IJCER Online Submission
IJCER Paper Submission Format
Publication Charges - IJCER

Frequency: 12 issues per year
ISSN: 2250–3005 (online version)
Published by: IJCER
Call for paper...

International Journal of Computational Engineering Research (IJCER) Volume 3, Issue 5, May, 2013

  
Version I
S.No. Article Title Page No. Paper Index PDF
1

Study of the energy potential of solid waste in bauchi town

Aliyu Mohammed Lawal , Dr. Isa Garba

Abstract

The study of the energy potential of solid wastes in Bauchi Town was carried out, on the average the combination of plastics, rubber, polyethene bags constituted about 33% of the wastes, followed by textile materials, leathers, wood 26%and combination of papers, cartons 15%. The heating values or calorific value of the wastes was determined to be about 6.83 MJ/kg almost one-third of the energy content of sub-bituminous coal which is 19.4 MJ/kg was as determined using a digital calorimeter. SIGNIFICANCE OF THE RESEARCH The research will come up with records of wastes disposed and their energy potential that is their heating value. This will sensitize the state to adopt the waste to energy incineration system. Further, if this system is implemented together with solid waste recycling in form of compost and re-use, the principles of sustainable development would be supported.

Keywords: Energy potential, heating value, incineration, municipal solid waste and simulation
01-07  
03.3005/03510107
PDF
2

Neural network approach to power system security analysis

Bidyut Ranjan Das , Dr. Ashish Chaturvedi

Abstract

Contingency analysis of a power system is a major activity in power system planning and operation. In general an outage of one transmission line or transformer may lead to over loads in other branches and/or sudden system voltage rise or drop. The traditional approach of security analysis known as exhaustive security analysis involving the simulation of all conceivable contingencies by full AC load flows, becomes prohibitively costly in terms of time and computing resources. A new approach using Artificial Neural Network s has been proposed in this paper for real-time network security assessment. Security assessment has two functions the first is violation detection in the actual system operating state. The second, much more demanding, function of security assessment is contingency analysis. In this paper, for the determination of voltage contingency ranking, a method has been suggested, which eliminates misranking and masking effects and security assessment has been determined using Radial Basis Function (RBF) neural network for the real time control of power system. The proposed paradigms are tested on IEEE 14 – bus and 30 – bus systems.

Keywords: Input here the part of 4-5 keywords.
8-11


03.3005/035108011
PDF
4.

Strength, Corrosion correlation of thermochemically treated low carbon value-added steel

Somnath Mukherjee , B Duari , P. K. Mitra

Abstract

In recent times it is very difficult to get only low carbon plain carbon steel. There are always some alloying elements associated with it and are known as value added steel. The effects of different types of chemical heat treatment on such steels have been studied to evaluate how far these steels can be used in those applications where high surface hardness and good corrosion properties are required.


16-22


03.3005/0351016022
PDF
5.

Mutual Funds and SEBI Regulations

R. M. Kamble

Abstract

A Mutual Fund is a form of collective investment that pools money from many investors and invests the money in stocks, bonds, short-term money market instruments, and/or other securities. Now a day's these Mutual funds are very popular because they provide an excellent way for anyone to direct a portion of their income towards a particular investment. In order to help the small investors, mutual fund industry has come to occupy an important place. Mutual funds provide an easy way for small investors to make long-term, diversified, professionally managed investments at a reasonable cost. The purpose and objective of this article is to study meaning and nature of Mutual funds, procedure, importance of SEBI and its mechanism in India, and also examine the growth of mutual funds and analyze the operations of mutual funds and suggest some measures to make it a successful scheme in India.


Keywords: Mutual Fund, Investment, Long Term, Short Term, Investor, Securities, SEBI.

23-27
03.3005/0351023027
PDF
6.

Integral solution of the biquadratic Equation

S.Vidhyalakshmi , T.R.Usha Rani , M.A.Gopalan

Abstract

We obtain infinitely many non-zero integer quadruples (x, y, z, w) satisfying the biquadratic equation with four unknowns ( 1)( ) 4 4 2 2 2 x  y  k  z  w . Various interesting relations between the solutions, polygonal numbers, pyramidal numbers and centered pyramidal numbers are obtained.

Keywords: Biquadratic equations with four unknowns, integral solutions, special numbers, figurative numbers, centered pyramidal numbers

28-31


03.3005/0351028031
PDF
7.

Experimental Studies on Effect of Coil Wire Insert On Heat Transfer Enhancement and Friction Factor of Double Pipe Heat Exchanger

Prof.Shashank S.Choudhari , Prof. Taji S.G.

Abstract

In the present study heat transfer characteristics and friction factor of horizontal double pipe heat exchanger with coil wire inserts made up of different materials are investigated. The Reynolds numbers are in the range of 4000-13000. The inner and outer diameters of tubes are 17 mm and 21.4 mm respectively. Hot water and cold water are used as working fluid on tube side and annulus side, respectively. The hot water and cold water flow rates are maintained same and in range of .033 to .1 kg/s. Three different materials as copper, aluminum, and stainless steel and different pitches are used. Aluminum, copper, and stainless steel inserts are of pitches 5, 10, and 15 mm respectively. Effect of these coil wire inserts material on enhancement of heat transfer and friction factor are considered. The experimental data obtained from plain tube were verified with the standard correlation to ensure the validation of experimental results. Coil wire has significant effect on heat transfer and friction factor. Cu insert has higher heat transfer enhancement of 1.58 times as compared to plane tube. On other hand Aluminum and stainless steel insert has heat transfer enhancement of 1.41 and 1.31as compared to plane tube respectively. The friction factor found to be increasing with decreasing coil wire pitch.

Keywords: coil wire, insert, enhancement, friction factor, heat exchanger

32-39
03.3005/0351032039
PDF
8.

Simulation studies on Deep Drawing Process for the Evaluation of Stresses and Strains

 A.Purushotham

Abstract

Deep drawing is a sheet metal forming process in which a sheet metal blank is radially drawn into a forming die by the mechanical action of a punch. It is thus a shape transformation process with material retention. The process is considered "deep" drawing as the depth of the drawn part exceeds its diameter. The flange region (sheet metal in the die shoulder area) experiences a radial drawing stress and a tangential compressive stress due to the material retention property. These compressive stresses (hoop stresses) result in flange wrinkles. Wrinkles can be prevented by using a blank holder, the function of which is to facilitate controlled material flow into the die radius. The present study therefore aims at estimating the pattern of radial and hoop stress and strain distributions and their variation under different blank holding forces (BHF) and friction forces. In the paper , comparison between the stress and strain distribution with steel and copper materials also made by changing the blank holding force (BHF) and the friction force (FF) between the punch and the blank during the deep drawing process. The investigation of effect of friction and blank holding force is performed using the numerical software tool ABAQUS. ABAQUS software is used to model the deep drawing process to evaluate stresses under BHF and FF.

Keywords: Deep drawing, BHF, FF, Hoop stress, Radial stress, wrinkle, Necking.
40-47


03.3005/0351040047
PDF
9.

Text Extraction in Video

Ankur Srivastava , Dhananjay Kumar , Om Prakash Gupta , Amit Maurya, Mr.sanjay kumar Srivastava

Abstract

The The detection and extraction of scene and caption text from unconstrained, general purpose video is an important research problem in the context of content-based retrieval and summarization of visual information. The current state of the art for extracting text from video either makes simplistic assumptions as to the nature of the text to be found, or restricts itself to a subclass of the wide variety of text that can occur in broadcast video. Most published methods only work on artificial text (captions) that is composited on the video frame. Also, these methods have been developed for extracting text from images that have been applied to video frames. They do not use the additional temporal information in video to good effect.This thesis presents a reliable system for detecting, localizing, extracting, tracking and binarizing text from unconstrained, general-purpose video. In developing methods for extraction of text from video it was observed that no single algorithm could detect all forms of text. The strategy is to have a multi-pronged approach to the problem, one that involves multiple methods, and algorithms operating in functional parallelism. The system utilizes the temporal information available in video. The system can operate on JPEG images, MPEG-1 bit streams, as well as live video feeds. It is also possible to operate the methods individually and independently.

Keywords: Detection, Extraction, Frame, Images and Tracking.
48-53
03.3005/0351048053
PDF
10.

Improved Performance for "Color to Gray and Back" For Orthogonal transforms using Normalization

Dr. H. B. Kekre , Dr. Sudeep D. Thepade , Ratnesh N. Chaturvedi

Abstract

The paper shows performance comparison of two proposed methods with Image transforms alias Cosine, Sine, Haar & Walsh using Normalization for "Color to Gray and Back‟. The color information of the image is embedded into its gray scale version using transform and normalization method. Instead of using the original color image for storage and transmission, gray image (Gray scale version with embedded color information) can be used, resulting into better bandwidth or storage utilization. Among the two algorithms considered the first algorithm give better performance as compared to the second algorithm. In our experimental results first algorithm for Discreet Cosine Transform (DCT) using Normalization gives better performance in "Color to gray and Back‟ w.r.t all other transforms in method 1 and method 2. The intent is to achieve compression of 1/3 and to print color images with black and white printers and to be able to recover the color information afterwards.

