ARPN Journal of Engineering and Applied Sciences                ISSN 1819-6608 (Online)
 

 
GoogleCustom Search
 
 
 
ARPN Journal of Engineering and Applied Sciences                                     July 2015  |  Vol. 10  No. 13
   
Title:

Performance improvement through scalable design of hybrid service discovery protocol

Author (s):

Anish Pon Yamini K. and T. Arivoli

Abstract:

Hybrid protocol is a blending of proactive and reactive routing approaches. This can be achieved by keep up-to-date topological map of a node centric zone. Initially the routing is accomplished with some proactively explored routes and then functions based on the demand from the nodes that are additionally activated by means of reactive flooding. In the proposed protocol a scalable design of hybrid service discovery protocol for efficient discovery of services is proposed. In the proposed protocol the zone size can be adjusted based on the overhead. The prediction technique is used here to predict the proactive as well as reactive overhead. The results show the scalability of the protocol. Thus adjusting the zone size improves the throughput, packet delivery ratio and reduces the number of control packets and end-to-end delay comparing to the existing approach.

   

Full Text

 

Title:

A comparative study of sequential algorithm and shortcut routing algorithm on multiple traveling salesman problem

Author (s):

Kalaiarasi, P. Sriramya and R. A. Karthika

Abstract:

Multiple Traveling Salesmen Problem is a complex problem that is to assign a route for the salesman who visits the city having difficulty in the congested roads. The existing Sequential Algorithm is used to select the best path and also manages time complexity in the application but this reduces performance of the salesmen by not providing path equally to the salesmen. So the paper shows how the Shortcut Routing (SR) algorithm provides the best result compare than present algorithm. The main purpose of this algorithm is to gain the solution and also satisfying the problem without doing any changes in the limitation of an application. The final result gives best path and also it reduces time complexity.

   

Full Text

 

Title:

Investigation of tensile property of nylon – glass fiber polymer matrix composite

Author (s):

R. Srimurugan, B. VijayaRamnath and N. Manoharan

Abstract:

In this work   nylon 6 and E-glass fibre are combined together to get a polymer matrix composite. Nylon 6 gives the composite a high strength which is widely using in gears and in many automotive industries. Due to low cost, high strength and high stiffness, E-glass is used along with nylon 6. Twin screw extrusion process – an injection molding technique was used to fabricate the polymer composite with varying compositions with nylon 6 80% and   Glass fibre with 20% . The tensile behavior of the composite was investigated.

   

Full Text

 

Title: GT heuristic for solving multi objective job shop scheduling problems
Author (s):

M. Chandrasekaran, D. Lakshmipathy and P. Sriramya

Abstract:

The n-job, m-machine Job shop scheduling (JSP) problem is one of the general production scheduling problems in manufacturing system. Scheduling problems vary widely according to specific production tasks but most are NP-hard problems. Scheduling problems are usually solved using heuristics to get optimal or near optimal solutions because problems found in practical applications cannot be solved to optimality using reasonable resources in many cases. In this paper, optimization of three objectives mean job flow time, mean job tardiness and makespan are considered. New Game theory based heuristic approach (GT) is used for finding optimal makespan, mean flow time, mean tardiness values of different size problems and generating a feasible schedule that minimizes three objectives. This schedule is called a Pareto optimal solution. A set of non-dominant solutions have been identified using Naive and Slow approach. The findings are compared with Genetic Algorithm (GA) that tested the same problems. The proposed GT heuristic is competent and proves to be a good problem-solving technique for multi objective optimization in job shop scheduling.

   

Full Text

 

Title:

Reduction of paper in orthogonal frequency division multiplexing using optimal search partial transmit sequence technique

Author (s):

T. Jaya, V. Margaret Suganthi and E. Gopinathan

Abstract:

Orthogonal frequency division multiplexing is one of the modulation techniques used as a high speed transmission technology with good interference reduction properties. High peak to average power ratio (PAPR) in transmitted signal is one of the major disadvantages of OFDM technique. We propose a optimal search algorithm called Partial Transmit Sequences (OSA-PTS) is used to reduce peak to average power ratio. The proposed new OSA-PTS method is a very effective in reducing the high peak to average power ratio during transmission. The earlier method is selective mapping (SLM) technique has the disadvantage that it requires high computational complexity which increases with increasing number of sub blocks. The new optimization search algorithm based partial transmit sequences method is used to reduce the high peak to average power ratio with low computational complexity. The output response of proposed new optimal search algorithm provides better PAPR reduction in the transmitted signal compared to the existing SLM method.

   

Full Text

 

Title:

Kenaf fibre reinforced composites: A review

Author (s):

V. R. Raman Bharath, B. VijayaRamnath and N. Manoharan

Abstract:

Natural fiber composites are nowadays playing a vital role in automotive and construction industries. Various natural fibers namely, jute, sisal, kenaf, abaca, hemp and banana are widely used in industries for making composite which are fabricated by either hand layup method or by other mechanized methods. Among the various fibers, kenaf fibers have vast applications in automotive industries. They have indisputable advantages over synthetic reinforcement materials. They are economical, non-toxic with low density. They have very good strength and are associated with less waste disposal problems. This paper aimed to review the properties and applications of kenaf fibre reinforced polymer composites to provide a platform for further research in this area.

