Operation and Control Techniques of SMES Unit for Fault Ride through Improvement of a DFIG Based WECS |
Author : Sneha Patil1 |
Abstract | Full Text |
Abstract :The energy storage in an SMES is in the state of magnetic field within a superconductor coil. The magnetic field is formed by flowing DC current in the SMES. To ensure proper operation the temperature of SMES should be maintained below critical temperature. At this temperature the resistance of the coil is zero and hence there is no loss in stored energy. The ability of SMES to store energy is influenced by the current density. The energy is fed back to the grid by conversion of magnetic field into electrical energy. An SMES system has a superconductor, refrigerant, power conditioning unit and control unit. The storage of energy is achieved by continuous circulation of current inside the coil. Since the energy is not converted in any form other than electrical there are lesser losses in SMES configuration than any other storage mechanism. Thus the efficiency is very high. It inhibits very low cycling time and the number of charge discharge cycles is very high. The major drawbacks of this technology being very high initial cost as well as losses associated with auxiliaries. This paper covers various aspects of SMES configuration and its connection in power system. |
|
Controlling Packet Loss at the Network Edges by Using Tokens |
Author : B.Suryanarayana1, K. Bhargav Kiran2 |
Abstract | Full Text |
Abstract :— The Internet accommodates simultaneous audio, video and data traffic. It requires the Internet to guarantee the packet loss which at its turn depends very much on congestion controls. A series of protocols have been introduced to supplement the insufficient TCP mechanism controlling the network congestion's. CSFQ was designed as an open-loop controller to provide the fair best effort service for supervising the per-flow bandwidth consumption and has become helpless when the P2P flows started to dominate the traffic of the Internet. Token-Based Congestion Control (TBCC) is based on a closed-loop congestion control principles, which restricts token resources consumed by an end-user and provides the fair best effort service with O(1) complexity. As Self-Verifying Re-feedback and CSFQ, it experiences a heavy load by policing inter-domain traffic for lack of trusts. In this paper, Stable Token-Limited Congestion Control (STLCC) is introduced as new protocols which appends inter-domain congestion control to TBCC and make the congestion control system to be stable. STLCC is able to shape input and output traffic at the inter-domain link with O(1) complexity. STLCC produce a congestion index is pushes the packet loss to the network edge and improves the network performance. At last, the simple version of STLCC is introduced. This version is deployable in the Internet without any IP protocols modifications and preserves also the packet datagram. |
|
Technical Competency of Engineer Expert in Brazil and the USA approach |
Author : Alexandre A.G. Silva1, Pedro L.P.Sanchez 2 |
Abstract | Full Text |
Abstract :This article discusses the system of choice of experts, especially engineers experts in Brazil and the United States. Despite being different legal systems, there are common issues that have different solutions in both countries. First will be exposed as is the Brazilian legal system, and will be described how is the choose of experts in the judiciary. Next will be described the American legal system and how is the choice of the experts in this system. Possible solutions to the problems of the Brazilian system based on the American system will be pointed out. |
|
Derating Analysis for Reliability of Components |
Author : .Bindu Madhavi1, BH.Sowmya2, B. Sandeep2, M.Lavanya2 |
Abstract | Full Text |
Abstract : Ensuring reliable operation over an extended period of time is one of the biggest challenge facing present day electronic systems. The increased vulnerability of the components to various electrical, thermal, mechanical, chemical and electromagnetic stresses poses a big threat in attaing the reliability required for various mission critical applications. Derating can be defined as the practice of limiting electrical, thermal and mechanical stresses on devices to levels below their specified or proven capabilities in order to enhance reliability. If a system is expected to be reliable, one of the major contributing factors must be a conservative design approach incorporating part derating. Realizing a need for derating of electronic and electromechanical parts, many manufacturers have established internal guidelines for derating practices. In this project, a notch filter circuit is used in an aerospace application is selected. Circuit simulation will be carried out by using E-CAD Tools. Further Derating analysis will be done as in the methodology given in MIL-STD-975A and provide design margin against this standard as well. Key for success of any product lies in its producibility, Quality and reliability. A lot of effort is needed to develop a new product, make a prototype and prove its performance. Still more effort is required, if it is to be produced in large quantities with minimum number of rejections. Minimum number of rejections or increase in First time yield saves production costs, testing time and resources. Hence it helps to reduce cost of item. It is also required that product delivered to the customer should perform satisfactorily without failure under its expected life cycle operational stresses. It should continue this performance over its expected operational life time, or whenever it is required to operate, a factor which is called reliability. Reliable product performance increases customer satisfaction and gives Brand name for manufacturer. The increased vulnerability of the components to various electrical, thermal, mechanical, chemical and electromagnetic stresses poses a big threat in attaing the reliability required for various mission critical applications. Derating is the practice of operating at a lower stress condition than a part's rating. |
|
High Speed CPL Adder for Digital Biquad Filter Design |
Author : Neva Agarwala1 |
Abstract | Full Text |
Abstract :The project presents the comprehensive explanation of how to minimize the overall delay of a Digital Biquad Filter by comparing the time delay performance analysis among different adders. Finally, 8 bit CPL adder is used in the design methodology of this Biquad Filter for its excellent performance in timing delay calculation. At the end, it has been found that the design was fully functional and the time delay was less compare to others. |
|
Analysis of Advanced Techniques to Eliminate Harmonics in AC Drives |
Author : Amit P. Wankhade1, Prof. C. Veeresh2 |
Abstract | Full Text |
Abstract :Variable speed AC drives are finding their place in all types of industrial and commercial loads. This Work covers the current source converter technologies, including pulse width-modulated current-source inverters (CSIs) and in addition, this also addresses the present status of the direct converters & gives an overview of the commonly Used modulation schemes for VFD systems. The proposed work flow is that to work with the simulation of three phases PWM Current Source Inverter fed Induction Motor (CSI-IM) drive systems using Matlab/Simulink simulation Software. This work primarily presents a Unified approach for generating pulse width-modulated patterns for three-phase current-source rectifiers and inverters (CSR/is) that provides unconstrained selective harmonic elimination and fundamental current control. This conversion Process generates harmonics in the motor current waveform. This project deals with the analysis of motor current Harmonics using FFT analysis and use of filter for mitigating them for smooth operation of motor. The filter used for Reduction of harmonics is passive filter. The filter is such it reduces only the 5th & 7th order harmonics. Thus the Analysis of motor current harmonics is done firstly without filter & then it has been compared with the results after the Addition of filter. It is found that the 5th & 7th order harmonics has reduced considerably. |
|
Fitting Performance of Empirical and Theoretical Soil Water Retention Functions and Estimation of Statistical Pore-Size Distribution-Based Unsaturated Hydraulic Conductivity Models for Flood Plain Soils |
Author : Alka Ravesh1, R.K.Malik2 |
Abstract | Full Text |
Abstract :For identifying the soil water retention function for its best fitting performance, the empirical retention functions of Brooks-Corey, Van Genuchten and theoretical Kosugi were parameterized for the clay loam and silt loam flood plain soils. The parameters using non-linear least- squares optimization technique as used in the RETC code were optimized and these were used in the Mualem’s statistical pore-size distribution-based unsaturated hydraulic conductivity models. It was observed that the log-normal function of Kosugi gave an excellent fitting performance having the highest co-efficient of determination and the lowest residual sum of squares. The physically-based Kosugi function was observed to be followed by empirical functions of Van Genuchten and Brooks-Corey in their fitting performances, respectively |
|
The Influence of Length of the Stem of Klutuk Banana (Musa Balbisiana) Toward Tensile Strength: A Review of the Mechanical Properties |
Author : Achmad Choerudin1, Singgih Trijanto 1 |
Abstract | Full Text |
Abstract :This study is testing the effects of fibre length on tensile strength and strain on the stem of klutuk banana fibre specimen with length of fiber are variation of 10 cm, 7 cm, 5 cm and 3 cm. The results showed that composite fibres stem of banana with tensile strenght test result is specimen of 10 cm (25.38 N/mm2), specimen of 7 cm (14,47 N/mm2), specimen of 3 cm (17,27 N/mm2) and specimen of 5 cm (12,08 N/mm2). The result is strain specimen and extension of 10 cm (20,14), specimen of 7 cm (9.95), specimen of 5 cm (5,49) and specimen of 3 cm (5,39). The conclusions of this study are (1) the length of the stem of banana fibres in composite will further improve the tensile strenght on an existing specimen, by not being influenced by other factors, (2) The length of the stem of banana fibres will be increasingly small elongation that occurred compared with shorter fibres, and (3) the length of the stem of banana fibres are the higher values of the strain that occurs. |
|
A Survey on Feature Selection Techniques |
Author : Jesna Jose1 |
Abstract | Full Text |
Abstract :Feature selection is a term commonly used in data mining to describe the tools and techniques available for reducing inputs to a manageable size for processing and analysis. Feature selection implies not only cardinality reduction, which means imposing an arbitrary or predefined cutoff on the number of attributes that can be considered when building a model, but also the choice of attributes, meaning that either the analyst or the modeling tool actively selects or discards attributes based on their usefulness for analysis. Feature selection is an effective technique for dimension reduction and an essential step in successful data mining applications. It is a research area of great practical significance and has been developed and evolved to answer the challenges due to data of increasingly high dimensionality. The objective of feature selection is three fold. Improving the prediction performance of the predictors, Providing faster and more cost effective prediction and providing a better understanding of the underlying process that generate the data. This paper is actually a survey on various techniques of feature selection and its advantages and disadvantages. |
|
Impact of Network Size & Link Bandwidth in Wired TCP & UDP Network Topologies |
Author : Mrs. Meenakshi. |
Abstract | Full Text |
Abstract : The transmission of information in a network relies on the performance of the traffic scenario (application traffic agent and data traffic) used in a network. The traffic scenario determines the reliability and capability of information transmission, which necessitates its performance analysis. The objective of this paper is to calculate and compare the performance of TCP/FTP and UDP/CBR traffic in wired networks. Study has been done using NS-2 and AWK scripts. Exhaustive simulations have been done to analyze results, which are evaluated for performance metrics, such as link throughput, and packet delivery ratio. The effect of variations in link bandwidth, number of nodes on the network performance is analyzed over a wide range of their values. Results are shown in terms of graphs and tables. |
|
WiTricity: A Wireless Energy Solution Available at Anytime and Anywhere |
Author : Shahbaz Ali Khidri¹, Aamir Ali Malik², Shakir Hussain Memon³ |
Abstract | Full Text |