Keywords: Color Embedding; Color-to-Gray Conversion; Transforms; Normalization; Compression.
54-59


03.3005/0351054059
PDF
11.

Chain Code Based Handwritten Cursive Character Recognition System with Better Segmentation Using Neural Network

 Parikh Nirav Tushar , Dr. Saurabh Upadhyay

Abstract

Character recognition plays an important role in many resent applications. Pattern recognition deals with categorization of input data. It is easy to recognize normal character but in cursive character we have to find out the boundary of a character that's why we have to apply better slant and segmentation techniques. A proper feature extraction method can increase the recognition ratio. In this paper, a chain code based feature extraction method is investigated for developing HCCR system. Chain code is working based on 4-neighborhood or 8–neighborhood methods. In this paper, 8–neighborhood method has been implemented which allows generation of eight different codes for each character. After feature extraction method, Classification techniques have been used for training and testing of Neural Network and other classifier.

Keywords: Pattern recognition, handwritten cursive character recognition (HCCR), segmentation with slant correction, feature extraction, chain code, neural network.
60-63
03.3005/0351060063
PDF
12.

Strength of Ternary Blended Cement Concrete Containing Oil Palm Bunch Ash and Plantain Leaf Ash

L. O. Ettu , K. C. Nwachukwu , J. I. Arimanwa , C. T. G. Awodiji , H. E. Opara

Abstract

This work investigated the compressive strength of ternary blended cement concrete containing oil palm bunch ash (OPBA) and plantain leaf ash (PLA). 105 concrete cubes of 150mm x 150mm x 150mm were produced with OPC-OPBA binary blended cement, 105 with OPC-PLA binary blended cement, and 105 with OPC-OPBA-PLA ternary blended cement, each at percentage OPC replacement with pozzolan of 5%, 10%, 15%, 20%, and 25%. Three cubes for each percentage replacement of OPC with pozzolan and the control were tested for saturated surface dry bulk density and crushed to obtain their compressive strengths at 3, 7, 14, 21, 28, 50, and 90 days of curing. The 90-day strengths obtained from ternary blending of OPC with equal proportions of OPBA and PLA were 27.00N/mm2 for 5% replacement, 25.90N/mm2 for 10% replacement, 25.10N/mm2 for 15% replacement, 23.60N/mm2 for 20% replacement, and 22.10N/mm2 for 25% replacement, while that of the control was 24.60N/mm2. The results show that high concrete strength values could be obtained with OPC-OPBA-PLA ternary blended cement at 50 days of hydration and above. Thus, OPC-OPBA-PLA ternary blended cement concrete could be used for various civil engineering and building works.

Keywords: PBinary blended cement, ternary blended cement, concrete, pozzolan, oil palm bunch ash, plantain leaf ash.
64-68

03.3005/0351064068
PDF
13.

Ni-Based Cr Alloys and Grain Boundaries Characterization

Aezeden Mohamed , Tarek Mohamed

Abstract

Three Ni-base alloys Hastelloy C22, Inconel 600, and Inconel 601 with carbon contents of 0.003, 0.05, and 0.3 wt. % respectively were used to investigate the effect of carbon on the morphology grain boundaries at constant heat treatment. From microstructural characterization and analysis, it was observed that the lowest carbon content resulted in planer character grain boundaries, the carbon content produced wavy grain boundaries and the highest carbon content produced saws-teeth grain boundaries. It is suggested that higher carbon contents result in the formation of occurred grain boundaries due to the formation of M23C6 morphology.

Keywords: Boundary, Carbides, Grain, Hastelloy, Inconel, Morphology, Serration, Triangle
69-72
03.3005/0351069072
PDF
14.

Comparative Study of Available Technique for Detection in Sentiment Analysis

 Miss. Siddhi Patni , Prof. Avinash Wadhe

Abstract

Our day-to-day life has always been influenced by what people think. Ideas and opinions of others have always affected our own opinions. As the Web plays an increasingly significant role in people's social lives, it contains more and more information concerning their opinions and sentiments. The distillation of knowledge from this huge amount of unstructured information, also known as opinion mining and sentiment analysis. It has recently raised growing interest for purposes such as customer service, financial market prediction, public security monitoring, election investigation, health related quality of life measure, etc. Sentiment Analyzer (SA) that extracts sentiment (or opinion) about a subject from online text documents. Instead of classifying the sentiment of an entire document about a subject, SA detects all references to the given subject, and determines sentiment in each of the references using natural language processing (NLP) techniques. There are various machine learning algorithms that attempt to predict the sentiment or opinions of some documents or information of particular data and organize data, such as finding positive and negative reviews while diminishing the need for human effort to classify the information. This paper compares the NLP and machine learning methods of sentiment analysis and determines which one is better.

Keywords: Sentiment Analyzer, Natural Language Processing, Machine Learning.
73-77

03.3005/0351073077
PDF
15.

Analyzing massive machine data maintaining in a cloud computing

 Balamanigandan R

Abstract

We present a novel framework, Cloud View, for storage, processing and analysis of massive machine maintenance data, collected from a large number of sensors embedded in industrial machines, in a cloud computing environment. This paper describes the architecture, design, and implementation of CloudView, and how the proposed framework leverages the parallel computing capability of a computing cloud based on a large-scale distributed batch processing infrastructure that is built of commodity hardware. A case-based reasoning (CBR) approach is adopted for machine fault prediction, where the past cases of failure from a large number of machines are collected in a cloud. A case-base of past cases of failure is created using the global information obtained from a large number of machines. Case-base creation jobs are formulated using the MapReduce parallel data processing model. CloudView captures the failure cases across a large number of machines and shares the failure information with a number of local nodes in the form of case-base updates that occur in a time scale of every few hours. The case-base is updated regularly (in the time scale of a few hours) on the cloud to include new cases of failure, and these case-base updates are pushed from CloudView to the local nodes. Our approach, in addition to being the first reported use of the cloud architecture for maintenance data storage, processing and analysis, also evaluates several possible cloud-based architectures that leverage the advantages of the parallel computing capabilities of the cloud to make local decisions with global information efficiently, while avoiding potential data bottlenecks that can occur in getting the maintenance data in and out of the cloud.

Keywords: Fault prediction, machine data analysis, case-based reasoning, cloud computing,
78-81
03.3005/0351078081
PDF
16.

Implementation of an Algorithmic To Improve MCDS Based Routing In Mobile Ad-Hoc Network By Using Articulation Point

 Shalu Singh , Dr Naveen Hemrajani

Abstract

A virtual backbone can reduce the Communication Overhead, increase the Bandwidth Efficiency, reduce Channel Bandwidth Consumption, decrease Management. Thus virtual backbone is being employed to optimize the number and locations of the resource centers in a give Wireless Ad hoc network. Only virtual backbone situated nodes act as routers and thus other nodes need not to acquire, keep, or update routing information. Generally CDS concept is implemented as virtual backbone in Mobile Ad hoc network and it must be of Minimum Size. Algorithms to find CDS in Ad hoc networks is divided into two types of Centralized (Global) Algorithms and Decentralized (Local) Algorithms. we determine MCDS of a greph And Analysis the performance and result. The proposed algorithms for MCDS formation are analyzed that calculate the list of nodes as MCDS for the wireless ad hoc networks with pictorial representation.

82-89


03.3005/0351082089
PDF
17.

Model Order Reduction By MixedMathematical Methods

 Sumit Mondal , Pratibha Tripathi

Abstract

In this paper, a mixed method mathematical technique is proposed for finding reduced order model of Single-Input Single-Output (SISO) system. The model reduction of large scale systems is achieved by using Padé approximation and utilizing the characteristics of the higher order system which is maintained in the reduced model. The denominator polynomial of the reduced model is determined by the characteristic equation which retains the basic characteristics of the original system, and the coefficients of the numerator polynomial are obtained by using the Padé approximation technique.

Keywords: Integral Square Error, Padé Approximation, Single-Input Single-Output
90-93
03.3005/0351090093
PDF
18.

Enterprise Management Information System: Design & Architecture

Majid Zaman , Muheet Ahmed Butt

Abstract

The field of information systems deals with systems for delivering information and communications services in an organization and the activities and management of the information systems function in planning, designing, developing, implementing, and operating the systems and providing services. These systems capture, store, process, and communicate data, information, and knowledge. The systems combine both technical components and human operators and users. The environment is an organization or a combination of organizations. The process of Automation implicitly refers to the use of Information Technology for the development of Information system. Automation of information systems in organizations has been a thrust area since several years now. With the introduction of new technologies and reduction in their cost the affordability of automation of activities in different organizations has grown significantly [1][4].

94-97


03.3005/0351094097
PDF
19.

A Novel Approach for Filtering Unrelated Data from Websites Using Natural Language Processing

Foram Joshi Sandip Chotaliya

Abstract

Day by day review or opinion can be taken by number of websites. Either it's related to movie review or anything else. Every times it's not necessary that user post his/her opinion or review for particular subject only.so to filter out such unrelated comments or review we proposed a structure which is based on natural language processing. Our proposal first extract the comments or reviews from the particular site using web crawling concept and then it will processed on such data using natural language processing.so finally we will get the data which is only related to particular post.

