ARPN Journal of Engineering and Applied Sciences              ISSN 1819-6608 (Online)
 

 
GoogleCustom Search
 
 
 
ARPN Journal of Engineering and Applied Sciences                                  July 2016  | Vol. 11  No. 13
   
Title: Intrusion detection system in stand alone and cooperative networks
Author (s): Josephin Asha Grace and P. Kavipriya G.
Abstract:

In Mobile Ad-hoc Networks (MANETs) the presence of malevolent hubs leads to a serious security problem, such hubs disturb the routing process. Due to the occurrence of malicious hub the researchers conducted different detection scheme. In this paper, we survey the existing solutions and the techniques used by the researchers to detect the malicious hub by grey hole, black hole attack and cooperative bait detection scheme and we implemented an algorithm to improve the system performance. Avoiding and sensing malicious hubs launching grey hole and collaborative black hole attack is a main challenge. To resolve this issue by cooperative bait detection scheme (CBDS) which coordinates the upside of both reactive and proactive defense architecture. The proposed system is used to avoid this issue by using Localizability Aided Localization (LAL) algorithm. The proposed work is simulated using NS-2 and is analyzed using certain parameters such as delay, throughput, loss rate, energy consumption and non-localizable.

   

Full Text

 

Title: A novel approach to detect bone cancer using k-means clustering algorithm and edge detection method
Author (s): Sinthia P. and K. Sujatha
Abstract:

Medical Image Processing is one of the most challenging topics in research areas. This paper proposes an approach to detect bone tumor in MRI images. A proposed approach integrates some pre-processing techniques such as the average filter and the bilateral filter in order to remove noise and to smooth images. This will increase the quality of the image so that they are suitable for segmentation as well as morphological operations that will be used to eliminate false segments. The MRI bone cancer images are analyzed to detect the presence of bone cancer and also to determine its stage based on the computations of mean intensity and tumor size using k-means algorithm. The exploratory results demonstrate, the proposed system could get the smooth picture with edge demonstrating the ailment influenced part without the spatial and spectral noises.

   

Full Text

 

Title: A study on fatigue properties of compacts obtained from ready-made and polymer grafted alumina
Author (s): Riyadh B. Mohammad Hadi S. Al-Lami and Muhammed A. M.
Abstract:

This study was devoted to outlining the fatigue behavior of alumina as a widely used ceramic material and to predict their life under cyclic loads. Two types of a-alumina have been studied to predict their fatigue behavior and the effects of physical properties, particularly, and porosity and their pore size; and mechanical properties such as fracture strength, modulus of elasticity, and toughness of materials; in addition to pressing loads. The first type was alumina made especially for pressing. The second type of alumina was commercial high purity grafted with random copolymer (n-butyl metacrylate-methacrylic acid) as a lubricant. Dry pressing forming technique with different loads has been used to form different alumina compacts. They were fired in two stages, 1200°C and 1600°C. It was found that porosity affects fatigue behavior in a complicated manner. Firstly, it weakens the ceramic material. Secondly, pore sizes, particularly surface pores, have a great harmful influence on fatigue life. Therefore, reduction in porosity and good surface finishing can elongate the fatigue life. Furthermore, it was predicted that specimens of alumina made especially for pressing, which was pressed under relatively low loads (0.5, 1, 2 kN) were relatively better than those pressed under higher loads. That is due to the initiation of fractures in the specimens, pressed under higher loads with worst case for specimens, pressed under 9kN, on the contrary of their static mechanical behavior. Gradual enhancement of fatigue properties for specimens, pressed under higher loads (11-16 kN) because of toughening mechanisms, which emerges due to the more closeness, higher internal friction, and meandrous paths of cracks. Whereas grafted alumina is better in static mechanical properties, and their fatigue properties are close to, or even better than their predecessors. Design and applications of ceramics should be based upon KTH.

   

Full Text

 

Title: Experimental analysis of Malayalam POS tagger using EPIC framework in scala
Author (s): Sachin Kumar S., M. Anand Kumar and K. P. Soman
Abstract:

In Natural Language Processing (NLP), one of the well studied problem under constant exploration is part-of-speech tagging or POS tagging or grammatical tagging. The task is to assign labels or syntactic categories such as noun, verb, adjective, adverb, preposition etc to the words in a sentence or in an un-annotated corpus. This paper presents a simple machine learning based experimental study for POS tagging using a new structured prediction framework known as EPIC, developed in scala programming language. This paper is first of its kind to perform POS tagging in Indian Language using EPIC framework. In this framework, the used corpus contains labeled Malayalam sentences in domains like health, tourism and general (news, stories). The EPIC framework uses conditional random field (CRF) for building tagged models. The framework provides several parameters to adjust and arrive at improved accuracy and thereby a better POS tagger model. The overall accuracy were calculated separately for each domains and obtained a maximum accuracy of 85.48%, 85.39%, and 87.35% for small tagged data in health, tourism and general domain.

   

Full Text

 

Title: A review on highly birefringent dispersion compensation Photonic Crystal Fiber
Author (s): Arun Joy Skaria and Revathi S.
Abstract:

This paper discusses several optimum designs for high birefringence and dispersion compensation in Photonic Crystal Fiber (PCF) for broadband compensation covering the E, S, C, L bands wavelength ranging from (1360 to 1640 nm). The finite element method (FEM) with perfectly matched layer (PML) is generally used to investigate the guiding property. Large negative dispersion over wideband range is obtained in many modified structures with varying dispersion coefficient and with relative dispersion slope (RDS) matched to that of single mode fiber (SMF) of about 0.0036 nm-1 at 1550nm. High birefringence of order 10?^(-2) is observed in most cases with asymmetric structures. In addition to this other properties of PCF like effective area, non-linearity, residual dispersion, and confinement loss are also reported and discussed.

   

Full Text

 

Title: Optimized blurred object tracking using ANFIS
Author (s): S. Rajaprabha and M. Sugadev
Abstract:

Many promising applications need to track the blurred images in the videos. In most of the object trackers, implicit assumptions are made that the video is blur free. But in real time videos, motion blur is very common. If severe blur is present in a video the performance of the generic object trackers may go down significantly. The proposed method uses GLCM algorithm for feature extractions from the blurred object and then ANFIS (Adaptive Neuro Fuzzy Inference System) for tracking those blurred objects in the videos. The ANFIS model is trained with the parameters of blurred objects. The input video is imported and GLCM (Gray-Level Co occurrence Matrix) method is used to extract features from the frame. Now the ANFIS data is loaded and compared with the frame. Then the blurred object is detected and tracked by the ANFIS model. The proposed algorithm robustly track challenging scenes and severely blurred videos. The speed and performance is improved in this proposed method.

   

Full Text

 

Title: Effect of compaction density and moisture content level on shear strength behaviour of fly ash mixed coal mine overburden dump material
Author (s): Pankaj Kumar Dewangan, Manoj Pradhan and G. D. Ramtekkar
Abstract:

Mixing and compaction of fly ash with the coal mine overburden dump material in presence of water result in complex shear strength behaviour of the mixture. Both fly ash and overburden dump material are cohesion less and non plastic material. But when they are mixed in presence of water and consolidate for some time, it hardens and changes the shear strength behaviour of the mixture. In this study, a series of small and large scale direct shear tests were conducted to assess the effect of mixing fly ash in two ratios i.e. 20 and 25% by volume on the shear strength behaviour of coal mine overburden dump material. With the addition of fly ash, the cohesion of the overburden dump material increased significantly while reduction in friction angle of the dump material was noticed. The reduction in friction angle got more pronounced with the increase in fly ash percentage. The effect of compaction density and moisture content levels on shear strength behaviour was also evaluated. Both cohesion and angle of internal friction was found to be decreased for the mixture compacted at lesser density. The overall mobilized shear strength was found slightly increased for the mixtures compacted at the moisture content below the optimum moisture content (OMC) due to increase in its friction angle component.

   

Full Text

 

Title: Performance analysis of hardware implemented DNA algorithm for security applications
Author (s): A. Ruhan Bevi, Kathan Patel and S. Malarvizhi
Abstract:

DNA Cryptography is used for secure end to end communication over a network by encrypting the messages. DNA is a well-known information carrier from one generation to another. DNA cryptography is preferred due to vast parallelism and information density that are inherent in any DNA molecule. In this paper, a new algorithm is proposed based on DNA cryptography which enhances the security aspects of the data which is sent over a network. This is achieved by introducing feistel inspired structure and adding complex operations to it. Furthermore, this paper discusses DNA cryptosystem concepts based on the classic Vigenere cipher for substitution. A random function is used for generating One Time Password which is unique for every transaction. This makes the algorithm complex and prevents the attackers to perform any brute force attacks. The results indicates that the confidentiality and integrity of the data is maintained and the feistel inspired structure for DNA cryptography using one time pad for key generation achieves a better encryption rate.

   

Full Text

 

Title: The influence aluminum waste addition on density and compressive strength mortar
Author (s): Abdul Haris
Abstract:

The function of the aluminum waste used in this study is as a developer because when mixed with a mixture of mortar aluminum powder will react with the calcium hydroxide (Ca OH 2) contained in the non-active cement or lime with water and form hydrogen. The hydrogen gas expands and tucks volume for mortar mix until doubled and also speed up the dough ingredients. This research was conducted with the aim, aluminum waste utilization in the manufacture of mortar. Variations in the mix is 0 % , 0.25 % , 0.5 % , 0.75 % and 1 % by weight of the binder to use , test objects cube is 5cm x 5cm x 5cm 150 pieces . The analysis showed that more and more, a mixture of aluminum powder, the more light, density mortar, with a minimum yield mortar autoclave 1612.8 kg / m³ and results minimum specific gravity, of the mortar, without autoclave 1636.8 kg / m³. For compressive strength, the increasing variation of aluminum powder mixture, the smaller the value of compressive strength. Where the results optimum compressive strength of mortar with autoclave 13.886 N/mm² and a minimum compressive strength of 6.436 N/mm². While the results of optimum compressive strength of mortar without autoclave 13.65 N / mm² and a minimum compressive strength of 6.124 N / mm². From this analysis it can be concluded that the mortar with autoclave treatment has a specific gravity that is smaller but has a great compressive strength.

   

Full Text

 

Title: A rule based approach for ensuring privacy in data mining
Author (s): G. Manikandan, N. Sairam, M. Sathya Priya, Sri Radha Madhuri V. Harish and Nooka Saikumar
Abstract:

Data mining or the knowledge discovery process is examining data in several views and sum up it into practicable data that can be utilized to raise gross, cuts costs, or both. The ultimate goal of data mining is to attain the patterns and the trends that are concealed in the stimulant data. For this purpose it utilizes the large data sets that are available as part of data publishing. Data Privacy has to be ensured while extracting information from large data sets. In recent times achieving privacy in data mining plays a vital role. Data Perturbation can be used for generating the sanitized data from the original data. Most of the existing systems in the literature use a single noise value for the perturbation process. Here we are adding noise by generating If-then-rules for various attributes by grouping them into various classes for attaining privacy.

