ARPN Journal of Engineering and Applied Sciences              ISSN 1819-6608 (Online)
 

 
GoogleCustom Search
 
 
 
ARPN Journal of Engineering and Applied Sciences                                August 2016  | Vol. 11  No. 15
   
Title: Performance analysis of a vertical well with a finite-conductivity fracture in gas composite reservoirs
Author (s): Yu Long Zhao, Freddy Humberto Escobar, Claudia Marcela Hernandez and Chao Ping Zhang
Abstract:

It is well known that hydraulic fracturing can efficiently be applied to develop both low permeability and unconventional gas reservoir. Sometimes, the formations cannot be fully fractured and, then, the resulting fracture does not end up with infinite conductivity. Besides, for either tight or unconventional gas reservoir, a fracture network will be developed around the well during the fracturing process. This paper presents a semi-analytical model governing fluid flow in porous material for a finite-conductivity-fractured well in a composite gas reservoir, considering the fractures as either partially or fully penetrated. By nature, a fracture-network system around the well is always induced in tight gas formations, then, a composite model with inner dual-porosity to describe stimulated reservoir volume is established. Solutions for both constant-production rate and constant-bottom hole pressure are obtained by using the point-source function and the Laplace transformation techniques which are used along with the Stehfest algorithm to obtain the numerical inversion of the pressure and rate variables. The pressure-time and rate-time behaviors are then analyzed by careful observation to both transient-pressure and the rate-decline type curves. The models and type curves introduced in this work possess both theoretical and practical valuable application in the field of well test interpretation for the system under consideration.

   

Full Text

 

Title: Intelligent parking by merging cloud and sensors
Author (s): N. V. Rajeesh Kumar, R. Kamala Kannan and R. Madhan Kumar
Abstract:

The aim of the project is to develop an Internet of Things (IOT). We propose Internet of Vehicles (IoV) by the combination of sensors and microcontrollers in the vehicles and cloud server to form an intelligent vehicle parking slot booking system. In this, Sensor will measure physical characteristics of the vehicle and converts them to digital signals and the microcontroller will handles the operations of electrical systems and processing. In the recent world, number of vehicles has been increased and so, the increasing amount of information requests thrown by vehicles cannot be managed by a traditional roadside unit (RSU) which is responsible to respond. Therefore, we introduced cloud which plays a major role in providing efficient services. We process the requests in our web applications hosted in the cloud.

   

Full Text

 

Title: Study of change in the SCM's strength properties depending on the aqueous-clay suspension's concentration and muscovite's amount in its composition
Author (s): Yuriev Pavel O., Lesiva Elena M., Bezrukikh Alexander I., Belyaev Sergey V., Gubanov Ivan Yu., Kirko Vladimir I. and Koptseva Natalia P.
Abstract:

This article represents the results of the study of change in aqueous clay suspensions' (ACS) electrostatic properties depending on muscovite's concentration in their composition. The influence of ACS' concentration and muscovite's varied amounts in the composition of mechanically activated bentonite clay (Chernogorskoe field) used as a coupling agent in molding sand mixtures for steel and cast iron casting, on the mixture's strength properties has been studied. The increase in the sand-clay mixture's (SCM) strength properties and gas permeability depending on the ACS's and muscovite's concentration has been established.

   

Full Text

 

Title: Prominent speed arithmetic unit architecture for proficient ALU
Author (s): R. Rashvenee, D. Roshini Keerthana, T. Ravi and P. Umarani
Abstract:

ALU is one of the most important unit of processor. The computing efficiency of the processor depends on the competency of the ALU. ALU unit performs the arithmetic and logical operations. The adder and multiplier are the main computational units of the arithmetic unit. The performance factors such as delay, power and area. Parallel prefix adders have better delay performance; it involves the execution of the operation in parallel. Brent Kung adder is the most area and power efficient parallel prefix adder. In this paper we proposed high speed Brent Kung adder which consists of Urdhava Tiryakbhyam sutra based Vedic multiplier. In the conventional multiplier speed is restricted by the adders used for partial products. The proposed multiplier is used in the arithmetic unit of an ALU shows better performance in terms of delay. The proposed arithmetic architecture is designed, evaluated and implemented in Xilinx FPGA.