Abstract :Electrical power is vital to everyone and is a clean and efficient energy source that is easy to transmit over long distances, and easy to control. Generally, electrical power is transmitted from one place to another with the help of wires which introduce losses and a significant amount of power is wasted in this way. As a result, the efficiency of the power system is significantly affected. In order to overcome these problems, a low-cost, reliable, efficient, secure, and environmental friendly wireless energy solution is presented in this research paper. The concept of transferring power wirelessly in 3D space was first realized by Nikola Tesla when he gave the idea to transmit the power without the help of wires over large distances using the earth’s ionosphere. In this research paper, magnetic resonance method which is non-radiative in nature is introduced for wireless power transmission and the electrical power is transmitted wirelessly over a distance of 10 feet with an overall efficiency of 80%. The method introduced in this paper is environmental friendly and has a negligible interaction with exterior forces/objects. |
|
Design, fabrication and Performance Evaluation of Polisher Machine of Mini Dal Mill |
Author : Sagar H. Bagade1, Prof. S. R. Ikhar2, Dr. A. V. Vanalkar3 |
Abstract | Full Text |
Abstract :This paper describes the detail information of design procedure of polisher machine. Pictorial views of fabricated machine is given. The processed dal sample is tested for reflectivity. Schematic of test apparatus is given. Apparatus consist of LDR , which detects incoming light in the form of resistance. Three Dal samples are tested. Surface of Polished Dal samples found more reflective than unpolished Dal sample. |
|
Analysis of Thick Beam Bending Problem by Using a New Hyperbolic Shear Deformation Theory |
Author : Vaibhav B. Chavan1, Dr. Ajay G. Dahake2 |
Abstract | Full Text |
Abstract : A new hyperbolic shear deformation theory for bending of deep beams, in which number of variables is same as that in the hyperbolic shear deformation theory, is developed. The noteworthy feature of theory is that the transverse shear stresses can be obtained directly from the use of constitutive relations with efficacy, satisfying the shear stress free condition on the top and bottom surfaces of the beam. Hence, the theory obviates the need of shear correction factor. The fixed-fixed isotropic beam subjected to varying load is examined using the present theory .Governing differential equation and boundary conditions are obtained by using the principle of virtual work. Results obtained are discussed critically with those of other theories. |
|
Mobile Tracing Software for Android Phone |
Author : Anuradha Sharma1, Jyoti Sharma4, Dipesh Monga2, Ratul Aggarwal3 |
Abstract | Full Text |
Abstract :The goal of this document is to give description of how to use the “Mobile Security System (MSS)” (release 1.0). It gives complete information about functional and nonfunctional requirements of system Mobile security system is security software tocapture missing mobile phones or tablet pcs. The main purposes behind this project are to reduce some of the vulnerabilities in existing security systems, providing user friendly authentication mechanisms (for organizations’ resources such as domains, networks and so on) and location identification. This will be useful for business organizations and for individuals as well to keep track their mobile. For example the strategies, stability, configurations and etc. are can be considered as some of the confidential information. And it can also provide some management capabilities as well. The project is carried out within two phases. |
|
Design of 16-bit Data Processor Using Finite State Machine in Verilog |
Author : Shashank Kaithwas1, Pramod Kumar Jain2 |
Abstract | Full Text |
Abstract :This paper presents design concept of 16—bit Data processor. Design methodology has been changing from schematic to Hardware Descriptive Language (HDL) based design. Data processor has been proposed using Finite State Machine (FSM). The state machine designed for the Data Processor can be started from any state and can jump on any state in between. The key architecture elements of Data processor such as, Arithmetic Logic Unit (ALU), Control Unit and Data-path are being described. Functionalities are validated through synthesis and simulation process. Besides verifying the outputs, the timing diagram and interfacing signals are also track to ensure that they adhere to the design specification. The Verilog Hardware Descriptive Language gives access to every internal signal and designing Data Processor using this language fulfils the needs for different high performance applications. |
|
Therapeutic Properties of Ficus Regligiosa |
Author : Shailja Singh1, Shalini Jaiswal1 |
Abstract | Full Text |
Abstract :Medicinal plants have played a vital role in maintaining and improving human health from past thousands of years. History of human civilization and discovery of herbal medicines are running parallel from ancient time till date. Among hundreds of medicinal plants, Ficus tree has a significant role in promoting health and alleviate illness. Ficus religiosa commonly known as Peepal tree is regarded as sacred tree to both Hindus and Buddhists. Itcontains enormous range of pharmacological activities like ant diabetic, antimicrobial, analgesic, wound-healing etc. The present review describes the morphological, phytochemical and pharmacological aspects of F. religiosa. |
|
Students and Teachers’ Perception of the Causes of Poor Academic Performance in General and Further Mathematics in Sierra Leone: A Case Study of BO District Sourthern Province |
Author : Gegbe B 1, Koroma J.M1 |
Abstract | Full Text |
Abstract :The essential basis for economics and social well being of any country lies in the understanding by its people, basic mathematical, scientific, and technological knowledge. This concern is not just about those expected to continue in further studies and professions that are related to mathematics, science, technology and economics , but a competent mathematical population forms a basis for national growth and development. There are number of different forces that have led to strong concern about the low quality of mathematical knowledge, skills values and performance among students the last few decades in Bo city. Over the years, many different perceptions about General Mathematics and Further Mathematics have been held. This study examines the poor performance among Senior Secondary students at West Africa Secondary School Certificates Examination level in Bo City, in Sierra Leone. The target population of the study included one hundred students (100) and seventy-five (75) teachers randomly selected from five (5) secondary schools in Bo city. Questionnaires were used to collect relevant data for the study. Chi-square tests were used to analyse the research questions. Other forms of data are presented in the form of percentages. Teacher qualification and student environment did not influence students’ poor performance, but teaching methods have influenced poor performance of students in General Mathematics and Further Mathematics. Teachers should encourage and motivate the student to adore the mathematics related subjects. Students must develop positive attitude towards the teacher and the subjects matter. |
|
Face Recognition using Laplace Beltrami Operator by Optimal Linear Approximations |
Author : Tapasya Sinsinwar1, P.K.Dwivedi2 |
Abstract | Full Text |
Abstract : We propose an appearance-based face recognition technique called the laplacian face method. With Locality Preserving Projections (LPP), the face imageries are mapped into a face subspace for analysis. Unlike from Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA) which commendably see merely the Euclidean structure of face space, LPP discovers a set in subspace that conserves native information, and finds a face subspace that best perceives the essential face manifold structure. The laplacian faces are the optimal linear approximations to the Eigen functions of the Laplace beltrami operator on the face manifold. In this way, the undesirable variations resulting from changes in lighting, facial expression, and pose may be removed or reduced. Theoretical analysis shows that PCA, LDA, and LPP can be obtained from different graph models. We equate the proposed Laplacian face approach with Eigen face and Fisher face methods on three different face data sets. Experimental results recommend that the proposed Laplacian face method provides a better representation and attains lower error rates in face recognition. |
|
Risk Factor Analysis to Patient Based on Fuzzy Logic Control System |
Author : M. Mayilvaganan1, K. Rajeswari2 |
Abstract | Full Text |
Abstract :Fuzzy logic has proved in this paper, a medical fuzzy data is introduced in order to help users in providing accurate information when there is inaccuracy. Inaccuracy in data represents imprecise or vague values (like the words use in human conversation) or uncertainty in using the available information required for decision making handle the uncertainty of critical risk for human health. In this paper involved to diagnosis the health risk which is related to Blood Pressure, Pulse rate and Kidney function. The confusing nature of the symptoms makes it difficult for physicians using psychometric assessment tools alone to determine the risk of the disease. This paper describes research results in the development of a fuzzy driven system to determine the risk levels of health for the patients. The system is implemented and simulated using MATLAB fuzzy tool box. |
|
A Review of Different Content Based Image Retrieval Techniques |
Author : Amit Singh1, Parag Sohoni1, Manoj Kumar1 |
Abstract | Full Text |
Abstract :The extraction of features and its demonstration from the large database is the major issue in content based image retrieval (CBIR). The image retrieval is interesting and fastest developing methodology in all fields. It is effective and well-organized approach for retrieving the image. In CBIR system the images are stored in the form of low level visual information due to this the direct correlation with high level semantic is absent. To bridge the gap between high-level and low-level semantics several methodologies has developed. For the retrieval of image, firstly extracts the features of stored images then all extracted features will goes for the training. After the completion of preprocess, it’ll compare with the query image. In this paper the study of different approaches are discussed. |
|
Evaluating the Efficiency of Bilateral Filter |
Author : Harsimran Kaur1, Neetu Gupta2 |
Abstract | Full Text |
Abstract :Bilateral filtering is a simple, non-iterative scheme for texture removal and edge-preserving and noise-reducing smoothing filter. The intensity value at each pixel in an image is replaced by a weighted average of intensity values from nearby pixels. This weight is based on a Gaussian distribution. Thus noise is averaged and signal strength is preserved. Performance parameters of bilateral filter have been evaluated. The design and implementation is done in MATLAB using image processing toolbox. The comparison has shown that the bilateral is quite effective for random and Gaussian noise |
|
Investigation of SMAW Joints By Varying Concentration of Rutile (TiO2) in Electrode Flux |
Author : Chirag Sharma1, Amit Sharma2, Pushpinder Sharma2 |
Abstract | Full Text |
Abstract :Our aim to investigate the SMAW joints by varying the concentration of Rutile (TiO2) in the flux composition on the various characteristics of metal cored coated electrodes for the purpose of developing efficient and better rutile electrodes for structural mild steel. In this work five rutile metal cored coated electrodes were prepared by increasing Rutile (TiO2), at the expense of cellulose and Si-bearing components like Mica and Calcite in the fluxes. Various mechanical properties like micro hardness, tensile properties and Impact toughness were measured and metallographic studies were undertaken. Qualitative measurements of operational properties like porosity, slag detachability and arc stability were also carried out. |
|
An Analytical Study on integration of Multibiometric Traits at Matching Score Level using Transformation Techniques |
Author : Santosh Kumar1, Vikas Kumar1, Arjun Singh1 |
Abstract | Full Text |