   

Full Text

 

Title: Effect of part features on dimensional accuracy of FDM model
Author (s): Mohd Nizam Sudin, Shamsul Anuar Shamsudin and Mohd Azman Abdullah
Abstract:

This research investigates the dimensional accuracy of parts produced using the additive manufacturing method of Fused Deposition Modeling (FDM). The fabrication of parts was carried out based on the standard value of process parameter of Stratasys FDM 400MC machine. Parts with four common features of products in different sizes were fabricated in FDM machines using Acrylonitrile Butadiene Styrene (ABS) material. Then, the linear dimension of each part feature was measured with a Coordinate Measurement Machine (CMM) that was repeated for three times. The accuracy of the fabricated part feature was computed by subtracting the nominal dimension of the part (CAD model) with the measured dimension of FDM model. An analysis of sixteen different dimensions of the part feature were identified that, parts dimension had a significant effect on the dimensional accuracy of FDM model. In addition, it was found that FDM machine is less accurate in producing a circular shape part such as cylinder, sphere and hole as the majority of them are out of the machine’s tolerance.

   

Full Text

 

Title: Comparison of efficiency to the air pollution control systems from the solid waste incineration
Author (s): Prayong Keeratiurai

Abstract:

The solid wastes rapidly increasing to the problem of storage, transportation, disposal and environmental impact. Removal of solid wastes by burning was a popular way in municipal sub districts. Because of it was convenient and highly effective in the solid waste minimization. This research studied to reduce air pollution from the solid waste incineration. This study used tools for trapping dust, smoke and air pollutant. This study conducted for the solid waste incineration was four systems. The first system was the solid waste incineration that did not turn on the air pollution control system. The second system was the air pollution control with the smoke burning alone. The third system was the air pollution control with the wet scrubber alone. The air pollutants were treated with water. The fourth system was the air pollution control with the smoke burning and the wet scrubber. This study was conducted the solid waste incineration that was 1, 2, 3, 4 and 5 kg in every system. The objectives of this research were the evaluation of relationship between the internal temperatures in incinerator to time at various waste quantities and the performance evaluation of the air pollution control systems. The results of this study found that the solid waste incineration in the first system which this system was used in the comparison, had a lot of smoke and soot and black smoke. The efficiency of the solid waste incineration of this system was 90.44% ± 4.58%. The air pollution control with the smoke burning alone found that the smoke and soot from the solid waste incineration were decreased than in the first system. This second system had the efficiency of the solid waste incineration was 90.04% ± 4.84% and the efficiency of the air pollution control system was 12.90% ± 5.69%. The results of this study also showed the air pollution control system with the wet scrubber alone. They found that the smoke and soot from the solid waste incineration were decreased more than in the first and second system because the water was sprayed to eliminate air pollutants. The internal temperatures in incinerator were higher than the first and second system. This third system had the efficiency of the solid waste incineration was 89.53% ± 4.91% and the efficiency of the air pollution control system was 40.75% ± 3.97%. The last system was the air pollution control with the smoke burning and the wet scrubber. The results of this study showed that this system could control air pollution more than all the systems that were tested. This fourth system had the highest efficiency of the solid waste incineration and the air pollution control system were 92.50% ± 3.57% and 52.31% ± 7.02%, respectively.

   

Full Text

 

Title: Modeling of air pollutants SO2 elements using Geographically Weighted Regression (GWR), Geographically Temporal Weighted Regression (GTWR) and Mixed Geographically Temporal Weighted Regression (MGTWR)
Author (s): Kukuh Winarso and Hasbi Yasin
Abstract:

Sulfur dioxide gas (SO2) is derived from the combustion of fuels containing sulfur. Aside from fuel, sulfur is also contained in the lubricant. Sulfur dioxide gas is difficult to detect because it is colorless gas. Sulfur dioxide can cause respiratory disorders, indigestion, headache, chest pain, and nerve. A necessary preventive measures to reduce the impact of air pollutants SO2 particular elements, one of them by making the modeling that can bring the causes and factors resistor element of air pollutants SO2. The modeling is Geographically Weighted Regression (GWR), Temporal Geographically Weighted Regression (GTWR) and Mixed Geographically Weighted Temporal Regression (MGTWR). All three models are regression models spatial, temporal and spatial temporal spasial- combined, which models the effects of air pollutants SO2 element with a direct view of geography and time of occurrence of air pollution. The third model is then compared to obtain the best model in the modeling of air pollutants SO2 elements.

   

Full Text

 

Title: Cost of construction: how globalization impacts on vernacular houses
Author (s): Mehdi Ghafouri, Tareef Hayat Khan and Abdullah Sani bin Ahmad
Abstract:

Historically people in vernacular area did not have to pay to become a householder or a landowner, or even to buy materials. But that is not the case in modern era any more. Besides the fact that one has to buy land or house, modern materials and technology, spread out by the flow of globalization, has also been associated with increasing cost. In this study on vernacular houses in Northern Iran, both traditional (Kali, Lar deh ee, Muddy), and modern (load bearing brick wall, concrete structure and steel structure) have been investigated with regards to their cost. Residents, experts and contractors were used to collect the data. Findings showed that the perception of cost is a skewed one, and choosing a new material or technique over an old one needs to be rational.

   

Full Text

 

Title: An improved model for load balancing and dynamic channel allocation in cluster based MANETs
Author (s): K. Shahina and Y. Bevish Jinila
Abstract:

In Mobile ad-hoc networks (MANETs), mobile devices are arranged independently for the use of wireless links and progressively fluctuating system topology. In MANETs, the interconnections are dynamically changing in an increasing rate due to fluctuating non-uniform loads which leads to network congestion and data losses. To handle such interconnections, the channel allocating scheme must be done in such a way to support dynamic allocation mechanism and Cooperative load balancing to handle the heavy load in MANETs. Dynamic channel allocation scheme proves more advantageous over all other channel allocation schemes because it controls network traffic effectively, avoids data loss and is energy efficient. This technique also has some problems like intervention and incompetence under heavy load. In this paper Spectrum sensing mechanism is analyzed as a suitable solution for this problem, which senses the free channels and reduces the network interference. Cooperative load balancing control is associated with controlling incoming traffic in a telecommunication network and is extensively used to avoid congestive crumple or link capability of the intermediate nodes and networks and to reduce the rate of sending packet. Through extensive simulations, we illustrate that both dynamic channel allocation – time reservation using adaptive control for energy efficiency and cooperative load balancing get better bandwidth efficiency under non-uniform load distributions compared to other protocols that do not use these mechanisms. Simulation results prove that DCA-TRACE provides noteworthy improvement for both uniform and non-uniform traffic heaps.

   

Full Text

 

Title: Investigation of surface water quality in Owerri Municipal, Imo State, Nigeria for human consumption
Author (s): B. C. Okoro, R. A. Uzoukwu and C. K. Ademe
Abstract:

The study was around Owerri Municipal of Imo State, Nigeria to investigate the quality of the surface water for human consumption. The qualities of water from Otamiri River and Nworie River as sources of potable water supply in Owerri Municipal were evaluated by analyzing samples of raw water collected from Otamiri River and Nworie River which were compared with World Health Organization (WHO) Standards. Water analyses were carried out on the samples for their physicochemical parameters which included, major ions, nutrients and their bacteriological quality. The average values obtained from the analyses are: Ammonia (mg/L) = 0.65, Total iron (Fe) (mg/L) = 0.40, pH = 7.57, Sodium (Na) (mg/L) = 0.95, Nitrate (mg/L) = 0.96, Nitrate (mg/L) = 1.30. The average observed values were compared with standard values of the WHO for potable water. Based on WHO guidelines for drinking water, the results of the analyses indicated that the waters from Otamiri River and Nworie River are not acceptable for human consumption. The two surface waters are unsafe for drinking and they require appropriate treatment before human consumption. Recommendations were made to discourage direct consumption of waters from Otamiri and Nworie Rivers surrounding Owerri Municipal.

   

Full Text

 

Title: Face recognition based attendance management system with raspberry pi 2 using Eigen faces algorithm
Author (s): Sarath chandu gaddam and N. V. K. Ramesh
Abstract:

In recent trends industries, organizations and many companies are using personal identification strategies like finger print identification, RFID for tracking attendance and etc. Among of all these personal identification strategies face recognition is most natural, less time taken and high efficient one. It’s has several applications in attendance management systems and security systems. The main strategy involve in this paper is taking attendance in organizations, industries and etc. using face detection and recognition technology. A time period is settled for taking the attendance and after completion of time period attendance will directly stores into storage device mechanically without any human intervention. A message will send to absent student parent mobile using GSM technology. This attendance will be uploaded into web server using Ethernet. This raspberry pi 2 module is used in this system to achieve high speed of operation. Camera is interfaced to one USB port of raspberry pi 2. Eigen faces algorithm is used for face detection and recognition technology. Eigen faces algorithm is less time taken and high effective than other algorithms like viola-jones algorithm etc. the attendance will directly stores in storage device like pen drive that is connected to one of the USB port of raspberry pi 2. This system is most effective, easy and less time taken for tracking attendance in organizations with period wise without any human intervention.

   

Full Text

 

Title: Identification tool of rupiah banknotes for blind people with audio output using optical character recognition (OCR) method
Author (s): Albert Gunadhi, Daniel Ivan, Diana Lestariningsih, Widya Andyardja, Yuliati
Abstract:

Visually handicapped person apparently can’t learn through some physical experiences or observations that required sight, in that case they have to get the information by direct access of another sensory perceptions such as touch or hear. Even in their financial management, visually handicapped persons are rely on somebody who has a normal vision whom they really trusted to organize their money. Therefore the writer brought up an idea to make a device whose its function is to identify a value of a money with audio output. It is expected that help visually handicapped person when have a transaction using cash effectively, quicker and also to avoid miscalculation. To identify a value of a money, the writer using numerical character as parameter. This device using image processing and optical character recognition as the method and also uses some of the important components such as windows tablet and webcam. Before it could recognize anything, the image have to have image pre-processing and some of segmentation to continue in the training character. After training character has done, next it will be continue with recognition process. When a character has been recognized, there will be a loop audio that mention a value of a money.

   

Full Text

 

Title: Towards the adoption of modular construction and prefabrication in the construction environment: A case study in Malaysia
Author (s): Muhamad Faiz Musa, Mohd Reeza Yusof, Mohammad Fadhil Mohammad and Noor Sahidah Samsudin
Abstract:

Modular construction is classified as off-site prefabrication and modern method of construction and used in developed countries such as US, UK, Japan, European countries and Australia due to its benefits. Modular construction is also known as volumetric construction, modular building system or modular system. Modular construction was developed since the 1940’s, during the World War 2 as a solution for the soldier’s accommodation and after World War 2 due to the increase in housing demand in the US. Modular construction is a construction method to construct a building using three-dimensional or modular units, which are assembled and produced in a factory. The three-dimensional units used for modular construction includes the logistic and assembly aspect of it, done in proper coordination through planning and integration. The research aims to investigate the definition, history, benefits, application and characteristics of modular construction and the adoption of modular construction in the Malaysian construction industry through a case study.