   

Full Text

 

Title: Study of distance-based Outlier Detection
Author (s): Pritam Pramanik, Rahul Singh and Sathyabama R.
Abstract:

The classic k-NN technique is widely used for observing density of each outlier which will be able to notify the detected ways i.e., fast reverse nearest Neighbors search regarding each outlier which include high dimensions, hubness, antihubs, outliers and unattended outlier. The distinction between unsupervised and supervised outlier detection can apprise solely the closest Fast Nearest Neighbors Search with variety of nodes between them on the opposite hand unsupervised Detection filter Fast Nearest Neighbors Search relating to distance and can detect and list out every of the closest neighbors. Our technique supplies proof that demonstrating that distance-based ways in which can prove further contrastive scores in Big-dimensional settings. The property has a definite impact, by examining the fast distance resulting outliers. Artificial and in real- world knowledge sets, offers better sets of objective which may list out Fast Nearest Neighbors Search based on Unsupervised based Outlier Detection.

   

Full Text

 

Title: Circular monopole slotted antenna with FSS for high gain applications
Author (s): B. T. P. Madhav, A. V. Chaitanya, R. Jayaprada and M. Pavani
Abstract:

A coplanar waveguide feel wideband antennas are designed with slots on the radiating element and stubs on ground plane. Proposed model 1 exhibiting notch band characteristics at desired frequencies (3.5-4.5 GHz, 7.5-8 GHz) and model 2 is designed to operate in the ultra-wide band region. To enhance the gain characteristics of the proposed models incorporated a mushroom structured like frequency selective surface as reflecting device beneath the antenna structure. By placing FSS structure a stable gain of 7dB is attained from model 1 and 5dB in model 2. The experimental results of the proposed wide band antenna of model 1 are in good correlation with the simulated results from HFSS.

   

Full Text

 

Title: Model validation for temperature profile inside FFB during sterilization for palm oil mill process
Author (s): Arif bin Ab Hadi, Dato Ir. Abd. Wahab Mohammad and Ir. Mohd Sobri Takriff
Abstract:

The purpose of a developing a reliable and accurate spreadsheet modeling tools was in order to investigate heat transfer efficiency inside mill sterilizer cage by predicting the temperature profile inside FFB at various locations inside the cage. The model was previously validated based on Mongana Report, Chan SY and Ang et al suggested that the model was best predicted by the experimental data which was taken from experimentally determined data of Ang et al, based on 15kg bunch at sterilization time of 1 hour (3600s) with the thermocouple inserted into a hole drilled near or beside stalk. In this study, an experiment was conducted to investigate the temperature profile inside FFB based on different FFB weights (12kg, 15kg and 18kg) by using temperature sensor probe inserted into a drilled hole beside FFB stalk and inside the stalk. The result suggest that temperature profile located at near or beside the stalk was best represented as the temperature profile located at the center of FFB as per validated result with Ang et al, with the smallest percentage error in the range of 0.31-5.82% for all FFB weight (12kg, 15kg and 18kg).

   

Full Text

 

Title: Content image detail enhancement on wavelet analysis using satellite and medical images
Author (s): Kalyan Babu Ch., Karthick C. and Satish Kumar V. H. N. S.
Abstract:

To Improve Image Quality on Contrast and Sharpness using Wavelet based smoothness and gradient operator on Image Enhancement. Detail enhancement is required by lot of problems in the fields of computational photography and image processing. In Existing Method on Smoothing and gradient operator algorithm reduce color deformation in the detail-improved image, especially around pointed edges. In our proposed method we implement on Wavelet using with smoothness for contrast enhancement and gradient operator on color image sharpness enhancement. Then visibility refurbishment component utilize average color difference standards and enhanced sharpen and contrast on image with improved feature. Finally the simulated result shows that enhanced detail image.

   

Full Text

 

Title: Validation of the Grader’s ability using measurement system analysis
Author (s): Ivan Gunawan and Dwi Agustin Nuriani Sirodj
Abstract:

Quality control is one of the important thing for the company in maintaining consistency of product quality. Time always becomes a technical problem that often occur in quality control process while we are measuring quality characteristics with specific device. So, it can make the analysis and decision be late because it is not in accordance with the operational needs. Upgrading or adding a number of specific devices is not a wise solution because the impact is significant increase in the cost of quality. More efficient way for the company to reduce the quality cost is to develop human resource with particular sensory sensitivity to be a Grader. On the one hand the using of human labor as Grader is a practical solution in order to reduce the cost of quality, but on the other hand would cause a problem of trust between suppliers and companies (as customers). Grader often considered subjectively in providing an assessment of the characteristics of quality for the materials supplied by the supplier. Some methods in MSA as Gage R&R and Gage Linearity and Bias Study will be applied to validate Grader’s ability in assessing the quality characteristics. The results of the study showed that the gage R&R not only can validate the Grader’s ability but also detect when needed improvement for the measurement system in assessing the quality characteristics.

