ARPN Journal of Engineering and Applied Sciences                ISSN 1819-6608 (Online)
 

 
GoogleCustom Search
 
 
 
ARPN Journal of Engineering and Applied Sciences                               August 2015  |  Vol. 10  No. 14
   
Title:

Phishing website detection system based on enhanced iTree classifier

Author (s): D. Muthu Krishnan and V. Subramaniyaswamy
Abstract:

Nowadays, a lot of attacks have cropped up for phishing of emails and password of users. In order to get one’s confidential information like passwords, bank details such as debit or credit card numbers illegally, phishing act can be done. For doing an identity theft or financial gain or some fraudulent activities, an individual or group of persons gets confidential information from unsuspecting victims via email. This study proposes data mining techniques to classify phishing data’s and then attempts to rectify phishing. A decision classifier tree model is used for detecting phishing datasets and another hybrid session based model is also developed to escape from such phishing attacks. The use of the session based unique password is scrutinized to protect the privacy of the users which is not revealed by attacks or infected systems. The proposed model generates a novel minimum spanning tree called iTree which takes only a minimum time to construct it. The proposed iTree model classifies the inputs which are resistant to a number of phishing attacks and is also resilient to keyboard logging as well, thus ensuring reliability. The tree classifier model will be able to identify any types of attacks in the future. The proposed models of session based authentication and data mining based decision tree classification are much more accurate in the usage of the anti-phishing than the existing method.

   

Full Text

 

Title:

L Z source inverter with closed loop control system

Author (s):

Chokkalingam C. and M. Pushpavalli

Abstract:

This paper proposes closed loop of L Z source inverter. This inverter has three diode and two inductors in the main circuit. It boosts up the input DC voltage. The traditional inverters have capacitors in the main circuit which lead to many problems such as resonance produced in the circuit, voltage surge which can damage the devices, large volume, more cost, and reduced life span of the system. This inverter does not have capacitor in the main circuit and therefore eliminates the problems present in traditional inverters. But in industrial applications the control of output voltage becomes a difficult factor. The sudden voltage change creates many problems such as instability in the system, damage to devices etc. The voltage control is an important factor for stable operation of the system in real time. It can been achieved using the closed loop control of L Z source inverter.

   

Full Text

 

Title:

Elimination of power system harmonics using shunt active power filter with hysteresis current control technique

Author (s):

D. Maruthu Pandian and D. Godwin Immanuel

Abstract:

This paper proposes a SAPF with hysteresis current control technique. Active power filter consist of VSI, gate pulse to VSI is given by pulse generation circuit. This pulse is generated by the hysteresis controller which consists of PI controller, pulse generation circuit and control technique circuit. VSI and Vref will drive the PI controller which in turn gives to control technique circuits and then to pulse generation circuit. The load voltage is not constant in the line when extra load is connected, which create unbalance in the system. By means of online tuning the above said drawbacks can be eliminated.

   

Full Text

 

Title:

A hybrid genetic algorithm based Lagrangian relaxation approach profit based unit commitment problem

Author (s):

Logavani K. and S. Senthil Kumar

Abstract:

In this paper an application of a combined method for the profit based unit commitment problem (PBUC) using Genetic Algorithm and Lagrangian Relaxation (LR) is presented. The algorithm is proposed to solve PBUC under deregulated environment with the objective of maximizing GENCO’s profit and minimizing the operating cost. The problem formulation of the unit commitment takes into consideration the minimum up and down time constraints, start-up cost, and spinning reserve. UC schedule depends on the market price in the deregulated market. However demand satisfaction is not an obligation. GENCO can consider a schedule that produce less than the predicted load demand and reserve but creates maximum profit. The LR procedure solves the UC problem by dual optimization. The Genetic Algorithm (GA) develops the optimal schedule and Lagrangian Relaxation method produces Economic Dispatch. The proposed hybrid approach improves the performance of solving the Unit Commitment problem. The resultant schedule maximizes the profit and the proposed algorithm is tested for a 10 unit system taken as an individual GENCO and the simulations are carried out using MATLAB.

   

Full Text

 

Title:

Web usage forecast with adapted least recently used model

Author (s):

Prapai Sridama, Somchai Prakancharoen and Nalinpat Porrawatpreyakorn

Abstract:

The research focuses on decreased downloading of web pages from other web servers and decreased expenditure of cost. The quantity of web usage from people is increasing. This situation is effected to the networking traffic. The researchers try to solve this problem with new techniques. Unlucky, those techniques can give the hit rate not more 40 percent. Therefore, this research investigates Adapted Least Recently Used (ALRU) algorithm for solving the networking traffic. Many Mathematical Statistics theories are used in this algorithm for increasing the hit rate of the web cache memory as following; Estimated value equation, Interpolation with Cubic Spline, Interpretation of first derivative, Interpretation of second derivative, First Order Condition (FOC) and to find area under curve function. In addition, this model is tested with data sets of web usage from Walailak University. The result of this algorithm is shown that the quantity of downloading decrease more than other algorithms. However, the performance of ALRU algorithm has compared with the LRU algorithm which is a popular algorithm in the present. Furthermore, the maximum of the hit rate of the ALRU algorithm is 72.56 percent but the LRU algorithm can give the maximum hit rate 53.8 percent. However, the average value of the hit rate of the ALRU algorithm is 53.8 percent while the LRU algorithm can give 12.99 percent.

   

Full Text

 

Title:

IEEE 754 compliant floating point fused add sub unit

Author (s):

Sharmila Hemanandh, Siva Subramanium

Abstract:

Floating point arithmetic is a key component in the development of many algorithms for DSP applications that require large dynamic range and high level of accuracy. This paper proposes a floating point fused add sub unit that computes the sum and the difference of two operands simultaneously.  Algorithms like FFT and DCT require the sum and the difference of two operands. The proposed fused unit is compliant with both single precision and double precision IEEE 754 standard of floating point representation. It also supports all rounding modes. When compared with the conventional floating point adder, the results obtained using the fused unit are more accurate since the number of rounding operations is reduced in the proposed unit. The fused unit is implemented using Verilog HDL and synthesized using Xylinx 14.1.

   

Full Text

 

Title:

The influence of clustering techniques in the diagnosis of genetic disorders

Author (s):

B. Lakshmipathi and G. Kousalya

Abstract:

Clustering is a process of putting similar data into groups. Clustering has considered the most important unsupervised learning technique so, as every other problem of this kind; it deals with finding a structure in a collection of unlabeled data. This paper reviews the six types of clustering techniques namely k-Means, Hierarchical, DBSCAN, OPTICS, STING. All these algorithms have compared according to the factors: size of dataset, the number of clusters, types of dataset and the type of software used. Some conclusions that have extracted belong to the performance, quality, and accuracy of the clustering algorithms.

   

Full Text

 

Title:

Numerical analysis on piston optimization for enhanced mass flow rate in oil pumps

Author (s):

S. J. Park and Y. L. Lee

Abstract:

Oil pumps are used when friction occurs between components in automotive engines or compressors. This study performed piston optimization to improve the mass flow rate of oil pumps for use in linear compressors. In addition to adjusting the piston length, a taper and fluid diode was used. Under the proposed conditions, the mass flow rate improved by 19% by adjusting the piston length, 43% from using a fluid diode, and 56% from using a taper.

   

Full Text

 

Title:

A web based approach to detect mimicking attacks in homogeneous environment

Author (s):

R. Padmapriya and S. Igni Sabasti Prabu

Abstract:

Botnets have become major engines for malicious activities in cyberspace nowadays. Botnets are the main drivers of cyber attacks, such as distributed denial of service (DDoS), flash crowds, information phishing and email spamming. Both flash crowds and DDoS attacks have very similar properties in terms of internet traffic. Flash crowds are legitimate flows whereas DDoS attacks are illegitimate flows. To sustain their botnets, botnet owners are mimicking legitimate cyber behavior. This poses a critical challenge in anomaly detection. In this work, study of mimicking attacks and detections from both sides, as attackers and defenders is done. First of all, a semi-Markov model for browsing behavior is established. Based on this model, a botmasters can simulate flash crowd successfully in terms of statistics, with a sufficient number of active bots (not less than the number of active legitimate users). But it is hard for botnet owners to satisfy the condition to carry out a mimicking attack most of the time. With this new finding, we conclude that mimicking attacks can be discriminated from genuine flash crowds using second order statistical metrics. We detect the mimicking attacks when the sufficient number condition does not hold for botmasters. Detection is proclaimed to the user. Furthermore, the findings can be widely applied to similar situations in other research fields.