   

Full Text

 

Title: Degradation of organic, iron, color and turbidity from peat water
Author (s): Mirna Apriani, Ali Masduqi and Wahyono Hadi
Abstract:

This paper evaluates the Fenton process, involving oxidation and settling after coagulation and flocculation for the removal of organic, iron, color and turbidity from peat water. The experiment is to examine the operation condition which can result in the highest removal efficiency. The experimental variables studied include oxidation time, molar ratio of [H2O2]/[Fe2+], coagulation and flocculation pHs and settling time. The highest removal efficiency is resulted from operation condition of 60 minute oxidation and the coagulation pH of 8. The organic removal efficiency is around 33.40% to 46.86% for oxidation and 53% to 79.66% for settling. The highest removal of 37.92 mg/L organic is resulted from the [H2O2]/[Fe2+] molar ratio of 4.5. For organic concentration of 26.65 mg/L, the highest removal is resulted from the [H2O2]/[Fe2+] molar ratio of 3.5. The removal efficiency of iron, color and turbidity by settling process is 99% for all of the [H2O2]/[Fe2+] molar ratio. In oxidation process, the removal efficiencies of iron, color and turbidity are 2% to 4%, 20% to 57%, and 17% to 42% respectively. The experiment results also show that the maximum effect of removing pollutant is occurring on settling process after coagulation and flocculation.

   

Full Text

 

Title: Effective matrix block sizes in percolation model and filtrational parameters of fractured environments
Author (s): Marat Ovchinnikov and Galiya Kushtanova
Abstract:

The relationship of matrix block sizes and fluid filtration parameters in fractured porous media is considered. It is shown that the Bareblatt hypothesis operates quite well starting from the times smaller than the characteristic times of pressure redistribution in saturated porous media and relaxation times in fractures media with two type of porosity. By using of percolation model of a naturally fractured reservoir with uniform and normal distributions of matrix block sizes it is calculated linear lengths of the blocks. It is occurred that the relatively large linear sizes of the blocks in fractured porous media (10-1-101 meters) corresponds to the relaxation times in interval102-105 seconds.

   

Full Text

 

Title: Use of spectral decomposition attribute in detecting channels in Taranaki basin, New Zealand
Author (s): Joseph Gnapragasan and Umar Bin Hamzah
Abstract:

Alluvial deposit is considered to be one of the biggest hosts of the petroleum entrapment and also for many nonrenewable resources. Several methods have been introduced to track and delineate the alluvial deposits that show geological features of channels, point bars, flood plains, and crevasse play and so on. The purpose of this paper is to discuss on how spectral decomposition method could be used to enhance geological features of the Taranaki basin emphasizing on stacking channels that widely seen most part of the area. With the introduction of complex traces in early 1970, more seismic attributes have been created and used by seismic interpreters to get better results in interpreting the subtle features of the subsurface. One of the attribute that widely used nowadays is spectral decomposition which was created simply by changing the time seismic into frequency domain using Fourier analysis that cross correlate between predefined sinus and cosines frequencies. Each channel in the survey area stand up more clearly within a specific frequency range where thicker channels shows higher amplitude reading at lower frequency and the thinner layer shows higher amplitude reading at higher frequency. Application of spectral decomposition also helps in determining the channels which were deposited within the incised valleys and helps in recognizing the orientation as well the relative thickness of each channel.

   

Full Text

 

Title: Double-contour geodesic domes with an internal second contour
Author (s): Lakhov A. Ya.
Abstract:

The new type of a double-contour geodesic dome with a plate space enclosing contour and a lattice internal load bearing contour is described. Here the article contains description of a principle of a duality for geodesic networks, questions of breakdown of domes of plain hexagonal elements and of mainly plain hexagonal elements. New reusable parametrical objects on embedded programming language within ArchiCAD software GDL are described too.

   

Full Text

 

Title: Combination up flow roughing filter in series with geotextile to removal total nitrate in dry and rainy season
Author (s): Maritha Nilam Kusuma, Orta Oktavia, Nurina Fitriani and Wahyono Hadi
Abstract:

Water treatment plants Siwalanpanji treating raw water by ultra filtration without pre treatment. In dry and rainy season, turbidity reach ± 100 and ± 2500 NTU. Influent of ultra filtration allowed is = 100 NT; it is necessary pretreatment with principle of filtration and sedimentation. Roughing filter is chosen because have that function. Type roughing filter (RF) used is up flow roughing filter in series (UFRS). Media filter use gravel with a various diameter. In the compartment I = ( 10-15 ) mm; Compartment II = ( 16-20 ) mm; Compartment III = ( 21-25 ) mm; Compartment IV = ( 26-30 ) mm; Compartment V = ( 31-35 ) mm; Compartment VI = ( 36-40 ) mm. Analyzed nitrate with US EPA METHOD 353.2 Revision 2.0August 1993. UFRS installed in series with six compartments with additional geotextile. Geotextile aimed to helping filtration on UFRS. This research aims to remove total nitrate in the raw water at rainy and dry seasons. UFRS with geotextile able to remove total nitrate in the dry season and the rainy season for respectively 72, 6 % and 44, 2%.

   

Full Text

 

Title: Analysis desiccant addition to the quality of SF6 gas compartment for gas insulated switchgear 150kV
Author (s): Titiek Suheta
Abstract:

In the electrical equipment with SF6 insulating gas, SF6 gas quality according to standard, is fundamental, for good insulating power, when a decline in the quality of the gas will decrease, the level of voltage insulation on electrical equipment. In this case, it was found that the aggravation of , SF6 gas in GIS Compartment Brand Ganz in the substation Darmogrande the high rate of humidity gas SF6 insulation to exceed the standard limit which is determined. In addition, GIS is not equipped with a silica gel / desiccant as, moisture absorbent material, and absorbent gas the result of switching PMT (IEEE Std 1125-1993), which resulted in a decrease in SF6 gas quality. The addition of desiccant in the GIS is needed to maintain the quality of SF6 gas. This material will be analyzed quantity and performance when applied inside the compartment so that the deterioration of the quality of SF6 gas and insulation failure can be avoided as early as possible, and SF6 retain their character with BDV of 88.4 kV /cm ( according to the Critical Breakdown Voltage SF6). Hopefully, SF6 gas work according to its function as a medium of good insulation. As an application it has been done desiccant experiment on compartment GIS in the substation Darmogrande.

   

Full Text

 

Title: A statistical analysis on price elasticity of electricity demand using Response Surface Methodology
Author (s): Abdullah Asuhaimi Mohd Zin, Mehdi Moradi and Azhar Bin Khairuddin
Abstract:

For strategic planning under restructured environments, it is essential to assess how consumers respond to the price changes in order to increase the profits of suppliers and customers. In this study, a case study based on Iran power system was collected to explore the effect of different factors including proportion of income spent-level (A), consumer academic-level (B), demand-types (C), demand time (D), possibility of postponing demand-level (E), price-level (F), demand-level (G) and awareness of participation benefits-level (H) on price elasticity of electricity demand. To achieve this, an nonlinear-empirical model based on Response Surface Methodology (RSM) is created. The statistical analysis reveals that factor A which represents proportion of income spent-level has the most significant effect on determination of the price elasticity of electricity demand while consumer academic-level (B) factor has the least effect. The results can be utilized as a tool for policy makers in developing an effective electricity pricing schemes.

   

Full Text

 

Title: Designed a new compensation current control method for three-phase grid-connected photovoltaic inverter
Author (s): A. Asuhaimi Mohd Zin, A. Naderipour, M. H. Bin Habibuddin, A. Khajehzadeh and A.H. Khavari
Abstract:

This article proposes a New Compensation Current Control Method for Three-Phase Grid-Connected Photovoltaic Inverter. Our proposed grid-connected power converter consists of a switch mode DC-DC boost converter and an H-bridge inverter. The control method designed to eliminate main harmonics and also is responsible for the injection power to the grid. The proposed control method is comprised of the advance synchronous reference frame method (ASRF). The simulations for three-phase Bridge type inverter have been done in MATLAB/Simulink. To validate the simulation results, a scaled prototype model of the proposed inverter has been built and tested.

   

Full Text

 

Title: Analysis of a peak detection algorithm using system -on-chip architecture
Author (s): Lim Chun Keat, Asral Bahari Jambek and Uda Hashim
Abstract:

Peak detection is widely used in many signal-processing applications, since it allows automatic signal processing and produces faster result for users. In this work, an analysis of a peak detection algorithm implemented into a field-programmable gate array (FPGA) is discussed. A system-on-chip (SoC) hardware architecture was designed using the Altera platform to analyze the system data flow. A set of 1000 random data was executed by the peak detection algorithm in the SoC architecture. The output result obtained from the architecture were verified with the result obtained from a Matlab simulation. Based on the power consumption report, the reported power dissipation of the system architecture is 202.79 MW.

   

Full Text

 

Title: Analysis of brain regions and event related potential (ERP) associated with the imagination of actions by EEG signals and brain-computer interface (BCI)
Author (s): Diego Alfonso Rojas, Leonardo Andres Gongora and Olga Lucia Ramos
Abstract:

Brain-computer interfaces (BCI) are devices designed with the aim of enable ways of interaction and communication in people with disabilities, and improve the execution of different tasks in healthy individuals. Thus arises the concept of imagined action, which consists of using different techniques of measuring and processing, capable of registering, extract and classify features related to changes that take place in the cerebral cortex, specifically the motor cortex, at the time of thinking about a movement or action. This work presents the results of analyzing EEG signals from the thought of an action, specifically to push an object, using domain transformation techniques, as well as a methodology that facilitated the registration of the mentioned event, obtaining as main contribution the characterization of areas with greater activation and variation of potential at the time to imagine the movement.

   

Full Text

 

Title: Identification and quantification of Malathion using image analysis algorithms in infrared spectrometry
Author (s): Cristian Camilo Ortiz Yara, Olga Lucia Ramos Sandoval and Dario Amaya Hurtado
Abstract:

The infrared spectroscopy (IR) is a chemical analysis method cheaper and faster. Reason why it is important to deepen its application in the quantification of pesticides in food, especially for the detection of harmful amounts for human health. Using Matlab® tool, an algorithm capable of analyzing images of IR spectra was developed for transmittance and absorbance, without the need of using a calibration curve, as was commonly used, in order to identify and determine the amount of Malathion in a matrix. The algorithm calculates the area under the curve at intervals of 620-715 cm -1, 1018-1047 cm -1, 1200-1300 cm -1 and 1700-1800 cm -1, for C-S, P-O, C-O and C = O bonds respectively, from the absorbance spectrum. Once the problems of the matrix effect, the molecular dynamics and the information obtained on the image analysis, have been considered. The direct influence of the number of times that the bond repeats and the IR spectrum were achieved. A mathematical relationship was developed, which was capable to find the amount of analyte in a sample. Finally, the algorithm evaluation was developed, having two IR spectra of Malathion, the first reported in the data base SDBS and the second from a commercial sample at 57% w/v. It was obtained an error of 4.62% and 11,76% respectively.

