|
ARPN Journal of Engineering and
Applied Sciences June 2015 | Vol. 10 No.
10 |
|
|
Title: |
Multi-tier load balancing in pervasive computing using power managing
approach |
Author (s): |
R. Vasanthi
and R. Prakash |
Abstract: |
With their growing popularity in the today web services
are faced with the deal of handling thousands of users requests every
second, each requiring very fast responses. Existing work controls power
and application-level performance separately and thus cannot
simultaneously provide multi tier web services between the different
tiers. The present work fails to define the cost function over the time
interval. Providing the solution for multi tier web services, Hierarchy
based Load Balancing Approach (HLBA) is used to model the association
between the different tiers. Manage the cost function over the time
interval using Power Managing Approach (PM) for overcoming the above
issues. Performance of Hierarchy based Load Balancing Approach with
Power Management (HLBA- PM) provides a more satisfaction to the users
for today’s multi-tier dynamic web services. Hierarchy based Load
Balancing Approach with Power Management considers the problem of cost
function and correlations between the different type of multi- tier. |
|
|
Full Text |
|
|
Title: |
Zero
point energy conversion for self-sustained generation |
Author (s): |
P. RajaRajeswari, S.
Sakthi, K. Bharathi and S. Srinivasan |
Abstract: |
In this paper zero point energy conversion is proposed
for self-sustained generator applications. Our entire universe balance
is based on a magnetic energy lying in a minimum energy point called
zero-point. By using an energy conversion machine magneto-gravitic link
can be made zero-point energy by taking kinetic energy form i.e.
rotational motion .Kinetic energy link is constructed using a special
permanent magnet arrangement and it is independent of electricity . It
uses perpetual motion and the kinetic energy is later converted by
using a special type low speed axial flux alternator, comprising two
rotating discs in-between which the coil is placed from which the power
is drawn. |
|
|
Full Text |
|
|
Title: |
Automated supervisory
control system of urban passenger transport |
Author (s): |
Andrey Vladimirovich Ostroukh, Nataliya
Evgenievna Surkova, Mikhail Borisovich Polgun and Anna Vladimirovna
Vorobieva |
Abstract: |
The
article presents scientific and technical aspects of improvement of the
effectiveness of the Automated System of Urban Passenger Transport
Supervisory Control (ASUPTSC) that are the most crucial elements of
modern city passenger transportation management. It is proposed to
establish the ASUPTSC on the basis of development of software and
technological solutions designed to improve the quality of headways
monitoring that ultimately improves the quality of supervisory control
and management. The article includes the overview of domestic and
international experience of using the automated systems of urban
passenger transport supervisory control. The article provides the
analysis of the informational support structure for ASUPTSC. The
analysis includes the main components of any automated system of
supervisory control (ASSC), the basic roles of participants of transport
management process. The article provides the analysis of tasks, solved
via ASUPTSC, requirements to it, and ASUPTSC architecture. |
|
|
Full Text |
|
|
Title: |
Siso
fuzzy tuned power oscillation controller for UPFC connected network |
Author (s): |
S. Sakthi and P. Raja
rajeswari |
Abstract: |
This paper focuses on the design of single input single
output fuzzy controller for a Power oscillation controller based
UPFC
for damping rotor oscillation in power system network. The oscillation
due to disturbance cannot damp out only by
UPFC,
but with single input Fuzzy tuned Damping controller based
UPFC
can easily damp out the oscillation. Here the proposed system has been
implemented in the standard nine-bus system and simulation results are
taken by deriving the transient stability algorithm using C compiler
software. After the analysis it is found that the Fuzzy based POD
controller is very much required for
UPFC
controller to damp out the power oscillations. |
|
|
Full Text |
|
|
Title: |
A channel allocation scheme to avoid channel interference
using genetic algorithm and heuristic approach in mobile networks |
Author (s): |
M.
Kamaladevi, R. Devika and T. Renugadevi |
Abstract: |
Channel Interference is the major problem
in mobile networks. The reasons for channel interference are improper
frequency planning, weather conditions etc. The reproductive stage of
Genetic Algorithm is used to avoid channel interference in dynamic
mobile channel allocation. This algorithm combines sequential heuristic
methods into a genetic algorithm that consists of three assignment
strategies. The three strategies are regular interval assignment
strategy, greedy assignment strategy which consists of node degree
ordering and Frequency Exhaustive Assignment technique and Genetic
Algorithm strategy which consists of selection, crossover and mutation. |
|
|
Full Text |
|
|
Title: |
Challenges and issues of power distribution automation using multi agent
systems |
Author (s): |
Anisha K
and Rathina Kumar M |
Abstract: |
In Today’s world, “WITHOUT POWER CAN’T DO ANYTHING”.
Because of electronic technology development depends up on power system.
Electric power distribution system has an important role in electrical
power systems to deliver the electricity to consumers by multi agent
systems (MAS). Automation in the distribution field with MAS allows
utilities to implement flexible control of distribution systems, which
can be used to enhance efficiency, reliability, and quality of electric
service. In this paper, the challenges facing in fault detection,
isolation and restoration in the power system are discussed. |
|
|
Full Text |
|
|
Title: |
UAV remote control distraction prevention trough synthetic augmented
virtual imaging and oculus rift-style headsets |
Author (s): |
Luca Piancastelli and
Raimondo Alberto Bernabeo |
Abstract: |
A remote control station for Unmanned
Aerial Vehicles (UAV) based on oculus Rift-style headsets and joysticks
is proposed in this paper. With this solution situation awareness and
distraction can be controlled and measured during the flight. With
Virtual Augmented Reality (VAR) software it is possible reproduce
accurately both the cockpit and the external view thanks to the helmet
tracking system. Also the head-up display (HUD) and up-to-date flight
instruments can be reproduced. In this way the PF (Pilot Flyng) station
can be reduced to helmet, throttle/stick joysticks with force feedback
and a few additional LCDs. Another main advantage of VAR headsets is the
possibility of reconfiguring the cockpit via software and to use it for
several different UAVs. In Figure-5 it is possible to see a logical
schema of a VAR station: the pilot inputs via helmets (line of sight
direction), flight controls (stick and throttle) and switches on
joysticks the data in the AVCS software (Aircraft Visualization and
Control System): The Aircraft Visualization and Control System take the
data from the aerial vehicles, elaborates them and outputs the external
view (external visual system) and the view of instruments (instrument
visualization system). These two "images" are overlapped and mixed in a
highly hierarchical visualization system, where only the relevant
objects are depicted. To do so the external camera images from the
aerial vehicle are analyzed and cleaned of all non relevant data. The
data from the sensors are also to be included in the synthesizing
process. The application of these ideas as discussed in this paper
consists of the realisation of a VAR display system for a remotely
piloted aerial vehicle. All the instruments are modelled via Head Up
Display (HUD) while the external scenery is analyzed and only relevant
elements for mission accomplishment or collision avoidance are
represented. The PF have the possibility of a 360° field of view. Sound
realism and true situation awareness can be then achieved. Software for
distraction control and situation awareness can be easily implemented in
the system. A synthetic audio interrogation system can keep track of the
current state of alert of the PF. |
|
|
Full Text |
|
|
Title: |
Application of the method of distribution of the total energy of impact
on the bearing elements of the
body of the bus when calculating the failure loads |
Author (s): |
Kalmikov B.Yu.,
Ovchnnikov N.A., Kalmikova O.M, Guguyev I.K. and Kushnariva I.V. |
Abstract: |
Article is devoted to solving practical
problems in the field of passive safety of buses and in particular the
definition of the uneven distribution of potential energy from the
bearing elements of the body rollover bus on its side. This
non-uniformity due to a significant difference axle load bus has an
impact on the definition of failure loads arising from the impact of the
roof of the bus on the support surface. Group of authors proposed a
method of dividing the total impact energy on the bearing elements of
the body of the bus and determining failure loads largest crumple bus
rollover. |
|
|
Full Text |
|
|
Title: |
New petrophysical model for unconventional high-Co2-content oil
reservoirs |
Author (s): |
Jose Miguel Galindo,
Jorge Arturo Camargo, Jose Wilder Losada, Jorge Ivan Chavarro, Freddy
HumbertoEscobar and Carolina Charry |
Abstract: |
It is known the existence of unquantified
amount CO2 produced from some fields in the Caguán Putumayo
basin in Colombia. The effect of CO2on resistivity and
porosity open hole logs have not been evaluated yet; then, it is
proposed to build a new petrophysical interpretation model from