Keywords: Data Extraction, Natural Language Processing, Wrapper , Opinion, Web Crawling, seed, fetch
98-101
03.3005/03510980101
PDF
20.

Current Routing Strategies to Adapt the Characteristics

Prof. Ananad L.Mothghare,

Abstract

The VANET characteristics including high-speed node movement, frequent topology change, and short connection lifetime especially with multi-hop paths. These three characteristics degrade the performance of some popular topological routing protocols for ad hoc network significantly. This is because topological routing needs to maintain a path from the source to the destination, but the path expires quickly due to frequent topology changes. The frequently changed topology suggests that a local routing scheme without the need to keep track of global routing information scales better in VANET. In addition, the popularity of GPS also makes position-based routing, which maintains only local information about the node's position, a popular routing strategy. A successful VANET routing solution also needs to handle issues such as sparse network density, interfering environment, long path length, latency etc. In this Paper, we look at the current routing proposals that address the characteristics of VANET. We select the routing strategies designed and tested on VANET simulation and categorize them into (1) position-based, (2) enhanced topological-based, and hybrid approach.

<
102-103

03.3005/035101020103
PDF
Version II  
S.No. Article Title Page No. Paper Index PDF
1.

Energy Based Routing Protocol for Wireless Sensor Networks

 Paramveer Singh Bali , Srinivas B K.

Abstract

The main aim of the project carried is to provide an efficient routing mechanism that helps in data transmission in wireless network. The project is combination of mainly two algorithms, LEACH-c algorithm: it selects the cluster head by the base station. DCHS: it is also used to select cluster head by considering both factor of energy and factor of threshold. With the deployment of both algorithms it maximize network lifetime in wireless sensor networks, the paths for data transfer are selected in such a way that the total energy consumed along the path is minimized. It also helps to solve issues like load imbalance, signal interference and reduce time delay.

Keywords: Base station, Cluster Head, DCHS, Leach-c, WSN.
01-04

03.3005/03520104

PDF
2.

Cfd Analysis of Convergent- Divergent Supersonic Nozzle

Ms. B.Krishna Prafulla , Dr. V. Chitti Babu , Sri P. Govinda Rao

Abstract

In the present work, CFD analysis of flow within, Convergent–Divergent rectangular supersonic nozzle and supersonic impulse turbine with partial admission have been performed. The analysis has been performed according to shape of a supersonic nozzle and length of axial clearance, with an objective of investigating the effect of nozzle-rotor interaction on turbine's performance. It is found that nozzle-rotor interaction losses are largely dependent on axial clearance which affects the flow with in nozzle and the extent of flow expansion. Therefore nozzle-rotor interaction losses can be decreased by selecting appropriate length of axial clearance. The present work has been carried out in two stages: Part 1 consists of modeling and analysis of flow for rectangular convergent divergent supersonic nozzle. Part 2 of the work is on prediction of optimal axial gap between the Nozzle and rotor blades by allowing the above nozzle flow. In the present study, flow through the convergent divergent nozzle study is carried out by using a finite volume commercial code, FLUENT 6.2. The nozzle geometry modeling and grid generation has been done using GAMBIT 2.3 Software. Computational results are in good agreement with the experimental results taken from the literature.

Keywords: CFD, Modelling, Fluent, Gambit
5-16

03.3005/035205016

PDF
3.

Observations on the Ternary Cubic Equation 2 2 3 x  xy  y  7z

S.Vidhyalakshmi , M.A.Gopalan , A.Kavitha

Abstract

The non-homogeneous cubic equation with three unknowns represented by the diophantine equation 2 2 3 X  XY  Y  7Z is analyzed for its patterns of non-zero distinct integral solutions. A few interesting relations between the solutions and special numbers are exhibited.

Keywords: Integral solutions, non-homogeneous cubic equation with three unknowns.
17-22

03.3005/0352017022

PDF
4.

Integral Solutions of the Homogeneous Cubic Equation

M.A.Gopalan , V.Geetha

Abstract

The cubic equation 3 3 3 3 2 x  y  xy(x  y)  z  w  zw(z  w)  (x  y  z  w)X is analysed for its non-zero integral solutions. A few interesting relations between the solutions and special numbers are exhibited.
Keywords: Homogeneous equation with five unknowns, Integral solutions.
23-27

03.3005/0352023027

PDF
5.

Observations on Icosagonal number

M.A.Gopalan , Manju Somanath , K.Geetha

Abstract

We obtain different relations among Icosagonal number and other two, three and four dimensional figurate numbers.

Keywords: Polygonal number, Pyramidal number, centered polygonal number, Centered pyramidal number, Special number
28-34

03.3005/0352028034

PDF
6.

Highly Efficient Motorized Screw Jack

Prashant Kumar Srivastav , Vipin Kumar Pandey , Shailesh Kumar Maurya ,
Ajit Tiwari , Prof. Jawed Rafiq , S.K. Dwivedi ,

Abstract

Power screws are used to convert rotary motion into translatory motion. A screw jack is an example of a power screw in which a small force applied in a horizontal plane is used to raise or lower a large load. The principle on which it works is similar to that of an inclined plane. The mechanical advantage of a screw jack is the ratio of the load applied to the effort applied. The screw jack is operated by turning a lead screw. The effort required to rotate the screw can be eliminated by using a 12V DC motor to rotated screw of jack; which facilitate in easy replacement of tyre. Advantage of this system is that it draws the energy from the battery of vehicle. For torque multiplication; generated by motor two spur gear are used. A small gear is mounted on motor shaft and a large spur gear on power screw of jack. Also we are looking for to increase the efficiency of motorized screw jack by varying helix angle by which energy drawn by motor can be decrease.

Keywords: D.C motor, Power screw, Lifting Arm, Gear & pinion, speed reduction.
 
35-41

03.3005/0352035041

PDF
7.

A comparative study of Broadcasting Protocols in VANET

A.Noble Mary Juliet , Vijayakumar.S , Joan Pavithra.R , Kaleeswari.P

Abstract

Vehicular Ad-hoc Network (VANET) represents a challenging class of mobile ad-hoc networks that enables vehicles to intelligently communicate with each other and with roadside infrastructure. Reliable and efficient broadcasting in vehicular ad hoc networks is one of the keys to success for services and applications on intelligent transportation system. Many protocols have been introduced but none of them has been evaluated in realistic scenario. In this research, we discuss the reliable broadcasting protocols such as Distance Based Routing (DBR), Street cast and Acknowledgement-Based Broadcasting Protocols (ABBP) on VANET. Then, we evaluate performance of these protocols by simulation. From simulation result, we found a performance and problem in each protocol, which can lead to broadcast storm problem and inefficient operation.

Keywords: DBR, ABBP, Streetcast, VANET.
42-46

03.3005/0352042046

PDF
8.

Recommendation Systems: a review

Amir Hossein Nabizadeh Rafsanjani , Naomie Salim , Atae Rezaei Aghdam, Karamollah Bagheri Fard 

Abstract

This article presents an overview of recommendation systems and illustrates the present generation of recommendation techniques that are usually categorized into the following three main classes: Collaborative Filtering (CF), Content-Based Filtering (CBF), and Hybrid Recommendation approaches. This paper also describes several weaknesses of current recommendation techniques.

Keywords: Recommender systems, Collaborative Filtering, Content-Based Filtering, Hybrid approach
47-52

03.3005/0352047052

PDF
9.

Using Fast Fourier Extraction Method Power Quality Improvement by Dvr for Unbalanced Voltage Sag-Swell Control

Subhro Paul , Satyajit Samaddar , Gautam Kumar Panda , Pradip Kumar Saha

Abstract

Voltage sag and swell is big problem in power system. Sensitive load has a severe impact on itself due to voltage sag and swell. Dynamic Voltage Restorer (DVR) is a power customed device used in power distribution network. Matlab is an advanced simulation software used for effective modelling and simulation of DVR. Compensation for the control of voltage in DVR based on dq0 algorithm has been discussed here. To appropriately control the control targets for compensation voltage control, firstly the power circuit of a DVR systrm is analysed. The design is simple. The Simulation results are carried out by Matlab/Simulunk to verify the performance of the proposed method.

Keywords: Power Quality, DVR, voltage sags/swells, VSI, Fast Fourier Extraction.
53-59

03.3005/0352053059

PDF
10.

Using Genetic Algorithm Minimizing Length of Air-Gap and
Losses along with Maximizing Efficiency for Optimization of
Three Phase Induction Motor

Satyajit Samaddar , Surojit Sarkar , Subhro Paul , Sujay Sarkar,
Gautam Kumar Panda , Pradip Kumar Saha. 

Abstract

Optimization of three-phase induction motor using Genetic Algorithm (GA) is displayed in the paper. Objective functions such as Air-Gap Length (Lg), SCL, RCL, SIL and efficiency are considered here along with their individual plotting after optimization have been presented. The intense nonlinearity of the motor stated here have been observed in mathematical form and hence forth solved using MATLAB. To optimize performance of the Induction Motor the Genetic Algorithm method has been very useful for this purpose. MATLAB is very powerful software which has been used here effectively.