   

Full Text

 

Title:

Bandwidth enhanced and sidelobes level reduced radial line slot array antenna at 28 GHZ for 5G next generation mobile communication

Author (s):

Ibrahim Maina, Tharek Abd. Rahman and Mohsen Khalily

Abstract:

Radial Line Slot Array Antenna has simple structure and exhibit good radiation characteristics. It is low cost, easy to manufacture with high gain and it found application in services like Direct Broadcast Services and Wireless LAN. Its features make it attractive for millimeter wave mobile broadband applications like the fifth generation (5G) mobile communication system. Also, it can be designed for circular, linear or elliptical polarization. But achieving a reduced sidelobes level has not been an easy task in its design. This paper presents a simple technique to improve the impedance bandwidth and reduce the sidelobes level in linearly polarized Radial Line Slot Array Antenna at 28 GHz for 5G communication system. In the design, high frequency laminate RT duroid 5880 and air gap were utilized with a modified dielectric coated 50 Ω SSMA connector as the coaxial to waveguide transition. The technique was experimented via simulation on Computer Simulation Technology Microwave Studio 2014 software. The simulation result gave a return loss of -18.98 dB at 28 GHz. Gain of 23.3 dB, 10 dB impedance bandwidth of 1.28 GHz, sidelobes levels of: -16.5 dB (E- plane); -17.5 dB (H- plane) and efficiency of 96 % were realized.

   

Full Text

 

Title:

Robust image steganography by embedding selective intrinsic mode functions with discrete wavelet transform

Author (s):

S. Senthil Kumar and K. Palani Thanaraj

Abstract:

Steganography is the method of embedding information in a carrier medium for secure transmission. Steganography enables protection of confidential data that arise in many military and communications systems, online retail and banking systems, medical data transmission etc. This paper focuses on medical image steganography that involves hiding a secret medical image into a cover image thereby preserving patient privacy. In this work improvements to discrete wavelet transform (DWT) based steganography is attempted in different clinical settings. Here we propose to combine DWT with empirical mode decomposition (EMD) at different frequency scales for robust and secure image steganography. Initial step involves decomposing the cover and secret image to predefined approximation level using DWT. Then the approximate secret image is decomposed to intrinsic oscillating modes that contain details at different frequency scales.  A selection procedure is initiated in this stage where the user can embed the secret image at different detail level based on the application requirements. The predefined intrinsic modes of secret image are embedded in the cover image by a linear mixing model. Then inverse DWT is applied to reconstruct the stegano image. Performance assessment of the proposed method is carried out (6.5% of payload) with image quality metrics such as peak signal to noise ratio (PSNR), mean Square Error (MSE), maximum absolute error (MAXERR) and ratio of squared norms (L2RAT) are tabulated and compared with DWT based steganography. Our study shows that proposed method can be a robust tool in secure transmission of secret images.

   

Full Text

 

Title:

Signature based intrusion detection in cloud based multi-tenant system using MTM algorithm

Author (s):

N. Thirumoorthy, M. Aramudhan and M.S. Saravanan

Abstract:

The improvement of security prevents the malicious attacks from various types of networks. The intrusion by the malicious attackers in real time cloud networks has major issues for security credentials. The various types of attacks are identified in cloud networks are not enough to handle the critical situations. This paper contributes a new class of malicious attacks or intrusions in the cloud network and addresses the mischievous and malicious behaviour, which is the root cause for the modification of cloud network stored data. The cloud based storage services are handled by single or multi-tenant based system. This paper uses the patient healthcare record, which is handled by multi-tenant users for various applications. This is the first attempt to identify the multi-tenant user attacks in cloud network. In this attempt a new algorithm is introduced, that identifies the multi-tenant user database malicious attacks. The basic idea of this algorithm is devised from the wireless LAN malicious attacks. Hence Multi-Tenant Mapping (MTM) Algorithm developed to analyse data flow inconsistency with the less number of packet transfer between the cloud nodes. This type of analysis is presented in this communication. Analysis of information in the unbound values determines whether the database value has been compromised for any attacks.  Results show that the proposed algorithm has a promising prediction for malicious attacks for multi-tenant based user data security

   

Full Text

 

Title:

Reversible watermarking technique using time-stamping for relational data

Author (s):

Malathi K. and Veeramuthu A.

Abstract:

Watermarking procedure is a conspicuous pattern used to recognize credibility. This procedure is elusive and harm against malicious attack. Watermarking has been utilized for ownership protection for a couple data organizations like pictures, video, sound, program, xml records, geographic information frameworks related data, content archives, relational databases that are utilized as a part of distinctive application domains. As of late, cunning mining systems have been utilized for data which is extracted from relational databases. This is utilized to identify captivating patterns that give critical backing to leaders in making compelling, right, and applicable choices. By and large, data imparted between its proprietors and true blue clients obliges data security. To be sure data protection and security, proprietor’s database is outlined with watermarking data. The proprietor of the social database implants the watermark data. The bends in the first data are kept inside positive points of confinement, which are characterized by the ease of use limitations that save the learning contained in the data. The proposed method inserts each minor bit of a multi bit watermark in every chose column with the point of having greatest vigor. Guaranteeing the assailant is not able to degenerate the watermark of the dataset.

   

Full Text

 

Title:

Source and destination anonymity using end-to-end anonymous addressing scheme in WSN

Author (s):

D. Angeline Deborah Monica, S. Karthikeyan and V. Brindini

Abstract:

The wireless sensor network is most widely used for the critical applications; we need to provide the anonymity for the source and destination. The proposed scheme named as End to End anonymous addressing scheme will provide anonymity with less computational and storage overhead. In the proposed scheme, the hop by hop authentication is provided by using the Elliptic Curve Cryptography (ECC) based Digital signature scheme. The source node sends the message along with signature. Each and every intermediate node should validate the signature to ensure that it receives the message from authenticated node. It will forward to next hop node, only the signature is valid otherwise it will drop the message. The anonymous address scheme is used to provide the destination anonymity. In this technique, the Duplicate Address List (DAL) is constructed by destination and send to the source node. The source node attaches this DAL with DATA packet. To provide high security for the destination address the destination address is encrypted by using ECC and then append with DAL. The performance of the proposed scheme is evaluated by using the network simulator NS2. The packet delivery ratio, packet loss ratio, End to End delay is used to evaluate the performance.

   

Full Text

 

Title:

Examination of pasture records on web safety measures commitment

Author (s):

Sinthuja Mohan and A. Sivasankari

Abstract:

Most data frameworks and business applications constructed these days have a web frontend and they have to be generally accessible. These web applications, which can be gotten to from anyplace, may make a security helplessness issue will most likely be uncovered and misused by programmers. To see how these vulnerabilities are truly happened, this paper likewise shows an examination of the source code of the scripts used to assault them. This likewise can be utilized to prepare programming designers and code auditors in the identification of such blames and are additionally the establishment for the examination of sensible weakness and assault injectors. In this paper, we accordingly propose to make trusted equipment a top of the line subject in the safe information administration stadium. Additionally, we trust that cost-driven experiences and compositional standards will on a very basic level change the way frameworks and calculations are planned.

   

Full Text

 

Title:

A novel approach for fusion of panchromatic and multispectral image through neural network

Author (s):

Gayathri Rajagopal, Saranya Velu and Dhivya Sampath

Abstract:

In this paper, a new technique for image segmentation from high resolution fused multispectral image is recognized. The proposed techniques are a mixture of image fusion, feature extraction like shape and edge and also perform fused multispectral image classification. Researchers have performed an enormous amount of experiments on multi-focus image fusion techniques. To extract superior quality information and consistency by using multi-focus image fusion and also it is developing into many image processing applications. A fusion method enhances the feature of image and also enlarges the application of these data. The panchromatic image has high spatial information while multispectral image has high spectral information when merging these images to get a high resolution multispectral image. By using spectral and spatial information the feature is extracted to enhance the accuracy of the image. Therefore, conventional methods are suffering from either spatial or spectral characteristics, but the proposed methods save both spectral and spatial characteristics simultaneously. Conventional methods like a high pass filter modified principal component analysis and atour’s method. The proposed method uses multi-wavelet transforms through a pulse coupled neural network. Performance can be evaluated based on the classification of fused multispectral image and also investigate the impact of image fusion using selected features of reference and fused image. Using, SVM classifier to build classification experimentation on fused multispectral image. Therefore, the final results of the proposed method are more efficient than the conventional methods.

