mesh of Triangular Surfaces
H. T. Rathod, K.V.Vijayakumar, A. S. Hariprasad
This paper presents a numerical integration formula for the evaluation of , where and is any polygonal domain in That is a domain with boundary composed of piecewise straight lines.We then express
in which is a polygonal domain of N oriented edges with end points and . We have also assumed that can be discretised into a set of M triangles, and each triangle is further discretised into three special quadrilaterals which are obtained by joining the centroid to the midpoint of its sides. We choose an arbitrary triangle with vertices in Cartesian space We have shown that an efficient formula for this purpose is given by where, u= u(ξ,η)=(1-ξ)(5+η)/24,v=v(ξ,η)=(1-η)(5+ξ)/24
and is the standard 2 square in space. This 2 square S in is discritised into four 1squares in (ξ,η) space.We then use four linear transformationssing the Gauss Legendre Quadrature Rules of order 5(5)40, we obtain the weight coefficients and sampling points which can be used for any polygonal domain, or or (m=3n-2,3n-1,3n;b=1,2,3,4)
The present composite integration scheme integrates gives the same accuracy for half the number of triangles for each discretisation of a polygon used in our earlier work[16].
Fuzzy Based Efficient Routing Protocol For Route Recovery In MANET
Ritu Dahiya, Ajay Dureja
A Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile hosts that are arbitrarily located and lack any infrastructure and centralized administration. In MANET, routing protocols are used to provide the specific path for sending the data packets. By growing the use of real-time application on mobile devices, there is a constant challenge to provide reliable and high quality routing algorithm among these devices. Due to the mobile nature of MANET, all the routing protocols have some route errors. In addition to limited energy resources, failure of the nodes is a constraint to provide a reliable communication in wireless mobile networks. The failure of a node may have many reasons like mobility of the node and node or link failure. In this paper, we propose a technique to improve routing protocols by considering both energy and failure constraints and managing them. By using the proposed protocol, the routing protocols dynamically adapt to node’s failure. In this paper, we propose a fuzzy based efficient routing protocol (FBERP) for large scale mobile ad-hoc networks that aims to minimize the packet loss rate. Each node in the network is characterized by its communication parameters. We develop a fuzzy logic controller that combines these parameters, Packet Loss Rate, Communication Rate, Energy and Delay Parameters. The value obtained, indicates the priority of a node and it is used in route formation. Our simulation shows that our proposed protocol outperforms the standard AOMDV routing protocol in minimizing the packet loss.
Performance Analysis of RSA Algorithm Using Elliptic Curve Cryptography, Diffie Hellman And OAEP
Neha Garg, Partibha Yadav
Communication is the very important part of any type of network for making it possible to transfer data from one network to another. Communication needs quality and security for better performance which provides confidentiality to users. Cryptographic technique is one of the principal means to protect information security. It is to ensure the information confidential and also provides digital signature, authentication, secret sub-storage, system security and other functions. Therefore, the encryption and decryption solution can ensure the confidentiality of the information, as well as the integrity of information to prevent information from unauthorized access and counterfeiting. Encryption and decryption algorithm’s security is depends on the algorithm and also depends on the key confidentiality. In this paper we compare asymmetric key cryptography algorithm and also implement these algorithm. we compare these algorithm on the basis on time
Remote Client Administration is a service offering a full function network, which provides its authorized users with the ability to monitor and manage the connected clients. This software will benefit the administrator in lab/office to manage the clients. This project gives an administrative power to the server. The software mainly provides services chatting through text, audio and sharing resources between computers. The administrator system provides some restrictions for the clients. It gives the system a role of administrator in an organization. Our system is highly user friendly and interacting. Our system can view all users connected with the server. Administrator system can view the hardware status of the client and all process currently running under the client machine. Our system helps the administrator to kill the unwanted process running on the client machine. The administrator can shut down, restart and log off the client system. We are confident that this project will benefit every administrator in delivering his duties.
Android is software platform and operating system for mobile devices. Being an open-source, it is based on the Linux kernel. It was developed by Google and later the Open Handset Alliance (OHA). It allows writing managed code in the Java language. Due to Android here is the possibility to write applications in other languages and compiling it to ARM native code. In this paper a mobile-based web server was introduced for serving static HTML/JavaScript pages to the client systems (the systems could be PCs or Mobiles) for access by these client systems. A static website will be designed to serve from the mobile (web server). The Mobile Web server is based on Android OS. The static website saved inside the SD Card of the Android Mobile would be the source for the web server, thereby increasing the capability of the Mobile to become a web server for even PCs in the Network created by Android Mobile itself.