   

Full Text

 

Title:

Optimization of nozzle: Convergence using ANSYS with RSM, MOGA

Author (s):

S. JerinWinne and M. Chandrasekaran

Abstract:

In this paper, a multi objective optimization based on Genetic Algorithm, Response Surface Method and Design of Experiments are adopted in order to calculate the optimal CFD model parameters, retaining the convergence. Objective functions to be optimized simultaneously in such a real world complex multi-objective optimization problem. These objective functions are either obtained from experiments or computed CFD approaches, unless a simple but effective meta-model is constructed over the response surface from the numerical or experimental. So that modeling and optimization of the parameters is investigated by using ANSYS. An ANSYS FLUENT software package is utilized to simulate the viscous gas flow-field in the nozzle; the Response Surface Methodology (RSM) applied for the reason of performing a multi-objective optimization.

   

Full Text

 

Title:

A host-mortal commensal eco-system with harvested host- Phase plane analysis

Author (s):

N. Seshagiri Rao, K.V.L.N. Acharyulu and K. Kalyani

Abstract:

In this paper we discussed about the stability nature of the biological system containing two species commensal and the host where as the host species is being harvested at a constant rate. This model is developed by a couple of first order non linear differential equations. The behavior of this biological system is observed  based on the equilibrium points, threshold regions and threshold diagrams by taking existed values of the equilibrium points to the parameters in the dynamic model equations.

   

Full Text

 

Title:

Evaluation of mechanical properties of human hair-bombyx mori silk fiber reinforced epoxy based biocomposite

Author (s):

C. Elanchezhian, B. VijayaRamnath, M. U. Sughan, K. Suseetharan V. Varun Kumar, R. Vezhavendan and R. Kaosik

Abstract:

Awareness about environmental degradation and a need for a consistent sustainable development for the betterment of the environment, has a direct influence over replacement of synthetic fibres by natural fibres. Extensive research work has been carried out on plant fibre based biocomposites. Hence our research work is based on fabrication and investigation of mechanical properties of animal fibre based biocomposites. Out of a wide variety of animal fibres, the fibres chosen by us for this research work were Bombyxmori silk and human hair which constitutes the dispersed phase, and the matrix phase is formed by epoxy resin. One of the reasons for selection of hair as a reinforcement material is due to the fact that human hair is continuously generated as waste in large quantity and there is a need to devise a novel method to effectively utilize this waste. Silk fibre was selected owing to the extensive properties possessed by it.  Fabrication was done by hand layup technique in which three samples were manufactured. One sample was silk based biocomposite, another was hair based biocomposite and the third was hybrid biocomposite made from hair and silk fibre. Alternate vertical and horizontal orientations of fibres was introduced to improve the mechanical strength at inter laminar level. The biocomposite was tested for mechanical properties like tensile strength, compressive strength, flexural strength, impact strength and hardness. Mechanical tests conducted showed that silk based biocomposite was better in compression, flexural and impact strengths. Hair based composite showed higher tensile strength and it had highest break load. Hardness was same among all the three composites as it is a property exhibited by the matrix material constituted by epoxy resin. Analysis of hybrid composite showed that properties of hybrid composite were in between that of silk and hair composite. Hence it is suggested that hair may be included in the composite to reduce the overall cost of the composite, considering the exorbitant cost of silk.

   

Full Text

 

Title:

Single speed gear box optimization using genetic algorithm

Author (s):

M. Chandrasekaran, Padmanabhan S. and V. Srinivasa Raman

Abstract:

Gears are used in almost all mechanical devices and they do several important jobs, but most important, they provide a gear reduction. This is vital to ensure that even though there is enough power there is also enough torque. Gear box has to produce maximum power with minimum weight. In many real-life problems, objectives under consideration conflict with each other, and optimizing a particular solution with respect to a single objective can result in unacceptable results with respect to the other objectives. Multi-objective formulations are realistic models for many complex engineering optimization problems. A reasonable solution to a multi-objective problem is to investigate a set of solutions, each of which satisfies the objectives at an acceptable level without being dominated by any other solution. In this paper, genetic algorithms developed specifically for a single speed gear box problem with multiple objectives.

   

Full Text

 

Title:

Mammogram enhancement using quadratic adaptive Volterra filter- A comparative analysis in spatial and frequency domain

Author (s):

G. R. Jothilakshmi and E.Gopinathan

Abstract:

Early breast cancer in women can be detected efficiently, by processing Mammograms in an effective way. Mammographic images are generally noisy with poor radiographic resolution and low contrast, due to ill-performance of X-ray hardware systems. This leads to improper visualization of lesion detail. Generally Non-linear filters are preferred for image enhancement applications.  Because they provide better filtering results not only by suppressing background noise but also preserving the edges. In this paper, an Adaptive Volterra filter is used for contrast enhancement of mammograms. A mammogram image which is affected by three types of noise individually like Gaussian, poison, white noise is considered. These noise elimination are done using adaptive Volterra filter and the performance of adaptive Volterra filter is compared with other spatial nonlinear filters like mean, median, min, max filters. The noisy mammogram is enhanced with five different filters in frequency domain which includes Volterra, Median, Min, Max, Mean filters. The comparison between spatial and frequency domain enhancement is done using five different filters with three types of noises. The performance measures like Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE) are computed and presented in this paper.