   

Full Text

 

Title:

Circularly polarized Koch fractal triband antenna for wireless communication applications

Author (s):

B T P Madhav, K. Sairam, M. Deepika, V. Naresh, Ch Saisri, K. Mounika

Abstract:

A novel monopole asymmetric fractal micro strip antenna is designed and analyzed in this paper. The proposed Koch fractal monopole antenna is resonating at triband with circular polarization operation. Five diff structures - without slot (basic model), single slot (Iteration 1), double slotted (Iteration 2), triple slotted (Iteration 3), and optimized fractal slot (Iteration 4) are studied for circular polarization radiation. Perturbations in the structure for triband CP radiation are introduced by employing optimization in the asymmetrical Koch fractal curves as boundaries of a square patch and embedded triangular slots. The generated 3-dB axial ratios are analyzed with the simulation results demonstrate that the proposed antenna design is suitable for wireless communication applications.

   

Full Text

 

Title:

Securing the privacy of sensitive data on health management system using elgamal encryption

Author (s):

G. Nagapriya and Jeberson Retnaraj

Abstract:

Most healthcare systems still rely on paper medical records. To coordinate care between patients and physicians and amongst the medical community is limited. The online health analysis system will help to check the patient health condition regardless of the patient or doctors geographical location. In practical life patients such as old aged or handcrafted peoples face lot of difficulties in tracking their health status. In this paper, the proposed solution is track the patient’s health records in digital format and uploads the file in to cloud space using personal computers. The patient health record file can be encrypted by using strong security algorithm and stored in the cloud space. The doctors will check their assigned patient status by checking the client module. The Doctors and Nurses who are authenticated or Government approved doctors can be registered in to the system; they can able to view the patient records. Doctors will login in to the system, get the patient’s health records from cloud space, review their health condition and reply the patients by proposing the prescribed medicines. The proposed application will help the patients by reducing their travelling time to hospitals, reduce time spending in getting their appointments, reduce time spending in taking the proposed reports by doctors and the patient reports can be viewed online without any issues.

   

Full Text

 

Title:

Secured data storage design using cryptography

Author (s):

V. Jayanthiand Maria Anu

Abstract:

Cryptography is the practice and study of techniques for secure communication in the presence of third parties (called adversaries). More generally, it is about constructing and analyzing protocols that overcome the influence of adversaries and that are related to various aspects in information security such as data confidentiality, data integrity, authentication, and non-repudiation. Applications of cryptography include ATM cards, computer passwords, and electronic commerce. In this paper, we implement the self-generating key approach it is proposed to use an algorithm stored in a procedure in the SYS schema which will be made executable by PUBLIC with a public synonym. However only the DBA can view or edit the procedure thus preserving the secrecy. The algorithm will generate a RAW key value using the filename of the Binary Large OBject (BLOB) or CLOB and the date of uploading into the LOB with a shuffling algorithm stored in the procedure. This is used as the encryption key.

   

Full Text

 

Title:

FPGA implementation of highly area efficient advanced encryption standard algorithm

Author (s):

D. Arivazhaki, V. Vijayakumar and T. Ravi

Abstract:

Cryptography is art of science that encrypts plain text into cipher text (unreadable form) for security in electronic data transmission over network fields. For this method the current encryption method is Advanced encryption standard. The proposed method is hardware implementation of AES-128 and the key length is varying 128,192 and 256 bits is designed by Impulse C language with the help of Xilinx Platform Studio. Impulse C is a high level synthesis tool and supports parrel programming in particular for programming applications mainly targeting FPGA based devices.

   

Full Text

 

Title:

Characterization of the spherical stabilization flow regime by transient pressure analysis

Author (s):

Freddy Humberto Escobar, Alfredo Ghisays-Ruiz and Priyank Srivastav

Abstract:

There are three typical cases in which a constant-pressure boundary is combined with some other transient periods giving origin to the formation of new flow regimes. Such cases are radial stabilization, linear stabilization and spherical stabilization. The first one when a radial flow regime finds a constant-pressure boundary, the late pressure derivative will display a straight line with a negative unit slope. Once all the boundaries have been felt by the transient wave the pressure derivative will take the classic cascade behavior. The third case takes place in elongated system when the well is near a lateral pressure-constant boundary, then a transient period is expected along the other side of the reservoir. A combination of that with the effect of the constant–pressure boundary leads to the formation of the linear stabilization or parabolic flow regime. The third case corresponds to a limited-entry well completed near a constant-pressure boundary. In that case a -3/2 slope is seen in the pressure derivative plot and no characterization of this has ever been presented in the literature. So, a governing equation for such flow regime is developed and characterization of that is achieved by both conventional analysis and the TDS technique so both vertical and horizontal permeabilities can be estimated. Synthetic examples were run to validate the applicability of the provided equations.

   

Full Text

 

Title:

Common rail diesel-automotive to aerial vehicle conversions: An update (Part III)

Author (s):

Luca Piancastelli, Leonardo Frizziero and Giampiero Donnici

Abstract:

Back to the 1997 when this activity began, it was generally though that CRDIDs (Common Rail Direct Injection Diesel) would have completely replaced the piston gasoline engines used in aircrafts within a decade. This fact did not happen for several reasons. This paper tries to individuate these reasons. The more updated solutions to the many problems that almost stopped this application are also introduced. In this third part, maintenance and cost effectiveness related issues are introduced. Automotive OBD concept is described as a method to reduce maintenance costs and risks.

   

Full Text

 

Title:

A study on performance enhancement of refrigerators using economizers

Author (s):

J. W. Jeong and Y. L. Lee

Abstract:

Many studies have been conducted to overcome the deterioration of COP (coefficient of performance) that occurs from lowering the evaporating temperature of a cascade cycle to extremely low temperatures. This study applied economizers to low stage and high stage cycles to enhance the performance of the R134a-R404a cascade cycle. Cycle analysis was performed to examine changes in cycle performance with condensing temperature, evaporating temperature, cascade temperature difference and economizer ratio. Numerical analysis revealed a 13% improvement in both cooling capacity and COP from applying an economizer to the low stage cycle. The optimal temperature difference of the cascade heat exchanger was approximately 6oC.

   

Full Text

 

Title:

Analysis of superposition ratio control method for the improvement of voltage utilization factor in three phase multilevel inverter

Author (s):

S. Narasimha and M. Sushama

Abstract:

In this paper, a new approach for the control of superposition ratio of odd harmonic wave into output voltage feedback control and improvement on voltage utilization factor is presented. The input DC sources feeding the inverter are considering being varying in time, In case of solar and fuel cell applications. In fact, each one of the dc sources can have different values at any time, but the output fundamental voltage will stay constant. This paper gives detailed analysis of the improvement on the controllability and absorption of the DC voltage fluctuation by superimposing the moderate odd harmonic wave. The results obtained using 5level and 7level cascade multilevel inverters with static and dynamic loads with spwm, using simulink/MATLAB.

   

Full Text

 

Title:

Analyzing of free transverese vibration of an elastically connected rectangular plate-membrance system with a Pasternak layer in-between

Author (s):

M. Nasirshoaibi and N. Mohammadi

Abstract:

This paper theoretically analyzes free transverse vibrations of an elastically connected rectangular plate-membrane system with a Pasternak layer in-between. Solutions of the problem are formulated by using the Navier method. Also natural frequencies of the system are determined. The effect of Pasternak layer on the natural frequencies of this mixed system is discussed in a numerical example. Increasing shear foundation modulus of the Pasternak layer causes an increase in the value of natural frequency of the system (ωimn); however this influence of the shear foundation modulus of the Pasternak layer is different at some particular frequencies. That is, this effect is stronger at ω2mn frequencies rather than what is seen at ω1mn frequencies. The mixed system has an interesting feature which allows each natural frequency to change as a function of shear foundation modulus of the Pasternak layer, whilst other constructional and physical parameters of the system can remain unchanged. The important result on which this paper puts an emphasize, is that the magnitudes of the frequencies become larger with increasing shear foundation modulus of the Pasternak layer and the Pasternak layer can increase the magnitude of frequencies more than Winkler elastic layer can. Thus the Pasternak layer can be used instead of Winkler elastic layer to more effectively suppress the excessive vibrations associated with plate-membrane systems. Numerical results of the present method are verified once compared with those available in the literature.

   

Full Text

 

Title:

Evaluating the performance of various hybrid fuzzy clustering algorithms on brain magnetic resonance images

Author (s):

T. Avudaiappan, R. Shanmuga Priya and R. Balasubramanian

Abstract:

Image Segmentation is an indispensable process in the visualization of human tissues, particularly during clinical analysis of MR Images. The Objective of this paper is to talk about the usage of Fuzzy Logic in MRI Brain image segmentation. There are different fuzzy approaches to segment the MRI Brain image. In this paper, different fuzzy clustering algorithms are used for the segmentation of brain MR Images. One of the major issues of the fuzzy clustering algorithm based brain MR image segmentation is how to select the initial prototypes of different classes or categories. In this paper, the quantitative indices are described to extract local features of brain MR Images, when applied on a set of synthetic and real brain MR Images, for segmentation.