Mobile ad hoc network consists of a group of mobile nodes which can be dynamically self-organized into arbitrary topology networks without any fixed infrastructure. In MANET mobile nodes will not stay in a same position, due to this large mobility of nodes in MANET, frequent link breakages will occur which will lead to path failure and route discovery problems. To overcome this type of routing overhead we are proposing the new technique using NCPR. The proposed NCPR method is used to determine the rebroadcast delay in the rebroadcast order and obtain the more exact additional coverage ratio by sensing neighbor coverage knowledge.
Trust Decision Making Scheme for Wireless Sensor Networks
Veena A, Kavyashree S C
The fundamental requirements for any wireless sensor network (WSN) are network life time, resource efficiency and dependability of a trust system. We are applying a clustering scheme considering mobility to minimize the number of nodes that moves away from the current cluster head before next cluster formation. This approach improves network life time and energy consumption. In addition, we use trust decision-making scheme based on the node’s identities in the clustered MWSNs to send data packets to sink. It facilitates energy-saving by canceling feedback between cluster members (CMs) or between cluster heads (CHs), which is suitable for WSNs. This approach can significantly improve system efficiency, while reducing the effect of malicious nodes, selfish, and faulty CHs of networking consumption. Theory as well as simulation results show that clustering scheme improves network lifetime and dependable trust decision making scheme demands less memory and communication overhead compared with the current typical trust systems for WSNs.
A Reduced Switch Count Dual Output Single Phase Inverter
Parikshit Bajpai, Amita mahor, Rahul Arora
Dual-output three-switch inverter topology is proposed in this paper. To supplying two single-phase ac loads independently with one inverter. Using reduced switch count topology which introduced in three phase converter. This configuration required less no of devices and provide dual output compared to conventional inverters. Which results in reduction in cost, size and switching losses. The proposed topology is introduced with its gate circuit for switching schemes is elaborated. Simulation model of proposed inverter is developed. Its output waveforms are analyzed. Total harmonic distortion and performances are compared with different PWM techniques.
Reduction Of Ground Current In A Transformerless Photo Voltic Inverter Connected To Grid
Arvind Jain, Amita Mahor, Rahul Arora
When no transformer is used in a grid-connected photovoltaic (PV) system, a galvanic connection between the grid and the PV array exists. In these conditions, dangerous ground currents (common-mode currents) can appear through the stray capacitance between the PV array and the ground. This current increase conducted and radiated electromagnetic emissions, harmonics injected in the utility grid and losses.In this paper, an improved output filter for reduction of common mode voltage and ground current in a grid connected full bridge(FB) inverter is proposed .A model for measurement of this ground voltage and current is build by using simulation software. Finally ground voltage and current of a FB inverter using conventional LCL filter and proposed filter is measured and compared with satisfactory results.
Application of Data Mining Techniques on Software Engineering Data for Software Quality
Pooja Arora
The processes of Software engineering are complex and produces large number and variety of artifacts. The potential of data mining technique on this large valuable data is to better manage the software projects and to produce high-quality software systems that are delivered on time and within budget. This paper present the latest research in mining software engineering data, software engineering task helped by data mining, kind of software engineering data, data mining techniques used in software engineering.
Avoid personal data presumption attacks on social networks
T. Swetha, V. Balaji, P.Nirupama
Now a day’s many people are rapidly increases the use of social networks like facebook. By using these networks so many number of users are connected with their friends and relatives. Some of the user related data should be private in the networks. To launch presumption attacks using released social networking data to forecast personal data. Three possible refining techniques that could be used in different situations. Discover the effectiveness of these techniques and challenge to use methods of collective presumption to discover sensitive attributes of the data set. So then decrease the effectiveness of both local and relational classification algorithms by using the sanitization methods can describe.