Abstract : Biometric is one of those egressing technologies which are exploited for identifying a person on the basis of physiological and behavioral characteristic. However, unimodal biometric system faces the problem of lack of individuality, spoof attacks, non-universality, degree of freedom etc., which make these systems less precise and erroneous. In order to overcome these problems, multi biometric has become the favorite choice for verification of an individual to declare him as an imposte or a genuine. However, the fusion or integration of multiple biometric traits can be done at any one of the four module of a general multibiometric system. Further, achieving fusion at matching score level is more preferable due to the availability of sufficient amount of information present over there. In this paper we have presented a comparative study of normalization methodology which is basically used to convert the different feature vectors of individual traits in common domain in order to combine them as a single feature vector. Keywords— Biometric, Multibiometric, Normalization, Unimodal, Unsupervised Learning rules, Imposter, Genuine. |
|
Hadoop: A Big Data Management Framework for Storage, Scalability, Complexity, Distributed Files and Processing of Massive Datasets |
Author : Manoj Kumar Singh1, Dr. Parveen Kumar2 |
Abstract | Full Text |
Abstract :Every day people make 2.5 quintillion bytes of information. In the most recent two years alone in excess of 90% of the information on the planet has been made and there is no sign that this will change, truth be told, information creation is expanding. The purpose behind the enormous blast in information is that there are such a variety of sources, for example, sensors used to gather barometrical information, information from posts on social networking locales, advanced and movie information, information created from every day transaction records and cell and GPS information, simply to name a couple. The greater part of this information is called Big Data and it incorporates three measurements: Volume, Velocity, Variety. To infer esteem from Big Data, associations need to rebuild their reasoning. With information developing so quickly and the ascent of unstructured information representing 90% of the information today, associations need to look past the legacy and select schemas that place extreme restrictions on overseeing Big Data productively and gainfully. In this paper we give an in-profundity theoretical review of the modules identified with Hadoop, a Big Data administration schema. |
|
VLSI Based Design of Low Power and Linear CMOS Temperature Sensor |
Author : Poorvi Jain1, Pramod Kumar Jain2 |
Abstract | Full Text |
Abstract :Complementary Metal Oxide Semiconductor (CMOS) temperature sensor is introduced in this paper which aims at developing the MOSFET as a temperature sensing element operating in sub-threshold region by using dimensional analysis and numerical optimization techniques A linear CMOS temperature to voltage converter is proposed which focuses on temperature measurement using the difference between the gate-source voltages of transistors that is proportional to absolute temperature with low power. This proposed CMOS temperature sensor is able to measure the temperature range from 0oC to 120oC . A comparative study is made between the temperature sensors based on their aspect ratio under the implementation of UMC 180nm CMOS process with single rail power supply of 600mV. |
|
A Study of Current Scenario of Cyber Security Practices and Measures: Literature Review |
Author : Rajesh Mohan More1, Dr. Ajay Kumar2 |
Abstract | Full Text |
Abstract :Security measures are of prime importance to ensure safety and reliability of organizations. Hacking of data and information has become almost a routine and regular of organizations. Before we think to combat such a situation; to avoid both predictable and unpredictable loss, danger and risk associated, tangible and intangible factors, we have to strategize in keeping cool in the heat of battle and find out the causes attributing to the same; so proactive action need to be taken to exterminate the same. The researchers feel to encircle parameter to have an in-depth insight such as – integrity of network connections and components, telecommunication issues, firewall, filtering, intrusion detection and prevention system, and network maintenance. These are in fact intra and interrelated. |
|
Design of Impact Load Testing Machine for COT |
Author : Sandesh G.Ughade1, Dr. A.V.Vanalkar2, Prof P.G.Mehar2 |
Abstract | Full Text |
Abstract :this paper describes the design of a new pneumatically load applied machine that has been specifically design for studying the dynamic mechanical behavior of COT (wooden bed). Such type of equipment has been used to generate simple and measurable fracture processes under moderate to fast loading rates which produce complicated crack patterns that are difficult to analyze. We are developing the machine as a facility to provide experimental data to validate numerical data of impact load on COT that observe kinetic energy during collision. The machine consists of two main parts, the mechanical structure and the data acquisition system. The development process included the design, development, fabrication, and function tests of the machine. |
|
Heat Treating of Non Ferous Alloys |
Author : Jirapure S.C1, Borade A. B2 |
Abstract | Full Text |
Abstract :Non ferrous alloys are the most versatile engineering materials. The combination of physical properties such as strength, ductility, conductivity, corrosion resistance and machinability makes these suitable for a wide range of applications. These properties can be further enhanced with variations in composition and manufacturing processes. Present paper gives a clear idea about various strengthening processes of non ferrous alloys and prepares it as per the need of the user. |
|
Data Collector by Using Wireless Technologies IEEE 802.15.4 and Bluetooth |
Author : KSV Pavan Kumar1, R.Srinivasa Rao2 |
Abstract | Full Text |
Abstract :In this paper we have shown a system based on Bluetooth and ZigBee for hospital environment applications. This system provides an easy way to monitor the patient’s health condition.We have used advanced technical methods to design the system like ZigBee, Bluetooth and ARM9. ARM9 processor requires significantly less transistors than other micro controllers. This reduces the cost, heat producing by the circuit. We have used Pulse sensor, Temperature Sensor, ECG signal for the health monitoring of the patient. Finally we have designed a system by using the wireless technologies to monitor an individual’s health. |
|
CDMA Power Control Using Optimization Techniques- A Review |
Author : Arti Singh1, Kuldeep Bhardwaj2 |
Abstract | Full Text |
Abstract :In this paper power control techniques for code division multiple access (CDMA) system is presented. For CDMA system Power control is the most important system requirement. To function effectively, there is a need to control the power. If power control is not implemented many problems such as the near-far effect will start to dominate and consequently will lower the capacity of the CDMA system. However, when the power control in CDMA systems is applied, it allows multiple users to share resources of the system equally between themselves, leading to increased capacity. With appropriate power control, capacity of CDMA system is high in comparison to frequency division multiple access (FDMA) and time division multiple access (TDMA).For power control in CDMA system optimization algorithms i.e. genetic algorithm & particle swarm algorithm can be used which determines a suitable power vector [1], [2]. These power vector or power levels are determined at the base station and told to mobile units to adjust their transmitting power in accordance to these levels. So a detailed discussion about CDMA system power control is given here. |
|
Remote Power Generating Systems WHIT Using Low Frequency Transmission |
Author : Mohammad Ali Adelian,Narjes Nakhostin Maher, Farzaneh Soorani |
Abstract | Full Text |
Abstract :the goal of this research is to evaluate alternative transmission systems from remote wind farms to the main grid using low-frequency AC technology. Low frequency means a frequency lower than nominal frequency (60/50Hz). The low-frequency AC network can be connected to the power grid at major substations via cyclo-converters that provide a low-cost interconnection and synchronization with the main grid. Cyclo-converter technology is utilized to minimize costs which result in systems of 20/16.66 Hz (for 60/50Hz systems respectively). Low frequency transmission has the potential to provide an attractive solution in terms of economics and technical merits. The optimal voltage level selection for transmission within the wind farm and up to the interconnection with the power grid is investigated. The proposed system is expected to have costs substantially lower than HVDC and conventional HVAC systems. The cost savings will come from the fact that cyclo-converters are used which are much lower in cost than HVDC. Other savings can come from optimizing the topology of the wind farms. Another advantage of the proposed topologies is that existing transformers designed for 60 Hz can be used for the proposed topologies (for example a 345kV/69 kV, 60Hz transformer can be used for a 115 kV/23kV, 20 Hz system). The results from this research indicate that the use of LFAC technology for transmission reduces the transmission power losses and the cost of the transmission system. |
|
Pulse Oximeter System |
Author : Bindu Madhavi Kalasapati1, Lavanya Thunuguntla 1 |
Abstract | Full Text |
Abstract :A person’s heart forces the blood to flow through the arteries. As a result the arteries throb in sync with the beating of the heart. This throbbing can be felt at the person’s wrist and other places over the body.Electronically this throbbing can be sensed using LDR and LED sensor. The LDR resistance changes with the intensity of the light falling on its surface. The variations in the light intensity due to blood flow are exploited in this project.The counter is configured such that it counts the pulses for 1 minute. The process is initiated by a start condition and the count terminates at the end of 60 seconds. The result is displayed on the LCD.Although the pulse rate can be manually measured by us, an electronic digital heart beat counter gives the opportunity to measure tit automatically and continuously. Our heart beat monitor has the following salient features like Light dependent resistor is used as transducer, blinking LED for visual indication of heat beats,counts are automatic and are displayed on LCD, Continuous monitoring can be done, the processed signal can be fed to data logger for future reference, Works on AC mains or batteries. |
|
Analysis of the Factors of Influence on Motivation Learn Automotive Electrical Material for Students of Class XI SMK YP Delanggu Klaten, Central Java, Indonesia (An Empirical Study) |
Author : Joko Rochmadi1 |
Abstract | Full Text |
Abstract :The purpose of this study is to determine the interest and knowledge, facilities and schools, and how teachers teach to the motivation of study in vocational automotive electrical SMK YP Klaten Delanggu either partially or simultaneously.The study was conducted at SMK YP Delanggu Klaten. This study population is all class XI students majoring in automotive, mounting to approximately 128 students. Sample of 40 students by using purposive sampling techniques. Data analysis techniques using multiple linear regression analysis, test the accuracy of the model and the assumption of classical test. The results of this study were (1) There is a partial influence student’s interest and knowledge of student’s motivation (0.036 <0.05), (2) There is a partial influence on school facilities and students' motivation (0.015 <0.05), (3) No partial influence the way teachers teach to student’s motivation (0.938> 0.05) and (4) There are influences simultaneously the independent variables interest and knowledge of students, school facilities and infrastructure, and how teachers teach) to the dependent variable (F = 17.523). R Square = 59% means that changes in student’s motivation is influenced by variables in the study by 59% in relative terms and the remaining 41% are influenced by variables other than research. Effectively research variables affect student’s motivation to change their interest and knowledge |
|
Coherence among Electrocardiogram and Electroencephalogram Signals as Non- Invasive Tool of Diagnosis |
Author : Abhishek Chaudhary1, Bhavana Chauhan 1, Gavendra Singh1, Monika Jain 1 |
Abstract | Full Text |