   

Full Text

 

Title:

Score level fusion of multiple features for efficient personal recognition

Author (s):

Esther Rani P. and Shanmugalakshmi R.

Abstract:

Hand based biometric systems are widely used in many applications owing to their reliability and high user acceptance. In this work, a multimodal biometric system for personal identification using score level fusion of palmprint and finger knuckle print is proposed. Features are extracted from palmprint using Gabor filter and Principal Component Analysis. Euclidean distance is used for matching and the minimum scores generated by the matchers are combined using sum rule. Also from finger knuckle print Speeded up Robust Features and Bidirectional Empirical Mode decomposition is used to extract features and scores are combined using sum rule after score normalization using min-max technique. Finally score level fusion using different rules is applied on the palmprint and finger knuckle print matching scores. The multimodal system is implemented using MATLAB and it is found that it provides low value of false acceptance rate, false rejection rate and equal error rate and high genuine acceptance rate in comparison to unimodal system using either palmprint or finger knuckle print.

   

Full Text

 

Title:

Road restraint systems monitoring with stereoscopic dip-technique

Author (s):

Marco Guerrieri and Raffaele Mauro

Abstract:

Road restraint systems (RRS) are used to protect vehicle occupants from dangerous roadside elements such as rigid obstacles, slopes, utility poles, etc. The crashes on a road restraint system damage its structure and, therefore, the functional behavioral; for this reason is required monitoring the RRS into their operational conditions. The research addresses the problem of the measurement of safety barrier (SB) deformations by means digital image processing technique (DIP). This technique is founded on the analysis of high resolution photos/videos, obtained by means of 3D camera installed into a data vehicle. The DIP technique has been used for evaluating the longitudinal safety barriers deformations. A case study concerning N2 W-beam guardrails installed along a rural road in Italy was examined. The procedure has shown that the DIP technique can be used with the aim to monitoring guardrails and, therefore, to identify the cases in which damaged SB must be repaired or replaced.

   

Full Text

 

Title:

Decision tree based feature selection and multilayer perceptron for sentiment analysis

Author (s):

Jeevanandam Jotheeswaran and S. Koteeswaran

Abstract:

Sentiment Analysis plays a big role in brand and product positioning, consumer attitude detection, market research and customer relationship management. Essential part of information-gathering for market research is to find the opinion of people about the product. With availability and popularity of like online review sites and personal blogs, more chances and challenges arise as people now can, and do use information technologies to understand others opinions. In this paper, a Multi-Layer Perceptron (MLP) is used to classify the features extracted from the movie reviews. A Decision Tree-based Feature Ranking is proposed for feature selection. The ranking is based on Manhattan Hierarchical Cluster Criterion In the proposed feature selection; a decision tree induction selects relevant features. Decision tree induction constructs a tree structure with internal nodes denoting an attribute test with the branch representing test outcome and external node denotes class prediction. In this paper, a hybrid algorithm based on Differential Evolution (DE) and Genetic Algorithm (GA) for weight optimization algorithm to optimize MLPNN is proposed. IMDb dataset is used to evaluate the proposed method. Experimental results showed that the MLP with proposed feature selection improves the performance of MLP significantly by 3.96% to 6.56%. Classification accuracy of 81.25% was achieved when 70 or 90 features were selected.

   

Full Text

 

Title:

Magneto-hydrodynamics non-newtonian squeeze film characteristics of porous curved circular plates

Author (s):

Santhana Krishnan Narayanan and Sundarammal Kesavan

Abstract:

The squeeze film characteristics between porous curved circular plates lubricated with an electrically conducting non-Newtonian fluid in the presence of an external magnetic field are investigated in this paper. Based upon the Magneto-hydrodynamic flow theory together with the Stokes micro-continuum theory, the magneto-hydrodynamic non-Newtonian (MHNN) Reynolds equation is derived and applied to predict the porous curved circular squeeze film behaviours. The expressions for MHNN porous squeeze film pressure, load-carrying capacity and squeeze film time are obtained. Comparing with the hydrodynamic Newtonian case, the squeeze film characteristics for porous curved circular plates are improved by the use of an electrically conducting non-Newtonian fluid in the presence of external magnetic fields.

   

Full Text

 

Title:

The effect of upflow velocity and influent concentration to cod removal on UASB reactor treating domestic wastewater

Author (s):

Syafrudin, Sudarno Anif Rizqianti and Mochamad Arief Budihardjo

Abstract:

This study aims to estimate the laboratory scale of domestic wastewater (grey and black water) processing ability of UASB (Upflow Anaerobic Sludge Blanket) reactors by varying the upflow velocity and influent concentration. Three kinds of influent concentrations; low, medium and high was determined. The parameter examined was the Chemical Oxygen Demand (COD). The concentration of the COD that can be removed by the UASB reactor increased with the increased wastewater concentration. The maximum removal efficiency values obtained for the COD was 69%. Overall, the reactor with slower upflow velocity allowed more time for the microorganisms to decompose the wastewater substrate, increasing the observed removal efficiency. However, the UASB reactor treatment results did not meet the waste water quality standards released by Ministry of Environmental of Indonesia and thus requiring further processing before discharging to the environment.

   

Full Text

 

Title:

Efficacy of dolime fine stabilized red mud-fly ash mixes as subgrade material

Author (s):

Akshaya Kumar Sabat and Swapnaranee Mohanta

Abstract:

Red mud is an industrial solid waste produced during the production of aluminum. The effects of dolime fine on compaction properties, unconfined compressive strength (UCS), soaked California bearing ratio (CBR) and durability of red mud stabilized with optimum percentage of fly ash has been discussed in this paper. Modified Proctor compaction and UCS tests were conducted on red mud -fly ash mixes to find the optimum percentage of fly ash (15%) for stabilization of red mud. Dolime fine was added to red mud stabilized with optimum percentage of fly ash from 0 to 12% at an increment of 2%. Modified Proctor compaction, UCS, and soaked CBR tests were conducted on dolime fine stabilized red mud-fly ash mixes. The optimum percentage of dolime fine obtained was 8%. Durability test was conducted on the sample, having optimum percentage of red mud, fly ash and dolime fine. It was observed that, the sample having optimum percentages of red mud, fly ash and dolime fine is durable. The economy of addition of fly ash and dolime fines was studied by designing a flexible pavement and found that there would be substantial savings in cost of construction if dolime fine stabilized red mud -fly ash mixes is used as subgrade in place of a low CBR soil.

   

Full Text

 

Title:

Analysis of effect of in-wheel electric motors mass on passive and active suspension systems

Author (s):

Abdussalam Ali Ahmed Omar and Basar Özkan

Abstract:

This study presents evaluation of effect of in-wheel electric motors mass on the performance of passive and active suspension systems using Matlab. Linear Quadratic Regulator (LQR) is one of more common control methods which is used to complete the design of the active suspension system in this paper .Unsprung mass is one of the important parameters which effects on road holding and ride comfort behaviors in the vehicles, this effect obtained in this work by comparing the performance of the two systems using standard tire and tire with In-Wheel Electric Motor. Also, modeling and simulation of quarter car model completed to construct the Simulink models of the systems using MATLAB software. The study summarized bad effect of increasing the weight of tires by add In-Wheel Motors to the passive and active suspension systems on the road traction and the vehicles drivers comfort, at the same time the active suspension system with in-wheel motor needs high actuator force to work compared to the same system without in-wheel motor.

   

Full Text

 

Title:

Multimodal biometric system based on fuzzy logic and genetic algorithm

Author (s):

N. Jeevitha, K. Krishneswari and A. Swathi

Abstract:

In this paper a novel technique for multimodal biometric system based on fingerprint and palm print is proposed. The proposed system combines features of palm print and fingerprint using an appropriate fusion scheme. In order to avoid redundant as well as irrelevant features, it is necessary to select an optimal subset of features from a larger set. The main issue of choosing a suitable feature set is to achieve high recognition rate. The proposed system employs genetic algorithm to select discriminating features which provides more robust solution.  The similarities between the templates are identified by Euclidian distance. The performance of the system was evaluated using a publicly available dataset. The result obtained has shown significant improvement in the recognition rate.