   

Full Text

 

Title: Speed control of induction motor without speed sensor at low speed operations
Author (s): Akshay Prasad Dubey and Saravana Kumar R.
Abstract:

This paper represents the control strategy for the speed control of induction motor without using any feedback position sensor. The system uses speed, torque and current loops to estimate the actual speed of the motor and to generate the six pulses according to the error signal between the reference speed and the estimated speed. Six pulses are given to the real time inverter which is supplying AC source to the motor. The change in characteristics of the pulses changes the speed of the induction motor. The hardware setup is made by interfacing between the MATLAB simulink model and the field sensors and the inverter. The proposed system is simulated in the MATLAB/ Simulink, also the system is dumped into the dSpace System and Arduino Board to generate the required six pulses for the six bridge inverter. These pulses are given to the inverter. Thus, the speed of the system is controlled without using the position sensor. This system is mainly proposed to reduce the cost of the system by eliminating the use of position feedback sensor by the current and voltage sensors. This system is having high accuracy, less cost, less complexity and weight of the system and it is highly reliable and efficient system.

   

Full Text

 

Title: Digital branding: An empirical study with special reference to E-commerce startups
Author (s): Brijesh Sivathanu
Abstract:

Advent of new technology, media and tools are rapidly reshaping the traditional ways of branding. Branding is the challenge for any of the e-commerce startups. This paper aims to highlight the digital branding practices of e-commerce startups and study its impact on the consumer buying behavior. A primary survey was conducted in Pune city using a structured questionnaire among 380 consumers who have purchased online. The exploratory factor analysis technique was deployed to identify the antecedents contributing to the digital branding of the e-commerce startups. Multiple Linear regression technique was used to understand the impact of the digital branding practices of the e-commerce startups on the consumer buying behavior. The results and findings clearly show that there exists a significant impact of the digital branding practices on the consumer buying behavior. This study attempts to interweave the disciplines of digital branding and consumer buying behavior, a crucial activity for the survival of e-commerce startups, given their lack of resources, financial cost constraints and the fundamental need to find and maintain clients. The significant contribution of this paper is that it provides a basis for conceptualizing a model of digital branding practices for the e-commerce startup firms performing under dynamic and competitive global environments.

   

Full Text

 

Title: Novel approach of Data Reconciliation in cement mill for kernel PCR algorithm
Author (s): B. Dinesh Kumar, M. Guruprasath and Komanapalli Venkata Lakshmi Narayana

Abstract:

The quality of finished product of a cement mill is measured in terms of blaine, which is the measure of specific area of cement. Normally blaine is measured offline and maintaining the blaine is very important because it directly hampers the cement strength and also affects production cost. A soft sensor based kernel autoregressive exogenous model (ARX) was developed to predict the blaine quality for a defined sampling period to be used in a controller. ARX model includes the past blaine predictions as regressors in addition to the other informative variables in order to predict the blaine. The quality of predictions is largely dependent on data; the construction of data to be used in the algorithm requires good process understanding as the raw data collected from the process will have many information that can mislead the prediction. This means the information may cause over fitting or sometimes reverse modeling because of excess information. In this paper, an automatic method to align data based on the process characteristics to be fed into the algorithm for improving the prediction based on data reconciliation method is proposed. Data Reconciliation (DR) is a technology that uses process information (input data’s) and mathematical model to automatically align the variables according to the dynamics of the industrial processes.

   

Full Text

 

Title: Optimization of spatial data sample for gold mineral prediction
Author (s): Nur Ali Amri, Abdul Aziz Jemain and Ahmad Fudholi
Abstract:

This study examines the relationship between the results of semivariogram fitting conformity with estimating based on errors produced. The experimental semivariogram estimation was calculated using robust methods, while the theoretical semivariogram function used are spherical and exponential models, with weighted least squares and ordinary least squares approaches. Consistently, the four semivariogram fittings produce root mean square error (RMSE) fluctuates, while the values are proportionally to the median absolute deviation (MAD) generated by ordinary kriging.