   

Full Text

 

Title:

Evaluation of mechanical properties of kenaf based hybrid composite for automotive components replacement

Author (s):

C. Elanchezhian, B. Vijaya Ramnath, Kaosik R., Nellaiappan T. K. Santhosh KumarK., Kavirajan P. and Sughan M. U.

Abstract:

Tremendous growth of science and technology over the past few decades demands a new and hybrid material to meet variety of purposes. Composite materials are one among those new emerging engineering material which plays a major role in automotive parts. Thus our project is based on evaluating the mechanical properties and behavior of kenaf, banana, and neem fibres as hybrid composites which in case proposed for automotive components. These three were the dispersed phase and the epoxy resin as the matrix phase. We chose kenaf as the main reinforcement material as it does have promising properties on impact and tensile which are the most important while considering automotive components. The samples were made by using hand layup technique which is the conventional way of producing hybrid composites. Three samples were made. The first sample was made with kenaf fibre/ GFRP, another was with kenaf and banana fibres and the third was with kenaf and neem fibres. Thus the mechanical properties and behaviors of these samples were identified by Tensile, Impact, Flexural and Hardness tests and these properties were compared with existing automotive component properties.

   

Full Text

 

Title:

Swarm intelligence optimization of worm and worm wheel design

Author (s):

M. Chandrasekaran, Padmanabhan S. and V. Srinivasa Raman

Abstract:

The problem of optimization of gears is difficult to solve. Indeed, the objectives are many and they require a multicriteria optimization. The compromise between the various objectives is not easy to find because the optimization criteria are often contradictory. In addition, there are a large number of design variables, and the majority of these variables takes discrete values. Worm and worm wheel drives are normally used for non-parallel, non-intersecting, right angle gear drive system where high reduction ratios are involved, though they are also employed with low to medium speed reducers in many applications. In this paper an attempt has been made to optimize worm and worm wheel design using conventional tool LINGO and heuristics as Particle Swarm Optimization (PSO) algorithms. A combined objective function which maximizes the Power, Efficiency and minimizes the overall Weight, Centre distance has been considered in this model.

   

Full Text

 

Title:

Adaptive modulation and rate coding multi carrier code division multiple access technique for 4G mobile communication systems

Author (s):

T. Jaya and E. Gopinathan

Abstract:

Future mobile communication requires 100 Mbps data rate, video and audio streaming, asymmetric, multiple access, adaptive modulation and code rate, dynamic packet arrangement, adaptive antenna and IPv6 utilization facility to enhance lossless communication. We propose an Adaptive Modulation and Rate Coding Multi Carrier Code Division Multiple Access (AMRC-MC-CDMA) technique is a promising way to increase the data rate with reliable transmission over wireless channels. In this paper, we present various digital modulation techniques such as BPSK, QPSK and M-aryPSK systems applied to a coded MC-CDMA system in an AWGN channel environment. This method compares the Bit Error Rate Performance of various code rates using MC-CDMA technique and finally choose the best code rate to achieve better BER performance. It is found that the proposed method gives the optimum performance compared to the conventional MC-CDMA system used in fourth generation.

   

Full Text

 

Title:

Experimental investigation on flexural property of abaca and raffia hybrid composites

Author (s):

P. Sathish, R. Kesavan and B. VijayaRamnath

Abstract:

Presently natural composites are playing vital role in automotive industries. Due to their high specific strength and modulus, they are replacing many metallic structures. This paper deals with fabrication and investigation of flexural property of natural fibre composites using abaca and raffia fiber. In this work, the composite is manufactured by hand layup process. Three different types of composites were fabricated and their flexural property was investigated. The result shows that the Raffia - glass fiber composite has very high strength as compared to other two composites. Morphological analysis was carried out to analyze the internal structure of tested specimens.

   

Full Text

 

Title:

Software defined radio implementation in 3GPP systems

Author (s):

R. Janani, A. Manikandan and V. Venkataramanan

Abstract:

Radio frequency can be accessed by computer through Universal Software Radio Peripheral (USRP) hardware device capability, and it is expensive for laboratory experiments, but Family Radio Service/General Mobile Radio Service (FRS/GMRS) does not use the hardware component. Software Defined Radio (SDR) provides the platform through Mat lab/Simulink tool and this is possible by the IEEEP1900.1 group. Software Defined Radio (SDR) allows different modulation technique such as Analog modulation, Quadrature phase shift keying (QPSK), Differential Binary Phase Shift Keying (DBPSK) and the Differential Quaternary Phase Shift Keying (DQPSK) implementation in the design and limitations need to overcome are hardware requirement, communications distance, static frequency offset and time-varying symbol delay through the enhancement in the receiver part. Here analog modulation (amplitude) is implemented with enhancement in the receiver part.