   

Full Text

 

Title: Blind source separation on biomedical field by using nonnegative matrix factorization
Author (s): T. C. Chuan, A. M. Darsono, M. S. Md Saat, A. A. M. Isa and N. M. Z. Hashim
Abstract:

The study of separating heart from lung sound has been investigated and researched for years. However, a novel approach based on nonnegative matrix factorization (NMF) as a skill of blind source separation (BSS) that utilized in biomedical field is fresh presented. Lung sound gives beneficial information regarding lung status through respiratory analysis. However, interrupt of heart sound is the obstacle from taking precise and exact information during respiratory analysis. Thus, separation heart sound from lung sound is a way to overcome this issue in order to determine the accuracy of respiratory analysis. This paper proposes factorizations approach that concern on the 2 dimensional which is combination of frequency domain and time domain or well known as NMF2D. The proposed method is developed under the divergence of Least Square Error and Kullback-Leibler and it demonstrates from a single channel source. In this paper, we will forms a multivariate data and it will proceed for dimension reduction by log frequency domain. Experimental tests and comparisons will be made via different divergence to verify and evaluate efficiency of the proposed method in term performance measurement.

   

Full Text

 

Title: Enhancement of leakage resiliency based secure data transmission using Key Distribution Scheme shuffling algorithm
Author (s): Rincy S. Cherian and A. Veeramuthu
Abstract:

Side Channel Assaults (SCA) works on the information that leaked during the transmission. Sometimes unintentional outputs may leak the information to discover the secret information of the cryptographic modules. This paper tried to focus on the generic framework of lightweight key shuffling scheme to restrict the secret privileges. The Key Distribution Center (KDC) establishes the key “K” that is shared between the source and destination. Based on the message sent time and number of hops, the encryption and decryption process is built. Experimental results show that our proposed algorithm works better as far as throughput. We trusted that this algorithm is an efficient solution for detecting the side channel attacks. Blowfish Algorithm has been implemented and utilized in order to enhance the efficiency. The calculation comprises of two sections: a key-extension part and an information encryption part. Each round comprises of a key dependent stage, and a key-and information subordinate substitution. The main extra operations are four ordered exhibit information lookups per round. Blowfish utilizes an expansive number of sub keys. These keys must be pre computed before any information encryption or unscrambling. Creating the sub keys is ascertained utilizing the Blowfish calculation. Applications can store the sub keys as opposed to execute this determination prepare numerous times.

   

Full Text

 

Title: An efficient power control detection scheme for MIMO transmission in LTE
Author (s): Vanitha Rani Rentapalli, Sowjanya B. and B. T. P. Madhav
Abstract:

In this paper author’s proposed an efficient ordering scheme for interference cancellation, which is determined for multiple antenna systems using transmission power control. Based on this approach, the fixed ordering algorithm is first designed, for which the geometric mean is used for channel gain coverage. Simulation results shows that proposed ordering schemes using QR-decomposition require a reduced computational complexity results with improved error performance. In this article an overview of power control in LTE uplink MIMO schemes including receivers suitable for uplink MIMO are also presented, and their link performances are compared.

   

Full Text

 

Title: Optimization of dynamic channel allocation techniques in mobile wireless sensor network
Author (s): Vivita Sherin B. and Sugadev M.
Abstract:

Wireless network needs an access mechanism and communication services during the mobility of the nodes. A Mobile Ad hoc network is a type of Wireless network services which is provided when infrastructure is not available or in an impractical or expensive environment like Emergency rescue operation , military application, home networking. In ad hoc network host (mobile node) movement is frequent, topology changes are frequent, where there is no fixed cellular infrastructure for a multi hop network and data must be routed via intermediate nodes. Ad hoc network is used for setting up of fixed access point as the backbone infrastructure is not viable i.e. impractical or destroyed and with increased users daily in turn increases the significance of bandwidth efficiency by maintaining the tight requirement on energy consumption and delay. An Ad hoc On-Demand Distance Vector (AODV) Routing is a routing protocol used in these mobile ad hoc networks (MANETs) which provides on demand services by providing the dynamic channel allocation. A novel algorithm for the optimization of the dynamic channel allocation is provided for a CBR (cluster based routing) called “Mobile cluster based relay reconfiguration (MCRR)” Where the cluster head is chosen considering the energy of the all nodes in the cluster .This approach is used for increasing the performance by optimization in terms of throughput, energy consumption, packet loss and bandwidth for mobility mobile nodes. This paper the existing approaches are compared to the optimized algorithm MCRR through the simulation using the RED HAT software.

   

Full Text

 

Title: Vlsi design for a PSO-optimized Real-Time Fault-Tolerant task allocation algorithm in wireless sensor network
Author (s): Priyanka M., Anisha S. and Sakthi Prabha R.
Abstract:

The most complicated issues in a wireless sensor network are to distribute a task uniformly among the nodes of the sensor network. Rational distribution of sensing tasks would improve the lifetime of the sensor network and would even reduce the overall power consumption and the task will be executed within the given deadline. In this paper, we introduce a PSO-optimized Real-time fault tolerant algorithm (FTAOA) for WSN’s designed in VLSI to overcome the existing drawbacks. A P/B technique is adopted to overcome the faults in the sensor network and distribute the provided task rationally. The Discrete particle swarm optimization (DPSO) is constructed using the Binary matrix encoding form, which reduces the task execution time and saves the node energy by balancing the load on the sensor nodes. This can be achieved by developing an expression for Fitness function; this can even improve the scheduling effectiveness and system reliability. Primarily, FTAOA employs the P/B technique which uses passive backup copies overlapping methodology to monitor the mode of backup copies adaptively through scheduling primary copies early and backup copies delayed. The resources are well utilized, as tasks are allocated with high performance in terms of energy consumption, load and failure ration. The potency and efficacy of Fault tolerant mechanism can be examined through the final results.

   

Full Text

 

Title: Registration-analytical provision of productive expenditures management of commercial organizations in agro-industrial complex
Author (s): Anna S. Gorbacheva, Tatiana A. Chekrygina, Nadezhda V. Chernovanova, E. V. Golubeva and L. N. Pavlova
Abstract:

The authors offer and substantiate the hypothesis that one of the reasons for low level of competitiveness of national commercial organizations in agro-industrial complex is ineffective registration-analytical provision of productive expenditures management. The purpose of the article is to determine key problems and to develop recommendations for improvement of registration-analytical provision of productive expenditures management of commercial organizations in agro-industrial complex. For this purpose, by the example of a large enterprise Rusagro, the authors develop and approbate the methodology of evaluation of effectiveness of registration-analytical provision of productive expenditures management of commercial organizations in agro-industrial complex. As a result of the research, the authors come to the conclusion that the most important reason for low competitiveness of national commercial organizations in agro-industrial complex of Russia are high productive expenditures which are caused by influence of climatic factors and are uncontrolled. At that, among internal factors, which can be managed, the first place belongs to ineffectiveness of registration-analytical provision of productive expenditures management, which shows large importance of this factor. The authors determined causal connection between ineffective registration-analytical provision of productive expenditures management and low competitiveness of national commercial organizations in agro-industrial complex, found the most serious problems of registration-analytical provision of productive expenditures management of commercial organizations in agro-industrial complex which lead to its low effectiveness, and compiled recommendations for their solution.

   

Full Text

 

Title: Mathematical modeling of process parameters in Electrical Discharge Machining on 17-4 PH steel using Regression Analysis
Author (s): Chandramouli S. and Eswaraiah K.
Abstract:

Proper selection of machining conditions is one of the most important aspects in the die sinking Electrical Discharge Machining process. The objective of the present work is to develop empirical models and prediction of machining quality for Electrical Discharge Machining of martensitic Precipitation Hardening (PH) stainless steel with copper tungsten electrode. The important process input parameters such as peak current, pulse on time, pulse off time and tool lift time are selected to predict the machining qualities of Material Removal Rate (MRR) and Surface Roughness (SR). Taguchi experimental design (L27 orthogonal array) was used to formulate the experimental layout. The empirical models have been developed to predict the Material Removal Rate (MRR) and Surface Roughness (SR) using Regression Analysis (RA). Prediction capability of regression models are verified with experimental data. According to results, the regression model is better performed to predict the MRR and SR for a given range of process parameters of EDM.

   

Full Text

 

Title: Secure de-cloning process with enhanced reliability along with dual Encryption
Author (s): Aparna Ananda Mohan, Arsha Mary Philip and Chandu P. M. S. S.
Abstract:

The most essential fundamental in the cloud services is the de-duplication route which is used to prevent the similar copies of the stored data and prevention of data repetition. The de-duplication is executed to prevent the storage of similar kinds of content and similar file names in the cloud storage. The proposed system is having three major stages as Encryption, Auditing and De-duplication. The AES methodology is performed for the encryption process; the encryption is conducted at the service provider side, before uploading the data into the cloud. The auditor verifies the data reliability and converses within the service provider for getting the data information. The auditor is presenting the data security and integrity within privileges differential. The de-duplication process is being performed within the SHA-3 algorithm, which prevents the data duplication. This technique is preventing the file duplication by matching and comparing with the already uploaded file in cloud and removes the existing file and content initially by utilizing the SHA-3 algorithm. These are the three proposed techniques, which helps in improving the data efficiency in cloud environment and achieves the desired security process in the encrypted outsourced data base.

   

Full Text

 

Title: Attribute based encryption (ABC) algorithm for searching and securing encrypted data
Author (s): A. Vinothkumar, M. Anand and S. Ravi
Abstract:

Cloud servers are virtual servers that can be run on cloud computing environmental and it encrypts data by a common key. Due to this accessing client through server is easy. In this paper, client can encrypt, store and search data by their own key on server. If client sends encrypted queries to the server for searching, it returns the encrypted matching data without knowing about plain text. In this algorithm, attribute based searching mechanism is used for searching data on cloud in which server is only allowed to learn the set of encrypted documents and attribute of the documents and not the keyword data. A user’s private key is associated with a set of attributes and cipher text specifies an access policy over a defined universe of attributes within the system.

   

Full Text

 

Title: Application of an integrated QFD and Kano’s model, case study: Cabinet design
Author (s): Dian Retno Sari Dewi and Dini Endah Setyo Rahaju
Abstract:

QFD is a methodology that helps translating customer desires into technical specifications. Rating assessment in determining the relationship between customer need and engineering characteristics are often very subjective in QFD. QFD also assume that customer satisfaction is determined linearly with the need of customers. Yet according to the model of Kano, the increase in customer satisfaction is not linear with the need of customers. This study contributes to application the mathematical modeling to maximize customer need simultaneously in minimizing customer dissatisfaction to assign product development resources. The relationship between consumer desire and technical characteristics were obtained by regression. The model was applied to cabinet design. Results showed that the output obtained by the model can assign existing resources to improve customer satisfaction and dissatisfaction.