   

Full Text

 

Title: Calculated characteristics of a prototype model of beam recirculation in a linear accelerator with standing wave
Author (s): Aleksandr Evgenevich Novozhilov, Aleksandr Nikolaevich Filatov and Vladimir Kuzmich Shilov
Abstract:

In this paper we discuss the justification of a beam recirculation scheme in a prototype model of an accelerator with standing wave, the justification of a calculation method for bending magnets and the choice of their geometry, the calculation of the radial and longitudinal dynamics of particles in a system with beam recirculation, and the influence of various parameters of the scheme on the beam characteristics. In selecting the beam recirculation scheme, the fact is determinative that, in the operation of the linear electron accelerator in the standing wave mode, it becomes possible to perform an acceleration of the beam in the opposite direction in the same structure, which does not lead to a significant increase in the size of the entire setup. It is also reasonable to stay with the double passing of the beam along the biperiodic retarding structure, which greatly simplifies the technological implementation of the recirculation process scheme.

   

Full Text

 

Title: BLDC torque ripple minimization using modified Staircase PWM
Author (s): M. Senthil Raja and B. Geethalakshmi
Abstract:

This paper presents a BLDC motor drive system using modified Staircase PWM (SCPWM). Based on the hall position sensor signal, the controller generates Staircase PWM to drive the BLDC motor. Because it’s SCPWM instead of Sine PWM signal, minimize pulsation torque ripple is more efficiently at various speeds. The BLDC motor has the advantage of being a special electrical machine and high power applications a staircase modulation, also known as selective harmonic elimination based method, has been proposed. This method is used to reduce the switching losses to a minimum value and to improve the efficiency of the inverter. Finally, the simulation and experimental results are presented to minimize pulsation torque ripple of the BLDC drive system.

   

Full Text

 

Title: Modelling, simulation and optimization of a reactive distillation process using Minitab and Matrix Laboratory
Author (s): Abdulwahab GIWA and Saidat Olanipekun GIWA
Abstract:

Reactive distillation is a novel process that combines both chemical reaction and separation in a single piece of equipment. It is normally accomplished inside a column. Actually, the process has a lot of benefits, especially for those reactions occurring at temperatures and pressures suitable for the distillation of the resulting components. However, the combination of both reaction and separation in a single unit has made the modelling of the process a bit challenging. It has been deemed necessary to employ a mathematical method, with the aid of Minitab, to handle the modelling of this process in an effective manner. Therefore, in this research work, the modelling knowledge of mathematics has been employed to develop equations for the different phenomena occurring at some specific sections of a reactive distillation column. The developed models were simulated and, further, optimized using Matrix Laboratory in order to obtain the values of the model parameters required to give the desired mole fractions of the product components of the process. The results obtained revealed that the developed models were good representatives of the top and the bottom sections of the column used because there were good correlations between the measured and the simulated mole fractions as the R-squared values of the top and the bottom section models were estimated to be 99.32% and 99.03% respectively. Furthermore, the optimization carried out revealed that multi objective problem formulation was the best way of handling this type of a system because that was the one that gave the desired optimum values of the two products from the irrespective sections of the column.

   

Full Text

 

Title: Simulation and evaluation of Switched Inductor Boost DC-DC Converter for PV Application
Author (s): Ahmad Saudi Samosir
Abstract:

This paper presents the simulation and evaluation of Switched Inductor Boost Converter for PV Application under MATLAB/Simulink software. This paper introduces a boost converter with high dc gain to increase the low output voltage of photovoltaic (PV) module. The inductor of the conventional boost converter is replaced with the switched inductor branch. As a result, the conversion gain ratio of the boost converter can be increased. Simulation results and analyses are provided to evaluate the operation of the converter.

   

Full Text

 

Title: Role based authentication to sensitive data using collaborative tagging and scanning with SVM
Author (s): Bhanumathi, Joel and Jude Nithin Joel
Abstract:

Tagging system is a standout amongst the most diffused and mainstream administrations accessible on the web. This framework permits clients to include free content names for the most part alluded as labels to the Internet assets for instance websites, pictures, video, audio and even online journals. Web metadata can possibly enhance inquiry, recovery and to shield the end client from a conceivable destructive substance. The organization redesigns their company entrance with open imparting information along with Sensitive information. The question is handled in light of the user profile analysis. In the real framework give the scientific classification of labeling framework and system web technologies determine the names and root for that name which surveys the reliability of assets to authorize web access personalization. To upgrade the productivity of label concealment the protection guaranteed skim with SVM alongside Privacy Enhancing Technology is actualized. SVM is utilized for extraction of information and dark sensitive information. It is accomplished by utilizing the system tag suppression which has the part of giving the security to data. Web client will seek utilizing a catch phrase. The catchphrase might be the area, input or cost to examine the information. The confirmation of the entrance is finished by the administration. The Administration named two parts they are Head Role and Admin. The office head role is to redesign their piece of entry and recover just the relating information. Last verification and endorsement is finished by the administrator. Through the examination proficiency insurances of the proposed plan is accomplished.