   

Full Text

 

Title:

Geote leashes security in MANET

Author (s):

V. Dhanakoti, D. Nivethaand and D. Keerthika

Abstract:

The network which is infrastructure less and connecting a mobile device by wireless is called a Mobile Ad-hoc Network (MANET). Because of its fundamental characteristics like open peer-to-peer architecture, shared wireless medium, stringent resource constraints, highly dynamic network topology, nodes openness to physical capture, etc. MANET becomes vulnerable. An important service for all kind of network communications is its Security. In MANET, security service is not available. So, MANET should improve its security to make the communication confidential. This paper is about different assaults including MANET assaults and its detection schemes which are useful to avoid unwanted assaults.

   

Full Text

 

Title:

Experimental investigation on delamination behaviour of abaca based hybrid composites

Author (s):

P. Sathish, R. Kesavan and B. VijayaRamnath

Abstract:

Currently, the development of newer materials is gaining momentum as the automotive industries are mainly focusing on introducing bio degradable materials for their components. In this regard composite materials are playing a vital role. Among the various types of composites, natural fiber composites which use natural fibers like jute, abaca, raffia and neem are widely used in various automotive industries.  This paper aimed to fabricate and investigate delamination behaviour of abaca-raffia hybrid composite. In this work, hand layup process is used to fabricate the composites.

   

Full Text

 

Title:

Providing password security by salted password hashing using Bcrypt algorithm

Author (s):

P. Sriramya and R. A. Karthika

Abstract:

World Wide Web has become a popular medium to search information, business, trading and so on. Various organizations and companies are also employing the web in order to introduce their products or services around the world. E-commerce is any type of business or commercial transaction that involves the transfer of information across the internet. A huge amount of information is generated and stored in the web services. This document is intended for System end-users, System architects and System developers and Software Testers. This project focuses on providing security to user’s data by using Salted Password Hashing Technique. Shopping Online can be so vulnerable, since the user information are saved as a plain text in their database. To overcome this scenario hashing is used. This project focuses on saving an encrypted user data to the database rather their saving as a plain text. To provide more security to user data Bcrypt algorithm is implemented. Bcrypt algorithm can encrypt the data up to 512bits which provides a longer encryption key and give hashed value of the user data. Hash functions are primarily used in hash tables, to quickly locate a data records.

   

Full Text

 

Title:

Evaluation of mechanical properties of aluminium metal matrix composite for marine applications

Author (s):

A. Venugopal and N. Manoharan

Abstract:

Nowadays automotive and marine industries are in need of better class of materials that need all versatile applications and also they should be environment friendly. Therefore, the need of the hour is to innovate new materials namely smart materials, composites and supper alloys. In this paper aluminium metal matrix composite is prepared using stir casting process with aluminium 6061alloy as matrix metal and Silicon carbide as reinforcement with different proportions. Flexural and hardness tests are conducted and the result shows that composite specimen with high percentage of Silicon carbide has better properties than the others. 

   

Full Text

 

Title:

Investigation of flexural property of Kenaf- flax hybrid composite

Author (s):

V. S. Srinivasan, S. Rajendra Boopathy and B. Vijaya Ramnath

Abstract:

Present technological development made us to use composites which are environmental friendly and biodegradable those are plays vital role in automotive, construction and aero space applications. In this work the flexural properties of Flax and Kenaf mono fibre and hybrid composite of both are investigated. The composite are fabricated using hand layup method. The flexural property of composites is compared with the single fibre suspended natural composite made of their ingredients individually. The comparison shows the effect of hybridization on various aspects. The hand layup technique of manufacturing used here also influences in forming properties of the composites. Finally crack propagation and shearing styles are discussed using the Scanning electron Microscope (SEM) images of the tested fibre composite specimens.

   

Full Text

 

Title:

Adapting concurrent engineering approach for design and development of a new rotary hydraulic motor for marine application

Author (s):

D. Immanuel Thiagarajan and N. Manoharan

Abstract:

Nowadays industries are aiming to reduce lead time of the new product development. In this regard, they are using to adapt a lot of manufacturing methodologies like concurrent engineering, lean manufacturing and agile manufacturing in their design process. In order to select a suitable manufacturing method, in this paper an attempt has been made by using Analytical Hierarch Process (AHP) a multi criteria decision making model. The result of AHP shows that concurrent Engineering is most suitable for developing a new concept hydraulic motor for marine application. Among the various approaches of concurrent engineering, CAD based approach is used to design, develop, redesign and analyze the new hydraulic motor.

   

Full Text

 

Title:

Video analytics using HDVFS in cloud environment

Author (s):

Dhina karan K., Silviya Nancy J. and Duraimurugan N.

Abstract:

The proposed research work focuses on video analytics which is been emerged as the fastest growing research area in the schematic sketch of Big data and its applications in cloud. The exploration of video is been well marginalized and organized by Hadoop Infrastructure, whose propagation is discussed. Large volume of unstructured data is been produced in day to-day activities of the people, not exempting various organizations that are recorded and maintained eventually for research and other purposes. Traditional database architectures were not able to handle the generation, storage and access of this huge amount of unstructured (video) data. This proliferation led to the collaboration of video-analytics with a conservative database theory called Big Data. There are several structured database that are developed to master the needs for accessing and maintaining the videos. Despite, these developments, the retrieval and processing of the particular environment detail, specifically a featured human, or an object from the videos takes huge amount of time which is not too effective. So, this shortcoming is been forwarded to the Hadoop Distributed Video File System (HDVFS) whose Map-Reduce Framework process the recognition of stipulated image/object and their behavior from the unstructured video in the cloud repository which stores the intensive-sized files like Amazon S3 storage bucket.