Keywords: Air-Gap Length, Efficiency, GA, Induction Motor, RCL, SCL, SIL.
60-66

03.3005/0352060066

PDF
11.

Literature review: Iris Segmentation Approaches for Iris Recognition Systems

Ms. Sruthi.T.K

Abstract

A biometric system offers automatic identification of a human being based on the unique feature or characteristic which is being possessed by the individual. The iris segmentation has its own major applications in the field of surveillance, forensics as well as in security purposes. The performance of the iris recognition systems depends heavily on segmentation and normalization techniques. A review of various segmentation approaches used in iris recognition is done in this paper. The survey is represented in tabular form for quick reference.

Keywords: iris recognition, biometrics, iris segmentation, integrodifferential operator, near infrared light, fuzzy k-means clustering algorithm, Gabor filter
67-70

03.3005/0352067070

PDF
12.

Effects of Agreement on Trims on Indian Foreign Trade

Archana K.

Abstract

In the late 1980s, there was a significant increase in foreign direct investment throughout the world. However, some of the countries receiving foreign investment imposed numerous restrictions on that investment designed to protect and foster domestic industries, and to prevent the outflow of foreign exchange reserves. Examples of these restrictions include local content requirements, manufacturing requirements, trade balancing requirements, domestic sales requirements, technology transfer requirements, export performance requirements, local equity restrictions, foreign exchange restrictions, remittance restrictions, licensing requirements, and employment restrictions. These measures can also be used in connection with fiscal incentives as opposed to requirement. Some of these investment measures distort trade in violation of GATT Article III and XI, and are therefore prohibited. Until the completion of the Uruguay Round negotiations, which produced a well-rounded Agreement on Trade-Related Investment Measures, the few international agreements providing disciplines for measures restricting foreign investment provided only limited guidance in terms of content and country coverage. The Agreement contains transitional arrangements allowing Members to maintain notified TRIMs for a limited time following the entry into force of the WTO (two years in the case of developed country Members, five years for developing country Members, and seven years for least-developed country Members). The Agreement also establishes a Committee on TRIMs to monitor the operation and implementation of these commitments.

Keywords: TRIMs, WTO, GATT, Foreign trade, DSB, Multilateral trade, and AALA
71-76

03.3005/0352071076

PDF
13.

A Novel Approach to Mine Frequent Item sets of Process
Models for Dyeing Process using Association Rule Mining

Harendra Singh , Sitendra Tamrakar 

Abstract

A noval approach of process mining provides a new means to improve processes in a variety of application domains these process mining techniques help organizations to uncover their actual business processes in this presented paper. Dyeing process using apriori algorithm. but apriori algorithm has some drawback like more execution time, can not handle the large amount of data Now, we propose modified apriori algorithm that applied in dyeing process model to generate frequent pattern and remove the drawback of apriori algorithm in term of execution time, handle the large amount of data. We proposed work Evaluating and analyzing the usefulness and application of the association rule mining algorithms and as it was implemented to obtain simpler process models for the dyeing domain. In view of performance the proposed algorithm for frequent patterns discovery are, it reduces the size of the database after second pass and, the storage space and saves the computing time. this Proposed work has an excellent performance for various kinds of application marketing,medicine,e-commerce,web mining,bio informatics to create frequent patterns, outperforms currently available algorithms in dyeing processing systems, and is highly scalable to mining large databases.

Keywords: frequent pattern mining dyeing process model, confidence, database, association rule
77-83

03.3005/0352077083

PDF
14.

Modeling and Analysis of the Crankshaft Using Ansys Software

K. Thriveni , Dr.B.JayaChandraiah

Abstract

Crankshaft is large volume production component with a complex geometry in the Internal Combustion (I.C) Engine. This converts the reciprocating displacement of the piston in to a rotary motion of the crank. An attempt is made in this paper to study the Static analysis on a crankshaft from a single cylinder 4-stroke I.C Engine. The modelling of the crankshaft is created using CATIA-V5 Software. Finite element analysis (FEA) is performed to obtain the variation of stress at critical locations of the crank shaft using the ANSYS software and applying the boundary conditions. Then the results are drawn Von-misses stress induced in the crankshaft is 15.83Mpa and shear stress is induced in the crankshaft is 8.271Mpa. The Theoretical results are obtained von-misses stress is 19.6Mpa, shear stress is 9.28Mpa. The validation of model is compared with the Theoretical and FEA results of Von-misses stress and shear stress are within the limits. Further it can be extended for the different materials and dynamic analysis, optimization of crank shaft.

Keywords: Crankshaft, finite element analysis (FEA), ANSYS Software, Static Analysis;
84-89

03.3005/0352084089

PDF
15.

Efficient Model for OFDM based IEEE 802.11 Receiver with Autocorrelation technique And CORDIC algorithm

Mathana.J.M , Anusha.S.L , Jamal Hajara Parveen.J.M.H , Vaishnavi.J.P 

Abstract

To achieve compact spectral utilization with utmost efficiency in OFDM based WLAN receiver, Autocorrelator and CORDIC algorithm is used. This paper deals with simulation of these algorithms using Verilog HDL. An Autocorrelator takes care of frame synchronization, time synchronization, frequency synchronization by autocorrelating the received signal. CORDIC is an iterative trigonometric algorithm that performs vector rotations with one additional bit of accuracy for each iteration. It is used to estimate frequency offset by calculating the phase of the maximum correlating signal.

Keywords: Autocorrelator, CORDIC, frequency offset, Iteration, Synchronization.
90-97

03.3005/0352090097

PDF
16.

Traditional Uses Of Plants By The Tribal Communities Of Salugu Panchayati Of Paderu Mandalam, Visakhapatnam, District, Andhra Pradesh, India

S.B.Padal , P. Chandrasekhar ,Y. Vijakumar 

Abstract

An ethnomedicinal survey was carried out in Parvathipuram, Agency, Vizianagaram District, and Andhra Pradesh, India. For documentation of important plants and information from local community about their medicinal uses. The indigenous knowledge of local traditional uses was collected through questionnaire and personal interviews during field trips. The identification and nomenclature of the listed plants were based on The Flora of Andhra Pradesh. A total of 95 plants species were identified by taxonomic description and locally by ethnomedicinal knowledge of people existing in the region. Plant specimens collected, identified, preserved and mounted were deposited in the department of botany, Andhra University, Visakhapatnam for future references.

Keywords: Traditional uses, tribal communities, ethnomedicinal plants, salugu panchayati, paderu Mandalam, Visakhapatnam district.
98-103

03.3005/03520980103

PDF
17.

Content Based Video Retrieval Using Cluster Overlapping

Deepak C R , Sreehari S , Gokul M , Anuvind B

Abstract

To retrieve videos from database efficient video indexing and retrieval mechanisms are required. In this paper, we propose an efficient algorithm to retrieve videos from the database when a video clip is given as a query. To efficiently match query video clip with the videos in the database various spatio-temporal features are used. Clustering algorithms are applied to extracted features for fast retrieval. Cluster overlapping method is used to retrieve relevant videos. Relevant videos are ranked based on the similarity measurement and frequency of query shots in the retrieved videos. Experimental result proves that proposed method has high precision and recall compared to conventional algorithms.

Keywords: DContent based video retrieval, key frame, video indexing, shot clustering
104-108

03.3005/035201040108

PDF
18

Effective and Secure Content Retrieval in Unstructured P2P Overlay Networks using Bloom Cast Technique

Priya Ponnusamy , M. Yoha lakshmi

Abstract

P2P network stands among one of the best and popular network tool. This technique made the sharing of contents through internet easier. For unstructured P2P networks Bloom Cast serves as an efficient technique for full-text retrieval scheme. In order to achieve a guaranteed recall at a communication cost of the network, Bloom Cast makes copies of the contents in the network uniformly at a random across the P2P networks. To encode the complete document the Bloom Cast utilizes Bloom Filters. To support random node sampling and network size estimation Bloom Cast utilizes its hybrid network which is a combination of a lightweight DHT and an unstructured P2P overlay. There are possibilities of malicious codes and false transactions in unstructured P2P networks. At times it generates false identities resulting in false transactions with other identities. The proposed method here uses the concept of DHT and reputation management which provides efficient file searching. For secure and timely availability of the reputation data from one peer to the other peers the self certification (RSA ALGORITHM and MD5) is used. The peers are here repeated in order to check whether a peer is a malicious peer or a good peer. The transaction is aborted at once a malicious peer is detected. The identity is attached to the peer that has reputation. The peers are provided with identity certificates which are generated using self-certification, and all of them maintain their own (and hence trusted) certificate authority which issues the identity certificate(s) and digital signature to the peer.

Keywords: Bloom Cast, Bloom Filters, MD5 with RSA Algorithm, Self-Certification.
109-114

03.3005/03520109114

PDF
19.

Master-Slave Speed Control of Double Induction Motor

Ahmed A.M. Emam , Eisa B. M. Tayeb , A.Taifour Ali , Musab M.S.A. Alshiekh

Abstract

Induction motor is one of the main sources of mechanical energy in industry; several applications use more than one motor to bear the high load. This paper is concerned with the design of a master slave control system responsible for synchronization between the different motors. The concept of the field oriented control (foc) is explained. PI-field oriented controllers are designed for two induction motors in master slave configuration. The proposed control system is simulated using Matlab/Simulink. The simulation results showed good synchronization between the master and the slave motors with acceptable tracking error.