available open hole logs in order to quantify the CO2 concentration
in the Caballosformation in the Caguán Putumayo basin to facilitate a
better understanding of the thermodynamic behavior of the reservoir
fluids. Knowing CO2significant subsurface concentration
allows evaluating not only the impact in hydrocarbon reserves and
production costs but also alternative management strategies for produced
CO2 to reduce environmental pollution. Reservoir CO2quantification
resulted feasible by using porosity and neutron open hole logs
superposition only if filtrate invasion is low or moderate. This method
detects the residual CO2 saturation; however, special
drilling muds with null or low filtrate permits estimating virgin zone
porosity. The method applies with no additional costs to all under
saturated reservoirs containing CO2 if density and neutron
porosity logs are available. Neutron porosity can be replaced by NMR
porosity. |
|
|
Full Text |
|
|
Title: |
Convective heat transfer of titanium (IV) oxide nanofluids under turbulent flow condition |
Author (s): |
Budi Kristiawan,
Samsul Kamal, Suhanan, Yanuar |
Abstract: |
This
study has experimentally investigated the flow behavior and convective
heat transfer coefficient of TiO2 distilled water nanofluids
flowing inside a horizontal circular tube at turbulent regime under a
uniform heat flux boundary condition. Anatase titanium (IV) oxide
nanoparticles of average size approximately 21 nm dispersed into
distilled water with volume fraction range from 0.1 to 0.5 vol.% were
used as nanofluids. The observed nanofluids were assumed as
time-independent non-Newtonian fluid with their specific values of power
law index and consistency coefficient. A new correlation involving the
microconvection and microdiffusion effects was proposed to predict
Nusselt number. As nanofluid samples behave the non-Newtonian fluid, the
drag reduction phenomenon should be theoretically exhibited in turbulent
flow regime. This drag reduction phenomenon might be one of the
important factors that was responsible on the improvement of heat
transfer performance in nanofluids aside from the established heat
transfer enhancement mechanisms. |
|
|
Full Text |
|
|
Title: |
Cost
based multipath routing in wireless sensor network for multimedia data |
Author (s): |
Vairam T and
Kalaiarasan C |
Abstract: |
A Wireless Sensor Network (WSN)
essentially consists of data sensor nodes and video sensor nodes, which
senses both sound and motion of events. Routing is the process of moving
packets across a network from one node to another. It is usually
performed by dedicated devices called routers. Single path routing
protocol is used for route discovery and resource utilization. There are
some drawbacks like reduced network throughput, network performance,
increased traffic load and delay in data delivery. To overcome these
problems, multipath routing is preferred. It is the method of using
multiple paths in a network. A new system called Cost Based Multipath
Routing (CBMR) for multimedia data is proposed based on multipath
routing to improve the reliability of data transmission. The need for
the proposed system is to provide multipath routing for multimedia data
in an efficient manner where the best path is chosen based on the cost.
. The proposed system incorporates Real-time Transmission Protocol (RTP)
and Multiple Description Coding (MDC) for transmission of multimedia
data. Using these techniques, the multimedia data is encoded into trace
files at the sender side and the decoding of the trace files is
performed at the receiver side. The generated trace files contain
information about frames, pixels and headers. This system is applied
between the source and sink in a wireless sensor network. The proposed
protocol is simulated using Network Simulator2. |
|
|
Full Text |
|
|
Title: |
Air
permeability investigation towards automotive tyre pressure
sustainability and life saving |
Author (s): |
Sivaraos, M.J.
Raguvaran, A. S. Dahlan, R. Izamshah, M.A. Amran, Hadzley |
Abstract: |
One of the main reasons for major road
accidents which often lead into loss of life’s is the catastrophic tyre
failure caused by vehicles running with improper tyre pressure. The
phenomena where tyre loses pressure naturally and contracts over time is
called air permeation, which is identified to be the main cause of tyre
to deflate but rarely can be realised by naked eyes. Properly inflated
tyres can safe tyre life up to 20% which is equivalent to nine months of
its life span, save fuel from 4% to 10%, increase braking efficiency up
to 20%, lightens steering system and ease self-steer. Therefore, this
paper reveals the investigation findings by analysing the factors that
affect the air permeation that eventually causes pressure loss in an
automotive tyre. The experimentations were performed in both static and
dynamic conditions where they were also tested with and without loaded
situation to extract precise data of the pressure loss from tyre. The
results show that no matter what type of tyre or condition it undergoes,
it still experience pressure drop but at different rate subjected to air
properties, temperature, tyre materials and mechanical fittings of the
wheel. |
|
|
Full Text |
|
|
Title: |
A
wireless sensor network for polyhouse cultivation using Zigbee
technology |
Author (s): |
Prathiba Jonnala and
G.S.R. Sathyanarayana |
Abstract: |
The required climatic conditions for the polyhouse
cultivation can be provided by using this proposed technique. The Zigbee
technology has used for implementing the proposed wireless network. Few
of the surrounding parameters of ambient temperature, humidity
percentage, light intensity range and soil moisture content inside
polyhouse are controlled and optimum conditions for crop growth inside
polyhouse can be provided with the proposed model using abrupt actuators
used. This model has developed with the mesh topology consists various
nodes which are deployed inside polyhouse and are controlled by one
central monitoring unit (CMU). Based on the crop the threshold values
for the sensors and control values for the actuators during day time and
night time are programmed in the CMU and it continuously receives the
sensors data from all the nodes, and with respect to the programmed
values of crop the CMU sends the controlling data to the actuator node
for maintaining constant and required environmental conditions. By using
this proposed model the necessity of human effort can be reduced and
also the suitable weather conditions for the crop production
irrespective of the season can be provided for the maximum beneficiary
to the farmer. |
|
|
Full Text |
|
|
Title: |
Distance
routing on mesh network on chip |
Author (s): |
Elizabeth I and M.
RajasekharaBabu |
Abstract: |
NoC (Network on Chip)
is a promising technology for the interconnection network. Performance
of an interconnection network depends on the routing logic. We explore
the state of art of the existing routing algorithms for mesh connected
network. In this paper we have tried to model the distance routing for
mesh connect NoC network. The performance of the distance routing is
compared with that of the dimension order and odd-even routing
algorithms.
Experimental analysis on synthetic traffic shows that our proposed
distance routing outperforms the state of the art of routing algorithms
by increased link utilization fairness. |
|
|
Full Text |
|
|
Title: |
A novel
high performance dynamic voltage level shifter |
Author (s): |
Srinivasulu Gundala,
Venkata K. Ramanaiah and Padmapriya K. |
Abstract: |
Level shifters are
interfacing circuits, generally for Low voltage to high voltage
translation Level shifters are used and high to low translation
inverters are sufficient, but it needs an additional circuitry. In this
paper we have presented a novel high performance Dynamic Voltage Level
Shifter. It is a unique circuit will perform level-up shift, level-down
shift, and Blocking. The type of shift, Level up/down is will be
performed automatically based on its input voltage (VIN). The proposed
dynamic voltage level shifter has designed and simulated in 90nm
technology. Simulation results demonstrate that the proposed level
shifter translates voltages between 0.4V to 1V and vice versa, at
operating frequencies of 100 KHz, 500 KHz, and 1 MHz. It is observed
that the proposed design having static power of 4.6 nW while level up,
and 2.8 nW while level down operations. Level up and level down average
active power is 20.9 nW. |
|
|
Full Text |
|
|
Title: |
Development of the
rules base for an expert system choice adaptive learning strategy |
Author (s): |
Andrey Vladimirovich Ostroukh,
Dmitry Ivanovich Popov, Dmitry Grigorievich
Demidov and Nataliya Evgenievna Surkova |
Abstract: |
In
this article is described rules data base creation method for selection
an optimum education path for employees. Rules are formed on the basis
of the intellectual data analysis of open education Institute MSUPA by
Ivan Fedorov. Those data contains information about students’ education
results with applied remote educational technologies for 10 years. This
analyses shows both the most successful and most negative educational
method, which could be used by another students by definition others
education strategies. Analyses showed the studying sequence of
disciplines education plan directly connected with students’ education
productivity. Therefore expert system, based on received data will be
indispensable tutor’s instrument and helps to automatize support process
of electronic education. |
|
|
Full Text |
|
|
Title: |
Some new data on
isotope stratigraphy of the Permian rocks at the east of the Russian
platform |
Author (s): |
N.G. Nurgalieva, V.V.