   

Full Text

 

Title:

Investigation of tensile and impact behaviour of abaca-raffia hybrid composite

Author (s):

Vijaya Ramnath B., Manickavasagam V. M.,  Elanchezhian C., Karthick R., Bharath U., Maruthi Kishore R. A. and  Rahul R.

Abstract:

Current technological development forces the industries to find new alternate and non-conventional materials that may replace conventional materials. Hence, industries are aiming to develop composite materials that are made from two or more constituent materials with significantly different physical and chemical properties. Hence, the composite materials have better properties than their constituent materials. In this paper an attempt has been made to fabricate and investigate the tensile and impact properties natural fiber composites made up of abaca and raffia fibers with three different compositions. The method adapted is hand layup process. The result shows that the hybrid composite made up of abaca and raffia have better properties than mono fiber composites. Failure morphology analysis is done using scanning electron microscope on the tested specimens.

   

Full Text

 

Title:

Manage traffic in P2P live streaming using adaptive routing scheduling over video-on demand service

Author (s):

M. Narayanan and C. Arun

Abstract:

P2P Computing services have extended in all the fields such as Education, Business, and Medicine etc. The development of Computer Science and Technology provides better opportunities to P2P computing and file sharing technique. While the usage of P2P technique is increasing at an unprecedented rate, but on the other side P2P computing has its own difficult to providing better service. This paper focuses on the main trouble in P2P computing, i.e. P2P network traffic. The recognition of a novel invention of smart Peer-to-Peer applications have affected in numerous innovative challenges for precisely categorizing network traffic. An extensive perception of network traffic property is consequently significant to address the recent requirements and also to extend innovative architectures that will help in improving the network performance. This paper mainly focuses on Adaptive Routing Scheduling to minimize the traffic on P2P networks. The traveling of the data from one system to another system in the P2P networks not dependent on the desired mechanism, it is learning based on the traffic available in the present status. This paper implemented by Java programming technique. On future process focuses on live implementation on P2P networks.

   

Full Text

 

Title:

Efficient and secure attribute revocation of data in multi-authority cloud storage

Author (s):

Reshma Mary Abraham and P. Sriramya

Abstract:

One method which is effective and also ensures security in cloud storage is data access control. Now-a-days this method faces lot of challenges from data out sourcing as well as un-trusted cloud servers. In this case data owners should get direct controls on access policies, which is provided by Ciphertext-Policy Attribute-based Encryption (CP-ABE). Due to attribute revocation it is not easy for applying existing CP-ABE schemes to data in cloud storage. This design gives an efficient, expressive and revocation in data access control scheme in multi-authority storage cloud systems, in which there is co-existence of multiple authorities and each will be able to issue independently attributes. Specifically, this implemented system has a revocable multi-authority CP-ABE scheme, which gives the underlying techniques that helps to design schemes in data access control. This efficient revocation method achieves forward security as well as backward security. The screenshots show results in the data access control scheme which is secure and efficient.

   

Full Text

 

Title:

Identification of location using routing based protocols

Author (s):

V. Dhanakoti and P. Nirmala Deve

Abstract:

Many problems in Ad-Hoc network is divided as an optimization problem such as consumption in energy, localization, routing, use of nodes in effective way. To solve these problems set of routing algorithm have been developed based on swarm intelligence. Ant colony algorithm is based on the behavior of ants in swarm intelligence. To enhance the communication we use different protocols and also location of the nodes in the cluster is also identified using location based routing protocols.

   

Full Text

 

Title:

Suitable routing path for peer to peer file transfer

Author (s):

R. Naga Priyadarsini, S. Suma and V. Dhanakoti

Abstract:

Peer-to-peer (P2P) computing or networking is a distributed application architecture. The tasks and workload are partitioned between multiple peers. Peers are equally privileged, equipotent participants in the application. P2P file sharing is the distribution and sharing of files using P2P networking technology. The peers of such networks are end-user computer systems that are interconnected via the internet. In this paper we develop a systematic methodology to identify P2P nodes, perform suitable cluster operation to transmit files between various peers. In-case of any fault nodes identified in the transmission path suitable alternate path must be identified so that the file can reach the destination safely. Finally the packets are transmitted to the destination by means of suitable path and there the packets are collected and decrypted. The results are obtained based on the moving nodes also.