Keywords: induction motor, synchronization problem, master-slave control, field oriented control (FOC).
115-118

03.3005/035201150118

PDF
20.

Cd-Hmm For Normal Sinus Rhythm

V.K.Srivastava , Dr. Devendra Prasad,

Abstract

To diagnose the cardiac abnormalities, it is important to detect and classify the cardiac arrhythmias. To achieve this we have to use the specialized program tools and visual demonstrations of new methods, as propagated by researcher from time to time. Our work is focused on classification of normal sinus rhythm and premature ventricular contractions of the human heart. We are using the wavelets for the feature selection and extraction (searching for a local maximum in the contour envelope successfully detects Rpeaks) and Continuous Density Hidden Markov Models (CD-HMM) for the classification. The ECG data is taken from standard MIT-BIH arrhythmia database.

119-122

03.3005/035201190122

PDF
21.

Develop A Electricity Utility Network Using GIS

Ritik Sharma , Shubhangi Garg , Saurabh Kaushik , Himanshu Setiya

Abstract

GIS is a growing discipline in the field of information technology and is providing better solutions for the representation of the geographical data. Basically GIS means "A system for capturing, storing, checking, integrating, manipulating, analysing and displaying data which are spatially referenced to the Earth. This is normally considered to involve a spatially referenced computer database and appropriate applications software". The main objective of this paper is to Develop a Electricity utility Network Using GIS. The problem statement are following  Difficulty in fault management : time consuming and man power consuming.  Frequent thefts of electricity in current system.  Inefficient supply of electricity. Unsystematic network expansion. The geographical data is used for the purpose of studying and analyzing the current situation of any geographical region so that other aspects can also be analyzed surrounding that region, which may or may not be included in the attribute data. Hence it is being incorporated in different fields of research and analysis. In the field of managing electric power transmission and distribution GIS plays a strong role for both traditional and smart grid networks. when smart grid is applied over the electric network that time managing data using GIS becomes essential. EGIS(Electric network geographic system) provides some important functionalities just like as  Show complete network distribution system of area.  Information about the Main power distribution centers and the sub power stations in local area.  Information about the every pole located in the area and the connections supplied from that pole.  Information about the connections supplied from the transformers located in particular

Keywords: Geoserver, Arcgis, Autocad, SQL server, map(information), wireless toolkit.
123-129

03.3005/035201230129

PDF
Version III
S.No. Article Title Page No. Paper Index PDF
1.

Implementing CURE to Address Scalability Issue in Social Media

 U.Vignesh , S.Mohamed Yusuff , M.Prabakaran

Abstract

This paper presents a behavior of individuals from an collective behavior using a social-dimension based approach. Collective behavior, which indicates the group of data generated on a large scale, such as facebook, orkut, twitter etc. which generates a large amount of data on large scale and provides a way to act as a platform for targeting an actor's behavior involved on to them. Thus, we consider an place of social media network to choose an application for applying our work on to them. Social media network activities which includes millions of actors behaviors involved onto it in fraction of second. To predict these behaviors, we propose an edge centric clustering schema to extract social dimensions from a network. Although, there are many extracting schemes to extract social dimensions, their scalability paves the way to lack to guarantee in finding dimensions effectively and efficiently. Edge centric clustering schema with CURE algorithm solves the scalability issue that occurs in previous schemas and provides efficient and effective extraction of social dimensions. If the process implementation completed, the performance results using social media network shows that our cost included in CURE with edge centric scheme is being less than one third the cost required by existing schemas. The effectiveness of edge centric clustering schema is demonstrated by experiments conducted on various data and by comparison with existing clustering methods.

Keywords: actors, collective behavior, CURE, scalability
01-07

03.3005/03530107 

PDF 
2.

Design of Uniform Fiber Bragg grating using Transfer matrix method

Deba Kumar Mahanta

Abstract

The performance of a uniform fiber Bragg grating is depends on it reflectivity. The reflectivity is again depends on change of effective refractive index and length of the grating. This paper presents the design aspect of an optical fiber Bragg grating for maximum reflectivity. As fiber grating allows considerable amount of energy exchange between different modes of the fiber, couple mode theory which is solved by transfer matrix method is considered as good approximation to calculate the spectral response of fiber Bragg grating.

Keywords: Fiber Bragg grating, couple mode theory, transfer matrix method, reflectivity.
 
08-14

03.3005/025308014 

PDF
3.

Effect of Alkaline Activator on Workability and Compressive Strength of Cement Concrete with RHA

Prof. B.M.Bahadure, Prof. N.S.Naik

Abstract

Objectives of the investigations- To study the suitability of the RHA as a pozzolanic material for replacement of cement in concrete. To improve the early strength ( at ages 3,7, 14 days) of concrete with RHA by using alkaline activator. To make the concrete economical. To develop and satisfy various structural properties like compressive strength, Workability and Alkalinity To see the effect of alkaline activator on cement concrete with RHA. To obtain specific strength within specific time of cement concrete with RHA for particular situation (i.e. high performance strength concrete for sea shore structure, prestressing, blasting, nuclear power plant, bridge structures etc.). To find alternative binders to manufacture the concrete. To use low cost agricultural bi-product. To reduce environmental pollution. Scope of the investigation- To study the effect of alkaline activator NaOH and RHA on compressive strength, workability and alkalinity of cement concrete for :-Concrete grade – M30, Water to cementitious material ratio 0.5,Alkaline solution to cementitious material ratio – 0.35, Concrete mixes with RHA – 0%,10%,20% and 30%, NaOH concentration in morality M - 1,2,3 and 4, Mix design by – DOE method, Superplasticizer – Hydraproof - 1.5% of cementitious material , Workbility- By slump and compaction factor test, Compression test specimen – cube size 150*150* 15 mm, Curing method and age – 1) water curing – 3,7 and 14 days

Keywords: Rice husk ash( RHA),Molarity(M),Alkaline activator,sodium hydroxide(NaOH), compressive strength, Concrete grade 30,hydration,pazolanic reaction, pH value,slump,workability, calcium silicate hydrate (C-S-H gel),silica,plasticizer
15-20

03.3005/0253015020

PDF
4.

Priority Based Service Composition Using Multi Agent in Cloud Environment

Khushbu D. Virani ,Dhara D. Virani ,Madhuri Vaghasia

Abstract

Cloud computing is a highly research area in the technical I.T field and economic world, and many of the software industry have entered the development of cloud services. It is the Preeminnt on-demand service system along with a "Pay-as-you-go" Policy. Agent-based Cloud computing consist of the design and development of software agents Cloud service discovery, finding the appropriate service and service composition. Distributed and constantly changing Cloud computing environments pretense new challenges to automated service composition such as: (i) Dynamically contract service providers, which set service fees on a supply-and-demand basis, and (ii) Dealing with incomplete information regarding Cloud resources.Sometimes it allows resource agents to take advantage of the delegation of tasks, e.g., when a resource agent delegates a task to another resource agent given a failure.Proposed work contains designing a mechanism like adjusts existent service compositions to changes in consumer requirements, for example, a Cloud consumer demanding for more service to its currently contracted Broker Agents. Proposed system assume that smaller no. of length service has higher priority because less collboration among service agent and average time is also reduced so priority is also consider at the time of service composition.

Keywords: Agent, Broker, Composition , Consumer, Multi-Agent, Priority, Provider
21-25

03.3005/0353021025

PDF
5.

Formation of Pseudo-Random Sequences of Maximum Period of
Transformation of Elliptic Curves

Alexandr Kuznetsov, Dmitriy Prokopovych-Tkachenko, Alexey Smirnov

Abstract

It is considered methods of forming pseudo-random sequences for cryptographic of applications, in particular for domestic mechanisms to ensure security of information systems and technologies. We investigate the properties of pseudo-random sequences generator using the changes in the group of points of elliptic curves [according to the standard NIST SP 800-90], there are some disadvantages of test generator with respect to the properties of the formed sequences and their statistical visibility with uniformly distributed sequences. It is developed an improved method by introducing additional recurrent conversion, which allows you to create sequences of pseudo-random numbers maximum period.

Keywords: Pseudo-Random Sequences, Elliptic Curves
 
26-33

03.3005/0353026033 

PDF
6.

Block Mathematical Coding Method of Images Compressed by a SPIHT Algorithm

Alexandr Dreyev, Alexey Smirnov

Abstract

A method of mathematical block mathematical coding of images compressed by a SPIHT algorithm is developed in the article. Redundancy of information during encoding by a SPIHT algorithm that can further compress the information by entropy coding is identified. An optimization equation which enables us to find an optimal block size for the application in the block mathematical coding is obtained.

Keywords: compression, image, SPIHT, mathematical coding, block, network
 
34-39

03.3005/0353034039 

PDF
7.