Silantiev, O.S. Vetoshkina, V.A. Ponomarchuk, D.K. Nurgaliev and
M.N. Urazaeva |
Abstract: |
Variations of
d13С,
d18O,
87Sr/86Sr in carbonate rocks and shells of the
Permian age at the east of the Russian platform have been regarded.
Trends of these isotope ratios reflect global regression, increasing of
regional environments isolation from open sea and an arid climate
challenges. |
|
|
Full Text |
|
|
Title: |
Numerical analysis on the performance of refrigeration
compressors with varying operation frequencies |
Author (s): |
S. J. Park and Y. L.
Lee |
Abstract: |
Reciprocating compressors have high energy consumption
due to friction between component parts. Linear compressors with fewer
parts than reciprocating compressors are able to minimize friction and
deliver energy efficient performance. This study examines the impact of
changing frequencies in compressors used in household refrigerators on
overall cooling capacity and COP. For this, two frequency settings of
56.5 Hz and 100 Hz were tested to predict changes in cooling capacity,
compression work, and COP. Results from the numerical analysis showed
that low frequency resulted in reduced cooling capacity and compression
work but enhanced COP. Higher frequency resulted in lower COP but higher
cooling capacity, allowing for higher output from the same volume. |
|
|
Full Text |
|
|
Title: |
Multiobjective design of induction motor using ant colony optimization |
Author (s): |
P.S. Prakash and P. Aravindhababu |
Abstract: |
This paper presents an Ant Colony Optimization (ACO)
based design methodology for improving the efficiency besides reducing
the material cost of Induction Motor (IM). ACO is inspired from the
foraging behaviour of ants, and in particular, how ants can find
shortest paths between food sources and their nest. It does not require
initial values for the decision variables and uses a stochastic random
search that is based on the chemical pheromone trail so that the
derivative information is unnecessary. Among the number of design
variables of the IM, seven variables are branded as primary design
variables and the ACO based design strategy is built to optimize the
chosen primary variables with a view to obtain the global best design.
The developed methodology is applied in solving two IM design problems
and the results are presented with a view of exhibiting the superiority
of the developed algorithm. |
|
|
Full Text |
|
|
Title: |
Performance analysis of an energy efficient FFT processor using 32nm
cmos technology |
Author (s): |
V. Santhiya
and N. Mathan |
Abstract: |
This paper presents an energy-efficient
Fast Fourier Transform (FFT) processor which meets the requirements of
DSP applications. Fast Fourier Transform is one of the widely used
digital signals processing (DSP) algorithms which analysis the signal in
its frequency domain. Modified DOMS-FF (Duration Observation Master
Slave- Flip Flop) is introduced to reduce the power dissipation and
makes the computation of the result much faster than the existing
system. The goal of this work is to get less area and energy efficient
FFT processor with build in all requirements necessary for DSP
applications. |
|
|
Full Text |
|
|
Title: |
An
efficient CORDIC using factor sharing method in digital image processing |
Author (s): |
G. Preethi and V.
Vijaya Kumar |
Abstract: |
CORDIC (Co-ordinate Rotational Digital Computer) plays a
major role in shift and add operation in trigonometric, hyperbolic
function in shifting and adding cosine, sine, tangent function. In this
paper CORDIC is used in Discrete cosine transform as a multiplier unit.
DCT is modified using column bypass and row bypass technique to increase
the speed and to reduce the delay with less complexity for that purpose
a technique called factor sharing method is proposed in CORDIC
architecture which is implemented using video compression for real time
application. CORDIC using DCT is done using MODELSIM6.4a by taking video
compression as a input, where the video is been converted into text file
using the MATLAB software. |
|
|
Full Text |
|
|
Title: |
A novel
arithmetic and logic unit design using unconventional mathematics |
Author (s): |
Nirmal
Bhardwaj and V.J.K. Kishor Sonti |
Abstract: |
The ever increasing demand in enhancing the speed of
processors to handle the challenging problems has resulted in the need
of an efficient ALU. The speed of ALU greatly depends on multiplier and
Vedic mathematics helps in the design of an efficient multiplier using
Anurupyena and Urdhva Tiryakbhyam. Using Ekadhikena Purvena and
Dwandwayoga a squarer circuit is generated. After designing the proposed
Vedic multiplier and Squarer Circuit, it is integrated into an eight bit
module of arithmetic logic unit along with the conventional adder,
subtractor, and basic logic gates. The performance of the Different
Multipliers and Squarer circuit is analyzed using Xilinx ISE 9.1i.From
the results it is found that Dwandwayoga Squarer is better than
Ekadhikena in terms of time delay but on the other hand Ekadhikena
Purvena consumes less power than Dwandwayoga. Among multipliers
Anurupyena is better in terms of power consumption than Urdhva
Tiryakbhyam but it is having much delay. After synthesizing each module
of multipliers they are incorporated into the existing ALU Design. |
|
|
Full Text |
|
|
Title: |
Main geochemical association of the sulfides of lead-zinc mineralization in
Trepça mineral belt- Badovc mine, Kosovo |
Author (s): |
B. Durmishaj, S.
Hyseni, A. Tashko and M. Zabeli |
Abstract: |
In this paper presented the distribution of major metals (Pb,
Zn, and Ag)
and accompanying metals (Bi, Cd, Cu, Sb, As)
in Badovc mineral deposit. The
main elements of economic importance are zinc (Zn), lead (Pb), and
silver (Ag), for which are calculated the industrial reserves of the
mineral deposit of Badovc. Besides, the main metals during the
technological process extradited other associated components such as
gold (Au), cadmium (Cd), bismuth (Bi), etc. With
special emphasis, we studied the main geochemical association of lead (Pb)
and zinc (Zn) sulfides
mineralization. According
to the factorial analysis, the result of these
geochemical associations is
as follows: Pb-Ag-(Bi-Sb); Cd-Cu. In 1% of the
content of lead (Pb) has 14.51g/t silver (Ag). Variation
coefficient for lead is KvPb = 80.57%
and for zinc is KvZn = 81.02%. |
|
|
Full Text |
|
|
Title: |
Low power asynchronous
FPGA architecture for efficient data transfer |
Author (s): |
Sathyendran and V.J.K. Kishore Sonti |
Abstract: |
In recent years, Field Programmable Gate
Arrays are used as reconfigurable architecture in various platforms as a
special type processor which allows the end user to configure directly.
The Logic Blocks and switch matrix provides an extensive use in the
reconfigurable computing, that can be configured according to required
application which also consumes lots of standby power with reduced
throughput. This project investigates in optimizations of reconfigurable
FPGA cells that involves in two stages, optimization of Lookup Table (LUT)
in Logic Blocks for Large Application and optimization of switch matrix
with encoding techniques. The proposed encoding technique combines
four-phase dual-rail encoding and LEDR (Level-Encoded Dual-Rail)
encoding; Lookup Table consists of 8 inputs which are extensively used
for large applications; sleep controller design is used for reducing the
standby power consumed by the LUT. The proposed architecture is
designed, evaluated and simulated using Xilinx SPARTAN 3E (X3SC50). |
|
|
Full Text |
|
|
Title: |
RF
receiver subsystem design at 2.4 GHz frequency using microstrip lines |
Author (s): |
K. Rakesh babu and
V.J.K. Kishor Sonti |
Abstract: |
In this paper, performance analysis of RF subsystems
like, band pass filter (BPF), low noise amplifiers (LNA) are performed.