   

Full Text

 

Title:

Design and analysis of model predictive voltage and current controllers for three phase voltage source inverter in micro grid

Author (s):

P. Abirami and S. Visalakshi

Abstract:

Nowadays renewable energy sources are essential to meet the real power demand. All the Distributed Energy Resources are connected to the common grid through three phase Voltage Source Inverter (VSI). The reliable operation of micro grid can be achieved by controlling three phase voltage source inverter. Voltage and frequency of the Distributed Energy Resources are continuously varying and they depend on nature. While interfacing Distributed Energy Sources to the common grid, both variables must be maintained constant. And these variables are controlled by controlling three phase voltage Source Inverter. The two loop model predictive current and voltage controller is proposed in this paper for voltage source inverter operation. The outer voltage control loop is for controlling frequency and voltage which gives reference input to the inner loop model predictive current controller. The inner current loop generates signal to regulate the inverter current. The Space Vector Pulse Width Modulation Signal Generator is used for voltage commands. The performances of the both controllers are analyzed for various load conditions. Simulation is carried out in MATLAB.

   

Full Text

 

Title:

Feature extraction using TIPCA technique along with the combination of K-NN classifier

Author (s):

Sindhuja R. and Arun Sahayadhas

Abstract:

Face Recognition has becoming the most challenging and interesting area in all applications. It is one of the best biometric techniques. Feature Extraction is the major problem in face recognition. Researchers developed many best feature extraction techniques. The existing papers have followed SVM and KNN Algorithms. But since it requires more classification accuracy of the image, this paper shows how the Transform Invariant PCA technique provides better accuracy when used with K-Nearest Neighbor classifier. The experimental result shows the comparative analysis of the TIPCA algorithm with the combination of the KNN classifier algorithm.

   

Full Text

 

Title:

Evaluation of performance of after sales service- A comparative study involving home appliances manufacturing firms

Author (s):

Murali S., Pugazhendhi S. and Muralidharan C.

Abstract:

After-sales services (ASS) are a key strategic tool in the consumer durable products market. They allow manufacturers and retailers to capture more sales and profit. This paper is intended to study the importance of SERVQUAL dimensions in contributing to ASS performance with special attention to case companies involved in home appliances business through a questionnaire based approach. Three leading home-appliances manufacturing firms in South India were considered in this study. The study also examined whether there is any significant difference, among the three firms involved in this business, with respect to the SERVQUAL dimension that influences their performance on ASS. The findings can help the firms to identify the areas that need attention to achieve better ASS quality.

   

Full Text

 

Title:

Exploring the interactions and connectivity among the brain regions for identification of brain disorders

Author (s):

Pachhaiammal Priya M. and  S. P. Rajagopalan

Abstract:

Future of brain science is mainly focused on connectivity. Scientists have found that a cognitive function involves interactions between different brain regions in the state of rest. The image generating methods, such as EEG and fMRI, provide information on the intrinsic brain activity that is they demonstrate the connections of the brain areas within various regions that requires effective and efficient data mining techniques to determine the brain connectivity pattern associated with clinical rigidity to distinguish healthy brains from pathological brains from a number of brains. Clustering techniques are used to find the similar interaction patterns among brain regions and hence to identify the disorders in the brain. The aim of this study is to analyze and mine the various connectivity links for brain disorders and structure learning algorithms is studied for the interactions.

   

Full Text

 

Title:

A new ZCS-ZVS single phase PFC converter with a LCD snubber for output voltage regulation

Author (s):

Aiswariya S. and Dhanasekaran R.

Abstract:

A single phase ac-dc soft switched PFC converter with a LCD snubber is presented for dc output voltage regulation. The LCD snubber cell provides zero current switching (ZCS) turn ON and zero voltage switching (ZVS) turn OFF for the converter switch without increasing current or voltage stress. In this study, steady state analysis of proposed PFC converter is presented in detail and the theoretical analysis with its operation stages is verified with simulation results. This converter has a total efficiency of 95% and 0.994 power factor with sinusoidal input line current. Moreover the proposed converter is compared with the hard switched PFC converter and it can be seen that the improvement of efficiency is significantly achieved.

   

Full Text

 

Title:

An automatic grading system of severity level for diabetic retinopathy using CNN classifier

Author (s):

Mahendran Gandhi and R. Dhanasekaran

Abstract:

The human eye is an organ that reacts to light and has several purposes. As a sense organ, the human eye allows vision. The retina is a light-sensitive layer at the back of the eye that covers about 65% of its interior surface. Rod and cone cells in the retina allow conscious light perception and vision including colour differentiation and the perception of depth. A disease called diabetic retinopathy which is affected in the retina to the diabetic patients suffering with the diabetes more than 10 years. Diabetic Retinopathy (DR) is the utmost common diabetic eye disease and a leading reason of blindness. It is caused due to injury in the blood vessels of the retina. The brittle blood vessels may enlarge and leak fluid which is called as exudates. Exudates are fluids, cells, or other cellular substances that are slowly discharged from blood vessels usually from inflamed tissues. It can be a clear fluid which is composed of serum, fibrin, and white blood cells. Diabetic retinopathy is identified by the ophthalmologists by the dilation method. The dilation method is meant by pouring eye drops into the patient’s eye and it causes irritation to the patients. In order to protect the patients from the irritation and blindness, an automatic method is developed to detect these exudates and to measure the severity of the diabetic retinopathy. The exudates are detected by using the JSEG algorithm and the severity level grading is done by using Cascade Neural Network (CNN) classifier algorithm.