Fast Encryption Algorithm for Streaming Video over Wireless Networks

Mr.Rahul Bambodkar Mr.Avinash Wadhe

Abstract

Wireless networks are poised to enable a variety of existing and emerging video streaming applications. However, video streaming over wireless suffers from piracy and malicious attack. Also, it is well-known that video decompression on the handheld devices is constrained by the power and other computation resource. Therefore, video encryption should be designed to be lightweight and efficient. In this paper, we designed a new lightweight, efficient, scalable, format-compliant video encryption algorithm, which is based on the DCT (Discrete Cosine Transformations) coefficients scrambling. The simulation shows that the proposed video encryption algorithm consumes low computation resource while achieves high scalability and confidentiality, which is in compliance with the design goal of video streaming over wireless applications.

Keywords: video, encryption, security, wireless networks
 
40-43

03.3005/0353040043 

PDF
8

Area and Speed wise superior Vedic multiplier for FPGA based arithmetic circuits

Mr.Virendra Magar

Abstract

The speed of a multiplier is very important to any Digital Signal Processor (DSPs). Vedic Mathematics is the earliest method of Indian mathematics which has a unique technique of calculations based on 16 Formulae. This paper presents the efficiency of Urdhva Triyagbhyam Vedic method for multiplication, which strikes a difference in the actual process of multiplication itself. We are proposing the high speed and low combinational delay multiplier i.e. the fundamental block of MAC based on ancient Vedic mathematics. It enables parallel generation of partial products and eliminates unwanted multiplication steps. Multiplier architecture is based on generating all partial products and their sums in one step. Chipscope VIO is used to give random inputs of desired values by user, on which proposed Vedic multiplication is performed. The proposed algorithm is modeled using VHDL i.e. Very High Speed integrated circuit hardware description language. The propagation time of the proposed architecture is found quiet less. The Xilinx Chipscope VIO generator allows us to give the runtime inputs. The Xilinx Chipscope tool will be used to test the FPGA inside results while the logic running on FPGA. The Xilinx Spartan 3 Family FPGA development board will be used for this circuit. The proposed multiplier implemented using Vedic multiplication is efficient and competent in terms of area and speed compared to its implementation using Array and Booth multiplier architectures. The results clearly indicate that Urdhava Tiryakbhyam can have a great impact on improving the speed of Digital Signal Processors.

Keywords: Vedic Multiplier, urdhva tiryakbhayam, High Speed, Low Power, Latency
 
44-49

03.3005/0353044049

PDF
9

Effect of nano-silica on properties of blended cement

G.Reddy Babu

Abstract

The properties of blended cement with nano-SiO2 (NS) were experimentally studied. The silica, which is the major component of a pozzolan reacts with calcium hydroxide formed from calcium silicates hydration. The rate of pozzolanic reaction is proportional to the amount of surface area available for reaction. Results indicated that setting times were increased with increase in percentage of nano-SiO2 in cement blended with silica fume. A combination of 6% SF + 3%NS was given the best performance in compressive strength. XRD was used to analyze the results.

Keywords: Nano-Silica, Silica fume, Compressive strength, setting time.
 
50-55

03.3005/0353050055 

PDF
10

Load Forecasting For Practical Power Systems by Using Artificial Neural Networks and Classical Techniques – A Case Study

Mr. N.M.G. Kumar, Dr.P.S.Sangameswara Raju, Mr.P.Venkatesh

Abstract

This paper presents a method of STLF (Short Term Load Forecasting) in electrical power system using ANN. In this a multilayered feed forward network with back propagation learning algorithm is used because of its god generalizing property. The input to the Neural network is in terms of past load data which are heuristically chosen such that they reflect the trend, load shape as well as some influence of weather, but here the weather data is not used to train the network. The network is trained to predict one hour ahead load forecasting in both ANN as well as Conventional (Regression) methods. This method is trained for one month load forecasting data and two months load forecasting data and found that the MAPE(Mean absolute percentage error) obtained is small especially for prediction of load for hourly in considering two months data than one month data to train the network.

Keywords: STLF, ANN, Load Forecasting, Load demand
 
56-65

03.3005/0353056065 

PDF
11

Efirstaid Medical Services for Accident Cases

K.Bala Karthik, M.Subramanian

Abstract

From a newspaper survey, it is badly noted that for every second, 5 people in India meet accidents and lose their life. The main course of loss of life in accidents is due to the unavailability of quick first aid medical service. To overcome this problem, Government and private aid centre run mobile ambulance service. Due to delayed communication between the accident spots and service departments, fast first aid and medical assistance for the people who suffer in accident spot have not provided in correct time. There is also another problem of intimating the accident if it occurs in remote areas. Though the medical service reached spot, it has to test the victim's blood group to give the appropriate blood suits his blood current. These are the barriers considered by us and find the solution through this work

Keywords: AT, GSM, GPS, PHP, SQL, SMS
 
66-69

03.3005/0353066069 

PDF
12

Comparative study of capacitance of Nano-Scale and Pico-scale-MOSFET

Kaushik Chandra Deva Sarma, Janmoni Borah, Dhruba kr. Mandal,
Ajay chetry, Sanjeeb Kumar Deb Roy, Bhaskar Hazarika

Abstract

As CMOS technology dimensions are being aggressively scaled to reach a limit where device performance must be assessed against fundamental limits, pico scale device modeling is needed to provide innovative new MOS devices as well as to understand the limits of the scaling process. This paperpresents a comparison between nanoscale and pico scale MOSFETs from the viewpoint of device physics. The MOS capacitance for different dielectric is compared for device dimensions in nanometer and pico meter using MATLAB.

Keywords: Channel length, Gate oxide thickness, Gate capacitance, dielectric constant, nanometer, Pico meter, Threshold voltage.
70-74

03.3005/0353070074 

PDF
13

Increasing the Comprehensibility of Oscillation based Built-In Self Test (OBIST) using Frequency to Fault Code Converter

Ujwal J, J M Kishore, M K Sandeep , M S Sankari

Abstract

A new strategy to increase the comprehensibility of Oscillation based Built-In Self Test (OBIST) of either a SOC or part of a complex mixed-signal system is described. In the test mode, a circuit under test (CUT) is transformed to an oscillator providing a feedback to the CUT. The oscillation frequency is then converted to a corresponding fault code using a new concept of Point of Coincidence (POC).

Keywords: Frequency to fault code Converter, Built-in self test (BIST), Oscillation based Built-In Self Test (OBIST), Circuit under Test (CUT), Point of Coincidence (POC), mixed-signal test, fault detection, level crossing detector (LCD)
 
75-79

03.3005/0353075079 

PDF
14.

Smart Message Communication for Warrior

Santhosh kumar S, Athmaranjan K, Lohith, Basavanagouda Patil

Abstract

Message Service is getting more popular now-a-days. Message (SMS) was first used in December 1992, when Neil Pap worth, a 22-year-old test engineer used a personal computer to send the text message "Merry Christmas" via the Vodafone GSM network to the phone of Richard Jarvis in the UK. It will play a very important role in the future business areas of mobile commerce (M-Commerce). SMS's security has become a major concern for business organizations and customers. Many people send delicate information and conduct private conversations via text with little protection from third parties who might intercept the message (SMS) or the storage of their information in phone company records but this is not case for soldiers .The message (SMS) communication between soldiers in order to fill this void and offer soldiers a more securely private means of textual communication, Smart Message Communication for Warrior Using Android is developed. We used ECC cryptosystem for encryption and decryption of message (SMS). Text Encryption will be a third-party application capable of running on any Android system. It will allow users to send and receive encrypted text messages using our application. About key exchange we used Diffie Hellman key exchange mechanism it'll allow automatically exchange key between soldiers and start a secure session. In this way, we hope to provide a safe and secure means of transferring private messages between any two Android phones and it'll also provide identifying end user as a valid user or not.

Keywords: Android, Decryption, Encryption, ECC, SMS, Text secure, Cryptosystem.
 
80-83

03.3005/0353080083 

PDF
15.

Performance Optimization of Routing Protocols in Mobile Ad hoc Networks: Issues and Challenges

Dr. A. Ramesh Babu , Prof. S. Meenakshi Sundaram

Abstract

Ad hoc networks consist of autonomous self-organized nodes. Nodes use a wireless medium for communication. Thus two nodes can communicate directly if and only if they are within each other's transmission radius. In a routing task, a message is sent from a source to a destination node in a given network. Two nodes normally communicate via other nodes in a multi-hop fashion. Swarm intelligence follows the behavior of cooperative ants in order to solve hard static and dynamic optimization problems. Ants leave pheromone trails at nodes or edges which increases the likelihood of other ants to follow these trails. Routing paths are then found dynamically on the fly, using this so called notion of stigmergy. Creating the optimized routing protocol in MANET was first represented by the protocol that selects the shortest path. Later, context-aware metrics were considered to develop and optimize the routing protocols. Prediction, modeling, and AI techniques were also included to support the optimization. Researchers have invented optimum routing protocols with the main goal of their design formulated for particular objectives in the invented protocol. As such, there are already many routing protocols that equate the most suitable path with the shortest, most reliable, or most self-organized path. Also, there are the self-management protocols that are composed of self-protecting, self-healing, self-configuring, and self-optimizing components. Although they have different objectives, each of these protocols reflects their objective. For this reason, the search for the most effective routing protocol that provides the optimum path and satisfies the entirety of objectives still continues, as to our knowledge no routing protocol can handle and solve all these objectives at once, although there are many protocols which can solve one, two, or maybe even three of these objectives. Thus, from the survey undertaken in this paper, it can be expressed that there is a need for an approach that could deploy the existing algorithms based on the network's needs.