Abstract :-Degree of association or coupling of frequency spectra between the ECG (electrocardiogram) and EEG (electroencephalogram) signals at a particular frequency is presented in this paper. Degree of association or coupling of frequency spectra between two signals is called Coherence.ECG orelectrocardiogram and EEG or electroencephalogram are very important parameters when it comes to diagnosis and treatment of human heart and brain related problems. For this reason signal processing of such signals are most important. A continuous non-invasive, low cost and accurate monitoring of functioning of heart and brain have been proven to be invaluable in various diagnostics and clinical applications. In this paper coherence between simultaneously taken ECG signals and EEG signals of four different subjects is presented.The EEG signals acquired from the four different positions; the Frontal(F_(p_1 )-F_(p_2 )), Central(C_3-C_4), Parietal(P_3-P_4) and Occipital (O_1-O_2) Brain Regions. Coherence is analysed by obtaining magnitude squared coherence parameters at a certain frequency band (Very Low, Low and High) using Welch method of Power Spectrum Estimation. |
|
Information Security in Cloud |
Author : Divisha manral1, Jasmine Dalal1, Kavya Goel1 |
Abstract | Full Text |
Abstract :With the advent of the internet, security became a major concern where every piece of information was vulnerable to a number of threats. Cloud is kind of centralized database where many clients store, retrieve and possibly modify data. Cloud computing is environment which enables convenient and efficient access to a shared pool of configurable computing resources. However the data stored and retrieved in such a way may not be fully trustworthy. The range of study encompasses an intricate research on various information security technologies and proposal of an efficient system for ensuring information security in cloud computing platforms. Information security has become critical to not only personal computers but also corporate organizations and government agencies, given organizations these days rely extensively on cloud for collaboration. Aim is to develop a secure system by encryption mechanisms that allow a client’s data to be transformed into unintelligible data for transmission. |
|
Aerodynamic Characteristics of G16 Grid Fin Configuration at Subsonic and Supersonic Speeds |
Author : Prashanth H S1, Prof. K S Ravi2, Dr G B Krishnappa3 |
Abstract | Full Text |
Abstract : Grid fins (lattice fins) are used as a lifting and control surface for highly maneuverable missiles in place of more conventional control surfaces, such as planar fins. Grid fins also find their applications for air-launched sub-munitions. The main advantages are its low hinge moment requirement and good high angle of attack performance characteristics. In this paper, one such grid fin configuration named G16 grid fin was taken for the CFD analysis. The G16 fin was studied under standalone condition at 0.7 & 2.5 Mach number for different Angle of attack (AOA) from 0 to 30◦ . The aerodynamic characteristics were plotted and discussed. |
|
Adaptive Configuration Workload Queue in Cloud Computing |
Author : Rupinder Kaur1, Sahil Vashist 2 |
Abstract | Full Text |
Abstract :With the emergence of cloud computing, on-demand resources usage is made possible. This allows applications to scale out elastically according to the load. In this work we have tried to maximize the cloud profit and efficiency by efficient placement of virtual machines. The target of this algorithm is to maximize the service providers in the case of current resources are not enough to process all the requests in time. In this strategy, the requests are ranked according to the profits they can bring. Simulation results show the efficiency of our framework. |
|
Implementation of Decimation Filter for Hearing Aid Application |
Author : Prof. Suraj R. Gaikwad, Er. Shruti S. Kshirsagar and Dr. Sagar R. Gaikwad |
Abstract | Full Text |
Abstract :A hearing aid is a small electronic device that one wears in or behind his/her ear who have hearing loss. A hearing aid can help to the people to hear more in both quiet and noisy situations. It makes sounds louder so that a person with hearing loss can listen, communicate, and participate better in daily activities. In this paper, we implemented a digital filter which is used for hearing aid application. The implemented filter is based on the multirate approach in which high sampling rate signal is decimated to low sampling rate signal respectively. This proposed decimated filter is designed and implemented using the Xilinx System Generator and Matlab Simulink. |
|
Design of Substrate Integrated Waveguide Antennas for Millimeter Wave Applications |
Author : Y. Bharadwaja1 |
Abstract | Full Text |
Abstract :The paper presents a new concept in antenna design, whereby a photo-imageable thick-film process is used to integrate a waveguide antenna within a multilayer structure. This has yielded a very compact, high performance antenna working at high millimeter-wave (mm-wave) frequencies, with a high degree of repeatability and reliability in antenna construction. Theoretical and experimental results for 70 GHz mm-wave integrated antennas, fabricated using the new technique, are presented. The antennas were formed from miniature slotted waveguide arrays using up to 18 layers of photo-imageable material. To enhance the electrical performance a novel folded waveguide array was also investigated. The fabrication process is analyzed in detail and the critical issues involved in the fabrication cycle are discussed. The losses in the substrate integrated waveguide have been calculated. The performance of the new integrated antenna is compared to conventional metallic, air-filled waveguide antennas, and also to conventional microstrip antenna arrays operating at the same frequencies. |
|
Identification and Classification of Cloud–dense areas in Infrared Weather Imagery using Intensity Contours |
Author : D. Poobathy1, Dr. R. Manicka Chezian2 |
Abstract | Full Text |
Abstract :An alternative method to detect cloud density on geographic locations of the satellite infrared images for the prediction and nowcasting of weather and precipitation has been derived and tested. INSAT and METEOSAT satellite captured two different images were used for the analysis. Those images were covered different range and period of time; it shows the geographical areas of India and its nearest subcontinents. The techniques applied for cloud studyare density slicing and image contouring, the core idea behind the technique thatthe various intensity levels of gray in the monochromic images. Three basic steps involved in this task, Grayscale conversion, plot contour lines, provide labels.There are two contouring techniques appliedto carryout tests. After experiments the cloud dense areas are identified and classified into five categories. Those categories indicated by five colors, a circle like white region covered by red color spectacles that a cyclonic circulation formed on that location, same time a white region bounded by blue curves indicates no cloud on that particular surface |
|
The Effect of Engine Temperature on Multi Cylinder SI Engine Performance with Gasoline as a fuel |
Author : Sunil Choudhary1, A.C. Tiwari2, Ajay Vardhan3, Arvind Kaushal4 |
Abstract | Full Text |
Abstract :This country is amongst the tropical countries where the deviation in the temperature is having very vast range. Looking in to this vast varying temperature range it is very difficult to say that which temperature is best suited for operating condition of engines and gives us best performance level as for as Thermal efficiency and brake power is concerned. In this work it tried to investigate the best option to run the S.I. engine. The development of engines with its complexity of in-cylinder processes requires modern development tools to exploit the full potential in order to reduce fuel consumption. A three cylinder, four stroke, petrol carburetor Maruti 800 engine connected to eddy current type dynamometer for loading was adopted to study engine power. The performance results that are reported include brake power and specific fuel consumption (sfc) as a function of engine temperature; i.e. 50, 60, 70, 80, and 90°C with varying engine speed of 1500, 1800, 2100 and 2400 rpm. The effect of increasing the temperature can have the multiple advantage of reducing the specific fuel consumption while on the other hand low head temperature will have good impact in reducing the thermal stress of the top portion, reduction in chance of knocking & pre-ignition, increase in the volumetric efficiency. It is indisputable conclusion that lower speed engines and large capacity engines, which are usually of low speed design, more efficient than high speed engines. |
|
Biological Effects of Yellow Laser- Induced of Cell Survival: Structural DNA Damage Comparison is Undergoing Ultraviolet Radiation Photocoagulation |
Author : AL-TimimiZahra,a |
Abstract | Full Text |
Abstract :— In this work, we have a tendency to study lymphocyte cells survive before irradiated with a yellow laser (578nm) , and its protecting of deoxyribonucleic acid (DNA) damage once being irradiated with ultraviolet radiation (UVB-320nm) to activate DNA damage. Total range of blood samples (200) is collected from healthy donors. Donor blood volume varied from 5ml to 7ml in heparin tubes. Samples dole out to check the radiation effect on cell viability by using the trypan blue exclusion. The experiments implemented during 1, 24, 48 and 72 hours prior UVB to achieve the repair development.DNA gel electrophoresis technique is performed on samples to check the effect of radiation on the separating DNA molecules of varying sizes extending. The results show a decrease of separating or breaking of DNA manifest on gel electrophoresis experiments as a result of the smear length is reduced significantly for UVB, alternative results for cell viability tests showed that yellow laser ought to increase the survival of cells before irradiated with UVB demonstrating (91%, 87% , 80% , and 71%) amelioration.Improvement of lymphocyte survival by yellow laser can be attributed to the induction of endogenous radiation protection and doubtless enzymes elicited by laser irradiation that may be scaled back the free radical either by scavenging concern or by improved cell repair, we have a tendency to may conclude that yellow irradiation shall shield cells from radiation damage.Abstract must be of Time New Roman Front of size 10 and must be justified alignment. |
|
Catalytic Decomposition of Hydrocarbon Gas over Various Nanostructured Metal oxides for Hydrocarbon Removal and Production of Carbon Nanotubes |
Author : M.H.Khedra,d, M.I.Nasrb, K.S.Abdel Halimb, A.A.Farghalia,d, N.K.Solimanc* |
Abstract | Full Text |
Abstract : Nanosized CuO-CeO2, CuO-Fe2O3, CuO-CeO2-Al2O3 and CuO-Fe2O3-CeO2-Al2O3 were prepared by co-precipitation and wet impregnation techniques and were used for Catalytic decomposition of acetylene to produce carbon nanotubes (CNTs). Weight gain technique was used to follow up the catalytic reactions. The results revealed that catalyst chemical composition, catalytic temperature, acetylene flow rate and catalyst’s weight have a significant effect on the acetylene conversion percent. It was found that maximum acetylene conversion percent occurs over CuO-CeO2-Fe2O3-Al2O3 and CuO-Fe2O3 and it increase by increasing, temperature from 400-600oC, decreasing acetylene flow rate from 150-50 ml/min and increasing catalyst weight from 0.25-1g. With further increase in catalyst weight, acetylene conversion% decrease. The scanning electron microscope (SEM) image shows that some of catalyst particles are observed at the tips of CNTs indicating that its formation proceeds by tip growth mechanism. ` The prepared samples and CNTs were characterized by X-ray diffraction, inductive coupled plasma – atomic emission spectroscopy (ICP-AES), surface area apparatus, Transmission electron microscope (TEM) and SEM. |
|
Remote Data Acquisition of Physical Parameters Using Master-Slave Utility of Microcontroller |
Author : A. P. Bhat1, S.J. Dhoble3, K. G. Rewatkar2 |
Abstract | Full Text |
Abstract :— Improve the performance of remotely situated device control and data monitoring, acquisition with parameter such as temperature, pressure, vibration, humidity on real time basis give the data modularity as well as low data processing time. The infrastructure of the existing RF network is used, which is based on supervisory control, monitoring and data acquisition demands constant development and applicability in research. Versatile and highly accurate data acquisition system is investigated. In the present work, an embedded data acquisition system at operating frequency of 16 MHz is designed around the Atmega-16A microcontroller. The application of RF and microcontroller infrastructure is proposed. Wireless data acquisition deals with the creation of an inexpensive, adaptable and easy to use data acquisition within a network. The wireless data acquisition system, which is setup the temperature, pressure and vibration monetring system with the precision readout, is designed using locally available electronics component. The necessary control have been dumped or embedded as software in the microcontroller to add the intelligence to the data accusation system sufficiently recorded from remote location and store in personal computer memory using hyper terminal utility. The designed system is compact, stand-alone, reliable, accurate and portable with on-board display of the acquired the data from remote place or system under observation. The properly designed Data Acquisition system saves time and money by eliminating the need of service personal to visit each site for inspection, data collection logging or make adjustments. |