The center frequency is 2.4 GHz and the substrate used is FR4. The
software used is Advance
Designing Software (ADS). Noise Figure of LNA is 1.95 and the return
loss of the BPF is -20.2dB. Achieved results are in agreement with
theoretical values. |
|
|
Full Text |
|
|
Title: |
Decide,
detect and classify benign and malignant in mammograms using
CV-partitioning method |
Author (s): |
BV. Kavetha and J. Venu
Gopala Krishnan |
Abstract: |
In recent years, the stage determining and
classifying the mammogram as Benign or Malignant is somewhat complicated
process in the medical research. In the earlier papers many
classification techniques, CAD designs and feature extraction methods
are used constantly for mammogram classification, and has its own
advantages and limitations. To overcome the limitations, in this paper a
novel approach is introduced for accurate classification of Benign and
Malignant mammogram. This novel approach functions in three stages,
where preprocess the image, decide the image in complete normal or
Benign/Malignant and Determine whether the mammogram is Benign or
Malignant by comparing the shape, color, texture and size of the
extracted abnormal part of the mammogram Images. The experiment results
give more than 99.3% of accuracy in classification by a MATLAB
Programming method. The performance evaluation of the image is compared
with the cv-partition method and feature extraction method. |
|
|
Full Text |
|
|
Title: |
Sustainable management (SM) guide in GBI interiors design project tools |
Author (s): |
Rostam Yaman, Hamimah
Adnan Farrah Zuhaira Ismail and Noraini Ahmad |
Abstract: |
The paper aims to study and measure the applicability of
GBI tools for interior design project. The studies specifically focus on
one of the GBI Tools assessment criteria which is Sustainable Planning
and Management (SM).
The SM
criteria is chosen as assessment sampling as it make out the main point
scoring system in GBI for Interiors Tools.
The pilot study is to measure and benchmarked the standards and
applicability of the tools. The methodology used is on-site observation
and GBIAP score result. Outcome from the research suggest framework
criteria are highly applicable and meet Malaysia Green Building
Confederation (MGBC) standards. Based on selected related study, it is
imperative to apply and highly encouraging to implement green design in
interior design as it hold a significant sustainable awareness and
marketable values. |
|
|
Full Text |
|
|
Title: |
Stock
market component analysis using AHP and Markov chain |
Author (s): |
S. Sudharsun and
M. Renganathan |
Abstract: |
Stock Market is a huge area to perform Research works.
Prediction is one of the most important factors in Stock Markets, since
the shares of the companies are increasing or decreasing day by day and
it is necessary to safeguard the money of the investors. In this paper
we have focused on pharmaceutical field by selecting 15 companies within
this field. In order to predict the best performing company, AHP is
applied and hence the companies are ranked according to their
performances. AHP consists of Criteria’s and Alternatives. Fundamental
parts of the companies are taken as Criteria’s. Technical Part of the
Company is also considered and in order to select the best company
Artificial Intelligence is applied after combining both the results of
Fundamental and Technical parts. Application of Eigen Vector under
Markov Chain is applied to the result of AHP and share holding pattern
of the investor after a year is predicted. |
|
|
Full Text |
|
|
Title: |
Adaptive load balancing algorithm using modified resource
allocation strategies on infrastructure as a service cloud systems |
Author (s): |
Lavanya
M, Sahana V, Swathi Rekha K and Vaithiyanathan V. |
Abstract: |
Cloud computing is set of resources and services offered
by the Internet. Cloud computing provides its consumers to access
virtualized hardware, scalable, distributed and software infrastructure
over the internet. Load balancing is the method which is used to
distribute the task among multiple computers. Hence overload can be
avoided and can achieve minimum data processing time, optimal resource
utilization and minimum average response time. The existing Throttled
Load Balancing (TLB) algorithm exhibits some drawbacks. To overcome the
drawbacks in TLB this paper proposes an efficient scheduling algorithm,
which can support the load balancing and can provide better improved
strategies through efficient job scheduling, modified resource
allocation techniques and reduce the power usage and context switching
between the servers. Enhanced Throttled Load Balancing Algorithm
provides improved results to Throttled Load Balancing Algorithm. |
|
|
Full Text |
|
|
Title: |
Design
and simulation of cylindrical and sheet corner reflector Yagi-Uda
antennas for amateur radio application |
Author (s): |
Akella Jharesh, K. Ch.
Sri Kavya and Sarat K Kotamraju |
Abstract: |
Yagi-Uda antenna is the
most familiar high-gain antenna in HF, VHF and UHF bands. It is
popularly used by radio amateurs due to its less manufacturing cost and
simplicity in construction. In this paper, an additional corner
reflector is added to the conventional structure in order to improve the
gain and return loss of the antenna. Two types of corner reflectors,
namely Cylindrical and Sheet reflectors are proposed and designed using
HFSS software. The effects of reflector spacing and corner angle are
analyzed at 1 GHz and the results are tabulated. A corner reflector and
sheet reflector Yagi-Uda antennas are designed at a VHF frequency of
436MHz and results are presented. These antennas are proven to be more
suitable in the environmental conditions in the southern parts of India. |
|
|
Full Text |
|
|
Title: |
Feasibility of castella beam as a structural element to receive earthquake
load |
Author (s): |
Mara Junus,
Parung Herman, Tanijaya Jonie and Djamaluddin Rudy |
Abstract: |
The purpose of this study was to determine the ability of
castella beams can be used as a structural element to resist earthquake
load based on earthquake resistant building regulations applicable in
Indonesia. This research was carried out through testing castella beams
in the form of a portal with cyclic loading.
Solid beams steel used is
profiles IWF 200 100 5.5 8 fabricated became castella beam. Test beam
consists of a solid beam (NB) as a comparison and castella beams (CB).
The results showed that in terms of the flexure capacity, beam failure
at the ultimate load, partial ductility and full ductility meet the
requirements of SNI 03-1726-2003 on Earthquake Planning Procedures for
Building Resilience in Indonesia so castellabeam (CB) can be used as a
structural element to receive earthquake loads. |
|
|
Full Text |
|
|
Title: |
Design of
an HEMT based low noise L1-band amplifier for GPS reception |
Author (s): |
Joyal Joy and K.V.
Karthikeyan |
Abstract: |
GPS has evolved from a
military project to an invincible element of day to day life. The
accuracy of predicting the three factors of location, movement and time
transfer by a GPS device depend on its receiver quality. A front end of
a receiver primarily consists of amplifiers, filter and mixer. LNA is
the most important component of the front end as it dominates the
overall noise Figure as per the frii's formula. Here we discuss the
complete design of an LNA using Siemens CFY65 HEMT using Agilent
Advanced Design systems software at the L1 band of 1.575GHz. We obtain a
high gain of 15.85dB and very low noise Figure of 0.58 dB at the design
frequency. |
|
|
Full Text |
|
|
Title: |
Design
and implementation of PLL based frequency synthesizer with self
correcting DCO |
Author (s): |
V. Vinod Kumar and S.
Yogalakshmi |
Abstract: |
A phase-locked loop (PLL) is widely employed in wire line
and wireless communication systems. The poor device matching and leakage
current vary the common-mode voltage of a ring-based voltage-controlled
oscillator (DCO) wide frequency range. It may limit the oscillation
frequency range of a DCO and causes a DCO not to oscillate in a worst
case. To realize a wide-range PLL, the divider following a DCO should
operate between the highest and lowest frequencies. When a PLL works at
a higher frequency which the static circuits cannot operate, dynamic
circuits are needed. A true-single-phase-clocking (TSPC) divider is
widely used to realize a prescaler for this PLL. A TSPC prescaler must
work over a wide frequency range to cover the process and temperature
variations. For a TSPC prescaler, the undesired leakage currents may
limit its frequency range or alter the original states of the floating
nodes to have a malfunction. The leakage current and current mismatch in
a charge pump (CP) will degrade the reference spur and jitter
significantly. In the previous method to overcome the above problems, a
self-healing divide-by-4/5 prescaler and a self-healing DCO used. A
time-to digital converter (TDC) and a 4-bit encoder are used to quantize
the phase error and digitally calibrate the CP. In the existing method
the key parameter is to be changed is the modulus value of the prescaler.