   

Full Text

 

Title:

Multispectral palmprint recognition using ant colony optimization

Author (s):

R. Gayathri, L. Jayalakshmi, K. Mahalakshmi, K. S. Nevethitha

Abstract:

Biometric authentication is an effective method for automatically recognizing a person's identity with high confidence in which feature extraction and classification are key considerations. Palm vein pattern biometric technology is a promising feature for use in forensic and access control application. It uses the unique patterns of palm veins to authenticate personals at a high level of accuracy. Our proposed work is to accommodate the rotational, potential deformations and translational changes by encoding the orientation conserving features. The proposed system analyses the palm-vein authentication on two different databases that are acquired with the contactless CASIA and touch-based imaging setup collected from PolyU palmprint database.

   

Full Text

 

Title:

Model-based design of LTE baseband processor using xilinx system generator in FPGA         

Author (s):

C. Sasikiran and V. Venkataramanan

Abstract:

Long Term Evolution (LTE) is likewise brought up to as Evolved - Universal Terrestrial Radio Access (E-UTRA). The specifications define a new physical air interface in order to increase of the data rate of the cellular mobile wireless. In this paper, to appraise the effectiveness of LTE physical layer, the Reed-Solomon coder is used for Forward Error Correction (FEC) in systems where the data are transferred and vulnerable to errors before the reception. In an indispensable of convolution encoder, based on the encoder output rate more than to 2 bits are sent over the channel for every input bit. It is employed in a full combination of error correcting applications and frequently used in terminal with the Viterbi Decoder. These subsystems are implemented in MATLAB/Simulink model based design and the analysis of power parameter like Total power, Thermal power, Quiescent, Dynamic with family package in the Xilinx System Generator (XSG), and realize with FPGA.

   

Full Text

 

Title:

A statistical comparison of logistic regression and different bayes classification methods for machine learning

Author (s):

L. Mary Gladence, M. Karthi and V. Maria Anu

Abstract:

Recent machine learning algorithms are widely available for various purposes. But which classifier is suitable for particular data is not yet defined. To consider this into account, well known classifiers Logistics Regression and Bayesian Classifier is taken to validate the work. To validate this, consider some factor such as Asymptotic error (i.e Normally Naive Bayes reaches its asymptotic error very quickly with regards to the number of training samples), how performance takes place when we increase the data set size etc. Here we discuss how various bayes classifiers like Bayes Network, Naive Bayes, Naïve Bayes Multinomial Text, and Naïve Bayes Updateable are working and how they differ with each other based on given data and these results are effectively compared with Logistics Regression. Moreover, proposed work compared Naïve Bayes and Logistic Regression by using some standard dataset results as input. Finally it shows how the Bayes classifier methods and Logistic Regression differs each other in terms of performance factor.

   

Full Text

 

Title:

Performance analysis of optical transmission system using FBG and Bessel filters

Author (s):

Antony J.S, Jacob Stephen and Aarthi.G

Abstract:

The optical fiber has found great application in long distance communications, as light the medium of information transfer attenuates very less compared to electric pulses in cables. However the major issues that limit efficiency are chromatic dispersion and non-linear effects. Fiber Bragg Grating (FBG) is widely used as a component to compensate dispersion on account of its low insertion loss. This paper provides a method of using a combination of FBG as a dispersion compensator and Bessel filter to improve the Q factor of the system and also reduce the noise figure. A 10 Gb/s NRZ pulse is launched into the fiber and the performance of the system is evaluated using Optisystem simulator. The Q factor of the system is then investigated with and without use of Bessel filter. The simulation is analysed with respect to input power, fiber length, and attenuation coefficient.

   

Full Text

 

Title:

Four branches Yagi array of microstrip patch antenna’s design and analysis for wireless LAN application

Author (s):

Nuraiza Ismail, Rina Abdullah, Suziana Omar and Suziyani Rohafauzi

Abstract:

This paper presents the design and analysis of a new kind of Yagi array microstrip patch antenna which appropriate for wireless LAN application. The design is a derivative of the original microstrip Yagi antenna of two branches that comprises of two elements including driven and parasitic elements which consists of reflector and directors. The analysis has been carried out to identify the effect of adding another two more branches in comparison to the microstrip Yagi structure of one branch and two branches. The four branches of this microstrip Yagi antenna has been connected using two branches that are cooperated to each other in a composite array format using corporate-feed network. The proposed antenna design is fed by microstrip line that based on quarter wave impedance matching technique and simulated using Computer Simulation Tool (CST) Microwave Studio. The simulation result of return loss has shown the operated frequency at 5.6 GHz that is appropriate coverage standard of IEEE 802.11 in 5 GHz band between 5.15-5.875 GHz. The proposed four branches Yagi array of microstrip patch antenna can also achieve a gain above 10 dB and a high front-to-back (F/B) ratio as much as 13 dB.

   

Full Text

 

Title:

Test vector based multiple soft faults detection in linear analog circuits with hardware implementation

Author (s):

G. Puvaneswari and S. Uma Maheswari

Abstract:

A method to detect multiple soft faults in linear analog circuits using test vectors is proposed in this paper. The circuit under test (CUT) is simulated used Modified Nodal Analysis (MNA) and with the knowledge of circuit topology and the component values, the test vectors associated with each components of the CUT and diagnosis variables are derived. In real time fault detection, the dependency of test vector to component values and tolerance limits the fault detection process in analog circuits. To solve this issue, test vectors are generated for nominal values, upper bound and lower bound values of the components of CUT and the fault detection is performed. Hardware implementation and verification of benchmark circuits such as Sallen Key Band Pass Filter and Linear Voltage Divider shows the robustness of the proposed approach in real time testing.

   

Full Text

 

Title:

Null clines, phase planes of both harvested host-mortal commensal eco-system

Author (s):

N. Seshagiri Rao, K.V.L.N. Acharyulu and K. Kalyani

Abstract:

This paper introduces the null clines and threshold diagrams of commensalism interaction between two species. This biological model comprises commnesal and host species and the host is being migrated at constant rate. Further both are consider within the limited available natural resources.

   

Full Text

 

Title:

Classification bundle block detection using magnitude squared coherence

Author (s):

Padmavathi Kora and K. Sri Ramakrishna

Abstract:

This paper conveys a technique for the detection of Bundle Branch Block (BBB) ECG patterns using Magnitude Squared Coherence (MSC) function. The MSC function finds common frequencies between two signals and evaluates the similarity of the two signals. The ECG variation in BBB can observed through the changes in the ECG signal. MSC technique uses Welch method for calculating the PSD. For the detection of Normal and BBB beats, MSC output values are given as the input features for the LMNN classifier. Overall accuracy of LMNN classifier is 98.5 percent. The data was collected from MIT/BIH arrhythmia database.

   

Full Text

 

Title:

A novel personal authentication using knuckle multispectral pattern

Author (s):

Gayathri Rajagopal, Dhivya Sampath, Saranya Velu and Preethi Sampath

Abstract:

With the increased use of biometrics for identity verification, there have been similar increases in the use of unimodal biometric system. The finger knuckle print recognition is one of the newest biometric techniques research today. In this paper, one of the reliable and robust personal identification approaches using finger knuckle print is presented. Many researchers are going on in face, finger print and iris recognition and which finds its usage in many applications. These biometric which find its usage in many applications are easily duplicated for fraudulent activities. But the finger knuckle print recognition is the unique pattern to identify the individuality at a high level of accuracy. This paper proposes new algorithms for finger knuckle print recognition using SIFT algorithm and this algorithm presents, extracting a new original constant features from images As the proposed method matches the different angles of finger knuckle print with the database, its reliability is very high when compared to other biometrics. The features of SIFT which are invariant to image scale and rotation, are shown to provide robust matching across a substantial range of fine distortion, change in 3D viewpoint, addition of noise, and change in illuminance. The features are highly distinctive, in the sense that a single feature could be correctly matched with high probability against a large database of features from many images.

   

Full Text

 

Title:

Li-Fi design for high speed data transmission

Author (s):

M. Samuel Lazar and T. Ravi

Abstract:

Li-Fi represents Light Fidelity. Li-Fi is the future upcoming technology and this can transmit the information through light at high speed as compared to the present wireless technologies.  The Li-Fi technology can transfer the data through LEDs. It is a high speed and low cost wireless communication system, compared to Wi-Fi. It can provide high security, large bandwidth, and low cost.  While using various color LEDs can get the different bandwidth and speed. This paper describes the design of Li-Fi high speed data transmission system and analyzing its performance.