   

Full Text

 

Title:

Smart data acquisition technique for level process using LIFA

Author (s):

T. Sivaranjani, P. Malarvizhi and S. Manoharan

Abstract:

Level monitoring plays an important role in the industrial production, automotive, oil, petroleum and natural gas industries whose measurement should be continuous and accurate throughout the process. Hence the importance of measurement and data acquisition is very much increased in industry. This paper is proposed for measuring and monitoring the level of the tank using LabVIEW software and Arduino board is used for interfacing the hardware and the LabVIEW software. The proposed method is of low cost, easy to use and has wide range of applications in industries and laboratories.

   

Full Text

 

Title:

Achieving increased QoS, maximized lifetime, better routing and target coverage in wireless sensor networks

Author (s):

Devipriya C. N. Saravanaselvam and Saradha S.

Abstract:

In this paper, we focus on the various aspects related to wireless sensor networks, their features and how to increase the lifetime of the sensor and network nodes, better target coverage and the most important issues like Quality of service and routing. Wireless sensor networks (WSNs) have received a huge attention and focus among the emerging areas of the researches due to its application in wide areas like battle fields, habitat monitoring, underwater and underground monitoring, mobile robots, etc. There can be several environmental conditions which may make a sensor node to die and can also be due to depletion of battery power. The basic composition of a WSN is motes which pose only scarce resources like limited computational capabilities and memory features. The first challenge in the implementation of WSNs is source location privacy. A tree-based diversionary routing scheme for preserving source location privacy using hide and seek strategy can be used for this where the lifetime of WSNs depends on the nodes with high energy consumption or hotspot. The other design challenge in designing a (WSN) is to maximize the network lifetime, since each sensor node of the network is equipped with a limited power battery. To overcome this, different methods were proposed like network protocols, data fusion algorithms using low power, energy efficient routing, and locating optimal sink position. We focus on finding the optimal sink position. To improve WSNs’ reliability, we should consider that a sensor covers targets with users’ satisfied probability. To overcome this, introduce a failure probability into the target coverage problem to improve and control the system reliability. Energy savings optimization becomes one of the major concerns in WSN routing protocol design, due to the fact that most sensor nodes are equipped with the limited non-rechargeable battery power.  Using the principle of opportunistic routing theory, multihop relay decision to optimize the network energy efficiency can be made based on the differences among sensor nodes, in terms of both their distance to sink and the residual energy of each other.

   

Full Text

 

Title:

Numerical investigation over a typical launch vehicle with protrusion

Author (s):

M. Sasi Kumar, R. Santhanakrishnan, M. MakeshKumar and S. Karthick Ram

Abstract:

The Effect of shape of protrusion on aerodynamic pressure distribution at subsonic to supersonic The grid generation is carried out using multi block structured grid near the wall to capture the viscous boundary layer. Computational Fluid Dynamic Simulations of flow over a typical launch vehicle protrusion has been carried out using CFD++ RANS solver. K-epsilon turbulence model has been used for turbulence closure.  The flow features like distribution of pressure, Mach number, shock –boundary layer interaction, expansion waves has been captured. Simulation have been also been performed to understand the flow features and to access the force over typical launch vehicle protrusions at selected Mach number.

   

Full Text

 

Title:

Cooperative spectrum sensing scheme for vehicle to vehicle communication

Author (s):

D. Sivaganesan and S. Karthikeyini

Abstract:

The wireless access in Vehicular Environment (WAVE) protocol stacks to enable vehicular communication on the Dedicated Short Range Communication (DSRC) frequencies in RSU (Road Side Unit). All vehicular safety messages are over congested urban scenario. In DSRC might not provide sufficient spectrum for reliable of exchange of safety message. In this paper a blind detector is applied and tested on the vehicle level and spectrum sensing measurement by vehicle and the aggregating information in Road Side Unit which makes advantages deliver more accurate decision in dynamic vehicular environments. Cooperative Spectrum sensing algorithm is to aggregate the individual sensing data and decide on the vacancy of the sensed frequency bands. The performance of Cooperative Spectrum Sensing Algorithm are evaluated and tested in various vehicular scenarios using network simulator ns2. The obtained results prove the effectiveness of the system in detecting available ISM channels. The performance of the proposed approach is analyzed in terms of data packet delivery ratio, and end-to-end delay, control overhead and packet forwarding.  This the results indicate that the proposed approach provide efficient and robust communication over VANET.

   

Full Text

 

Title:

Influence of varying load on wear rate and frictional resistance of EN-8 steel sliding against EN-31 steel

Author (s):

Vemuri Lakshminarayana and Vincent Balu P.

Abstract:

The aim of this work is to study the influence of varying load on EN8alloy steel when it is sliding against EN31 alloy steel. The wear test was carried out by using Pin on Disc apparatus. The counter face discs were machined from the EN31 steel composition and the test was carried at low loads and high loads. Variations of friction coefficient and the wear rate at different normal loads and high load were investigated. The result shows that the wear rate increases when the load increases. An interesting result showed that the Co-efficient of Friction decreases at normal loading conditions and when the load increases from 125N, the Co-efficient of Friction increases till 175N.The Scanning Electron Microscopy (SEM) image of the worn out specimen reveals that the formation of groove lines on the sliding surface due to adhesion strength of the material is very less when it subjected to higher loads.