|
Designing a Human Computer Interface Systems Tasks and Techniques |
Author : M. Mayilvaganan 1, D. Kalpana devi2 |
Abstract | Full Text |
Abstract :This paper focus on goal of Human computer interface system which are used to analysis a skill for human user by interacting with the system. It can be evaluate by problem solving, assessment activity, creativity and other process based on metrics in systematically. It can be used to develop an idea for software tool to evaluate the skill of human user through usability metrics. |
|
Survey on Web Image Mining |
Author : Kumari Priyanka Sinha 1, Praveen Kumar1 |
Abstract | Full Text |
Abstract : In this paper a literature survey on web image mining is presented. Web image mining is a technique of searching ,retrieving and accessing the data from an image, There are two type of web image mining techniques i.e. Text based web image mining and image based web image mining. The objective of this paper is to present tools and technique which are used in past and current evaluation. We are also going to showa chart for comparison between all past available techniques and we will show a summarize report for overall development in web image mining. |
|
Quality in Design and Architecture- A Comprehensive Study |
Author : Ruqia Bibi 1, Munazza Jannisar Khan1, Muhammad Nadeem Majeed1 |
Abstract | Full Text |
Abstract :The design quality holds a decisive influence on success of product. Our work is comprehensive study of software metrics to evaluate quality in the design phase which will be beneficial to find, repair design problems and saves large amount of potential expenditure. This paper evaluates employment of several design methods such as Robust Engineering Design, Failure Mode and Effect Analysis etc., to ensure quality and minimize variation. It has also figured the use of emerging technologies, new materials and the adoption of a simultaneous approach to design. It introduces a quality attribute driven perspective on software architecture reconstruction. It is essential to elect and follow architectures that full fill specific concerns or required properties with a certain degree of confidence, as architecture and design models together, signifies the functional behavior of the system. |
|
Fast Approximation Based Combinatorial Optimization Algorithm |
Author : Harsimran Kaur 1, Neetu Gupta2 |
Abstract | Full Text |
Abstract :- Label cost optimization proposes a new improvement in label cost function, improving existing moves of α-expansion algorithm and introducing some new moves for this algorithm. In order to study the performance comparison, different metrics of energy minimization has been considered. An appropriate comparison has been drawn among proposed technique i.e. fast approximation algorithm and previous well known techniques. The objective is to effectively optimize energies so that satisfactory image segmentation can be obtained (represented with different labels respective to different objects). New combinatorial optimization algorithm have been proposed which shows promising experimental results with the new moves, which we believe could be used in any context where α -expansions are currently employed |
|
Comparison between Two Compensation Current Control Methods of Shunt Active Power filter |
Author : Nenceey Jain, Amit Gupta |
Abstract | Full Text |
Abstract :This paper presents the analysis and simulation using Matlab/Simulink of a Shunt Active Power Filter (SAPF) for reducing the harmonics current generated by nonlinear loads and also compared the two current control method. Due to increasing the usage of power electronics equipment with linear load, the increase of the harmonics disturbance in the ac mains currents has became a major concern due to the adverse effects on all equipment mostly capacitors, transformers, and motors, causing additional losses, overloading, malfunctioning and overheating and interferences. Shunt Active Power filter is used to compensating the harmonic non-linear loads harmonics by injecting equal but opposite harmonic compensating current which gives pure sinusoidal wave. |
|
Mechanical Properties of Epoxy Based Hybrid Composites Reinforced with Sisal/SIC/Glass Fibers |
Author : Arpitha G R1, Sanjay M R1, L Laxmana Naik1, B Yogesha 1 |
Abstract | Full Text |
Abstract :- Development of the Polymer Composites with natural fibers and fillers as a sustainable alternative material for some engineering applications, particularly in aerospace applications and automobile applications are being investigated. Natural fiber composites such as sisal, jute, hemp and coir polymer composites appear more attractive due to their higher specific strength, lightweight and biodegradability and low cost. In this study, sisal/glass/Sic fiber reinforced epoxy composites are prepared and their mechanical properties such as tensile strength, flexural strength and impact strength are evaluated. Composites of silicon carbide filler (without filler, 3, 6 & 9Wt %) sisal fiber and glass fiber are investigated and results show that the composites without filler better results compared to the composites with silicon carbide filler. |
|
Stress Analysis of an Aircraft Wing with a Landing Gear Opening Cutout of the Bottom Skin |
Author : Kiran Shahapurkar1, Ravindra Babu G2 |
Abstract | Full Text |
Abstract :: In this paper, work is addressed to a stiffened panel of a landing gear opening cutout of a typical transport aircraft wing. Cut-outs required for fuel access and landing gear in the bottom skin of the wing will introduce stress concentration because the lower part of the wing is subjected to tensile force due to the upward bending of the wing during flight. The stress analysis of the landing gear opening cutout is carried out. This identifies the location of high tensile stresses which are the potential sites for fatigue crack initiation. |
|
An Enhanced Source Anonymity Method Framework for Sensor Networks with Replica Detection Using Hypothesis Testing |
Author : I K. Poongodi MCA., II S. Nivas MCA., M.Phil., Ph.D., |
Abstract | Full Text |
Abstract :In certain applications, the locations of events reported by a sensor network need to remain anonymous. That is, unauthorized observers must be unable to detect the origin of such events by analyzing the network traffic. Known as the source anonymity problem, this problem has emerged as an important topic in the security of wireless sensor networks, with variety of techniques based on different adversarial assumptions being proposed. This thesis presents a new framework for modeling, analyzing, and evaluating anonymity in sensor networks. The novelty of the proposed framework is twofold: first, it introduces the notion of “interval in distinguish ability” and provides a quantitative measure to model anonymity in wireless sensor networks; second, it maps source anonymity to the statistical problem of binary hypothesis testing with nuisance parameters. The thesis shows how mapping source anonymity to binary hypothesis testing with nuisance parameters leads to converting the problem of exposing private source information into searching for an appropriate data transformation that removes or minimize the effect of the nuisance information. By doing so, it transforms the problem from analyzing real-valued sample points to binary codes, which opens the door for coding theory to be incorporated into the study of anonymous sensor networks. In addition, to mitigate the limitations of previous schemes, the thesis proposes a zone-based node compromise detection scheme in sensor networks. The main idea of the proposed scheme is to use sequential hypothesis testing to detect suspect regions in which compromised nodes are likely placed. A fast and effective mobile replica node detection scheme is proposed using the Sequential Probability Ratio Test. |
|
A Smart Distribution Automation using Supervisory Control and Data Acquisition with Advanced Metering Infrastructure and GPRS Technology |
Author : A.Merlin Sharmila 1, S.Savitha Raj1 |
Abstract | Full Text |
Abstract :To realize some of the power grid goals, for the distribution system of the rural area, which builds up a real-time, wireless, multi-object monitoring remote system of electrical equipment depending on GPRS network, with a feeder automation based on Advanced Metering Infrastructure (AMI) is proposed. GRID uses Supervisory Control and Data Acquisition (SCADA) to monitor and control switches and protective devices. This will improve routine asset management, quality of service, operational efficiency, reliability, and security. The three parts of the system are assimilated with the advanced communication and measurement technology. As a added advantage to the existing system, the proposed methodology can monitor the operating situation, easily detect and locate the fault of the feeders and status of breakers,. The information from the system helps in apprehending the advanced distribution operation, which includes improvement in power quality, loss detection and state estimation . |
|
Canonical Cosine Transform Novel Stools in Signal processing |
Author : S.B.Chavhan1 |
Abstract | Full Text |
Abstract :: In this paper a theory of distributional two-dimensional (2-D) canonical cosine is developed using Gelfand-Shilov technique and defined some operators on these spaces also the topological structure of some of the S-type spaces of distributional two dimensional canonical cosine transform. |
|
Synchronization and Time Slot-Based Method for Vampire Attacks Detection in Wireless Sensor Networks |
Author : I N. Keerthikaa MCA., II K. Devika M.Sc., MCA., M.Phil., |
Abstract | Full Text |
Abstract :Ad hoc Wireless Sensor Networks (WSNs) promise exciting new applications in the near future, such as ubiquitous on-demand computing power, continuous connectivity, and instantly deployable communication for military and first responders. Such networks already monitor environmental conditions, factory performance, and troop deployment, to name a few applications. As WSNs become more and more crucial to the everyday functioning of people and organizations, availability faults become less tolerable—lack of availability can make the difference between businesses as usual and lost productivity. Ad hoc low-power wireless networks are an exciting research direction in sensing computing. Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. This paper explores resource depletion attacks at the routing protocol layer, which permanently disable networks by quickly draining nodes’ battery power. These “Vampire” attacks are not specific to any specific protocol, but rather rely on the properties of many popular classes of routing protocols. It is found that all examined protocols are susceptible to Vampire attacks, which are devastating, difficult to detect, and are easy to carry out using as few as one malicious insider sending only protocol-compliant messages. Carousel attack and Stretch attack are the possible scenarios occurred. To avoid such attacks attestation based forwarding scheme and loose source routing is proposed. The thesis proposes the concepts using Content and Presence Multicast Protocol (CPMP) using the FPD (Future Peak Detection) and RFPD (Randomized Future Peak Detection) algorithms which nodes use to send updates to their neighbors. The updates contain the relative time of their sender’s next transmission. To address the energy efficiency problem the algorithms propose by synchronizing the transmission times of all the nodes in the system. Transmission synchronization presents energy saving opportunities through dynamic power management of the network interface. That is, nodes can switch off their wireless interfaces between transmissions. However, in uncontrolled ad hoc environments, a single malicious user can easily disrupt network stability and synchronization, affecting either the nodes’ power savings or their ability to receive updates from their neighbors. |
|
A Hybrid Dynamic Clustering Based Approach for Malicious Nodes Detection in AODV Based Manets |
Author : Alka Sachdeva 1, Ameeta2, Babita3 |
Abstract | Full Text |