   

Full Text

 

Title:

Forced transverse vibration analysis of an elastically connected rectangular double-plate system with a pasternak middle layer

Author (s):

M. Nasirshoaibi and N. Mohammadi

Abstract:

Forced transverse vibrations of an elastically connected rectangular double-plate system with a Pasternak layer in-between are considered in this paper. Based on the Kirchhoff-Love plate theory, the general solutions of forced vibrations of the plates subjected to arbitrarily distributed continuous loads are found. The forced vibration problem is generally solved by the application of the modal expansion method for the case of simply supported boundary conditions for the plates. The effects of Pasternak layer on the forced vibrations of the double-plate system are discussed for the case of particular excitation loading. The dynamic responses of the system caused by arbitrarily distributed continuous loads are obtained. Vibrations caused by the harmonic exciting forces are discussed, and conditions of resonance and dynamic vibration absorption are formulated. Shear foundation modulus of the Pasternak layer doesn’t have any effect on the first frequencies, but has an efficient effect on the second frequencies. Thus the plate-type dynamic absorber with a Pasternak layer can be used to more effectively suppress the excessive vibrations of corresponding plate systems with respect to those with a Winkler elastic layer in-between. The numerical results of the present method are verified once compared with those available in the literature.

   

Full Text

 

Title:

A multiband mimo antenna for s and c-band communication applications

Author (s):

B T P Madhav, D. Lakshmi Kranthi, Ch Kusumanjali Devi, N. Navyasanthi and B. Tarunteja Reddy

Abstract:

A compact multiband antenna that covers operating bands of C and S for communication applications is proposed in this paper. A multiple-input-multiple-output configuration is used in this design with two ports connected to the radiating element of the antenna. The MIMO antenna structure consisting of step shaped radiating element on four sides of the antenna model. Different iterations are constructed by introducing stepped slots on the basic antenna structure. The overall performance of the antenna in terns of s-parameters, radiation pattern, field distributions, directivity and efficiency are investigated and verified the basic parameters through measurements.

   

Full Text

 

Title:

FRAGDEG algorithm for Bigdata

Author (s):

Rekha and A. S.

Abstract:

The ultimate aim of this paper is to overcome the challenges faced in data mining and data warehousing in the field of big data. There are two types of data storage such as scalable and elastic. If it is scalable then existing techniques can be used. But while dealing with the elastic data, it needs concentration on many areas. It needs to concentrate on split up of data whenever the user adds some new data. It should be properly fetched without loss when needed no matter how many split-ups are there. Here a FRAGDEG Algorithm is used for integrating data. This fragmentation algorithm allows using a threshold value according to the user convenience. The big data handled in the existing best peer++ system provides platform for corporate network applications. This system delivers data sharing services for corporate networks with peer to peer data management platform. The total cost of ownership is reduced in inter companies. It eliminates the hadoop tool. The FRAGDEG algorithm works efficiently with bigdata on both velocity and variety aspect. The performance is made more efficient using this algorithm.

   

Full Text

 

Title:

Performance evaluation of I- shaped patch wearable textile antenna in leather substrate for 2.45 GHZ

Author (s):

Jeyakumar S. and Karthikeyan K. V.

Abstract:

The aim of our work is to design an I-patch over textile substrates (soft substrates) instead of hard substrate such as RT Duroid and FR4 and to test its performance over ISM band (2.45 GHz). Wearable textile antennas are current research for the ISM band. Electrical properties such as dielectric constant and loss tangent angle of various textile materials such as Leather, nylon, silk were considered for the design of I - patch is kept constant so that the various antenna parameters with different textile substrate also simulated and compared under the operating frequency of 2.45 GHz by using High Frequency Simulation Software (HFSS). Ansoft HFSS is used for design and simulation of Leather substrate wearable textile I - shaped patch antenna

   

Full Text

 

Title:

Design of suboptimal and optimal SU-MIMO system with improper modulations using per antenna power constraint and perfect CSI

Author (s):

C. Manikandan, P. Neelamegam, A. Srivishnu and M.S. JeyaSuganthi

Abstract:

Achieving good bit error rate performance without considering practical constraint is a major concern of  the industries in the design of MIMO transcevier system. In this paper two type of Single-User Multiple-Input, Multiple-Output (SU-MIMO) transceiver which employing one dimensional improper modulations are designed by considering the practical constraint and the perfect channel state information, Finally the performance of the both the design are analyzed in terms of Bit Error Rate(BER). From the result the system which  providing low BER named as optimal SU-MIMO system and which providing  high BER is named as suboptimal SU-MIMO System.

   

Full Text

 

Title:

A study of the oxygen absorption characteristics of unsaturated fatty acids of linseed, rubber seed, soybean and melon seed oils: Effect of temperature

Author (s):

Isiuku B. O. and Ibemesi J. A.

Abstract:

The oxygen-induced polymerization of the fatty acids of soybean (S.B.A.), linseed (L.S.A.), rubber seed (R.S.A.), and melon seed (M.S.A.) oils were monitored manometrically at 10-minute intervals for five hours at 31.5, 45, 60, 75 and 90oC. Moles of absorbed oxygen were calculated from pressures of un-reacted oxygen using the ideal gas equation. Plots of m moles of absorbed oxygen against time at the various temperatures show parabolic rise in oxygen absorption, for all temperatures except for 90oC when the optimum oxygen absorption was reached at about the fourth hour. Oxygen absorption rates were highest within the first 2.5hours for all temperatures except for 90oC where the rates were highest within the first 1.5hours. Fifth-hour oxygen absorption values were plotted against temperature. The plots show that the optimum oxygen absorption temperature range for the acids was within the range of 60-75oC. Oxygen absorption trends were generally not in conformity with degree of unsaturation.

   

Full Text

 

Title:

Analysis of chemical composition of rice husk used as absorber plates sea water into clean water

Author (s):

Humayatul Ummah, Dadang A.Suriamihardja, Mary Selintung and Abdul Wahid Wahab

Abstract:

Chaff is part of the grain grains (cereals) in the form of dry sheets, scaly, and can not be eaten, which protects the inside (endospermium and embryo). Husk can be found in almost all members of grasses (poaceae), although in some kinds of cultivation were also found that the variation of grain without husk (eg maize and wheat). This husk is a waste of life from the Plant. In agriculture, rice husk can be used as a mixed feed, litter, mixed in the soil as fertilizer, burned, or ashes are used as growing media, in print used as a fuel substitute for oil. In this study, rice husk fuel and charcoal briquettes will be used as the absorber. The results showed that the composition of rice husk after being submerged in sea water distillation process and experience a decline. The conclusion was that the actual rice husk as waste can be made as briquettes, fertilizer, fuel and others but also it can be used as an absorber plate in the distillation process sea water into clean water. The results obtained in which the chemical composition of all decreased for example Cl = 36.41 mm% decreased to 23.71mm%, Si = 30.48mm% to 22.27mm% and Fe = 17.27mm% to 9.62mm% and so on. This was due to rice husk briquettes as an absorber plate in the container of distilled lead compounds dissolved therein participate after undergoing a process of condensation.

   

Full Text

 

Title:

Effect of squeeze pressure on mechanical properties of LM6 aluminium alloy matrix hybrid composites

Author (s):

M. Kamaraj and A. Ramesh

Abstract:

Melt stirring and squeeze casting technique was successfully used to fabricate hybrid aluminium matrix (LM6) composites containing SiC and Al2O3 particles. The reinforcement particles were added into molten aluminium matrix by a mechanical stirrer and composite mixture was cast by applying pressure using a hydraulic press. The effect of squeeze pressure (30 - 120 MPa) on mechanical properties of LM6 aluminium alloy and composite were investigated. The specimens were prepared from the casting and are subjected to microstructural and mechanical characterization. The microstructural characterization revealed that grain size is decreased with increasing squeeze pressure. The density and hardness of composite increased with increasing squeeze pressure, but porosity decreased. The tensile properties such as yield strength, ultimate tensile strength of composite increased with increasing squeeze pressure and reached maximum value at a pressure of 90 MPa but elongation decreased. The tensile fracture surface of composite specimen indicates the modes of fracture mechanism.

   

Full Text

 

Title:

A new control method for power inverter based on dynamic evolution control

Author (s):

Ahmad Saudi Samosir

Abstract:

This paper proposes a new control method for Power Inverter. The analysis and design of the proposed control technique are provided. A new approach for power inverter controller synthesis based on dynamic evolution control theory is presented. In order to synthesize the controller formulation, the dynamic evolution control employs a simple analysis of nonlinear equation models of the inverter. The performance of the proposed controller is verified through MATLAB-Simulink. To validate the simulation results, an experimental prototype of power inverter is developed.