Fault Removal Effectiveness On Software Requirements Specification Using Non-Preemptive Relocation Technique
R. Saranya
Software specification is defined as the requirements that facilitates to achieve the specified organizational objective without any faults. Existing Model-based Oracle Software Generation (MOG) method capture the types of faults and define an automatically generated partial, passive oracle from the agent design models. MOG method not yet developed the framework for removing (i.e.,) preventing the fault at the initial stage of the software requirement specification. Present systematic review of requirements specifications from software engineering model fails to integrate the business requirements with the software functional model. To prevent the fault on the initial stage of the software requirement specification, Prior Fault Removal method using the Non-preemptive Relocation (PFR-NR) technique is developed. Prior Fault removal assures the definite software requirement specification without any faults. The functional model in PFR-NR technique refers to the set of software functions which offers a reliable fault free solution while performing the execution process. Non-preemptive Relocation performs the monitoring using the Reactive loop manage mechanism. The looping mechanism performs the integration between the business requirements and software functional model in the non-preemptive relocation technique. Non-preemptive relocation provides 12 % improved result to the customers. PFR-NR technique is measured in terms of Software fault prevention level, Customers satisfaction point, software specification overhead rate, true positive business requirements and software function integration time.
Black Hole Attack Prevention Techniques in MANET: A Review
Deepak Mishra, Mr. Srinivas Arukonda
Mobile ad-hoc networks (MANET) is a major next generation wireless technology. Dynamically and arbitrarily located nodes communicate to each other to form a Mobile Adhoc Network. MANET is more vulnerable to various types of attack than wired network. Black hole attack is more severe threat to MANET than any other attack. Prevention of Black hole attack is done by finding the malicious node before any harm can be done. Different techniques are proposed to prevent this type of attack. In this paper these techniques are studied with their advantages and disadvantages.
Web Usage Behavior and Navigational Structure mining
Mr.Sujeet Kumar Tiwari, Mrs. Neelu Tiwari
The Web can be defined as a depot of varied range of information present in the form of millions of websites dispersed around us. Often users find it difficult to locate the appropriate information fulfilling their needs with the abundant number of websites in the Web. Hence multiple research work have been conducted in the field of Web Mining so as to present any information matching the user’s needs. The need to fetch the navigation pattern for the website helps in aiding the owners business.
Metrics are defined as standards of measurement. Test metrics provides the visibility into the readiness of the product, and gives clear measurement of the quality and completeness of the product. Metrics allow for deeper understanding of the performance of the application and its behavior. Metrics help organization to obtain the information it needs to continue to improve its productivity, reduce errors and improve acceptance of processes, products and services and achieve the desired goal. This paper focuses on various types of testing metrics, and introduces the most commonly used software metrics and projected their use in constructing models of the software development process.
Effect of Voltage on Metallic Particle Movement in 3φ Pahse Gas Insulated Busduct Using Analytical Method, Fem & Csm
A. Giriprasad, J.Amarnath, PoonamUpadhyay
This paper analyses the electric field effect on particle movement in three phase gas insulated busduct with different field calculation methods like analytical method(AM), charge simulation(CSM), and finite element methods(FEM). The presence of free metallic particles in GIB can result in loss of as much as 90% of the SF6 gas dielectric strength and can be a problem with Gas Insulated Substations (GIS) operating at high electric fields. The main objective of this paper is to derive techniques for formulating the basic equations that will govern the movement of metallic particles in GIB. The simulation has been carried out to obtain the particle trajectories at various voltages on Aluminium and Copper particles. From the simulation results it is observed that the Al and Cu particle movements are increasing with increase of applied voltage. From the results it can also be observed that the maximum radial movements of Al and Cu particles are relatively less when calculated using charge simulation method and relatively highest when calculated using finite element method. It is found that maximum radial movements computed using analytical method is slightly more than charge simulation method.
Research Work on Network Intrusion Detection Using Artificial Immune System
Vijeta, Mr. Vivek Sharma
An artificial immune system (AIS) is a computer software system that mimics some parts of the behavior of the human immune system to protect computer networks from viruses and similar cyber attacks. Artificial immune system is a computer software system that mimics some parts of the behavior of the human immune system to protect computer networks from viruses and similar cyber attacks. The essential idea is that the human immune system, which is a complex system consisting of lymphocytes. This work provides AIS based intelligence to provide security measures in intrusion detection system.