Abstract :A Mobile ad hoc network (MANET) is a continuously self configuring infrastructure-less network of mobile devices connected without wires.MANETS are extensively used these days for communication and there are various communication networks with different standards and computing techniques, different Zone Routing Protocol by varying transmission range and mobility of MANETS are used. As days are passing by the size of MANETS is increasing day by day and its expansion is inevitable due to its high penetration and popularity for the usage of mobile application but at the same time it is also prone to many attacks and network failure due to technical vulnerability of the network. This paper discussed the detection and isolation of genuine node from the main network under DOS attack using Watchdog approach. Therefore we need a mechanism which would need to overcome such scenarios. Simulation results shows better results for packet loss ratio, throughput, packet delivery ratio and other parameters by detecting malicious for proper and smooth functioning of MANETS. |
|
Impact of Network Density on ZRP and Malicious Nodes Detection under Varying Transmission Range and Mobility of Nodes in Manets |
Author : Richa Arora 1, Dr. Swati Sharma2 |
Abstract | Full Text |
Abstract : — A Mobile ad hoc network (MANET) is a continuously self configuring infrastructure-less network of mobile devices connected without wires. MANETS are extensively used these days for communication and there are various communication networks with different standards and computing techniques, different Zone Routing Protocol by varying transmission range and mobility of MANETS are used. As days are passing by the size of MANETS is increasing day by day and its expansion is inevitable due to its high penetration and popularity for the usage of mobile application but at the same time it is also prone to many attacks and network failure due to technical vulnerability of the network. This paper discuss the impact of network density on ZRP and malicious nodes detection under varying transmission range and mobility of nodes in MANETS. Therefore we need a mechanism which would need to overcome such scenarios. Simulation results shows better results for packet loss ratio, throughput, packet delivery ratio and other parameters by detecting malicious nodes in Zone routing protocol under varying transmission and mobility for proper and smooth functioning of MANETS. Abstract must be of Time New Roman Front of size 10 and must be justified alignment. |
|
Low Power Design of Johnson Counter Using DDFF Featuring Efficient Embedded Logic and Clock Gating |
Author : Chandra shekhar kotikalapudi, Smt. P. Pushpalatha, |
Abstract | Full Text |
Abstract :In this paper, we have proposed a power efficient design of a 4-bit up-down Johnson counter by using Dual Dynamic Node Pulsed Flip-flop(DDFF) featuring efficient embedded logic module(DDFF-ELM) and then clock gating is incorporated in order to reduce the power dissipation further. The proposed design employs a DDFF which mainly reduces the power consumption by eliminating the large capacitance present in the pre-charge node of several existing flip-flop designs by separately driving the output pull-up and pull-down transistors by following a split dynamic node structure. This reduces the power up to 40% compared to conventional architectures of the flip-flops. Then the Embedded logic module is an efficient method to incorporate complex logic functions into the flip-flop. Clock gating is applied to reduce the power consumption up to 50% due to unnecessary clock activities. |
|
Removal of phenol from Effluent in Fixed Bed: A Review |
Author : Sunil J. Kulkarni1 |
Abstract | Full Text |
Abstract :Phenol removal from wastewater is very widely studied area of research. The practical approach for phenol removal by adsorption involves study of batch adsorption and more importantly the fixed bed operation. In the present study, various aspects of fixed bed adsorption for phenol have been discussed. The review of research carried out on this topic is presented. The phenol removal in fixed bed has been carried out by using adsorbents, biosorbents, aerobic and anaerobic biological mechanisms. In most of the investigations fixed bed adsorption was found to be satisfactory in terms of removal efficiency and time. The nature of break through curve was justified by using various models. The experimental data was in agreement with model results. In most of the cases, the equilibrium capacity increased with increase in influent concentration, bed height and decreased with increase in flow rate. |
|
Performance Comparison of AODV, DSDV and ZRP Routing Protocols |
Author : Ajay Singh1, Anil yadav2, Dr. mukesh Sharma2 |
Abstract | Full Text |
Abstract :Mobile Ad Hoc Networking (MANET) is a group of independent network mobile devices that are connected over various wireless links. It is relatively working on a constrained bandwidth. The network topologies are dynamic and may vary from time to time. Each device must act as a router for transferring any traffic among each other. This network can operate by itself or incorporate into large area network (LAN). In this paper, we have analyzed various Random based mobility models: Random Waypoint model, Random Walk model, Random Direction model and Probabilistic Random Walk model using AODV,DSDV and ZRP protocols in Network Simulator (NS 2.35). The performance comparison of MANET mobility models have been analyzed by varying number of nodes, type of traffic (CBR, TCP) and maximum speed of nodes. The comparative conclusions are drawn on the basis of various performance metrics such as: Routing Overhead (packets), Packet Delivery Fraction (%), Normalized Routing Load, Average End-to-End Delay (milliseconds) and Packet Loss (%). |
|
Wireless Automation System Based on Accessible Display Design |
Author : Y Chaitanya 1, K.Jhansi Rani2 |
Abstract | Full Text |
Abstract :with recent advancements in electronics market the development trend is leaning towards deploying intelligent, convenient and remote systems. The aim is to monitor and control devices from a central point. In this paper we present a economically feasible yet flexible and secure Accessible Interface based remote monitoring and control system applicable at different levels including houses, offices, hospitals, multiplexes etc.. The system is designed to be economically feasible with variety of devices to be controlled. This paper illustrates the design of an accessible interface for monitoring and controlling devices at remote places. The central monitoring and control system discussed in this paper controls the nodes at remote zones. The system provides flexibility to add nodes at a later time after setup. The communication mode used in this system is wireless and follows Zigbee protocol. |
|
A Design for Secure Data Sharing in Cloud |
Author : Devi D1, Arun P S2 |
Abstract | Full Text |
Abstract :Cloud computing, which enables on demand network access to shared pool of resources is the latest trend in today’s IT industry. Among different services provided by cloud, cloud storage service allows the data owners to store and share their data through cloud and thus become free from the burden of storage management. But, since the owners lose physical control over their outsourced data, there arise many privacy and security concerns. A number of attribute based encryption schemes are proposed for providing confidentiality and access control to cloud data storage where the standard encryption schemes face difficulties. Among them, Hierarchical Attribute Set Based Encryption (HASBE) provides scalable, flexible and fine grained access control as well as easy user revocation. It is an extended form of Attribute Set Based Encryption (ASBE) with a hierarchical structure of users. Regarding integrity and availability, HASBE is not sufficient to provide the data owner with the ability to perform checking against missing or corruption of their outsourced data. So, this paper extends HASBE with privacy preserving public auditing concept which additionally allows owners to securely ensure the integrity of their data in the cloud. We are using homomorphic linear authenticator technique for this purpose. |
|
VLSI Based Fluid Flow Measurement Using Constant Temperature Hot Wire Anemometer |
Author : Anuruddh Singh1, Pramod Kumar Jain1 |
Abstract | Full Text |
Abstract :The performance of a hot-wire anemometer configuration is affected by variation in the fluid temperature. The classical temperature compensation techniques in such anemometers employ two sensors. The performance of a temperature- compensated hot-wire anemometer configuration using a single sensor alternating between two operating temperatures and proposed for constant fluid velocity is investigated under conditions of time-varying fluid velocity. The measurement error introduced is quantified and can be practically eliminated using a low-pass digital filter. |
|
A Novel Biometric System Based on Lips |
Author : K. Decika1, M. Mohanraj2 |
Abstract | Full Text |
Abstract :In this paper, the A Novel Biometric System based on Lips for identity recognition is investigated. In fact, it is a challenging issue for identity recognition solely by the lips. In the first stage of the proposed system, a fast box filtering is proposed to generate a noise-free source with high processing efficiency. Afterward, five various mouth corners are detected through the proposed system, in which it is also able to resist shadow, beard, and rotation problems. For the feature extraction, two geometric ratios and ten parabolic-related parameters are adopted for further recognition through the support vector machine. |
|
Antimicrobial Activity of Three Ulva Species Collected from Some Egyptian Mediterranean Seashores |
Author : A. Abdel-Khaliq1*, H. M. Hassan2, Mostafa E. Rateb2, Ola. Hammouda4 |
Abstract | Full Text |
Abstract :Members of the class Ulvophyceae such as Ulva fasciata Delile,Ulva intestinalis Linnaeus and Ulva lactuca Linnaeus were collected from tidal and intertidal zone of Mediterranean sea shores during April 2011 and extracted in ethanol. The total summation of the recorded total protein increase in the order: Ulva fasciata < Ulva intestinalis < Ulva lactuca, with percentage; 28.7, 27 and 17.6%, respectively. The total summation of the recorded total carbohydrate increase in the order: Ulva lactuca < Ulva intestinalis < Ulva fasciata, with percentage; 55.6, 49.63 and 47.93%, respectively. The total summation of the recorded total ash increase in the order:Ulva lactuca < Ulva fasciata < Ulva intestinalis with percentage; 17.6, 17 and 14.6 %, respectively. The total summation of the recorded total moisture increase in the order: Ulva intestinalis < Ulva fasciata < Ulva lactuca, with percentage; 9.93, 9.28 and 8.50% respectively. The total summation of the recorded total crude fat increase in the order Ulva lactuca < Ulva fasciata < Ulva intestinalis, with percentage; 0.7, 0.60 and 0.54 % respectively. Phytochemical screening showed the presence of carbohydrates and/or glycosides, sterols and/or triterpenes and traces of tannins in all marine algae under investigation, the presence of both free flavonoids and/or combined flavonoids in all marine algae under investigation, Saponins are absent in all Ulva sp. under investigation, Cardiac glycosides, anthraquinones and alkaloids are absent in all Ulva species under investigation and volatile substances are also absent. Antimicrobial activity of Ulva sp. was tested against (10 Gram +ve bacteria, 10 Gram –ve bacteria and 10 unicellular Filamentous fungi). The antimicrobial activities were expressed as zone of inhibition and minimum inhibitory concentration (MIC). Identification of compounds from crude extract of Ulva sp. carried by LC/MS technique. Finally Ulva sp. could serves as useful source of new antimicrobial agents. |
|
Comparative Analysis of Extraction and Detection of RBCs and WBCs Using Hough Transform and k-Means Clustering Algorithm |
Author : Monika Mogra, Arun Bansel, Vivek Srivastava |
Abstract | Full Text |
Abstract :: Blood cell analysis is very much important for all human beings, because there are WBCs, RBCs, and Platelets in our blood, White blood cell count gives the vital information about our blood and diseases related to blood that help diagnosis many of the patient’s sickness. This research work presents an adaptive approach for extracting, detecting and counting the WBCs in microscopic blood sample images. In the research work i used two different approaches to perform my task one is k-means clustering technique and second is Hough transform. I also used to study the different parameters like number of cells, number of WBCs and also calculate the time for our code to be executed. |
|
AN OVERVIEW OF BUCKLING ANALYSIS OF SINGLE PLY COMPOSITE PLATE WITH CUTOUTS |
Author : Parth Bhavsar[1], Prof. Krunal Shah[2], Prof. Sankalp Bhatia[3] |
Abstract | Full Text |