Keywords: Ad hoc Networks, Swarm intelligence, optimization, AI Techniques
 
84-89

03.3005/0353084089 

PDF
16.

Comparison Of UPS Inverter Using PI Controller And NN Controller

S. N. Ambekar, 2 Dr. V. A. Deodhar-Kulkarni

Abstract

Uninterruptible power supplies (UPSes) are used to provide backup power to critical loads, where even a temporary power failure causes large economic losses. The UPSes are used in applications like computer installations, process control in chemical plants, and general communication systems. The function of UPS is to provide a high quality sinusoidal voltage and for this it needs to be controlled. Conventional controllers cannot provide the exact sinusoidal output with the nonlinear loads. The artificial neural network controller having an advantage of adaptability to all loads. The neural network controller is built and trained by using patterns obtained from a simulated controller with multiple feedback loops having an idealized load-current reference. The weights and biases are downloaded to neural network controller and then it is used for online control of inverter. This is to achieve low total harmonic distortion and pure sinusoidal output. This project proposes the Matlab / Simulink implementation of artificial neural network control of UPS inverter. The type of neural network controller used for UPS inverter is of feed forward type and training algorithm used is back propagation. The training of neural network is made with the help of Matlab NN toolbox. The closed loop simulation results obtained from the neural network controller is compared with PI controller.

Keywords: Neural network control, UPS inverter.
 
90-97

03.3005/0353090097 

PDF
17.

Ageing Behaviour of Epdm/Pvc Composites

C.P. Mohamed Kutty 1,O.P.Nasiya1, M.Sunil Kumar2,Muraleedharan Nair3, M .Jahfar

Abstract

The effect of thermal and weather ageing on observed properties of the EPDM/PVC composites was compared by measuring changes in modulus,tensile strength ,tear strength and elongation at break.The elongation at break and tensile strenght of all samples decreased due to weathering.The morphology of the samples were studied to compliment the observations.The chemical resistance of the samples were also studied in acid and alkali solutions.It can be seen that the 100/10 sample has got the greatest resistance. The results indicate that incorporation of PVC has improved ageing behaviour significantly.

Keywords: Polymer composites, effect of filler on ageing resistance
 
98-103

03.3005/03530980103 

PDF
18.

On Α Locally Finite In Ditopological Texture Space

I.Arockia Rani , A.A.Nithya

Abstract

The present study deals with the new concept namely α- para compactness in ditopological texture spaces. Also we develop comprehensive theorems using paracompactness and α-open sets. Many effective characterizations and properties of this newly developed concept are obtained

Keywords: Texture spaces, Ditopology, Ditopological Texture spaces, α-paracompactness, α-locally finite, α-locally co-finite. 2000 AMS Subject Classification. 54C08, 54A20
 
104-107

03.3005/035301040107

PDF
19.

A Study on Security in Sensor Networks

Divya James , Geethu Krishna Kartha

Abstract

Network Management is one of the important functionality in network Engineering. This paper proposes a methodology for security in SNMP managed sensor networks. McAfee is the platform used for implementing the security. It is mainly based on SNMP V3 which is the enhanced version of SNMP and it includes authentication.IEEE1451.4 TEDS is also incorporated to provide plug and play of sensor networks. SNMP is compactable with many kind of devices used in networking, So it provides a wide varity of devices to communicate in a network independent of the manufacturers. The proposed security method is applicable to many of the sensor devices.

Keywords: IEEE standard, Management Information Base, Transducers.
  
108-113

03.3005/035301080113 

PDF
Version IV
S.No. Article Title Page No. Paper Index PDF
1

Design and Simulation of Nonisolated ZVZCS Resonant PWM Converter for High Step-Up and High Power Applications

S.M.MohamedSaleem,K.KalaiRaja,A.MohamedIlyasMydeen,C.R.Mohan Raj ,M.Hazina

Abstract

This paper proposes a generalized scheme of new soft-switched interleaved boost converters that is suitable for high step-up and high power applications. The proposed converter is configured with proper numbers of series and parallel connected basic cells in order to fulfill the required output voltage and power levels respectively. This leads to flexibility in device selection resulting in high component availability and easy thermal distribution. Design examples of determining the optimum circuit configuration for given output voltage gain of 8.75times is presented.

Keywords: High Step-Up, High Voltage Gain, Multiphase, Non-isolated, Soft Switched.
01-09

03.3005/03540109 

PDF
2

Evaluating the Privacy Measure of the Source Location Privacy Scheme in a Wireless Sensor Network

Aparna Gurjar, Prof. A R Bhagat Patil

Abstract

Implementing Source Location Privacy Makes It Possible To Hide The Location Information Of The Transmitting Node. Classified As A Contextual Privacy Protection Technique, The Source Location Privacy Is An Essential Feature Of Those Real Life Sensor Networks Which Have Been Deployed For Monitoring Events Happening At Particular Locations. This Paper Designs A Source Location Privacy Scheme Using Cluster Based Anonymization And Random Routing. The Privacy Measure Index Is Then Evaluated In Order To Estimate The Overall Privacy Achieved By The SLP Scheme. The Effect Of The Privacy Scheme On End To End Message Delay Is Observed, For Estimating The Network Performance Degradation And Establishing The Efficacy Of The SLP Scheme.

Keywords: Anonymization, Message Delay, Privacy Measure, Routing, Source Location Privacy
10-13

03.3005/035410013 

PDF
3

Work Done on Avoidance of Bottleneck in PCS Network

Alka, Sidhi Pandey, Pratima Singh

Abstract

This paper contains work done on avoiding the bottleneck from network using some formulas and techniques that we have surveyed and studied. This is done by replicating the primary copy of HLR at same level which provide all services of primary HLR when it is not in serving mode. Also we have analyzed its performance and drawn results on this basis.

Keywords: PCS, Location Management, HLR-VLR, Replicated databases, mobile computing
 
14-17

03.3005/035414017 

PDF
4

Data Aggregation Protocols in Wireless Sensor Networks

Gunti Spandan, Archana Patel , C R Manjunath , Nagaraj GS

Abstract

Past few years have witnessed increased interest in the potential use of wireless sensor networks (WSNs) in a wide range of applications and it has become a hot research area. There is need of for fast data access in WSN, as resource-constrained is a critical issue in Wireless Sensor Networks (WSNs) applications. Routing protocols are in charge of discovering and maintaining the routes in the network. Routing protocols with low energy consumption plays a very important role in prolonging the lifetime of sensor network. Owing to a variety of advantages, clustering is becoming an active branch of routing technology in WSNs. Tree-based and Cluster-based routing protocols have proven to be effective in network topology management, energy minimization, data aggregation and so on. Data Aggregation is the global process of gathering and routing information through a multi hop network, processing data at intermediate nodes with the objective of reducing resource consumption. In this paper, various data centric aggregation techniques is discussed like TAG, EADAT, AGIT, SRTSD and PEDAP protocols under tree based and LEACH, PEGASIS, TEEN, APTEEN and HEED under cluster based approach for WSN. Furthermore this paper gives an overview tree-cluster based routing protocols.

Keywords: Wireless sensor network, Tree-based, Cluster-based, routing protocol, Data aggregation, life time, energy minimization;
18-24

03.3005/035418024 

PDF
5

Development of Virtual Backbone Scheduling Technique with Clustering For Faster Data Collection in Wireless Sensor Networks

P.Vignesh Raja, Dr.S.Subasree ,Dr.N.K.Sakthivel

Abstract

Wireless Sensor Networks (WSNs) dominated in last two decades and it is consider as a key technology for various applications that involve lengthy processing and minimum cost monitoring, such as Battlefield Reconnaissance, Building Inspection, Security Surveillance and etc. In most WSNs, the battery is the important energy source of the sensor node. These nodes are expected to work based on batteries for continuous period times like several months or even for few years without replacing. Thus, energy efficiency becomes a critical issue in WSNs. The main objective of a sensor network is often to send the sensing data from all sensor nodes to a common sink node and then perform further analysis at the sink node. Thus, data collection process is one of the important services used in WSNs applications. In the existing techniques, different approaches have been used to sensible simulation models under the set of sensor nodes to common sink communication process known as convergecast. In the TDMA scheduling technique, it is time scheduling process based on a single frequency channel with the aim of reducing the number of time slots required (schedule length) to complete a converge cast. By using this scheduling mechanism, the data collection is higher than previous mechanisms. However, from our experimental results, this Project Work is realized that the TDMA Scheduler unable to collect data from large Sensor Networks. This is the major identified problem. To address this issue, this Project Work proposed an efficient Virtual Backbone Scheduling (VBS) Technique. Along with scheduling mechanism if we use clustering technique which will increase the life time of Wireless Sensors. To overcome this technique a novel Fuzzy Logic based approach has been introduced which will reduce the complexity of mathematical model. So, that the scheduling process can be done in faster way and which will optimize the life time of WSN. In this project work along with Virtual Backbone scheduling, the Clustering mechanism and Fuzzy Logic based approach will optimize the performance of WSN in terms of Optimized Scheduling, Faster Accessing and Faster calculations.Index Terms- Wireless Sensor Networks (WSNs), Time Division Multiple Access, Virtual Backbone Scheduling, Clustering, Convergecast , Fuzzy Logic,Tree Based Routing.