   

Full Text

 

Title:

Design and evaluation of a portable meter oil pollution prototype wastewater with temperature control using arduino technology

Author (s):

A. Soto Otálora, C. A. Achury Bohorquez, M. J. Gómez Gutiérrez

Abstract:

In search of an efficient and quick way to determine the amount in ppm hydrocarbons in wastewater sample, design and evaluation of prototype portable meter oil pollution in wastewater temperature control is performed Using arduino technology, depositing the sample of water in a flask, is carried to the base of the device where the heating plate is located; the flask is plugged with plug support containing the temperature sensor and gas sensor. Depending on the concentration of hydrocarbon in water and using the increase in temperature causes the oil to evaporate, causing increased conductivity in the sensor as it is composed of metal oxide, which is a better conductor in the presence of hydrocarbons. Operation of the device is designed with the LabVIEW program, which allows obtaining the data generated by the sensors by means of an algorithm in language G, wherein the temperature sensor is required and the temperature of this is shown marked plus a graph of voltage vs. time obtained using the gas sensor. Both graphs generated data that is exported as a table and then perform the analysis of the results obtained from the sample. To determine the concentration of parts per million (mg / l) of hydrocarbons in the water is required experimentally obtained table, which entered with the aid of voltage and determine the concentration of hydrocarbon. After several tests and compared to the analysis performed by a laboratory certified to perform Aqualim total hydrocarbon tests, resulting in an error between the device and the laboratory is 3.27%. Being a very low percentage, compared to the elements used.

   

Full Text

 

Title:

Comparison of fuzzy AHP and TOPSIS evaluations of luggage bag design alternatives

Author (s):

Shivang Gupta, Shaurabh Kumar Singh, Kunal Agrawal and Dega Nagaraju

Abstract:

Selection of design concepts is an area of design research that has been under considerable interest over the years. It has become a very critical activity to the performance of organizations and supply chains. Studies presented in the literature propose the use of the various Multi Criteria Decision Making (MCDM) approaches. This paper presents a comparative analysis of Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) and Fuzzy Analytic Hierarchy Process (Fuzzy AHP) in the context of decision making for design selection. The comparison was made based on the factors: cost; quality; ergonomics and environmental factors. To illustrate the proposed model, a few design concepts of luggage bags are considered and the most appropriate one is determined. In addition, rank correlation is carried out to analyse the order of rankings obtained by TOPSIS and Fuzzy AHP techniques. This paper contributes to helping research practitioners as well as industrial decision makers to choose the more appropriate MCDM techniques for design selection.

   

Full Text

 

Title: Artificial cooperative search algorithm based load frequency controller for multi-area deregulated power system with coordinated control of TCPS, RFB and AC-DC parallel tie-lines
Author (s): Ramesh Kumar Selvaraju and Ganapathy Somaskandan
Abstract:

This paper presents the design and analysis of Artificial Cooperative Search (ACS) algorithm based Load Frequency Controller with the presence of Thyristor Controlled Phase Shifter (TCPS), Redox Flow Battery (RFB) and AC-DC parallel tie-lines for interconnected deregulated power system. In deregulated power scenario, specialized agencies for generation, transmission and distribution have been formed for increasing the reliability and efficiency of power system operation. This effects the formulation of LFC problem, so the traditional LFC model is modified to consider the bilateral contracts in the deregulated environment. The deviations in frequency and interarea tie-line power from their prescribed values following a load disturbance are of great concern in power system operation and control. It is possible to effectively suppress the frequency and tie-line power deviations by coordinated control of TCPS and RFB with AC-DC parallel tie-lines for different operating scenarios in deregulated environment. The simulation results reveal the superior performance of Artificial Cooperative Search (ACS) algorithm tuned Load Frequency Controller.

   

Full Text

 

Title:

Noticing emotion from bodily movement

Author (s):

Nurnadia M. Khair, M. Hariharan, S. Yaacob and Shafriza Nisha Basah

Abstract:

In this study, we investigate critical emotion-specific posture and movement features, which typically depended only on a small number of joints. The main goal is to minimal representative of emotional display by reducing the amount of joints involved in the movement. Beside to improve the computational efficiency, we can identify the important aspects of emotion expression. This work is inspired by the motor-control concept which defines the involving components of movements that cover only limited set degrees of freedom that are jointly controlled. The approach is based on the basic statistical analysis that is extracted from dynamic motion qualities such as position, velocity, acceleration and jerk. Four discrete categories of emotion, such as angry, happy, neutral and sad were analyzed through actions such as knocking, lifting, throwing and walking. Then, we evaluate the performance from the combination of statistical features extracted using different classifier, k-nearest neighbor (KNN), fuzzy k-nearest neighbor (FKNN), probabilistic neural network (PNN), support vector machine (SVM) and naive bayes (NB) classifier. The findings show that, it is informative enough to consider right arm movement to classify different emotion in actions such as knocking, throwing, lifting and full body for walking.

   

Full Text

 

Title:

Simulation of neutron transport for the purpose of neutron filters optimization in the pulsed neutron logging apparatus

Author (s):

Kosarev V. E., Goncharova G. S., Platov B. V., Rakaev I. M. and Kosareva L. R.

Abstract:

Numerical modeling of thermal neutron filters, which are an integral part of the apparatus of pulsed neutron logging (PNL), has been carried out. Many models of filters were created. The neutrons slowing down and absorption processes in filters was analyzed. Optimum structure and dimensions of neutron filters was offered.

   

Full Text

 

Title:

Energy efficient MCDS algorithm for MANETs based on convex hulls

Author (s):

Chakradhar P and P. Yogesh

Abstract:

This paper proposes and analyzes energy efficient Convex Hull based Minimum Connected Dominating Set [CHMCDS] algorithm. The algorithm achieves energy efficiency, bandwidth efficiency, reliability and robustness by reducing redundant rebroadcasts of control packets in the network. The Connected Dominating Set (CDS) is widely used as a virtual backbone or Spine in mobile ad-hoc networks for the purpose of routing and broadcasting. Here the MCDS is based on distributed Convex Hull algorithm and Unit Disk Graph. In this paper we use a quick hull algorithm with incremental sweeping which is more suitable for the MANETs than other algorithms. Mobility and Residual energy of the nodes are considered as parameters in the maintenance of MCDS. The resultant CHMCDS has relatively longer lifetime than other MCDS algorithms. This is a distributed algorithm with a time complexity of O(nh log n) and the message complexity O(nh log n), where ‘n’ is the number of nodes in the network and ‘h’ is the number of convex hull nodes in the network. The performance evaluation of this algorithm yields better results in dense networks as well as sparse networks. The cardinality and the performance ratio of this CHMCDS algorithm are optimal compared with existing MCDS algorithms. The simulation results show that the proposed algorithm performs better.

   

Full Text

 

Title:

Simulation research of free-space optical communication based on linear polarization shift keying modulation

Author (s):

Akshay Chawla, Sonali Mishra and G. Aarthi

Abstract:

Free-space optical communication is utilized for transmitting data between the source and destination using light traveling through free space. In this paper, the modulation technique applied to the propagating light is linear polarization shift keying. An FSO system is simulated in Optisystem software using the aforementioned modulation technique under different weather conditions. The performance analysis of the system is carried out by examining minimum BER values and the corresponding transmission distance achieved with different specific attenuations.

   

Full Text

 

Title: Chaotic behaviour of host-monad commensal species pair-a special numerical case study
Author (s): N. Seshagiri Rao, K.V.L.N. Acharyulu and K. Kalyani
Abstract:

In this paper we present the numerical solutions of a week commensal of a two species commensalism interaction with Monad type-variable commensal coefficient with limited resources and with mortality rate for the commensal species. The commensal coefficient depends up on the host population size. Very interestingly we observed the chaotic behavior of the dynamical system for an arbitrary change in the commensal coefficient. Also we noted the bifurcation timings of the trajectories of the commensal species over the host species.

   

Full Text

 

Title:

Effect of changing mass ratio of styrene/butyl acrylate on the behavior of nano organo-silica in poly (styrene-co-butyl acrylate) emulsion core-shell

Author (s):

Abd El-Shafey I. Ahmed, Ahmed M. El-Masry, Ahmed. I. Hussain and Ahmed Saleh

Abstract:

Poly (styrene-co-butyl acrylate) as shell and nano organo-silica as core were prepared by in situ seed emulsion polymerization. The influence of changing mass ratio, butyl acrylate (BuA), and styrene (St) on the prepared emulsion were studied. The ratio of the monomers St/BA were 60/40, 70/30, 40/60 and 30/70 at constant dose of nano organo-silica 3% (based on total monomer content). The prepared nano polymers were characterized using thermal analyses, HRTEM, FESEM, FTIR and UV-Visible. Results have shown that monomer ratio has a significant influence on glass transition temperature (Tg). Thermo gravimetric analysis showed that the systems with higher (BuA) fraction have better thermal stability than systems with higher (St) fraction.