Abstract :The use of Composite material in aircraft industries is booming now-a days to grab the advantage of high strength to weight ratio. These materials are used to build main components of aircraft like fuselage, panels, rudder, and skins. It is unavoidable to provide different size, shaped cutouts in such components for different purpose i.e inspection, maintenance. The buckling behavior on composite plate with different shape, size and location of the cutouts have been explore by many researchers in last 2 decades. The presented review article is an attempt to summarize the issue of critically examine the current status, problems and opportunities to use of single ply composite in aircraft industries. |
|
A Mathematical Model for the Flexural Strength Characteristics of Concrete Made with Unwashed Local Gravel Using the Second- Degree Polynomial |
Author : Umeonyiagu Ikechukwu Etienne1, Adinna B.O. 2 |
Abstract | Full Text |
Abstract :This research work set out to develop a model for the flexural strength characteristics of concrete made with unwashed local aggregatebased on the second-degree polynomial. The unwashed local gravelwas from Abagana and the river sand from Amansea, both in Anambra State of Nigeria. These aggregates were tested for their physical and mechanical properties based on BS 812: Part 2& Part 3:1975. Sixty concrete beams of dimensions 150 mm X 150mm X 600mm—three beams for each experimental point were made, cured and tested according to BS 1881:1983. The model equation developed was Ŷ= -366.27Z1+ 249.99Z2 -15.93Z3 -20.24Z4 +18.68Z1Z2 -1675.23Z1Z3 + 605.84Z1Z4 +1458.06Z2Z3 -290.71Z2Z4 +78.14Z3Z4.The student’s t-test and the Fisher’s test were used to test the adequacy of this model. The strengths predicted by the model were in complete agreement with the experimentally obtained values and the null hypothesis was satisfied. |
|
WEB FORUMS CRAWLER FOR ANALYSIS USER SENTIMENTS |
Author : I B.Nithya M.sc., II K. Devika M.Sc., MCA., M.Phil., |
Abstract | Full Text |
Abstract :The advancement in computing and communication technologies enables people to get together and share information in innovative ways. Social networking sites empower people of different ages and backgrounds with new forms of collaboration, communication, and collective intelligence. This project presents Forum Crawler Under Supervision (FoCUS), a supervised web-scale forum crawler. The goal of FoCUS is to crawl relevant forum content from the web with minimal overhead. Forum threads contain information content that is the target of forum crawlers. Although forums have different layouts or styles and are powered by different forum software packages, they always have similar implicit navigation paths connected by specific URL types to lead users from entry pages to thread pages. Based on this observation, the web forum crawling problem is reduced to a URL-type recognition problem and classifies them as Index Page, Thread Page and Page-Flipping page. In addition, this project studies how networks in social media can help predict some human behaviors and individual preferences |
|
In Advance, Highlight Affected Hilly Areas Network Roads by Sun Glare |
Author : Moh’d. I.M. Salah1 |
Abstract | Full Text |
Abstract : This studying aims to display on real time the affected roads of sun glares in advance or real time when traveling on the 3D national transportation networks, and present them on roads or navigations digital maps layers, by calculating the directions and azimuths of roads and Sun position and test if they were close enough or almost parallel in 3D model where the sun glare direct or indirect reflected the drivers eyes. The study would apply on cities that constructed on hilly or mountains areas were no absolutely flat areas found, have mid topographic surface and crowded with people and vehicles, and the roads had constructed on valleys, foothills and tops. |
|
Low Voltage, Low Power Rail to Rail Operational Transconductance Amplifier with Enhance Gain and Slew Rate |
Author : Sakshi Dhuware 1, Mohammed Arif2 |
Abstract | Full Text |
Abstract :Proposed paper deals with well-defined design criteria of rail to rail operational transconductance amplifiers. The system supply voltage is 1.6 V and the power consumption goes up to 15.03uW. The proposed amplifier was implemented in a 45nm-CMOS technology. Simulation results of proposed OTA achieves high 76.6 dB DC gain and slew rate 200 (V/us) with, 87.67dB PSRR and 82.66 dB CMMR. |
|
dB - Linear Variable Gain Amplifier with Addition of Diode Connected Load |
Author : Pashupati Nath Jha 1, Vinod Kapse 2 |
Abstract | Full Text |
Abstract :In this paper, a CMOS linear-in-dB variable gain amplifier (VGA) is presented. Based on the diode connected load technique which improves the gain range, a 108.77dB(–68.67dB to 40.10dB) continuous gain range is achieved with a single-stage structure. Simulation results show that the VGA core consumes of power consumption 0.6uW from a 1V supply with 0.04 dB gain error. |
|
A WEIGHT BASED SYNCHRONIZATION DETECTION FOR WORMHOLE ATTACK USING PERIODIC UPDATES FRAMEWORK |
Author : I C. Sudha M.C.A., II D. V. Rajkumar M.C.A., M.Phil., |
Abstract | Full Text |
Abstract :One type of major attacks to neighbor discovery is wormhole attack, in which malicious node(s) relay packets for two legislate nodes to fool them believing that they are direct neighbors. It seems a merit that this kind of attack can enlarge the communication ranges, however, since it causes unauthorized physical access, selective dropping of packets and even denial of services, the wormhole attack is intrinsically a very serious problem especially in case of emergent information transmission. This thesis proposes a wormhole attack resistant secure neighbor discovery (SND) scheme for directional wireless network. In specific, the proposed SND scheme consists of three phases: the network controller (NC) broadcasting phase, the network nodes response/authentication phase and the NC time analysis phase. In the broadcasting phase and the response/authentication phase, local time information and antenna direction information are elegantly exchanged with signature-based authentication techniques between the NC and the legislate network nodes, which can prevent most of the wormhole attacks. To solve the transmission collision problem in the response/authentication phase, we also introduce a novel random delay multiple access (RDMA) protocol to divide the RA phase into M periods, within which the unsuccessfully transmitting nodes randomly select a time slot to transmit. The optimal parameter setting of the RDMA protocol and the optional strategies of the NC are included. In addition thesis proposes the concepts using Substance and Existence Multicast Protocol (SEMP) using the Optimism Max Out algorithms (OPMA) and Randomized Optimism Max Out algorithms (ROPMA) algorithms which nodes use to send updates to their neighbors. |
|
Field Data Based Mathematical Modeling (FDMM): State of the Art and Literature Review |
Author : Ashish D Vikhar 1, Dr.D.S.Deshmukh2 Dr. J.P.Modak 3 |
Abstract | Full Text |
Abstract : The term model is to refer to the ensemble of equations which describe and interrelate the variables and parameters of a physical system or process. The term field data based mathematical modeling in turn refers to the derivation of appropriate equations that are solved for a set or system of process variables and parameters. These solutions are often referred to as simulations, i.e., they simulate or reproduce the behavior of physical systems and processes. This paper is organized to summarize a number of field data based mathematical modeling case studies and revises state of the art and its literature review. |
|
Active and Reactive Power Control Through P-Q Controller Base System to Replicate the Behavior of Full Power Converter of Wind Turbine |
Author : Abdullah Al Mahfazur Rahman |
Abstract | Full Text |
Abstract :This paper presents a technique to simulate the active and reactive power control phenomenon of a full power converter base wind turbine. The implementation of full power converter in the wind turbine has enhanced the quality of power supply to the grid. It has the ability to increase better controllability and full control over real and reactive power. The active and reactive powers are the essential area of control for the grid manager. The conventional energy generation companies provide some margin of reactive power support with the active power to the grid. But for the case of renewable energy producers it is the matter of concern. In this paper a P-Q controller is introduced for controlling active and reactive power of the full power converter base wind turbine which injects power to the PCC. The design technique implements PI controller base system with externally control current source. The simulation model has been prepared in PSCAD/EMTDC. |
|
Restructuring of an Air Classifier Rotor by Finite Element Analysis |
Author : Anuj Bajaj1, Gaurav V.Patel2, Mukesh N. Makwana2 |
Abstract | Full Text |
Abstract :The air classifier is an equipment that finds its major applications in mineral processing plants. One of its utility is to separate the finer particles from the coarse particles to provide the required size of particle output. Air classifiers use various principles of operation depending on their prerequisite and usage. Various running parameters of the air classifiers can be varied to obtain the desired output particle sizes which are governed by specific particle size distribution curves. The air classifier considered in the paper is based on a ‘deflector wheel’ principle. These deflector wheels are the rotors. During a trial run on a dynamic balancing machine the rotors failed structurally resulting in their permanent plastic deformation. This indicated a fault in the design; thus requiring failure analysis and restructuring of the same. This research paper points out an alternative to the current design keeping in mind the constraints of the system. The authors have employed the procedure of calculating the failure manually by an analytical approach. Later on, the design was examined and verified using a well-known Finite Element Analysis software followed by the development of conceptual designs and then choosing the most optimum one. The optimized design offered structural integrity to the rotor with minimal reduction in area, and hence the performance. |
|
Design of Low-Voltage and low-Power inverter based Double Tail Comparator |
Author : B Prasanthi1, P.Pushpalatha1 |
Abstract | Full Text |
Abstract :Design of low voltage double-tail Comparator with pre-amplifier and latching stage is reported in this paper. Design has specially concentrated on delay of both single tail comparator and double-tail comparator, which are called clocked regenerative comparator. Based on a new dynamic comparator is proposed, where the circuit of conventional double tail dynamic comparator is modified for low power and fast operation even in small supply voltages. Simulation results in 0.25µm CMOS technology confirm the analysis results. It is shown that proposed dynamic comparator both power consumption and delay time reduced. Both delay and power consumption can be reduced by adding two NMOS switches in the series manner to the existing comparator. The supply voltages of 1.5V while consuming 15µw in proposed comparator and 16 µw in existing comparator respectively. |
|
Improve Workflow Scheduling Technique for Novel Particle Swarm Optimization in Cloud Environment |
Author : R. Pragaladan1, R. Maheswari2 |
Abstract | Full Text |
Abstract :Cloud computing is the latest distributed computing paradigm [1], [2] and it offers tremendous opportunities to solve large-scale scientific problems. However, it presents various challenges that need to be addressed in order to be efficiently utilized for workflow applications. Although the workflow scheduling problem has been widely studied, there are very few initiatives tailored for cloud environments. Furthermore, the existing works fail to either meet the user’s quality of service (QoS) requirements or to incorporate some basic principles of cloud computing such as the elasticity and heterogeneity of the computing resources. In this paper proposes a resource provisioning and scheduling strategy for scientific workflows on Infrastructure as a Service (IaaS) clouds. The proposed system presents an algorithm based on the particle swarm optimization (PSO), which aims to minimize the overall workflow execution cost while meeting deadline constraints. |
|
Design of Welding Fixtures and Positiners |
Author : Prof. S.N.Shinde, Siddharth Kshirsagar, Aniruddha Patil, Tejas Parge, Ritesh Lomte |
Abstract | Full Text |