Keywords: --------------------------------------
25-30

03.3005/035425030 

PDF
6

Domain Driven Data Mining: An Efficient Solution For IT Management Services On Issues In Ticket Processing

V.R.Elangovan,Dr.E.Ramarajl

Abstract

Data Mining is the new emerging technology that can be applied in many real-world problems in order to make the solution. Conventional data mining application faces critical challenges and lack of soft power in solving real-world complex problems when deployed. This data mining is implemented on the IT Infrastructure in order to provide better services. In this aspect, we use a new paradigm shift from 'data-centered knowledge discovery' to 'domain-driven actionable knowledge discovery'. The domain-driven actionable knowledge discovery also termed as Domain-Driven Data Mining, ubiquitous intelligence must be involved and meta-synthesized into the mining process this an actionable knowledge discovery-based problem-solving system is formed as the space for data mining. This is the motivation and aim of developing Domain-Driven Data Mining used for IT Infrastructure Management. In this paper, we propose a methodology to solve the problem raised in the Management of IT Infrastructure. Also, it provides suitable solution for handling the issues raised in the ticket processing. Thus the proposed methodology provides better services to manage the IT services and provide an efficient way to increase the customer satisfaction.

Keywords: Customer Satisfaction, Data Mining, Domain-Driven Actionable Knowledge Discovery, IT infrastructure, Ticket Processing, Ubiquitous Intelligence
 
31-37

03.3005/035431037 

PDF
7

The Rhythm of Omission of Articles and Verbs by Bengali EFL Students

 Madhumita

Abstract

English language plays an important role as an effective communication medium. It is used in schools ,colleges and universities. The aim of this study is to explore writing difficulties in the English language faced by second language learners particularly by Bengalis. A survey was conducted for this purpose. Majority of students with rural and urban backgrounds cannot communicate properly in English and perceive it as a very difficult subject. This paper reports on a small scale study which examined ten Bengali learners with a vernacular background. Data was collected from them in the form of essay writing. The main focus of the study has been on usage of articles and verbs in the written form. Seven of the students essays were studied in details. Results of the study indicated that students were facing a lot of difficulties in writing English language due to lack of vocabulary, poor spelling, L1 interference and a poor understanding of grammatical structure. Primary data was collected from the students of Shantiniketan and the secondary data was collected from other websites.

Keywords: English language, writing difficulties, vernacular background, communication, Bengalis, medium, interference
38-49

03.3005/035438049 

PDF
8

Image Segmentation Using RGB Decomposition and Modified Bacterial Foraging Optimization

Bobbinpreet Kaur1, Raju Sharma

Abstract

This paper addresses the problem of segmenting the image into various color components by using combined approach of Modified Bacterial foraging optimization approach and RGB Decomposition. The original image is decomposed into separate planes of R G and B and then modified Bacterial Foraging algorithm is applied on three planes separately to calculate three different thresholds. Segmentation is performed on the basis of Thresholding. Since Image segmentation is the basic step in many image processing applications so faithful segmentation algorithm must be developed for successful implementation of the processing applications. Main aim of image segmentation is to extract the information which is of interest for a particular application. This methodology will be able to separate three different colors of original image. The accuracy of any algorithm varies with input image. This is an extensive research area as many applications depend upon results of the algorithm for image segmentation, but it is still difficult to assess whether one algorithm produces more accurate results than another for all type of images.

Keywords: Modified BFO, RGB planes, Segmentation, Thresholding
50-55

03.3005/035450055 

PDF
9

Performance Comparison of Rayleigh and Rician Fading Channels In QAM Modulation Scheme Using Simulink Environment

P.Sunil Kumar, Dr.M.G.Sumithra, Ms.M.Sarumathi

Abstract

Fading refers to the fluctuations in signal strength when received at the receiver and it is classified into two types as fast fading and slow fading. The multipath propagation of the transmitted signal, which causes fast fading, is because of the three propagation mechanisms described as reflection, diffraction and scattering. The multiple signal paths may sometimes add constructively or sometimes destructively at the receiver, causing a variation in the power level of the received signal. The received signal envelope of a fast-fading signal is said to follow a Rayleigh distribution if there is no line-of-sight between the transmitter and the receiver and a Ricean distribution if one such path is available. The Performance comparison of the Rayleigh and Rician Fading channels in Quadrature Amplitude Modulation using Simulink tool is dealt in this paper.

Keywords: Fading, Rayleigh, Rician, QAM, Simulink
56-62

03.3005/035456062 

PDF
10

Walking the Talk in Training Future Mathematics Teachers Has Potential for Benefits

Nosisi N Feza 

Abstract

Culturally relevant mathematics instruction requires modeling of the multicultural theories in teacher training. Providing theory only to students about how to teach diverse students does not engage them in experiencing being on the other side except minority students. This study presents findings of theanalyses of teaching artifacts, curriculum and lecture observations of two teacher training classrooms of mathematics pedagogy. The observations alone could not account for the rationale behind individual practices, hence students' experiences and syllabi of these two classrooms triangulate the observations to strengthen the analysis. The findings indicate that the "otherness" of diverse ways of knowing continue to prevail regardless of all efforts on informing mathematics teacher education about cultural affirming instruction. Also teacher trainer's theoretical framework on multiculturalism determines the nature of mathematics teacher education student teachers' will be exposed to.

Keywords: --------------
63-70

03.3005/035463070 

PDF
11

Experimental Investigation of Multiwalled Carbon Nanotube Reinforcement in the Metal Matrix Composites for High Value Fatigue Life

G.E.V.Ratna Kumar , P.N.S.Srinivas

Abstract

The present work shows that the addition of small volume fractions of multi-walled carbon nanotubes (CNTs) to the matrix results in a significant increase in the high-cycle fatigue life. It is proposed that carbon nanotubes tend to inhibit the formation of large cracks by nucleating nano-scale damage zones. In addition, the contribution to energy absorption from the fracture of nanotubes bridging across nano-scale cracks and from nanotube pull-out from the matrix are mechanisms that can improve the fatigue life. An energy-based model was proposed to estimate the additional strain energy absorbed in fatigue. The distributed nanotubes in the matrix appear to both distribute damage as well as inhibit damage propagation resulting in an overall improvement in the fatigue strength of glass fiber composites.

Keywords: carbon nanotubes, fatigue life, strain energy, metal matrix composites, thermosetting polymers, epoxy resins, cyclic stresses.
71-77

03.3005/0354071077 

PDF
12

A Firm Retrieval of Software Reusable Component Based On Component Classification

 Gowtham Gajala1, MV Phanindra

Abstract

The reuse system presented here is based on the principles of Attribute value classification and Threshold value. It allows a software designer to define the component, and retrieve the components which are similar to the required one. Algorithms to compute these reuse candidates are described. Once the reuse candidates for the required operations have been selected, the reuse system computes a list of packages for the set of operations. Linear-Search Algorithms for determining the package reuse list are also presented. If the suggested packages don't satisfy the requirements, the user may try slightly different operation descriptions to find other candidates. This approach facilitates the user to browse among similar components in order to identify the best candidates for reuse. The proposed classification system takes advantage of the positive sides of each classification scheme, whilst hopefully rendering the negative sides redundant. This classification scheme uses the attribute value for different parts of a component. The attribute value scheme is initially used within the classification for specifying the vendor, platform, operating system and development language relating to the component. This allows the search space to be restricted to specific libraries according to the selected attribute values.

Keywords: Reuse, Software components, classification, search, insert, attributes
78-83

03.3005/035478083 

PDF
13

Reduced Complexity Of Service Matching Using Tree Concept For Multi-Tenants In Cloud Environment

Dhara D. Virani , Khushbu D. Virani ,Madhuri Vaghasia

Abstract

Cloud computing is a highly Research area in the technical I.T field and economic world, and many of the software industry have entered the development of cloud services. It is the preeminent on-demand service system along with a Pay-as-you-go Policy. In Multi-tenant networking, with which multiple customers (tenant) networks are virtualized over a single collective physical infrastructure. Dynamic provisioning in the cloud requires an integrated solution across the technology stack (software, platform and infrastructure) combining functional, non-functional and resource allocation requirements. Research works in the area of web service matching. It reviews the available cloud computing services and identifies and clarifies their main characteristics. The Architectural features of multi-tenancy and classify them according to the requirements of end-users, enterprise that use the cloud as a platform, and tenant providers themselves. Service is matched with existing tenants and according to the requirement of end-users. Matching techniques such as string-based, chema based, semantic web service based, constraint-based, linguistic, graph-based and taxonomy-based. Clients spend extreme amounts of time and energy searching through a list of available services..

Keywords: Cloud Computing,Complexity, Multi-tenant, Service Matching, Taxonomy based Services
 
84-88

03.3005/035484088 

PDF