   

Full Text

 

Title: Preventing health care web applications from session hijack attacks using session key authentication and distributed session ID
Author (s): S. S. Manivannan and E. Sathiyamoorthy
Abstract:

Usage of health care web applications by network of hospitals and health care service providers are increases in the current technology world. Accessing the confidential healthcare information by doctors, patients over the wireless network is at the risk of information theft by various attacks. Most of the multi specialty hospitals situated in metropolitan cities, chief doctors are sending the prescriptions to the junior doctors over the intenet after successful completion of the surgery. Individual session is created for each user to access the health care data in a web application. Hackers make use of sniffer tools to crack the session ID and hijack the session in order to steal the confidential data of the patients. In this paper, we have proposed the session key authentication method and distributed session ID to secure the medical data against session hijack attacks in wireless networks.

   

Full Text

 

Title: Wavelet-based subsurface analysis in a non-stationary thermal wave imaging
Author (s): P. V. S. Saketh, P. Santosh Kumar, Sk. Subhani and G. V. Subbarao
Abstract:

Active infrared thermography makes use of temperature contrast over the object surface generated by distorted heat flow due to subsurface anomalies present in the material. This paper presents a wavelet transform based analysis for subsurface anomaly detection in recently introduced Quadratic frequency modulated thermal wave imaging for the subsurface analysis specimen and compares it with the contemporary Fourier transform based phase analysis using an experimentation carried over a carbon fiber reinforced plastic specimen with embedded flat bottom holes.

   

Full Text

 

Title: Pressure and pressure derivative analysis for hydraulically fractured vertical wells with face skin
Author (s): Freddy Humberto Escobar, Ruben Alberto Gonzalez, Laura Maria Hernandez and Claudia Marcela Hernandez
Abstract:

Pseudo linear flow takes place in finite-conductivity fractures when the fracture face possesses a moderate to high face skin. Then, an apparent linear flow will be developed once well bore storage has decayed. If given the case, the interpreter should avoid interpreting the test using the model for an infinite-conductivity fracture. Although, the straight-line conventional analysis has been included, this paper presents a methodology that uses characteristic points and lines found on the pressure derivative plots. The formulated technique was applied to a synthetic example and successfully compared to conventional analysis.

   

Full Text

 

Title: Secured and optimal retrieval of data in Cloud through computational techniques
Author (s): Sudha B. and Jabez J.
Abstract:

Within the Cloud computing system, it is essential to provide storage and security solution for users and the enterprises. It provides greater benefits like elasticity and flexibility. The Compromises of data occur due to attacks by the users. In this, we propose a secured and optimal retrieval of data in cloud through computational techniques. We ensure the security of the sensitive data through efficient fragmentation algorithm. Here, the data is fragmented and storing the fragmented pieces in multiple cloud nodes by ensuring each node stores a single fragment. It replicates and retrieves the fragmented data over the cloud space. The fragmented data are stored in a cloud node with a certain distance by means of Mersenne Twister computational technique and this prohibits the attacker to guess the location of fragmented data. It beats the assaults of finding the area of information and the bargain of hub containing the information is less. This does not depend on the cryptography procedures for security of information with the goal that it minimizes the expense of costly techniques. Furthermore, this likewise guarantees the internet getting to and altering of the record should be possible.

   

Full Text

 

Title: An efficient clustering formulation from resemblance in extant algorithms
Author (s): Mohana Prasad K., R. Sabitha and Oviya
Abstract:

Mobile commerce is an emerging trend. Mobile commerce provides exciting opportunities for users to perform shopping, order food, m-payments etc. This increasing trend leads to security threats. This paper is focused on user authentication, service provider authentication and security. User authentication is performed by using finger vein based biometric methodology. Existing system used for mobile payment services in handheld devices doesn’t involve biometric authentication. Hence leading to misuse and confusion among m-commerce users. Our proposed system is focused on finger vein authentication system (FVAS) for user authentication. The finger vein obtained is matched with the database using fuzzy logic system to obtain the matching score. If the matching score is above the threshold value PIN distribution process is initiated. Thus this paper looks to provide time efficient, high secure solution for m-commerce users and bring new m-commerce users to this vertical.

   

Full Text

 

Title: Efficient analysis of medical image de-noising for MRI and ultrasound images
Author (s): Mohamed Saleh Abuazoumy and Abdirahman Mohamud Shire
Abstract:

Magnetic resonance imaging (MRI) and ultrasound images have been widely exploited for more truthful pathological changes as well as diagnosis. However, they suffer from a number of shortcomings and these includes: acquisition noise from the equipment, ambient noise from the environment, the presence of background tissue, other organs and anatomical influences such as body fat, and breathing motion. Therefore, noise reduction is very important, as various types of noise generated limits the effectiveness of medical image diagnosis. In this paper, an efficient analysis of MRI and ultrasound modalities was investigated. Three experiments were carried out that include various filters (Median, Gaussian and Wiener filter). To validate the outcomes of medical image de-noising, both objective (quantitative) and subjective (qualitative) tests were used. Since the noise levels are scanner-dependent, this study has underlined several significant parameters to be considered in a generic de-noising algorithm for MRI and ultrasound modalities.

   

Full Text

 

Title: A high utility sequential pattern mining in sequence datasets
Author (s): R. Aroul canessane, N. Anbarasi and N. Abinaya
Abstract:

Mining sequential pattern is a critical exploration issue in information mining and learning disclosure with expansive applications. High utility successive example mining is a developing point in the information mining group. Contrasted with the great successive arrangement mining, the utility structure gives more useful and noteworthy learning subsequent to the utility of a grouping demonstrates business esteem and effect. Nonetheless, the presentation of "utility" makes the issue in a general sense not quite the same as the recurrence based example mining system and realizes emotional difficulties. In spite of the fact that the current high utility consecutive example mining calculations can find every one of the examples fulfilling a given least utility, it is regularly difficult for clients to set an appropriate least utility. A too little esteem might create a huge number of examples, though a too huge one might prompt no endings. In this paper, we propose two new calculations: “UtilityLevel (UL) is a high-utility successive example mining with a level-wise competitor era approach, and Utility Span (US) is a high-utility consecutive example mining with an example development approach”.

   

Full Text

 

Title: Comprehensive performance analysis of leakage gate MTCMOS seqential circuits using sleep transistors
Author (s): P. Sreenivasulu, K. Srinivasa Rao and A. Vinaya babu
Abstract:

There exist numerous techniques to reduce power consumption in sequential circuits. Major contributing factor for power consumption in these circuits is the clock and its effective management. To overcome this challenge methods such as clock gating, power gating and multi threshold are adopted in the design of these circuits. Effective implementation of sleep transistor logic also ensures the optimum utilization of the power in a design. This paper emphasizes and analyzes this implementation comprehensively in leakage gate MTCMOS sequential circuits. This work has been carried out on Virtuos platform and the simulation results give the better comparison of performance in various designs. This analysis fixes the challenge of reducing power consumption in sequential circuits in a most comprehensive manner.

   

Full Text

 

Title: 2-D object recognition using surveillance video processing on Daubechies wavelet decomposition
Author (s): Yashvanth kumar, Vara Prasad and Sakthi Prabha R.
Abstract:

The project suggests effective motion recognition built on background subtraction using dynamic threshold approach with mathematical morphology. Here the techniques frame differencing, dynamic threshold based detection will be used. In addition to dynamic threshold, mathematical morphology is also used within ability of greatly attenuating color dissimilarities has generated by background motions while still highlighting moving objects. After the object foreground detection, the parameters like velocity motion, speed will be determined. Finally the simulated results will be shown that used background subtraction with daubechies wavelet decomposition approach is effective rather than previous background subtraction methods.

   

Full Text

 

Title: The variability of fuzzy aggregation methods for partial indicators of quality and the optimal method choice
Author (s): Mikhail V. Koroteev, Pavel V. Tereliansky, Oleg I. Vasilyev, Abduvap M. Zulpuyev, Kadanbay Baktygulov and Beishenbek S. Ordobaev
Abstract:

This article examines the process of evaluating the integral index of the software quality using the method of fuzzy aggregation of multiple private indicators. The aim of the study is to determine the applicability of this approach in practice and research of its formalization and algorithmization approaches. A set of aggregation algorithms in the fuzzy inference model was used and their comparison in the application to the given problem is provided. Various modifications of the standard algorithm of fuzzy inference using fuzzy set operators, as well as different kinds of norms and conforms are considered. The study has revealed a wide variation of aggregation methods and provided the method of selecting the optimal one based on the comparison with standard numerical grades. The applicability of the methods of fuzzy logic was shown in the mathematical explanation of the decision making process, opening up the possibility of fuzzy-linguistic description of the subject area, private alternatives indicators and target vector formalizing.

   

Full Text

 

Title: Spacecraft control system with increased potential of robust stability in the class of single-parameter structurally stable maps
Author (s): Beisenbi, G. Uskenbayeva, A. Shukirova and J. Yermekbayeva
Abstract:

The article presents a new approach to construction control systems for objects with uncertain parameters in the form of single-parameter structurally stable maps of catastrophe theory to synthesize highly efficient control system, which has an extremely wide field of robust stability. Geometric interpretation of Lyapunov’s theorem second method and definition of system stability allowed to present initial dynamic system in the form gradient system, whereas Lyapunov’s function was presented in the form of potential function from catastrophe theory. Based on the above, universal approach is proposed for development and research of control system with increased potential of robust stability for spacecraft with linear and nonlinear models.

   

Full Text

 

Title: An android application for efficient e-question bank
Author (s): M. Lakshmi, Abhinayaa E. and Aiswariyaa Sruthi E.
Abstract:

Normally people’s actions are complicated being unplanned, planned in nature. The talent to organize all the activities without inconsistency is preferred by everyone, due to its time administration. Time management is a needed objective for successful people. In the same way examination [11] method is important for students and education institutions to evaluate the students’ performance. Thereby the exam nature would identify the student’s quality by institutions. Exam preparation is very important and challenging for every student. When students start preparing for their exams, they normally refer the existing year’s question papers to discover the question pattern, get idea of question models and find the frequent questions etc. To make these work easier, we provide the solution by an android application using efficient e-question bank system particularly for Sathyabama University. Our suggested system [12] uses searching algorithm and frequent questions mining algorithm for the application. This application is mainly built for students of Sathyabama University to search and download the previous year question papers. This proposed system also provides options for identifying the frequently asked questions from previous year question papers. Here we use Lucene scoring algorithm to extract the students-requested question papers from e-question bank data base and Apriori algorithm is used to mine the frequent questions from the old question papers.