By changing the value of the prescaler the PLL frequency range will be
extended. |
|
|
Full Text |
|
|
Title: |
Design of
modified 32 bit booth multiplier for high speed digital circuits |
Author (s): |
P. Nithiyanandham and
V. Balamurgan |
Abstract: |
This paper presents the design and
implementation of Advanced Modified Booth Encoding (AMBE) multiplier for
both signed and unsigned 32 - bit numbers multiplication the array
multiplier and Braun array multipliers perform multiplication operation
on unsigned numbers only. Thus, the requirement of the modern computer
system is a dedicated and very high speed unique multiplier unit for
signed and unsigned numbers. Therefore, this paper presents the design
and implementation of AMBE multiplier that can be suitable for the high
speed digital logic circuits. The Carry looks ahead Adder (CLA) tree and
the final Carry Look ahead (CLA) adder used in combination of CBEL
(Common Boolean Enable Logic) to speed up the multiplier operation.
Since signed and unsigned multiplication operation is performed by the
same multiplier unit the required hardware and the chip area reduces and
this in turn reduces power dissipation and cost of a system. |
|
|
Full Text |
|
|
Title: |
Multithreshold CMOS sleep stack and logic stack technique for digital
circuit design |
Author (s): |
M. Manoranjani and
T. Ravi |
Abstract: |
Power optimization is the major problem in
digital circuit design. In this paper using MTCMOS and stack techniques
are proposed. Multi threshold CMOS sleep stack and logic stack, super
cutoff sleep stack and logic stack are proposed. Stacking is introduced
in MTCMOS concept which decreases leakage power based on the power
dissipation of pMOS and nMO Stransistor. MTCMOS technique uses multiple
voltages in the circuit which is the main advantage of this. Power
dissipation, propagation delay and power delay product are calculated.
Constrains like power, delay is compared with the existing techniques.
It is proved that proposed technique is better than previous technique.
Simulation results are given using HSpice. |
|
|
Full Text |
|
|
Title: |
Highly
reliable low power MAC unit using Vedic multiplier |
Author (s): |
J. Elakkiya and N.
Mathan |
Abstract: |
An efficient high performance 64-bit MAC unit
(Multiplier-and-Accumulator) is presented. In most of the applications
Multiplier and Accumulator plays an important role. The existing method
is designed using Braun, dadda, etc., like different multiplier
architecture and compared the performance of MAC unit with those
multipliers. Hence it is vital to design a high-performance multiplier
to meet the needs like high speed, less delay, low cost and reduced
power. Therefore the proposed method is 64-bit MAC unit which is
designed using Vedic multiplier using URDHVA-TIRYAKBHYAM sutra. The main
objective of this work was to get an efficient MAC unit with less delay
and reduced power. Hence the MAC unit is analyzed using XILINX ISE 13.2
in Verilog HDL and simulated using MODELSIM SE 6.3g and QUARTUS II 9.0. |
|
|
Full Text |
|
|
Title: |
An over constrained optimization problem: The prolonged
autonomy bike (pa bike)
|
Author (s): |
Leonardo Frizziero and
Luca Piancastelli |
Abstract: |
The Prolonged Autonomy e-bike o PA-bike is
a e-bike that can use a traditional fuel to charge the battery during
run or at rest. In this way it is possible to prolong the autonomy of
the e-bike. A fuel cell with a reformer or a traditional very small
catalyzed piston engine can be used. In both cases the emissions are
very limited and the efficiency is very high, since the "traditional
fuel" motors work at constant optimum condition. This paper tries to
optimize the PA-bike by assembling commercial components. Outsourcing
for bicycles should be very easy since commercial part availability is
very high. Customization is a very common practice for bikers, since it
does not require authorizations. However the problem proved to be over
constrained. The commercial components, in particular the electric
motor, proved to be an important boundary condition. The result is a
single possible solution, or a category of solutions, all similar. This
is due to the fact that commercial components are highly standardized
for marketing reasons. |
|
|
Full Text |
|
|
Title: |
Factors
and antagonisms of development of innovative potential of
high-technology lines of industry of Russia in globalization conditions |
Author (s): |
Alina Y. Kazanskaya and
Vitaly S. Kompaniets |
Abstract: |
Within this investigation it is considered
the problem of detection and analysis of development factors of
innovative potential of high-technology lines of Industry of Russia. In
investigation the following problems were solved: carrying out the
analysis of structure and content of actual statistical data; evaluation
of achievement of running target indexes of Strategy of Russian
Federation innovative development for period till year 2020; revealing
and analyzing the factors and antagonisms of innovative development of
high-technology lines of economy of Russia. During investigation it has
been carried out the generalization of series of indexes of innovative
activity in Russian Federation, as a result the typology of innovative
activity kinds is improved; the specific singularities of structure and
dynamics of indexes of industry high-technology lines are excreted. The
conclusions received on poor efficacy of development of innovative
potential of Russian industry are confirmed by results of comparison of
Russia and some European countries per criterion of expenditures
intensity spend on technological innovations and quantum of new in the
market innovative goods. In structure of factors, obstructing the
technological innovations, the group of "informational" factors, as the
most flexible and perspective from point of view of possibilities of
development of innovative activity potential is evolved. As one of the
examples of "informational" factors development it is highlighted the
solution of problem of information support with use of ISP-technology.
Singularities of ISP-technology application are surveyed and the
possibilities of raising the production efficiency of science-intensive
production with their help are estimated. On the basis of revealed
modifications in cooperation structure of organizations, which are
realizing an innovative activity, the conclusion is drawn on models high
potential: the universities - the enterprises - the state (“Triad
spiral”), offered by Henry Etzkowitz. |
|
|
Full Text |
|
|
Title: |
Implementation of active storage in efficient virtual file system |
Author (s): |
C. Saranya, V.
Loganathan and S. Godfrey Winster |
Abstract: |
In present decades nearly all the
computation tasks use colossal volume of data. Moreover these
computation tasks are additionally of elevated performance. These tasks
transfer’s data from the storage node to the computing node. The data
transfer rate amid storage and compute nodes is elevated and to minimize
it the active storage was introduced. Active storage increases the
storage node’s processing power and it additionally reduces the web
traffic. Active storage was introduced in parallel file system’s like
lustre parallel file system, red hat GFS, etc. The proposal is to craft
n number of adjacent file system in windows working system. In this the
data can be stored and it does not inhabit space in the host system
drive or memory. The data stored in the file system ought to inhabit
less space for that the data is being compressed and then stored in the
file system. The data is additionally safeguarded by encrypting the data
before storing it into the file system. This file system is portable to
any other system. Our target is to make the file system to an active
storage. The file system is projected in such a method that it can
present effectual fetching of data from the file system. |
|
|
Full Text |
|
|
Title: |
Area
minimized FFT architecture using split radix algorithm for length
L=radix-3 and radix-2bx3c |
Author (s): |
Karthick
S. and Archana T. and Rekha P. |
Abstract: |
Fast Fourier Transform (FFT) is a most
proficient algorithm for computing the Discrete Fourier Transform (DFT).
FFT is specially used in analysis of autocorrelation, disambiguation,
recognition of patterns, statistics and data analysis. The new proposed
algorithm for computing a length L=2Bx3C
FFT. It is used to minimize the twist of hardware depict and arithmetic
operations. Additionally, the propound fragment design can accomplish by
the mixer of radix-3 and radix-2Bx3C FFT
algorithm. It is entirely changeable of Split Radix Fast Fourier
Transform (SRFFT) algorithm. As a consequence, the new proffer design of
length L is used to belittle the area of system on chips and
mathematical calculation. More compromise can achieve by combining the
two architectures implemented in the same FFT. It naturally furnishes a
broad selection of accessible length of FFT’s. |
|
|
Full Text |
|
|
Title: |
Congestion avoidance using blue algorithm in wireless network |
Author (s): |
A. Vijayaraj and
R.M. Suresh |
Abstract: |
In the existing system, the problem of TCP in MANET’s
environment is packet losses induced by network congestion. In case if
congestion occurs it leads to the loss of data. In the proposed system,
Blue algorithm is used for avoiding packet loss in TCP with wireless
network based on checking size of queue. If the size of queue is
maximum, gateway directly forwards the packet to destination through
queue. If the size of queue is minimum, gateway compresses the packet
and forwards the packet to destination with notification. Thus source
node efficiently sends packet to destination via gateway and queue. The
destination sends the acknowledgement to source via gateway. Gateway
checks the acknowledgement. If acknowledgement is positive, gateway
removes the packet from backup or if the acknowledgement is negative,
gateway retransmits the packet to destination. |
|
|
Full Text |
|
|
Title: |
Classification of sex chromosomes using SVM classifier |
Author (s): |
S.