   

Full Text

 

Title:

Harvested host-mortal commensal eco-system- A numerical study

Author (s):

N. Seshagiri Rao, K.V.L.N. Acharyulu and K. Kalyani

Abstract:

The present paper deals with the behaviour of the biological system comprising the commensal species and host species with a constant harvesting of the host species where as the commensal has mortality rate. Further both the species are considered in the natural limited resources. The nature of the ecological system can be observed by increasing the harvesting values of the host species in the dynamical model. The corresponding trajectories of the commensal species (growth, balanced and mortal commensal species) over the host species have been drawn for wide range of the values of the parameters in the model. The dominance reversal time of the commensal species over the host species or vice versa and the sustainability of the commensalism interaction between the species are discussed.

   

Full Text

 

Title:

An expert system for assessing solid fuel pollutants from traditional cook-stoves

Author (s):

M. Jagannath, P. Vetrivelan and K. Adalarasu

Abstract:

Most of the rural people in India use traditional stoves to cook for their families. They release carbon monoxide (CO) and other poisonous particulate matters to the air as a result of incomplete combustion of solid fuels. These pollutants are very harmful to the children, the women cooking near those stoves and more specifically the pregnant women causing serious health hazards to the inborn babies. An Indian woman on an average spends about 6-8 hours per day for this purpose. They spend 80 to 90% of their time at home cooking for their families and these primitive cook-stoves emit a significant amount of smoke, which fills all the rooms of a house. As the smoke contents varies significantly in various rooms, identifying the location of the person plays a vital role. An expert system that uses personal locators is an upcoming method brought about to specially educate the people, the need of improved stoves. These locators are designed in such a way that they determine the exact location of the person and also the duration of the women in that particular room. The stove temperature, location and exposure of the person are determined over a period of time indicating the changes in their locations and exposure levels each time in a specific place. Later obtained data are stored in the memory of the data logger. The stored data can be transmitted using wireless transmissions with the help of SIM 300 global system for mobile communication (GSM) modem to the server which is located at the area where further analysis is done.

   

Full Text

 

Title:

Experimental investigation of tensile and impact behavior of aluminium metal matrix composite (AMMC) for turbocharger

Author (s):

T. Mohan and N. Manoharan

Abstract:

Recent developments in material technology help to find and fabricate new materials which may replace existing materials for various applications. Among those, composite materials play a vital role which is combination of two or more materials with different physical and chemical properties. This work focuses on developing an aluminium metal matrix composite (AMMC) material for turbocharger components made by wrought aluminium alloy with various weight fractions of aluminium oxide in order to make five different forms of composites. In this work stir casting process is used. The fabricated composites are tested for their tensile and impact properties. The result shows that composites with higher percentage of aluminium oxide has high tensile strength than other composites.

   

Full Text

 

Title: Detecting the compromised node in zone-based leader election method in WSN
Author (s): Udaya Suriya Rajkumar D. and Rajamani Vayanaperuma
Abstract:

Since the WSN is not secured in nature, it compromises the sensor node and the physical capture of these nodes is very easy for the intruder nodes. The intruder nodes simply communicate with any node in the zone, thus compromising the nodes and in turn spoiling the nature of the network. To reduce the damages be fallen on the compromised nodes, it should be successfully detected and revoked as soon as possible. Range of node specifies detection systems in wireless ad-hoc and sensor networks have been projected by academicians, of late. In the existing approach Leader based intrusion detection system as well as trust value calculated is used to find out suspect regions where the compromised nodes are ensconced, here the Leader will be elected region wise based on the energy level to detect the attacker and revoke the compromised node. To overcome this as well as to provide high security two new stage approach are proposed. They are the DPFM-[Data Packet Format Matching] method which detects the attacker node and DAA-[Divert Attention Attacker] method which prevents nodes compromising in the zone. The simulation result shows that the compromising node is eliminated and attacks are controlled in the network.

   

Full Text

 

Title: Evaluation of MAC in vehicular networks
Author (s): E. Kamalavathi and R. Radhakrishnan
Abstract:

Vehicular Ad hoc Network (VANET), a subclass of Mobile Ad hoc Network (MANET), is an important one for the intelligent transportation system (ITS). VANET, used to provide communication among vehicles and between vehicles to RSU. These networks have the potential to increase safety and provide many services to drivers and the passengers. VANET has the name as network on the wheel (NOW). Medium Access Control (MAC) is designed to send information from source to destination .We use VER-MAC to send data with reliability and energy efficiency. VER-MAC and IEEE 802.11p are the two standards used in VANETs. In this paper we compare the performance of VER-MAC and IEEE 802.11p standards in terms of two factors i.e. Packet Delivery Ratio (PDR) and the delay of emergency packets. The performance is mainly analyzed using ns-2 simulator.

   

Full Text

 

 

 

 

     

  

   

  

  

  

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

arpnjournals.com   Publishing Policy                                                  Review Process                                           Code of Ethics