   

Full Text

 

Title: Application of face detection system for passenger counting in lifts using Haar features
Author (s): N. V. Rajeesh Kumar, G. Dhana Sekar and M. Dennis
Abstract:

Face detection is currently used technology and has a wide range of application. This paper presents a methodology for maintaining the elevator capacity based on computer vision. In this paper face detection is done by detecting facial features such as face shape and human eye position. Haar like algorithm is used to detect the face which relies on Viola-Jones face detection algorithm.

   

Full Text

 

Title: Design, development and precision scanning of single DOF flexural mechanism using double flexural manipulator
Author (s): Sharad S. Mulik, Suhas P. Deshmukh, Mahesh S. Shewale and Avinash M. Badadhe
Abstract:

Flexural mechanism generate motion based on the flexibility of the elements which offers advantages such as friction-free motion, zero backlash and high order of repeatability. Various attempts had been made to design, develop flexural mechanism for precision applications. Present article discuss about the design of such flexural mechanism using double flexural manipulator (DFM). Here, DFM is designed using classical as well as numerical approach to achieve straight line motion. DFM consists flexural manipulator, actuator (VCM i.e. Voice Coil Motor), optical encoder and high speed data acquisition microcontroller dSPACE DS1104 R and D Controller Board. Further, DFM is manufactured and integrated with dSPACE DS1104. Experimental investigation is conducted and experimental parameters are estimated which are having close match with theory as well as numerical FEA analysis. Frequency response system identification is conducted and experimental transfer function is identified and validated with due experimentations. Further, PID control strategy is implemented on DFM and numerous experiments are conducted to test its precision positioning at high speed of the scanning. It is observed a positioning accuracy of less than 2 microns at scanning speed of 2 mm per second (low speed scanning) and precision position of less than 5 microns at 60mm per second (high speed scanning).

   

Full Text

 

Title: Tapered slot CPW-FED notch band MIMO antenna
Author (s): M. L. S. N. S. Lakshmi, B. T. P. Madhav, Habibulla Khan, N. Sai Sri Vasanthi, Anuja Bamra
Abstract:

A coplanar waveguide fed notch band antenna is proposed in this paper to notch WLAN operating band. A tapered step ground with notched circular patch is used in the proposed antenna design to get notch band characteristics. Half wavelength slits are introduced inside the tapered slot ground and in the circular patch respectively. An FR4 substrate material is used to prototype the proposed model and measured the S-Parameters on ZNB 20 vector network analyzer. The modified model is notching the band from 4GHz-7GHz in which WLAN operating band is there. The proposed antenna has lower cross polarization with excellent impedance bandwidth in the operating band.

   

Full Text

 

Title: Secure Quality of Service aware routing in MANET based on collaborative trust mode
Author (s): D. R. Jijimol and S. Behin Sam
Abstract:

Mobile ad hoc network (MANET) is a self-organized system comprised of mobile wireless nodes. All nodes act as both communicators and routers. Due to the absence of centralized administration in MANETs, communications between nodes are vulnerable to attacks by malicious nodes. In order to decrease the hazards from malicious nodes, recently researchers have given more importance to the concept of trust and recommendation in MANETs. In these models, the recommendations are prone to issues such as recommender’s bias, honest-elicitation, and free-riding. In this paper we have tried to build a simple collaborative trust model to minimize those issues. This model is used to evaluate the trust of a node based on the trust value given by the neighbors. Weights are given to the trust value based on the trust degree of neighbors. The data packets get forwarded towards destination through the path having greatest trust value. The effectiveness and efficiency of the algorithm is demonstrated through an extensive simulation experiment and results are analyzed based on the Quality of Service metric.

   

Full Text

 

Title: Continuous Sign Language recognition from tracking and shape features using FIS and ANN
Author (s): D. Anil kumar, P. V. V. Kishore, A. Harini, K. Raviteja, N. Roja Sneha, B. Ashok Reddy and M. V. D. Prasad
Abstract:

Fuzzy and Neural Network based classification of continuous sign language videos with simple backgrounds trained with hybrid features is the focus of this work. Tracking and capturing hand position vectors is the artwork of horn schunck optical flow algorithm. Active contours extract shape features from sign frames in the video sequence. The two most dominant features of sign language are combined to build sign features. This feature matrix is the training vector for Fuzzy Inference Engine (FIS) and Artificail Neural Networks (ANN).The classifiers are tested with 50 signs in a video sequence. Ten different signers created 50 signs. Different instances of FIS and ANN are tested with different combination of feature vectors. The results draw comparisons between FIS and ANN classifiers for Continuous Sign Language. A word matching score (WMS) gauges the performance of the classifiers. A 90.8% average matching score is reported for FIS and 91.2% for ANN.

   

Full Text

 

Title: Wireless sensor based GPS mobile application for blind people navigation
Author (s): Sunaina Vasireddy, Vyshnavi Ravipati, T. Ravi and G. Jegan
Abstract:

As the technology is increasing and depending would be a great problem, and for blind people it becomes so difficult to survey on this planet. When the blind people are in a critical position, it becomes very difficult for them to navigate themselves and survive. In order to help them in navigation this project has been implemented. Electronic devices which include sensors and other devices will be used to detect the obstacles and give information. Usage of different sensors are been used which will be detecting the obstacles in the environment. These will be controlled with the help of Raspberry Pie. The sensed signals will send to the mobile application using Bluetooth. Hence, the required information will be processed to voice which would help the blind for navigation. This system will helps for visually impaired can make an independent travel.

   

Full Text

 

Title: Lightweight clay brick ceramic prepared with bagasse addition
Author (s): Sutas Janbuala and Thanakorn Wasanapiarnpong
Abstract:

We successfully prepared lightweight clay brick with the addition of bagasse (5, 10, 15, and 20 wt%) at different firing temperatures (700, 800, 900, and 1000 °C). Higher bagasse contents resulted in higher values of porosity and water absorption, while reductions in thermal conductivity and bulk density were observed. In contrast, the increased firing temperature gave a decrease in porosity and water absorption, and higher thermal conductivity and bulk density. Porosity and water absorption were maximized with 20 wt% bagasse and a firing temperature of 700 °C. Lightweight clay brick containing 10 wt% bagasse prepared at a firing temperature of 1000 ºC gave the required bulk density (1.11 g/cm3), compressive strength (8.14 MPa), and water absorption (20.96%) to meet the Thai industrial standard of lightweight brick C10 TIS 2601-2013.

   

Full Text

 

Title: Characterization of hydroxyapatite/polypyrrole/poly (caprolactone) based solvent cast thin films
Author (s): Alireza Lari and Naznin Sultana
Abstract:

This study addressed the fabrication of thin films composed of Polypyrrole (PPy), hydroxyapatite (HA) and poly (?-caprolactone) (PCL) via solvent casting method. The polymer and composite films were subsequently characterized in terms of morphology, wettability and water uptake properties using different techniques. The characterization of the thin films were determined using a Scanning Electron Microscope (SEM), Energy Dispersive X-ray (EDX), water contact angle and water uptake. The addition of HA and PPy reduced the hydrophobic properties of PCL in the thin films. An energy dispersive x-ray (EDX) analysis supported the existence of HA in composite thin films. Water uptake of PCL thin film was lower than HA/PCL and HA/PPy/PCL composite thin films.

   

Full Text

 

Title: Current fed full bridge soft switching grid connected solar based push pull inverter
Author (s): P. Hemkumarand, G. Nagarajan
Abstract:

This paper proposes the Current fed full bridge soft switching grid connected solar based push pull inverter with high efficiency and good transient and dynamic response. This paper also aims to formulate a comparative study of the conventional open loop &proposed method and its performance analysis is done by the use of MATLAB. Compared to the conventional method, full bridge rectifier is used to improve high output power. In critical loads, the time domain specifications play a major role which otherwise damage the system performance. Thus, the analysis is made from the conventional and proposed converter with PWM pulse technique current fed push pull grid inverter. Circuit simulations and experimental results are shown to have excellent agreement with the fundamental analysis.

   

Full Text

 

Title: An interactive utility tool for placement cell management
Author (s): Paul Pringle A., Pothi Raja M. and A. Pravin
Abstract:

Every University has a separate faculty for planning and organizing placement activities for students. In order to provide information to students they would have created an email group for their students. But this method has some serious flaws such as, messages sent in these group is not received by a majority of students. This flaw can be overcome by building a messaging application for placement cell. Other than this messaging system this application will also provide a query system where students can post their queries. It will also provide information about previous year campus recruitments, practice test links for training purposes and information about the faculty’s working in placement cell.

   

Full Text

 

Title: Node behavior monitoring and removal of faulty nodes in wireless network
Author (s): Prachi Sudam Hule, Mohinee Kumari and Prem Jacob
Abstract:

There is a rapid increase in demand for applications that use wireless networks to generate packets with delay constraints. In addition, the node behavior monitoring mechanism needs to consider the reliable and unreliable nature of nodes, differing from one link to another. Furthermore, for increasing the security of transmission among the links we encrypt the packets before they are transmitted through the selected path. Based on this prototype the link quality of every node is analyzed and identification of reliable and unreliable link nodes is done.

   

Full Text

 

Title: Study on the thermal performance of a 10W LED fog lamp
Author (s): W. S. Shim and Y. L. Lee
Abstract:

These days the LED (light emitting diode) is being actively employed in automobiles, due to its wide range of color expressions and excellent durability compared to other conventional light sources. In this study, CFD and other experiments were conducted with the aim of achieving improved thermal performance of 10-Watt grade LED fog lamps. First, three types of heatsink were considered to examine the differences in thermal performances based on the shape of the heatsink. In addition, two PCBs were also compared one with the LED module attached to one side, and other with LED modules on both sides. The analytical result of this study showed that the circular type heatsink with LED modules attached to both sides of the PCB had the highest thermal performance. A prototype of a 10-Watt fog lamp was then produced based on the CFD analysis, and thermal experiments were conducted on the prototype lamp. The results showed that the LED junction temperature of the prototype remained below the marginal junction temperature.

   

Full Text

 

Title: Handling Data Skew in Map Reduce Using Hadoop LIBRA
Author (s): Lakshmi Priya V. and Rajalakshmi V.
Abstract:

There are many efficient tools significantly uses Map Reduce applications that assigns data with their corresponding tasks in parallel and distributed data processing. LIBRA symbolizes the lightweight problems of data skew with input data applications that can overlap map and reduce strategies. This is one of the innovative and accurate distribution methods for intermediate data sampling with normal steps of processing data. LIBRA has trivial overheads for output data that balances loads of computing resources. In this paper we propose the method for handling Data Skew in Map Reduce Using Hadoop in LIBRA to show the effectiveness of Hadoop on Web Crawling of Large Datasets form Web Servers. Map Reduce processes huge a set of data efficiently to establish its subsistence. The large job is divided into many small tasks and they are assigned to various nodes to perform parallel processing. Applications and Frameworks of Map Reduce. Straggler Process causes time delay. Data skew refers to the disparity in the amount of data assigned to each task, or the existence of inequality in the amount of work required to process such data. Data sets in the real world are often skewed.