Saranya, P.S. RamaPraba, S. Sathiya Priya and V. Loganathan |
Abstract: |
Scrutinize of chromosome is a preliminary procedure
to detect the most characteristic signs of a disorder that may require
for further investigation of medical applications mainly for cancerous.
Diagnosis of karryogram is generally very complex, eroding and a time
consuming operation. As of now it requires fussy attention to details
and calls for meritoriously and trained personnel. Normally chromosomes
are essential genomic information carriers which contain 23 pairs. This
paper suggests a efficient classifier Support Vector Machine (SVM) for
classifying chromosomes of 23 and 24 chromosome which is the
sex chromosome in which 23 is X chromosome and 24 is Y chromosome in
comparison to the already existing methods such as support vector
machine based medial axis and density profiles. The features are
extracted based on GLCM (Gray level co-occurrence) feature extraction
algorithm which is very effective well known for its high accuracy. X
chromosome features and Y chromosome features are extracted based on
very effective GLCM algorithm from the segmented image and GLCM features
of chromosomes are extracted from the segmented image. As a
prerequisite, image segmentation needs to be done by using Fuzzy - C
Mean (FCM) procedure to obtain efficient features in coordination with
SVM which is used to classify the chromosomes from the available pairs
of 23 chromoseomes. Using this methodology increased the accuracy of
classification results. Simulation results are carried out in MATLAB to
support the analysis. |
|
|
Full Text |
|
|
Title: |
Design
and simulation analyses of MEMS gripper with Aluminum and nickel alloys |
Author (s): |
S. Praveen Kumar,
T. Aravind, G. Karman Frances Raj |
Abstract: |
A novel MEMS based Electro thermal Gripper is proposed in
this paper, the gripper tool proposed in this paper is designed to
handle the micro objects of about 100-150 microns. The gripper tool
proposed in this article is materialized with Nickel Alloy of UNS
NO4400. The material proposed for the Gripper has better heat resistant
characteristics and can with stand the high potential applications. The
gripper designed is working on the basics of Pull actuation method from
the middle hinge part due to the applied potential. The gripper tool is
actuated for an applied potential of about less than 2 volts and mode
shape response of the gripper was analyzed under Dynamic frequency.
Comparative analyses also carried out between the different Gradients of
Aluminum and Nickel alloys and applied potential. The yield point
criteria analyses have been presented for the gripper with various
Gradient of Aluminum and Nickel Alloys. The entire TEM analyses of the
gripper tool are carried out with COMSOL multiphysics software. |
|
|
Full Text |
|
|
Title: |
Discovery
of related e-books using dependency structure matrix (dsm) and library
ontology |
Author (s): |
K.
Nanthini and R. Raja Ramya |
Abstract: |
Ontology is an apparent prerequisite for
conceptualization. It can be organized in hierarchical manner that
provides whole description about domain and their class
interrelationship. Now-a-days colleges maintain lot of e-books for each
department because students, research scholars and staffs are preferred
to use e-books. This paper mainly focuses on finding associated e-books
for their source e-book. The discovery of related e-books is recognized
by using ontology based text mining. First, specified pages of e-books
are extracted by using java library. An extracted page contents are
saved in text file. After that, content pages (tables of contents) are
mined using file concept. Next employ filtering to that mined content,
because that may holds special characters, chapter number and page
number. Using this content page wording, identify the class of e-books
ontology. Ontology is used to provide inferences about them. Furthermore
perform analysis of e-book’s content pages with one another and update
the DSM. DSM shows whether e-books are processed or not. This DSM is
converted into graph structure along with their dependency level.
Dependency level specifies the map of each e-book. DSM is automatically
updated when new books came to library. Graph structure also updated
with their dependency levels. |
|
|
Full Text |
|
|
Title: |
A dynamic
cognitive system for automatic detection and prevention of
cyber-bullying attacks |
Author (s): |
NaliniPriya G. and Asswini M. |
Abstract: |
The phenomenal growth of the social networking sites has
swept over the communication world. The rising popularity of the social
networking sites have also contributed to the rise in offensive
behaviours, giving birth to one of the most crucial problem called
cyber-bullying. Most of the social networking users would have
encountered a worst e-day experience .The victims of cyber-bullying,
widely being the adolescents, suffer deep scars which has led to
suicidal attempts in many cases. Detection of cyber-bullying has also
been a challenging issue for the researchers. A few automated methods
have been developed which mainly rely on textual features. This work
aims to improvise the detection of cyber-bullying by developing a
real-time application combining user based textual features along with
the social networking features such as number of circles, number of
contacts in the friend’s list, bonding with the friends. |
|
|
Full Text |
|
|
Title: |
A dynamic
tool for detection of xss attacks in a real-time environment |
Author (s): |
K.G. Maheswari and R. Anita |
Abstract: |
With the wide spread application of internet, the web
application have become a focal target for the attackers. The cross site
scripting attack popularly known as XSS attack takes advantage of the
web browser rather than the application itself. This poses serious
threat to the developers who got to ensure the security of the web
services. Web intrusion detection systems are security programs that
help the developers as well as the customers to evaluate whether events
and activities occurring in a Web Application are legitimate. The
objective of Web IDS is to identify intrusions with high false alarms
and low detection rate while consuming minor properties. The proposed
work presents an intrusion detection system that analyzes web requests
looking for evidence of malicious behaviour and provides a sophisticated
query analysis. The injection of vulnerabilities and attacks is indeed
an effective way to evaluate security mechanisms and to point out not
only their weaknesses but also ways for their improvement. This work
tried a solution for the vulnerable web attacks through real time tools
such as DVWA and XSS Me. |
|
|
Full Text |
|
|
Title: |
A novel
method of security and privacy for personal medical record and DICOM
images in cloud computing |
Author (s): |
C. Gunamalai and S.
Sivasubramanian |
Abstract: |
Cloud computing is a emerging technology that allows us
access the shared resources which was stored in the cloud data center.
Several healthcare centers store the patient’s Personal Medical Record
and DICOM (Digital Imaging and Communications in Medicine) images in the
cloud data center. Using cloud data center healthcare center would
benefit of low cost, availability and disaster recoverability. The main
idea of this paper is the various healthcare centers from different
places can easily access and use the patient’s information for their
treatment. Healthcare center and registered in the outsourcing
organization in the cloud. This outsource organization provide access
right to registered health care centers through Two Way Authentication.
First step is a conformist one where the user enters his user id and
password, if it matches with the stored database of the cloud then they
proceed of authentication, the second step is the database triggers an
application which generates a dynamic password. This pass word is sent
to the user on his personal mobile as a message or an e-mail. The second
security method is Column Based Encryption (CBE). Using CBE, access
policies are expressed based on the attributes of handlers or data,
which enables a health center to selectively share their Personal
Medical Records and DICOM image among a set of users by encrypting the
file under a set of attributes or columns. |
|
|
Full Text |
|
|
Title: |
Improving road safety for pedestrians in black spots using
a hybrid VANET of vehicular sensors and pedestrian body unit |
Author (s): |
Dahlia Sam, Esther
Evangelin and V. Cyril Raj |
Abstract: |
With the rapid explosion of population,
usage of motor vehicle is also increasing. This has been causing a serious
issue in road safety for the past few decades. Road pedestrian injuries
and death rate is also rising day by day. The research on traffic
accidents shows a clear concentration of crashes happening in Black
Spots. Accident black spots include steep slopes, a hidden junction,
sharp corners in straight road, curvy roads concealed warning signs or
situations where the oncoming traffic is not visible. The histories of
traffic accident in the recent years have established a dependency
between the accident and the reaction time of the involved persons. This
is mainly due to tensed reactions of the drivers or pedestrians that
come spontaneously while facing a real time potentially dangerous
scenario. In this paper we provide a solution by proposing a Hybrid
VANET based driver alert system. An alert given to the drivers ahead of
time gives a better chance for the driver’s toreact in a way as to avoid
accidents. The system is designed by integratinga pedestrian body
unitalong with the vehicular nodes in a VANET. The signals sent by the
pedestrian body unit are received by the vehicular nodes in the VANET
and are given as input to the alert system. This alert wills notify the
drivers about surrounding pedestrians, which in turn gives him more
reaction time. The system was simulated anda laboratory demonstration
was also done. It all proved that the system was able to reduce the
chances of accident drastically with the alert system. |
|
|
Full Text |
|
|
Title: |
Inventive
technique, research and development of software analyzing atmosphere in
cloud computing equipment for responsible resemblance and allocated
systems |
Author (s): |
S.