   

Full Text

 

Title:

Characterization of hybrid black toner using the parameters waste toner and nano phase carbon

Author (s):

C. Krishnaraj and R. Vaira Vignesh

Abstract:

Toner is used in photocopiers to form the latent electrical image on the electrostatically charged drum. The paper picks up the toner particles, when it slides over the drum. Specific factors cause 10% of toner particles (approximately) to be left over the drum. This left out toner is cleaned by the unit to ensure the quality of the proceeding copies. This left out toner is called as waste toner and is collected in cleaner sump. If this waste toner is used in the photocopiers, the quality of the copier is reduced. The waste toner is mixed in proportion with Nano phase Carbon and original toner to get Hybrid Black Toner. The original toner is the toner prescribed for the photocopier by the manufacturer. The hybrid black toner is characterized by the two parameters say waste toner and nano phase carbon in this article.

   

Full Text

 

Title:

Analysis of machining and surface finishing of various materials in EDM

Author (s): C. Krishnaraj, G. Sundaram, C. Karthickkumar and K. Kathirvel
Abstract:

The proper selection of manufacturing conditions is one of the most important aspects to take into consideration in the majority of non-traditional machining processes and particularly, in processes related to Electrical Discharge Machining (EDM). EDM process is based on thermoelectric energy between the work piece and an electrode. Material Removal Rate (MRR), Tool Wear Rate (TWR) and surface finish are important performance measures in EDM process. Despite a range of different approaches, all the research work in this area shares the same objectives of achieving more efficient material removal rate and improved surface quality. The paper researches on EDM relating to MRR and TWR along with surface finish in various work materials like Hot Die Steel (11 / 13) and Aluminium (1100 / 2024) with different tool electrodes (Copper and Brass) and analysis will be carried out for the optimal solution as well as the result.

   

Full Text

 

Title:

Flexural behaviour of hemp fiber reinforced concrete beams

Author (s):

K. Ramadevi and S. Deepa shri

Abstract:

In this research work, an attempt was made to obtain low cost building materials using natural fibres. Fibers are usually used in concrete to control cracking due to both plastic shrinkage and drying shrinkage and bridge across the cracks that develop in concrete. Hemp fibres were used in this work to exploit the enormous potentials of renewable resources in the non-food areas of natural fibers. The fibres in volumetric ratios of 0.25%, 0.5%, 0.75% and 1% fibers were used. It was attempted to determine the optimum percentage of Hemp fiber in concrete that is found to bring about an appreciable increase in the mechanical properties of concrete. Reinforced concrete beams of grade M25 were cast and tested under two-point loading. The test results were found to be appreciable for RC beams with hemp fibres.

   

Full Text

 

Title:

Studies on relationship between compressive and splitting tensile strength of high performance concrete

Author (s):

K. Athi Gajendran, R. Anuradha and G. S. Venkatasubramani

Abstract:

This experimental study is intended to identify the relationship between Compressive strength and splitting tensile strength of High performance concrete. For this purpose the applicability of existing relationship between the Compressive strength and Splitting tensile strength of Concrete was examined. The commonly accepted 0.5 power relationship as per IS 456-2000 was investigated and then a similar kind of relationship developed for High performance Concrete. M60 grade HPC mixes incorporating different percentages of high reactivity metakaolin and silica fume by weight of cement along with some suitable super plasticizer. The results of the study indicate that the strength properties of HPC mixes improved by incorporating  metakoalin and silica fume up to a desirable content of 15% and 5% respectively by weight of cement. It was analyzed from the test result that the Compressive strength and splitting tensile Strength were related together and the 0.5 power relationship was found to be inaccurate. Thus the alternative relations were proposed for the High performance Concrete with the support of results and figures.

   

Full Text

 

Title:

Flexural behavior of self compacting geopolymer concrete using GGBFS with various replacements of R-sand and M-sand

Author (s):

T.G. Ushaa, R. Anuradha and G.S. Venkatasubramani

Abstract:

This paper presents an experimental investigation on flexural response of self-compacting geopolymer concrete (SCGC) beams by partial replacement of fly ash by GGBFS and various replacement of River sand by M-sand under two point loading. Mixtures were prepared with alkaline liquid to binder ratio by mass value is 0.33 for mix M1, M2, M3, M4, M5.The molarity of sodium hydroxide is 12M and replacement of fly ash by GGBFS of 30% is kept as constant for all mix. The ratio between sodium hydroxide to sodium silicate solution is 1:2.5. The specimen was cured for 48 hrs of heat curing and 28 days of ambient curing.  Super Plasticizer is added to achieve the properties of self-compacting geopolymer concrete (SCGC). It is found that the SCGC beams have shown good improvement in flexural strength.

   

Full Text

 

Title:

Lingo based pricing and revenue management for multiple customer segments

Author (s):

Anand Jayakumar A. and Krishnaraj C.

Abstract:

Pricing is an important lever to increase supply chain profits by better matching supply and demand. Pricing influences the amount of product demanded and the total revenue generated. Revenue management is the use of pricing to increase the profit generated from a limited supply of supply chain assets. In this paper a numerical problem is solved using the LINGO software.

   

Full Text

 

Title:

Performance of magnetic fuel induction technology to reduce the exhaust emission

Author (s):

T. Varun Kumar, S. Balaji, K. Mohan Babu and K. Hari Gautham

Abstract:

Automobiles are the basic necessary part in our day today life, while they have made transport easy and convenient from one place to other. Nowadays, due to the toxic emissions and an increased risk of accidents they have also made human life more complicated and vulnerable. Emission is the major cause of air pollution and this paper states about the emission in automobile sector. When analyzing the emission in automobiles, they have the major application of air pollution and it creates many major harmful diseases. To control the automobile emission system here we use the Magnetic fuel induction technology to detect and control the emission. Finally this article also review about new emerging technology i.e. fuel induction Technology and developments done across the various areas.

   

Full Text

 

Title:

A solid waste management in Coimbatore city, India

Author (s):

Pa. Ganeshwaran and S. Deepa Shri

Abstract:

Municipal solid waste management (MSWM) is one of the major environmental problems of Indian cities. Improper management of municipal solid waste (MSW) causes hazards to inhabitants. It is an obligatory duty of municipal authorities in the country to keep cities/towns clean and provide a good quality of life to the citizens. However, the services provided by the municipal authorities are outdated and very inefficient. Domestic, commercial, biomedical and variety of toxic and domestic hazardous wastes are generally disposed of by the citizens on the streets, drains, open spaces, water bodies, etc., causing serious problems of health and environment. Studies have revealed that waste generation rate varies from 0.12 to 0.60 kg per capita per day amounting to 115000MTs of waste per day i.e. 42 million tons annually in India. Analysis of physical composition indicates total compostable matter in the waste is in the range of 40-60 percent while recyclable fraction was observed between 10 and 25 percent. The moisture content in the MSW was observed to vary from 30 to 60 per cent while the C:N ratio was observed to be in the range of 20-40. The TATA Energy Research Institute (TERI) has estimated that the waste generation will exceed 260 million tons by 2047 which speaks volumes of the problems that urban areas are going to face in coming decades in managing their waste.

   

Full Text

 

Title:

Photo degradation studies on Ziram using homogeneous and heterogeneous Photocatalyst

Author (s):

K. Ramadevi, S. K. Shivaranjani

Abstract:

Photocatalytic degradation of Ziram was performed on wastewater by various photo degradation techniques via Solar, Solar/TiO2, UV and UV/TiO2processes. Studies were also performed to optimize the operating parameters such as pH, initial concentration, catalyst dosage and contact time. It was found that the UV/TiO2 photo catalytic process was more effective than any other methods studied for degradation of the Ziram. The maximum degradation of Ziram was 92.7% at 300 minutes for initial pH 5, initial Ziram concentration of 20mg/l and TiO2 dosage of 1 g/l. The kinetic constant (k) for UV/TiO2 was found to 9.62 times greater than solar/TiO2 process and 8.19 times greater than the UV process. The order of reaction rate constant was UV/TiO2>UV > Solar/TiO2> Solar.

   

Full Text

 

 


 

     

  

   

  

  

  

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

arpnjournals.com   Publishing Policy                                                  Review Process                                           Code of Ethics