   

Full Text

 

Title: Evenness in transport service ranking using Diversity Index
Author (s): K. R. Sekar, R. Ghurucharan and S. Depak
Abstract:

Tourism has always been one of the most important elements of pleasure for human beings. While planning tours, people usually concentrate only on the mode of transportation and not on the service offered by the transportation. Hence, if one does not give importance to the service quality, one would have to experience a terrible travel. This paper deals with a number of transport services for selected tourist destinations from a particular source. The attributes which validate a transport service were collected from various travel websites and the set of important attributes were chosen by feature selection using Principle Component Analysis (PCA) method. Then, the transport services for each selected tourist destination were ranked based on the selected attributes using crisp and fuzzy ranking methods. Finally, the transport services in which each of its attributes were given equal importance were determined using Simpson’s Diversity Index (SDI). Evenness is the term that is used to denote the ‘equal importance’ factor. SDI is the best approach to determine this evenness in any ranking method.

   

Full Text

 

Title: Algorithms for management objects in orthogonal packing problems
Author (s): Vladislav A. Chekanin and Alexander V. Chekanin
Abstract:

This paper contains proposed algorithms for constructing packing schemes applicable in solving of any orthogonal packing and rectangular cutting problems which are very actual in industry and economics. Usually for packing problems of different dimensions are used various packing models designed especially for each dimension. The described packing representation model allows managing of orthogonal objects of arbitrary dimension and fully describes all free spaces of packed containers in solving of one-, two-, three- and more dimensional orthogonal packing problems which ensures a maximal complete description of containers' state in time of packing. The algorithms of placing and deleting of the orthogonal objects are realized in applied software especially created for analyzing of efficiency of application of heuristic and met heuristic algorithms used for optimization of orthogonal packing problems.

   

Full Text

 

Title: Query optimization technique for videos in relational database
Author (s): Mercy Paul Selvan, Lokeshwaran S. and Kalai Selvan P.
Abstract:

PrefDB, “an inclination mindful social system that direct and successfully handles questions with slants”. In its inside, “PrefDB uses a slant careful information model and variable based math, where slants are managed as top notch natives”. We portray “a reference using a condition on the tuples affected, a scoring limit that scores these tuples, and an assurance that shows how beyond any doubt these scores are”. In our information model, tuples pass on scores with confidences. Our polynomial math incorporates the “standard social directors extended to handle scores and confidences”. For example, “the join executive will join two tuples and register another score-sureness pair by combining the scores and confidences that go with the two tuples”. Additionally, our variable based math contains another administrator, favor that surveys a slant on a connection, i.e., “given as inputs a connection and a slant on this connection, incline toward yields the association with new scores and confidences”. In the midst of slant appraisal, “both the unforeseen and the scoring part of a slant are used”. The prohibitive part goes about as "fragile" basic that makes sense of “which tuples are scored without blocking any tuples from the request result”. Thusly, PrefDB secludes slant evaluation from tuple isolating. It permits us to characterize the logarithmic properties of the incline toward administrator and manufacture nonspecific inquiry advancement and handling methodologies that are appropriate paying little respect to the kind of reference determined in a question or the normal sort of answer. The principle point of this paper is to propose and give a few inquiry enhancement systems to broadened question arranges and portray an inquiry execution calculation that mixes inclination assessment with inquiry execution, while making viable utilization of the local question motor.

   

Full Text

 

Title: Assessment of Jebba Hydropower Dam Operation for improved energy production and flood management
Author (s): Olukanni A. W. and Adejumo T. A. and D. O. Salami
Abstract:

One of the reservoir management options for flood moderation and energy production is the operation of Hydropower Dams to protect people and their socio-economic activities in flood plain areas. This study focuses on assessing Jebba Hydropower Dam Operation for improved energy production and flood management. Available Data for 27-year period (1984 - 2011) such as inflow, elevation, turbine release, generating head, energy generation, tailrace water level and plant coefficient was obtained from Jebba Dam Station. The present reservoir operating rule was investigated using statistical analysis to model the operation of the multi-purpose reservoir. Statistical tests carried out in accordance with standard procedure include chi-square (?2), probability plot coefficient of correlation (r), and coefficient of determination (R2). The results show that the optimal solution at operating performance of 50% reservoir inflow reliability has the total annual energy generation of 42105.63MWH with adequate water supply for downstream users and for irrigation throughout the year with annual optimal evaporation losses averaged at 58.16Mm3. Average optimal energy generation obtained is 19% of the observed energy generation but with adequate water supply for downstream users and for irrigation throughout the year. It is, therefore, essential to develop a decision-making framework capable of handling the conflicting demands.

   

Full Text

 

Title: Proposition of a methodology to evaluate the performance of the production process via performance indicators of both the production process and reverse chain process
Author (s): Faycal Mimouniand and Abdellah Abouabdellah
Abstract:

The production process represents the core of every industrial company. And each company strives to improve the critical process of production. The purpose of this work is to propose a methodology to evaluate the performance of the production process via performance indicators of both the production and the reverse chain process. The first part of the article presents the problems studied. The second part describes the literature review of reverse logistics and performance indicators. The third part highlights the interest of this study in the industrial field. The fourth part shows the different steps of the proposed methodology and the proposed performance indicators and its application to a case study followed by an analysis of the results obtained. The last chapter represents the conclusion and the research opportunities of this paper.

   

Full Text

 

Title: Determination of optimum sterilization condition based on calculated heat transfer rate for palm oil mill process
Author (s): Arif bin Ab Hadi, Dato’ Ir. Abd. Wahab Mohammad and Ir. Mohd Sobri Takriff
Abstract:

The study of temperature distribution inside sterilizer cage was conducted previously in order to improve the heat transfer efficiency during sterilization process based on calculated heat transfer rate at various locations inside sterilizer cage. In this study, further research was conducted based on laboratory experiment to investigate the optimum condition to achieve satisfactory sterilization based on the temperature profile inside FFB and the percentage of total loose fruit per total fruit let. The experiment was conducted at different sterilization time of 40, 50, 60 to 70 minutes excluding 5 mins de-aeration period. The result suggests that the optimum heat transfer towards FFB were determined to be248kJ/kg at estimated sterilization time of 60 minutes, which corresponds to 90% of total fruit let stripped per total fruit let in one bunch. The result obtained was used to determine the minimum sterilization time required inside the mill sterilizer cage for satisfactory sterilization condition based on the optimum heat transfer rate obtained in this study.

   

Full Text

 

Title: Video based facial spoof attacks detection using local binary pattern
Author (s): Jeba J., Naga Visaradha Nalam and G. I. Shamini
Abstract:

The identification of video source is very important for video validation evidence, tracking down video piracy crimes and regulating individual video sources. User authentication is an important step to protect information and in this context, face biometrics has more advantage. Face biometrics are natural, intuitive, easy to use and less human invasive. Unfortunately, recent work has face biometrics vulnerable to spoofing attacks using cheap low-tech equipment. We have introduced a method for face spoofing detection using spatiotemporal (dynamic texture) extensions of highly popular local binary pattern operator. With wide deployment, face recognition systems has been used in applications from border control to mobile device unlocking and laptop device unlocking. The combat of video spoofing attacks requires increased attention. We address the problem of video spoofing detection against replay attacks by using the aliasing analysis in spoofed face videos. We analyze the texture pattern aliasing that commonly appears during recapture of video or photo replays on screen in different channels (R, G, B and grayscale) and regions. Multi-scale LBP and SIFT features determines the texture patterns characteristics which differentiate a replayed spoof face from a live video (face present). We have introduced effective approach in face spoof detection both cross-database, and intra-database testing scenarios (video) and shows better comparison since we compare the edge pixel values and depth of pixel values of the authenticated person with the image stored in the database.

   

Full Text

 

Title: Efficient searching in social Internet of Things
Author (s): N. V. Rajeeshkumar, D. sindhujadevi and M. Thendralpreethi
Abstract:

The “Internet of Things” (IoT) incorporates countless and pervasive items that ceaselessly produce data about the physical world. A large portion of this data is accessible through standard Web programs and a few stages officially offer “application programming interfaces” (APIs) for getting to “sensors and actuators”. When objects communicate with one another and share data via social networks, this can open up tremendous opportunities for companies to create better, more useful experiences in the new digital realm. In Social systems and Internet of Things (SIoT), all things can be mingled. Social connections can be set up in the middle of individuals and things, and in the middle of things and things. Later on, individuals will live in the digital physical social hyperspace. SIoT can understand pervasive detecting and processing past the capacity of distinctive individuals or things, and animate advancements in these fields. In this paper, we collaborate offline social networking for query search over MANET through social Internet of things. Query results are got by a novel friend selection algorithm in distributed MANET network.

   

Full Text

 

Title: Bidirectional communication in Li-Fi technology
Author (s): Bharath B., Yaswanth Digumarthi, Ravi T. and G. Jegan
Abstract:

Li-Fi represents Light Fidelity; Li-Fi technology is a milestone in the history of wireless communication system. Since the number of people using wireless internet has increased, the network speed is reduced. Wi-Fi uses RF bandwidth which has more traffic so the possibility for interference is more. This can be overcome by using Li-Fi technology which implements transfer of data through simple light source (LED). Li-Fi uses LED for transmitting wirelessly, this method is called Visible Light Communication (VLC). It provides large bandwidth, security and low cost compared to other wireless communication systems. The systems using Li-Fi technology are Unidirectional which lacks in getting acknowledgement. This paper describes the Bidirectional implementation of Li-Fi technology for transmitting data in the form of text and image.

   

Full Text

 

Title: Design and performance analysis of Csla using adiabatic sub threshold logic gates
Author (s): Vinay kumar S., Karthick C. and P. Anil kumar
Abstract:

Digital sub threshold logic circuits can be recycled for applications in the ultra-low power end of the design spectrum, where presentation is of secondary position. A sub threshold digital circuit accomplishes to gratify the ultra-low power requirement because it uses the escape current as its effective switching current. This minute leakage current, though, it limits the extreme presentation at which the sub threshold circuit can be operated. Sub-threshold CMOS theory is a system which can decrease the power feeding to lower than threshold voltage specified. The adiabatic logic circuit is a system to decrease energy feeding by overpowering the voltage applied to the resistance of the circuit. In this it suggests that sub threshold adiabatic logic strategy implementation of carry look ahead adder. The simulation result is done in Cadence Virtuoso tool at 90nm technology.

   

Full Text

 

Title: Feature extraction and pattern identification of silent speech by using MFCC, DTW and AI algorithms
Author (s): Diego Alfonso Rojas, Olga Lucia Ramos, Joao Mauricio Rosario
Abstract:

At present are many the ways of communication, that allow the interaction among people of the same society, a particular case of these communication ways appears the silent speech, but it is still in study and development. Silent speech, is to acquire the signals generated in the vocal apparatus before a sound occur, in order to establish a channel of information transmission in environments with a considerable amount of noise or among people whose ability to emit sounds is limited due to various pathologies. In this work the results of capturing and analyzing signals of silent speech, with the aim of identifying phonological units of Spanish language are presented. Initially the signals acquisition was performed by NAM microphone, for further processing with feature extraction techniques like MFCC (Mel Frequency Cepstral Coefficients) and DTW (Dynamic Time Warping), which provided the necessary data for training the neural network for the pattern recognition task. The classification algorithm was trained with the data of 9 test subjects, all of the male gender, with 5 samples from each of the three phonological units that want to be recognized ('Uno','Dos','Tres'), as a final result the algorithm is able to classify and identify patterns with a success rate over 85%.