Ravichandran, M. Umamaheswari and A. Vijayaraj |
Abstract: |
Software analyzing
defines an essential element of the software engineering and an
imperative connection that the software growth quality was pledged. The
judicious model for software testing can decrease the costs of analyzing
in the progressing action in the sequence of analyzing is hence tumbling
price of software enhancement. Here an article, to propose prototypical
aimed at software analyzing that run throughout every stages of the
software growth cycle. It can seek and locate the fault in the software
the moment is possible and the situation will shorten the period grasped
on behalf of analyzing inside the sequence of that enhancement for the
software analyzing effectively, completely related that the pattern
these analyzing strategy when improves ERP technique then formerly
obtain the principle solution. Various information systems are
extensively consumed in communication humanity, and the extremely
responsible system is expanding year afterward year. While the software
analyzing for each system develops extra complex because of that
improvement then and there intricacy for that technique. The situation
is overly incomprehensible check resemblance and allocated methods
necessarily while responsible methods for example penetrating servers
regularly mode resemblance besides allocated methods. Toward explain
that troubles, expect the software analyzing atmosphere going to
responsible resemblance then allocated method consuming that cloud
processing equipment that is Data-Cloud (D-Cloud). Data- Cloud comprises
Eucalyptus because that the cloud managing software, then Fault Virtual
Machine founded upon Queue Emulator (QEMU) because the essential
software, besides Data-Cloud platform aimed at understanding the
analysis state. The Data-Cloud permits because computerizing this method
pattern then this analysis method but then completes many analysis
situations concurrently, formerly improve the hardware responsibilities
adaptable. Here an article, current thought besides proposal for the
Data-Cloud, then define exactly adjust this method pattern then analyze
state. Moreover, trivial analyze sample so the software analyzing
intense Data-Cloud organized. These solution indications this Data-Cloud
permits establish this atmosphere was effortlessly, besides toward check
this software analyzing of allocated method. |
|
|
Full Text |
|
|
Title: |
Preventing data transmission by misbehaving nodes in DTN |
Author (s): |
B. Sakthisaravanan, R.
Meenakshi and V. Priya |
Abstract: |
Selfish and Malicious nodes (referred as misbehaving)
present in the Delay Tolerant Network (DTN) results in insecure data
transmission resulting in the packet loss .Currently the misbehaving
nodes are identified only after data transmission. For this purpose
Information Centric Network (ICN) is used along with DTN .ICN has a
property of interactivity and it also supports mobility of nodes. Hence
ICN identifies about misbehaving nodes in the path before the data
transmission so that alternative path is chosen. Hence ICN avoids
misbehaving nodes and the packet reaches the destination safely. This
paper will be implemented in two parts. In the first part the
misbehaving nodes are identified by DTN .A new load balancing concept is
introduced in order to handle traffic. In the second part misbehaving
nodes are intimated in advance by ICN and hence alternative path is
chosen for the packets so that further transmission by misbehaving nodes
is prevented. |
|
|
Full Text |
|
|
Title: |
Providing
privacy and personalization in search |
Author (s): |
T. Mercy Priya and R.M.
Suresh |
Abstract: |
The Aim of this project is to construct a PWS framework
called UPS that can generate a profile for the given user queries. The
framework works in two phases, online phase and offline phase. The PWS
is a search technique which provides a better search result which will
satisfy the user needs. Here a personalized web search is provided
without affecting their privacy. This work has supported to expose the
user profile at run time with the given user query and to personalize
it. For the PWS the semi structured data is indexed with RDF. Here we
use two greedy algorithms, namely Greedy DP (Discriminating Power) and
Greedy IL (Information Loss). These algorithms are used in the run time
generalization. |
|
|
Full Text |
|
|
Title: |
Reducing
the energy consumption in wireless sensor networks using sink
relocation mechanism |
Author (s): |
S. Vidhya T. Sasilatha and Arun Kumaar |
Abstract: |
Base Station (BS) location and physical topology of a
network play an important role in a Wireless Sensor Networks (WSN)
because the BS position governs the lifetime of networks. Optimizing the
topology reduces the issues that arise due to the location of the
destination node. During network formation, some nodes have tends to
have that have longer distance to BS. In this case, data has to travel a
longer distance to reach a BS. The node failure in WSN occurs majorly
due to the exhaustion of the battery and replacing this is a difficult
task. Therefore, these long transmissions have effects on network’s
lifetime by wasting node’s energy. This can be overcome by relocating
the BS using a clustered WSN. This proposed approach discussed about all
possible locations to find the optimal position of BS in Low energy
Aware Clustering hierarchy (LEACH) which is an energy-efficient protocol
and shows the effects of BS Location in the WSN and the obtained results
are compared with the original Leach and Leach-B. |
|
|
Full Text |
|
|
Title: |
Route
reliability ranking algorithm for prefix hijacking attacks in border
gateway protocol |
Author (s): |
C. Siva and S. Arumugam |
Abstract: |
Prefix-hijacking
attack offers malicious parties to gain access to untraceable IP
addresses in Intenet. Border gateway protocol (BGP) is the dominant
inter domain routing protocol used in Internet. In this paper, to defend
against Prefix Hijacking Attack on border gateway protocol (BGP), we
propose to design a route reliability ranking (RRR) algorithm. The
algorithm is used to authenticate the validation of a routing update
based on the common facts of the autonomous systems (AS’s) in the
network. After RRR, an incentive based route selection mechanism is
performed to identify the suspicious candidates and avoid routes
propagated by them. By simulation results, we show that the proposed
algorithm is efficient defensive technique for prefix hijacking attack
in Internet. |
|
|
Full Text |
|
|
Title: |
A self
regulating tool to characterize an abnormal retina from a normal retina
using neural network |
Author (s): |
L. Reshma and R. Ramesh |
Abstract: |
Diabetes Mellitus is the most complicated proliferative
health issue all through the world. The International Federation
Committee of diabetes had made an analysis with reference to the
diabetic sufferer count and had concluded that more than 199 million
people deteriorate from diabetic complications globally and it is
expected to surge to 366 million by 2030. Diabetes Mellitus is the
leading cause for Retinopathy. It is the dominant proliferative eye
problem and it is one among the extensive reason for the loss of
eyesight. Eyesight problems can be abstained potentially by detecting
the signs of retinopathy at an earlier stage. Microaneurosyms and
Exudates are the emerging signs of Diabetic Retinopathy. Presently the
lesions are observed and detected manually and this detection is not so
useful for the mass eye screening programs. A huge group of research
community are involved in the process of designing an automatic tool to
individualize a deficient retina from the normal retina which provides a
complete solution for all the retinal problems and to also solve the
issues in terms of time and cost and to satisfy the needs of
ophthalmologist. In this paper the necessary region are segmented and
are given as the input to the neural network which uses the construction
neural network algorithm with back propagation technique in order to
classify the retinopathy level. This automatic tool will individualize
the patients on the basis of their retinopathy level and it will be
useful for the doctors to describe and analyze the inmate conditions
more accurately.