Abstract :Robotic welding requires specialized fixtures to accurately hold the work piece during the welding operation. Despite the large variety of welding fixtures available today the focus has shifted in making the welding arms more versatile, not the fixture.The new fixture design reduces cycle time and operator labor while increasing functionality; and allows complex welding operations to be completed on simple two axis welding arms |
|
Blog-Spam Detection Using intelligent Bayesian Approach |
Author : Krushna Pandit, Savyasaachi Pandit |
Abstract | Full Text |
Abstract :Blog-spam is one of the major problems of the Internet nowadays. Since the history of the internet the spam are considered a huge threat to the security and reliability of web content. The spam is the unsolicited messages sent for the fulfillment of the sender’s purpose and to harm the privacy of user, site owner and/or to steal available resource over the internet (may be or may not be allocated to).For dealing with spam there are so many methodologies available. Nowadays the blog spamming is a rising threat to safety, reliability, & purity of the published internet content. Since the search engines are using certain specific algorithms for creating the searching page-index/rank for the websites (i.e. google-analytics), it has attracted so many attention to spam the SMS(Social Media Sites) for gaining rank in order to increase the company’s popularity. The available solutions to malicious content detection are quite a more to be used very frequently in order to fulfill the requirement of analyzing all the web content in certain time with least possible “false positives”. For this purpose a site level algorithm is needed so that it can be easy, cheap & understandable (for site modifiers) to filter and monitor the content being published. Now for that we use a “Bayes Theorem” of the “Statistical approach”. |
|
Optimization of Anti-Roll bar using Ansys Parametric Design Language (APDL) |
Author : *Mr. Pravin Bharane, **Mr. Kshitijit Tanpure, ***Mr. Ganesh Kerkal |
Abstract | Full Text |
Abstract :The main goal of using anti-roll bar is to reduce the body roll. Body roll occurs when a vehicle deviates from straight-line motion. The objective of this paper is to analyze the main geometric parameter which affects rolling stiffness of Anti-Roll bar. By the optimization of geometric parameter, we can increase the rolling stiffness and reduce the mass of the bar. Changes in design of anti-roll bars are quite common at various steps of vehicle production and a design analysis must be performed for each change. To calculate rolling stiffness, mass, deflection, Von-mises stresses Ansys Parametric Design language (APDL) is used. The effects of anti-roll bar design parameters on final anti-roll bar properties are also evaluated by performing sample analyses with the FEA program developed in this paper. |
|
Impact of informationTechnology on Higher Institution of learning: A Case Study Njala University |
Author : Gegbe B, Gbenjeh M.M |
Abstract | Full Text |
Abstract :Njala University as a higher institution of learning remains to be on top of academic challenges in the educational processes in Sierra Leone. And for the past five years, information technology is being offered at various disciplines. One needs to know the impact of such programmes on students. So what is likely the impact of information technology on Njala University? The targeted population for the study comprises student in the Njala University. Priority was placed on student in the school of technology and schools that offered courses or programs that deals with information technology. Out of the targeted population, one hundred and fifty students were randomly selected and interviewed from Njala and Bo campuses. Forty five percent (45%) of the students agreed that they normally bring laptop to class while fifty five percent (55%) did not agree. Eleven percent (11%) of the students were unskilled in Microsoft Word, fifty nine percent (59%) were skilled and thirty percent (30) were very skilled respectively. Sixty four percent (64%) were skilled in Microsoft Excel and thirty six percent (30%) were very skilled respectively.. Fifty six percent (56%) of the students were skilled in the use of Firewalls, Antivirus Software while forty eighty percent (48%) were very skilled in the use Firewalls & Antivirus Software. Nearly fifty percent (50%) of the students each week in Njala University spent 1 to 2 hours on classroom activities and studying using electronic device; seventeen percent (17%) 3 to 5 hours; one percent (1%), 11 to 15 hours and three percent (3%) 16 to 20 hours respectively. On library resource to complete a course assignment thirty one percent (31%) spent 1 to 2 hours each week; nineteen percent (19%) 3 to 5 hours; thirty five (35%) 6 to 10 hours; four percent (4%); 11 to 15 hours and four percent(4)% 16 to 20 hours respectively. |
|
Power Factor Correction Circuits: Active Filters |
Author : Vijaya Vachak1, Anula Khare1,Amit Shrivatava1 |
Abstract | Full Text |
Abstract :The increasing growth in the use of electronicequipment in recent years has resulted in a greater need toensure that the line current harmonic content of anyequipment connected to the ac mains is limited to meetregulatory standards. This requirement is usually satisfiedby incorporating some form of Power Factor Correction(PFC) circuits to shape the input phase currents, so thatthey are sinusoidal in nature and are in phase with theinput phase voltages. There are multiple solutions in whichline current is sinusoidal. This paper provides a concisereview of the most interesting passive and active circuits ofpower factor correction, for single phase and low powerapplications.The major advantages and disadvantages arehighlighted. |
|
Influence of Macrophyte Types towards Agrochemical Phytoremediation in a Tropical Environment |
Author : Emmy LEMA 1, Revocatus MACHUNDA 1, Karoli Nicholas NJAU1 |
Abstract | Full Text |
Abstract :The presence of agrochemicals waste water from agricultural fields poses major environmental and human health problems which may be solved by phytoremediation technologies. Phytoremediation is the use of plants to remediate contaminants in the environment. Batch experiments were conducted to evaluate the influence of four aquatic macrophytes (Cyperus papyrus, Typha latifolia, Cyperus alternifolius and Phragmites mauritianus) towards phytoremediation of agrochemicals from simulated wastewater in Arusha, Tanzania. The selected agrochemicals belonged to different categories namely heavy metal based (Cu, Fe, Mn and Zn) and pesticides (L-Cyhalothrin, Endosulfan and Permethrin). The change in mean concentration of the agrochemicals was described by first-order reaction kinetics. The results indicated that the removal rate constants were greater for the batch experiments planted with the macrophytes than for the control group. Furthermore, the rate of removal varied between the treatments for the different categories of agrochemicals. As far as heavy metals are concerned, Cyperus papyrus had a greater removal Cu and Fe with the k values of 0.338 d-1 and 0.168 d-1 respectively and Typha latifolia had a greater removal of Mn and Zinc with k values 0.420 d-1 and 0.442 d-1 respectively. On the other hand, the pesticides endosulfan and permethrin were greatly removed by Cyperus papyrus with k values 0.086 d-1 and 0.114 d-1 respectively. Lastly, L-Cyhalothrin was removed greatly by Typha latifolia with k value of 0.116 d-1. Generally, the results demonstrated that aquatic macrophytes can influence the reduction of agrochemicals in wastewater. |
|
Implementation of Decimation Filter for Hearing Aid Application |
Author : Prof. Suraj R. Gaikwad, Er. Shruti S. Kshirsagar and Dr. Sagar R. Gaikwad |
Abstract | Full Text |
Abstract :- A hearing aid is a small electronic device that one wears in or behind his/her ear who have hearing loss. A hearing aid can help to the people to hear more in both quiet and noisy situations. It makes sounds louder so that a person with hearing loss can listen, communicate, and participate better in daily activities. In this paper, we implemented a digital filter which is used for hearing aid application. The implemented filter is based on the multirate approach in which high sampling rate signal is decimated to low sampling rate signal respectively. This proposed decimated filter is designed and implemented using the Xilinx System Generator and Matlab Simulink. |
|
Determination of Distortion Developed During TIG welding of low carbon steel plate |
Author : Atma Raj M.R, Joy Varghese V.M. |
Abstract | Full Text |
Abstract :TIG welding is widely used in modern manufacturing industries. In almost all kinds of metals, TIG welding produces high quality welds. Determination of distortions developed during welding is one of the major goals of welding simulation.Predictions of distortions are necessary to maintain the design accuracy of critically welded components in the design stage itself rather than doing corrective measures after welding. The purpose of present work is to predict the distortion developed during TIG welding of low carbon steel plate. In this study, 3-D FE model is developed to analyze the distortion during TIG Welding of steel plate. In numerical analysis thermal and structural analysis were carried out sequentially. The thermal loads are the main input of structural analysis. For the analysis the effect of distortion in different plates were calculated and compared to get the plane of maximum distortion. An experiment was conducted to measure the distortion or deformation in a welded plate |
|
Multi-Resolution Analysis Based MRI Image Quality Analysisusing DT-CWT Based Preprocessing Techniques |
Author : M. Vinay Kumar1, Sri P. MadhuKiran2 |
Abstract | Full Text |
Abstract :The main objective of this paper is to improve the image quality by de-noising and resolution enhancement Techniques. The medical image quality parameters are mainly noise and resolution. This paper targets the average, median and wiener filters for image denoising and Discrete Wavelet Transform (DWT) and Dual tree Complex Wavelet Transform (DT-CWT) techniques for resolution enhancement, and it shows the results comparisons between DWT and DT-CWT. The performance of these techniques is evaluated using Peak Signal to Noise Ratio (PSNR). |
|
Real-Time Finger-Vein Recognition System |
Author : S. Nivas1, P. Prakash2 |
Abstract | Full Text |
Abstract :As the need for personal authentication increases, many people are turning to biometric authentication as an alternative to traditional security devices. Concurrently, users and vendors of biometric authentication systems are searching for methods to establish system performance. However, most existing biometric systems have high complexity in time or space or both. In this paper, we propose a novel Finger-Vein recognition algorithm for authentication. It consists of two phases. Enrolment phase and verification phase. Both stages start with finger-vein image pre-processing, which includes detection of the region of interest (ROI), image segmentation, alignment, and enhancement. For the enrolment stage, after the pre-processing and the feature extraction step, the finger-vein template database is built. For the verification stage, the input finger-vein image is matched with the corresponding template after its features are extracted. Feature Selection process is based on SURF algorithm. |
|
An Enhanced Data Collection for Wireless Sensor Network Using Topology Routing Tree |
Author : I V.Priya., II S.Nivas |
Abstract | Full Text |
Abstract :this paper describes the basic idea about the different methods of data collection in WSN. In many applications of wireless sensor networks, approximate data collection is a wise choice due to the constraints in communication bandwidth and energy budget. Many existing techniques have power to manage with the issues like energy consumption, packet collision, retransmission, delay etc. For quick data collection, schemes are required to be scheduled in effective manner. One of the good techniques is BFS. It provides periodic query scheduling for data aggregation with minimum delay under various wireless interference models. Given a set of periodic aggregation queries, each query has its own period pi and the subset of source nodes Si containing the data. Time scheduling on a single frequency channel with the aim of minimizing the number of time slots required (schedule length) to complete a convergecast is considered. Next, scheduling with transmission power control is combined to mitigate the effects of interference, and show that while power control helps in reducing the schedule length under a single frequency, scheduling transmissions using multiple frequencies is more efficient. Lower bounds on the schedule length are given when interference is completely eliminated, and propose algorithms that achieve these bounds. Then, the data collection rate no longer remains limited by interference but by the topology of the routing tree. |
|