   

Full Text

 

Title: Unsupervised concept hierarchy induction based on Islamic glossary
Author (s): Ammar Abdulateef Ali and Saidah Saad
Abstract:

A machine-readable dictionary (MRD) is an electronic dictionary that enables query processing. One of the common processing tasks that has been widely applied is Concept Hierarchy Induction which aims at identifying concepts with its corresponding taxonomies such as named entities, synonyms and hyponyms. The Islamic domain contains a variety of concepts that are associated with numerous taxonomies. The existing concept hierarchy approaches for Islamic domain are using limited linguistic patterns. This study aims to propose an unsupervised concept hierarchy induction for the Islamic domain by extending the patterns and rules. In fact, Term Frequency-Inverse Document Frequency (TF-IDF) was carried out in order to identify the most frequently used concepts. Furthermore, two syntactical features were used including POS tagging and chunk parser in order to identify the tagging for each word (e.g. verb, noun, adjective, etc.) and extracting Noun Phrases (NP). Hence, the proposed extension patterns aim at utilize lexico-syntactic patterns to induce the concept hierarchy. The evaluation was performed using precision method by identifying the number of correctly extracted concepts and relation between them. Moreover, an expert review evaluation was performed by an expert in the Islamic domain. The experimental results showed that the proposed method achieved 82% precision. That demonstrates the usefulness of extending patterns for the Islamic domain.

   

Full Text

 

Title: Design analysis and optimization of Front axle for commercial vehicle using CAE
Author (s): M. Ruban and S. Sivaganesan
Abstract:

In the global competition, it is very important for the manufacturer to bring new product designs to market at a faster rate and at reduced cost. Up to 40% of the vehicle load carrying capacity is taken up by the Front axle beam. Therefore, optimization of front axle beam is necessary to improve strength to weight ratio for a given factor of safety without altering any assembly parameters. This is being achieved by using high-end optimization tool hyper mesh optistruct. Shape optimization tool in hyper mesh optistruct is used for analysis. In these work Design parameters such as Wheel track, King pin center, spring center, Weight of the axle and Rated load of axle was analyzed. The performance parameters such as stress, strain and displacement are measured by applying the vertical load, vertical and braking combined load and vertical and cornering combined load. The life cycle and strain value of the axle beam is analyzed.

   

Full Text

 

Title: Subtractive clustering based feature enhancement for isolated Malay speech recognition
Author (s): C. Y. Fook, M. Hariharan, Sazali Yaacob and Adom A. H.
Abstract:

This paper proposes a new hybrid method named SCFE-PNN, which integrates effective subtractive clustering based features enhancement and probabilistic neural network (PNN) classifier, had been introduced for isolated Malay word recognition. The proposed method of subtractive clustering features weighting is used as a data preprocessing tool, which designs at diminishing the divergence in features of the Malay word dataset, in order to further improve the recognition accuracy of the PNN classifier based speaker-dependent and speaker-independent mode. In this study, the mel-frequency cepstral coefficients (MFCCs) were extracted from the selected Malay word. The experimental results show the effectiveness of the proposed SCFE technique. The proposed method shows promising average results of 99.61% (Speaker Dependent) and 96.21% (Speaker Independent) in distinguishing between the selected Malay words.

   

Full Text

 

Title: Operational design and modelling of fire event tracking system in wireless sensor networks
Author (s): Omar Fouad Mohammed, Burairah Hussin and Abd Samad Hasan Basari
Abstract:

In recent years, WSNs have been widely used for monitoring of environmental changes as they are capable of combining their sensing of a phenomenon with their computational functions and operate with limited resources to accomplish an intended task. Sensors can cooperatively monitor the surrounding environment and provide data that help in realizing the time evolution of the phenomenon and anticipating its effects. Consequently, such information would facilitate performing control actions that meet the predetermined goals. As distributed computing enables the exchange of real time data statistics obtained from various sources that need to be combined together to infer real abnormal conditions for management decisions. As tracking of an event depends on the event type, high-accuracy localization of an event such as fire is a serious challenge, where most of traditional detection systems depend on visualization (cameras) in making their control decision. Moreover, those systems concern the continuous detection of fire and do not provide reliable and feasible mechanism for tracking fire spread. This paper presents the design and modelling of a fire event tracking system that consists of indoor distributed sensor nodes and a powerful intelligent processing unit (controller) to detect fire events and compute information to provide desired safety decisions. Whenever the temperature in a premise increases, the system deploys cooperative centralized control functions to collect and process data statistics related to the fire. It exchanges direction, velocity, and/or position to take proper decision such as evacuating people from fire areas to a safe exit.

   

Full Text

 

Title: The effect of fumigation toward the engagement ability of king pineapple leaf fiber (agave cantala roxb) with epoxy matrix
Author (s): Musa Bondaris Palungan, Rudy Soenoko, Yudy Surya Irawan, Anindito Purnowidodo
Abstract:

The purpose of this study is to find out the fumigated king pineapple leaf fiber (KPLF) engagement capability behavioral (IFSS) toward the epoxy matrix. The king pineapple leaf fiber fumigation treatment was under a time length of 5, 10, 15, 20 hours with the source of smoke from burning coconut shells and also comparing the KPLF without any fumigation treatment. KPLF without and with fumigation treatment was observed by SEM to determine the ability of the fiber engagement to the epoxy matrix and also for the KPLF surface morphology. The tensile test was conducted to determine interfacial shear strength by embedding a single king pineapple leaf fiber into the epoxy matrix as deep as 1 mm. The test result shows that the fumigation treatment causes the fiber surface becomes coarse, wrinkled, forming uneven grooves in a longitudinal and transverse direction. This condition would improve the KPLF and epoxy matrix engagement ability. The epoxy matrix interface shear stress (IFSS) with the untreated KPLF is a big as 4.48 MPa and for the KPLF treated for 15 hours the shear stress is as big as 17.15 MPa.

   

Full Text

 

Title: The dual nozzle Cross Flow turbine performance
Author (s): Corvis L. Rantererung, Sudjito Soeparman, Rudy Soenoko and Slamet Wahyudi
Abstract:

A Cross flow turbine is the most popular micro power plants because of the simple construction, reliable, but until to now, the turbine performance is still low compared with other water turbines. The purpose of this study was to examine the increase of the cross flow turbine with a dual nozzle as a hydro power generation performance. The research method is by testing and analyzing the dual nozzle Cross flow turbine performance. The Cross flow turbine best performance obtained in this study is that the best efficiency and optimal cross flow turbine with a dual nozzle of 78.80%. While the efficiency for a single nozzle cross flow turbine mounted horizontally is a little bit lower which is about 70.78%. While for the single nozzle cross flow turbine with a vertical position has the lowest efficiency of 61.92%.

   

Full Text

 

Title: Ordering objects on the basis of potential fuzzy relation for group expert evaluation
Author (s): B. Kh. Sanzhapov and R. B. Sanzhapov
Abstract:

The problem of ordering objects (determination of importance coefficients) indecision support systems is often connected with processing of expert information. The method for solving this problem with the presence of several fuzzy relations, which simulate the preferences of different expert groups, is proposed. Unlike the well-known approaches to the ordering of objects according to the fuzzy estimations of paired comparisons, the proposed method makes it possible to determine the resulting weights (potentials) of objects without the preliminary approximation of expert information. A numerical example is given.

   

Full Text

 

Title: Categorization of drugs based on polarity analysis of twitter data
Author (s): S. Rijo Meris, R. Raja Singh and J. Andrews
Abstract:

According to the present scenario, social media have emerged as major platforms for sharing information in medical field, business, education etc. In the existing system, the system will generate warning for adverse drugs reactions based on the negative comments. Social media provides limitless opportunities. The drug and disease related tweets are extracted from twitter API and web crawler based on the given input. The drugs can be predicted whether it is a best drug using polarity by extracted tweets are pre-processed by removing stop words, abbreviations and replacing. By this system, the user will not know which is the good medicine. In the proposed system, the consumer will gain knowledge about the best medicines.

   

Full Text

 

Title: Secure data hiding in image over encrypted domain
Author (s): Priyanka Kumari, Preeti Reddy M. and B. Bharathi
Abstract:

Steganography is a concept of hiding or concealing data in a cover object while the sender and receiver are able to communicate within themselves. The security of data has been prime concern for the people from past and many research works are still going to find out convenient methods to safeguard the communication between people. Intruder can easily detect the information in the links as internet does not have secure links. The transmission of data is required to be protected by limiting the chances for its detection while transmission. In this paper we have proposed a technique for image steganography that embeds or hides important or private messages or files into files like images, audio and video without affecting the quality of actual files. It is achieved by using the Least Significant Bits (LSB) of these files for embedding data in the portion of image, which are not used by the image viewing tools. It allows to embed the messages or files in encrypted form using steganography and uniform embedding algorithm which means that once encrypted, the message or file could be retrieved back (or decrypted) from the image only after specifying the correct password which was given by the sender at the time of embedding data into the image(or encryption).

   

Full Text

 

Title: Analysis and simulation of low power ALU design by using modified GDI technique in microchip application
Author (s): Sreenivasa Reddy M., Karthick C. and T. Hemanth Kumar
Abstract:

Power dissipation incorporates a major impact whereas we have a tendency to area unit coming up with any circuit. Since this issue plays a serious role when deciding the potency of the designed circuits i.e. while during this paper we have a tendency to area unit proposing an inspiration for sequent circuits in order that we will scale back the facility dissipation. Power dissipation that successively reduces the complete power dissipation of electronic equipment. During this paper, we have a tendency to plan a reduced power 1-bit full adder (FA) with 10-transistors and this can be employed in the look ALU. The planned style consists of GDI adder based mostly on mux circuits. By exploitation low power 1-bit full adder within the implementation of ALU, the facility and space area unit greatly reduced to quite five hundredth compared to traditional style and half-hour compared to transmission gates. So, the look is attributed as a neighbourhood economical and low power ALU .In this, ALU consists of 4x1 electronic device, 2x1 electronic device and full adder calculated to implement logic controls, like AND, OR, etc. and arithmetic operations, as ADD and cypher. GDI cells area unit employed in the look of multiplexers and full adder that area unit then associated to understand ALU. The simulation results are finished T-Spice tool with TSMC018 technologies.

   

Full Text

 


 

     

  

   

  

  

  

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

       arpnjournals.com                                                       Publishing Policy                                                  Review Process                                           Code of Ethics