The prospect of blindness can be probably diminished by detecting the
retinopathy at an earlier stage. |
|
|
Full Text |
|
|
Title: |
Security
and energy efficiency based EC-MAC protocol for sensor wireless networks |
Author (s): |
R.G. Nishaa and P. Latha |
Abstract: |
Security as well as energy consumption is the main
components of wireless sensor network. Sensor node has the main
functional component present in the WSN. In order to improve the
efficiency of energy consumption, enhanced version of (EC-MAC) is
proposed. Emergency Code-Medium Access Control (EC-MAC) is responsible
for emergency purposes. The proposed MAC protocol is designed using the
Carrier Division Multiple Access (CDMA) mechanism. CDMA can be used to
enable multiple users to access shared medium without interference. The
main resource of EC-MAC protocol is well suited to change the topology
in MAC protocol during emergency mode. The MAC behaviour changes during
the change in the topology and may inject the data detection. In order
to address these issues, Fuzzy-Concealing Sink Hole (F-CSH) may be used
to find the location of the main sink using the fake sink holes to
anticipate the traducer to turn the network to deplete the node energy
and abunding the network with bogus data. RSSI may be used to estimate
the distance between the two nodes during the data transmission. |
|
|
Full Text |
|
|
Title: |
Service
recommendation system in social networks |
Author (s): |
Sandra Elizabeth Salim
and R. Jebakumar |
Abstract: |
Social networks have become an inevitable part of today’s
life. The content from social media can be used for a number of
purposes; one of the main being recommendation systems (RS). Traditional
recommendation systems ignored the concept of social media and its
influence on people. There have been a lot of RS in industry since the
last decade. In this paper, we have proposed a new system called Service
Recommendation in Social Networks (SRSN) based on a keyword approach
which overcomes the drawbacks of current generation of RS. It utilizes
the concept of user based collaborative filtering algorithm (UCF) in
generating recommendations. SRSN is designed to work in big data
environments as it is implemented in Hadoop, a map reduce paradigm. |
|
|
Full Text |
|
|
Title: |
An
improved approach for detection and classification of vehicles in video
using support vector machines |
Author (s): |
Selvanayaki K. S. and Somasundaram R. M. |
Abstract: |
Deployment of effective surveillance and security
measures is important in these days. The system must be able to provide
access and track movement of different types of vehicles and people
entering the secured premises, to avoid any mishap from happening. There
are many existing approaches which are used for tracking objects. Edge
matching, Divide-and-Conquer search, Gradient matching, Histograms of
receptive field responses, Pose clustering, SIFT; SURF etc are some of
the approaches applied. All these methods are either Appearance based
methods or Feature based methods. They lag in one or the other way when
it comes to real time applications. So there has been a need for
creating a new system that could combine positive aspects of both the
methods and increase the efficiency in tracking objects, when it comes
to real life scenario. A novel approach for car detection and
classification is presented, to a whole new level, by devising a system
that takes the video of a vehicle as input, detects and classifies the
vehicle based on its make and model. It takes into consideration four
prominent features namely Logo of vehicle, its number plate, colour and
shape. The classification is done by a very efficient algorithm called
Support vector machines. Experimental results show that our system is a
viable approach and achieves good feature extraction and classification
rates across a range of videos with vehicles under different conditions. |
|
|
Full Text |
|
|
Title: |
Experimental investigation of alkali-activated slag and flyash based
geopolymer concrete |
Author (s): |
S. Aravindan and
Jagadish. N |
Abstract: |
This paper investigates
about the long term strength and durability properties of
Alkali-Activated and Flyash based Geopolymer Concrete comparing with the
conventional concrete of M40 grade. The Alkali activators are prepared
by combining sodium hydroxide and sodium silicate solution in the ratio
of 2.5 and molarities are 12M and 16M by varying two different curing
regims namely dry curing and open air curing. Totally nine mixes were
prepared with Naoh concentration of 12M and 16M was compares with two
curing regims namely open air curing and dry curing . Split tensile
strength, flexural strength and durability tests namely rapid chloride
permeability tests (RCPT) and sorpitivity tests were conducted on 56 and
90 days. Compressive strength tests were carried out on 14, 28, 56 and
90 days. The investigation resulted that there is increase in strength
characteristics with increase in concentration of sodium hydroxide
solution and open air cured specimens gained more strength than dry
cured specimens. However the sorptivity and rapid chloride permeability
test results were not found to perform good due to cracking of surface.
When compared with conventional concrete results the strength gained is
more in AAS-FA based geopolymer concrete. Also the utilization in
construction field is easy since it is Ecofriendly and convenient curing
process. |
|
|
Full Text |
|
|
Title: |
Efficient
server load balancing through improved server health report |
Author (s): |
Saifullah M. A. and M.A. Maluk Mohammed |
Abstract: |
To achieve scalability
and high availability of the service offered by web server clusters, an
efficient server load balancing policy is required. A critical part of
the load balancing policy is to find the best available server to assign
the load. For that, server load needs to be calculated. In this paper,
the parameters required to assess the load of the server are explored.
An important load parameter, ‘number of open file descriptors’ is
identified to find the load on a server along with existing load
parameters, CPU cycles and free memory. The server load reporting is
improved by extending SNMP agent to report server resources including
‘number of open file descriptors’. Performance metrics used in test
scenarios are: Throughput, HTTP Response Time and Error rate and
Normalized Throughput. Tests were done in two different scenarios:
normal condition scenario and the other scenario with high load on web
servers. The load balancing results of the server cluster by comparing
our implementation with known load balancing algorithm used on
web-clusters, Round Robin (RR) and state full algorithm Least
Connections (LC) are described. Our experimental results show that the
previously mentioned algorithms can be outperformed by our proposed
adaptive mechanism, Scalable Load BaLancing (SLBL) algorithm. Our
experimental results show that the performance of the cluster of web
servers is significantly improved by the proposed adaptive algorithm
SLBL over the existing algorithms, RR and LC. The average service
request rate that can be serviced by the SLBL algorithm is around 1.27
times more than that of LC and around 1.93 times more than that of RR.
|
|
|
Full Text |
|
|
Title: |
Blowfish
encryption algorithm for information security |
Author (s): |
Saikumar manku
and K. Vasanth |
Abstract: |
In this paper, a Blowfish encryption
algorithm for information secruity is designed and analyzed. The work is
done for networking and communication
application for enhanced network security and defence applications. In
the proposed Blowfish algorthim reduce rounds of algorithm and proposed
single blowfish round. The design simulation is done by Xilinx ISE
software using the language of VHDL. Cryptography is the one of the main
categories of computer security that converts information from its
normal form into an unreadable form. its ability to secure the protected
data against attacks and its speed and efficiency in doing so. |
|
|
Full Text |
|
|
Title: |
Numerical solution of sixth order boundary value problems
by Petrov-Galerkin method with quartic b-splines as basis functions and
sextic b-splines as weight functions |
Author (s): |
K.N.S. Kasi Viswanadham
and S. M. Reddy |
Abstract: |
This paper deals with a finite element method involving
Petrov-Galerkin method with quartic B-splines as basis functions and
sextic B-splines as weight functions to solve a general sixth order
boundary value problem with a particular case of boundary conditions.
The basis functions are redefined into a new set of basis functions
which vanish on the boundary where the Dirichlet and Neumann type of
boundary conditions are prescribed. The weight functions are also
redefined into a new set of weight functions which in number match with
the number of redefined basis functions. The proposed method was applied
to solve several examples of sixth order linear and nonlinear boundary
value problems. The obtained numerical results were found to be in good
agreement with the exact solutions available in the literature. |
|
|
Full Text |
|
|
Title: |
Design
and fpga implementation of soft loop handle fixing machine |
Author (s): |
K. S. Raja and K. Vasanth |
Abstract: |
There is a rapid growth in the extreme
increase in Industrial production, particularly in the domain of
Automation process. This is due to the extensive involvement of
Automation which is possible in the industries and the ease of
maintenance. This leads to an efficient way of improving the production
of the industrial process and reduces number of workers. Hence this
paper brings out the flexibility of Field Programmable Gate Arrays which
used to control two machines loop fixing machine, bottom sealing and
cutting machine. Here we use the pneumatic functions instead of motor
which controls the machine through FPGA and helps to reduce the power
consumption. The design has been described using VHDL (VHSIC Hardware
Description Language) and implemented in hardware using FPGA (Field
Programmable Gate Array). |
|
|
Full Text |
|
|
|