Effectiveness of Power flow by Shunt Compensation on Power Transmission
Mr.Arvind A.Agane, Prof. Sunil K. Patil
This paper is to develop a program to determine the required shunt compensation and after which,conduct power system analysis using simulation to evalute load voltage at fixed sending end voltage.The purpose of reactive power compensation is to change electrical characteristic of transmission line and make more compatible with load demand. The effect of change in length of transmission line on voltage profile is analyzed. This paper presents an analysis of the effect of shunt compensation level on the line voltage profile, transfered power capability, power factor and transmission losses. For this purpose simple model is developed to calculate the shunt compensated transmission line load voltage. The model is designed and simulated using MATLAB. The results show the effectiveness of shunt compensation on power transmission. It gives basic mechanism of shunt compensation, also highlight its benefits for power system.
Image Segmentation Using Modified K- Means Algorithm and JSEG Method
Amritpal Kaur, Dr.Yogeshwar Randhawa
Image segmentation is one of the important tasks in modern era. Traditional image segmentation techniques make use of conventional methods of clustering which suffers from problems. First problem is over segmentation which degrades the quality of the image. Moreover, parameter estimation is a big problem in traditional segmentation techniques. A new technique called JSEG is proposed towards this goal. This approach does not tend to apply to a specific model. Further some; it is used to test the homogeneity of the color pattern in regions in images. In this paper, JSEG along with enhanced clustering method called Modified K means clustering is presented. It has been investigated that the method is quite computationally feasible. Matlab software is used for simulation along with image processing toolbox
Brief overview of VANET routing protocols and their security attacks
S.I.S.Jaffarvalli, D.Ganesh
We know that opinion a VANET specialized form of MANET. As we know that a VANET stands for vehicular ADHOC network. a VANET uses every participating car into a wireless node or router ,allowing cars approximately 100 to 300 meters of each other to connect and to form a network with wide range. as car falls out of the signal range ,other cars can join in, connecting vehicles to one other so that a mobile internet is created. However in this research paper I concentrate on classification of VANETS and their security attacks
Data Hiding using difference between adjacent pixels and bit plane swapping
Shalini Singh, Satakshi Sharma
In this paper, we have implemented a novel technique for hiding text messages in a gray scale image. This technique involves data hiding using cryptography and steganography, which makes it a strong data hiding mechanism. In this method, we first apply cryptography to secret message and then hide it inside a gray scale image using steganography
Sensor network is having its importance in many real time applications to sense different atmospheric, environmental, industrial features. Sensor network is generally a hybrid network with large number of sensor nodes. These sensor nodes are defined with energy parameters and consume some amount of energy with each transmission, receiving and forwarding activity. These sensor networks are present under different network organizing architectures. One of such architecture is the clustered sensor network in which complete network is divided in small segments called clusters. Network is having the multiple sinks that can be defined in any cluster over the network as well as having the randomized node movement. Each cluster also having the static sink as well as having the Cluster head to control the communication. In this paper, a cluster analysis approach respective to the mobile sink node identification is defined to perform the load balancing over the network. The work will check for the presence of the mobile sink in each cluster
Energy Adaptive Approach for Node Inclusion and Exclusion in Dynamic Clustered WSN
Ranjita joon, Dr. MD Yusuf Mulge
A sensor network is an energy effective communication network organized under specific network architecture. One of such structured architecture followed by sensor network is clustered network. The communication in such cluster network is one of the effective challenges because of different kind of responsibility to different roles of a node. This communication becomes more challenging when the network is dynamic and any node can participate in communication. The proposed approach improves the effectiveness of communication in structured network while including or excluding a new node over the network. In this paper, a two level analysis approach is defined to perform the dynamic operations over the network.
Human Gait Identification using Depth Gradient Histogram Energy Image
Sonal N. Kharecha, C. Nandini
Earlier work where we evaluated how traditional Gait Energy Image (GEI) can be used to identify human gait and eventually human ID. However, we also witnessed how inaccurate segmentation (due to unclear foreground-background boundary, human walking direction w.r.t camera axis etc.) may disturb the overall identification performance. To overcome this limitation, present work focuses on using edge and depth gradients extracted from 3D depth data of human gaits. In this paper, first, brief survey of various approaches is outlined. Then promising feature called Depth Gradient Histogram Energy Image (DGHEI) obtained by Histogram of Oriented Gradients (HOG) is presented. Paper also covers performance comparison between 2D GEI and 3D DGHEI based clue to identify human gait.
Mobile Tourism Application BasedOn Situation Awareness
Ms. Komal M. Dhule , Prof. R. V. Shahabade
The process of searching, selecting, grouping and sequencing destination related products and services including attractions, accommodations, restaurants, and activities included in the travel and tour planning. In tour planning, there are many mobile tourism applications developed. These tourism, mobile applications is changing the way of travelers plan and experience tourism in the future. The previous research investigated the development of context awareness, mobile applications for the tourism industry. Various aspects of context awareness are applied in tour guide companions and recommendation systems. However, these contexts awareness, mobile applications do not improve travelers’ situation awareness, especially in pre-visiting and during visiting phases. In other words, when using mobile applications, travelers may not perceivethe situation correctly, fail to comprehend the situation or they are unable to anticipate the future development. We propose mobile tourism application using situation awareness. The semantic web technology and MES technique for showing Situation Awareness is discussed here. The proposed design shows scenarios of traveler visiting experiences are shown and suitable designs for each scenario are discussed. The proposed design will implement the mobile tourism application for Mumbai region.
Adaptive Energy Optimized Minimum Hop Routing In Sensor Network
Neha gupta, Dr. Md. Yusuf Mulge
A sensor network is one of the most adaptive research area that requires the optimization in term of energy effectiveness, load balancing etc. The sensor network is defined under the particular localization architecture and having the challenges in terms of load minimization, energy loss reduction, security etc. One of such common and most adaptive research problem is routing. In this paper, optimization is provided to the one of the effective routing algorithm called minimum-hop routing. As the communication is performed, each participating node in the network losses some amount of energy. The minimum hop routing, generates an energy effective path to perform the communication. But this effective path increases the load on the selective hops of defined routing approach. Because of which, the hops of this routing path dies earlier to other nodes. The technique proposed in this paper is the improvement to minimum hop routing by identifying the optimal compromising nodes to the minimum-hop routing path nodes.
An Improved Approach of Digital Watermarking in Frequency Domain
Kirti, Vikram Nandal
Digital watermarking is the processing of combined information into a digital signal. A watermark is a secondary image, which is overlaid on the host image, and provides a means of protecting the image. It acts as a digital signature, giving the image a sense of ownership or authenticity. Digital watermarking technique is very impressive for image authentication or protection for attacks. This paperproposes an approach to robust digital watermarking in frequency domain. The approach is divided in two parts: one is watermark embedding and another is watermark extraction. For watermarking SWT transformation is performed. MSE and PSNR are calculated for the extracted watermark.The robustness of different digital watermarking algorithms in frequency domain is evaluated by applying different attacks and by calculating PSNR. In this paper comparison is also performed between the proposed technique and DCT, DFT and DWT.
Route Trace Reduction Based Leader Election Approach to Improve Communication in Mobile WSN
Seema Balhara, Kavita Khanna
A wireless sensor network (WSN) consists of spatially distributed autonomous sensors to monitor physical or environmental conditions. When we work on a distributed sensor network then to control the communication over the network, some controller nodes are defined at various points over the network. These controller nodes are used to improve the effectiveness of the network by performing the routing as well as to identify the reliable communicating next node. This controller node is called the leader node that reduces the network communication and improves the network life. The election of the leader node is itself a challenging task and it affects the network reliability. In this paper, a multi parametric route tracing based approach is suggested to define a leader node in such a way so that the network life can be improved.
Distinctive Multipath Based Data Chunk Sequencing Scheme
Jyoti Chhikara, Sunita Dixit
A Mobile network is a hybrid network on which the different kind of data is communicated. One of the critical communicating data type over network is video transmission. Video Transmission with high resolution increases the network traffic that can result the packet loss over the network. The criticality of the situation is increased when the network is also suffering from some attack or the heavy load over the network that performs the flooding so that that the networks delay is increased over the network. In this paper, a distinctive multipath based data chunk sequencing scheme is suggested to perform the reliable communication over the clustered mobile network.
In modern world, the demand of network is increasing rapidly. This ever increasing usage of such network requirements also demands fast recovery from network failures. The multipath routing is one of the most promising routing schemes to accommodate the diverse requirements of the network. It has basic features like load balancing and improved bandwidth. In this paper, we have presented a review of some modern and popular methods for the reliable multi path routing. A brief introduction to the concept of multipath routing is also elaborated. The merits and demerits of each multi path routing methods are discussed.