   

Full Text

 

Title: Implementation of bus tracking, server reporting with bus querying system to minimize waiting time
Author (s): T. Venkata jyothi swaroop, B. Vijitendrasai goud and Pravin
Abstract:

Now a days the advancement of the urban area is quickly expanding. This outcomes major transport issue school, work places, office etc. Public transport is major issue in cites to reach their workplaces/destinations. People experiencing few issues in their daily life like heavy traffic, bus arrival delay, and timing. The surrounding information of the bus travelers are collected and used to calculate the bus traveling routes at arrival time at various bus stops. In this GPS is the main framework fixed in the buses which coordinates bus location and client location via latitude and longitude values. The evaluation suggested that android application is created to the user’s querying system for tracking the corresponding buses. User will be giving starting and destination place via android mobile to the server, where it transmit its longitude and latitude location values to the centralized server via GPRS.

   

Full Text

 

Title: Comparison characteristics of DSR and AODV pathing instructions
Author (s): K. R. R. Mohan Rao, G. Naga Kiranmai, N. Vikas and A. S. Murari
Abstract:

Best efficient network system has the selection of proper routing of the path and its protocol. At movable Adhoc System the chosen Instructions taught to better as far as information conveyance and information respectability. Thus the execution investigation of the protocol s is the significant stride before selecting specific protocol. Route development ought to be finished with at least overhead and transmission capacity consumption .In this paper, the execution investigation is done on an Adhoc On-demand Routing Vector and Dynamic Source Routing taking into account an sequence of parameters.

   

Full Text

 

Title: The variability of fuzzy aggregation methods for partial indicators of quality and the optimal method choice
Author (s): Mikhail V. Koroteev, Pavel V. Tereliansky, Oleg I. Vasilyev, Abduvap M. Zulpuyev, Kadanbay Baktygulov and Beishenbek S. Ordobaev
Abstract:

This article examines the process of evaluating the integral index of the software quality using the method of fuzzy aggregation of multiple private indicators. The aim of the study is to determine the applicability of this approach in practice and research of its formalization and algorithmization approaches. A set of aggregation algorithms in the fuzzy inference model was used and their comparison in the application to the given problem is provided. Various modifications of the standard algorithm of fuzzy inference using fuzzy set operators, as well as different kinds of norms and conforms are considered. The study has revealed a wide variation of aggregation methods and provided the method of selecting the optimal one based on the comparison with standard numerical grades. The applicability of the methods of fuzzy logic was shown in the mathematical explanation of the decision making process, opening up the possibility of fuzzy-linguistic description of the subject area, private alternatives indicators and target vector formalizing.

   

Full Text

 

Title: Morphology, chemical composition and magnetization of arc discharge Fe-C soot
Author (s): S. A. Novopashin, M. A. Serebrjakova and A. V. Zaikovskii
Abstract:

Composite Fe-C anode sputtering in a low pressure arc discharge has been used to produce Fe-C soot. The chemical composition and size distribution function of iron containing nanoparticles have been measured. The dependency of magnetic susceptibility at different frequencies and magnetization up to saturation were obtained. It was shown synthesized material is super paramagnetic.

   

Full Text

 

Title: Reducing the negative impact on the environment through organization of traffic flows considering the emissions of industrial enterprises
Author (s): Ilnar Fargatovich Suleimanov, Gennady Vitalievich Mavrin, Mikhail Pavlovich Sokolov, Yuliya Evgenevna Suleimanova and Liliya Ramilevna Ardashirova
Abstract:

Within the research work the authors carried out analysis of the air pollution sources in the city of Naberezhnye Chelny and conducted field examinations of the traffic flow structure and density on the city highways. The highway segments with polluting agent concentrations exceeding the sanitary and hygienic standards were identified, as well as emission allowances on the polluting agents from motor vehicles were determined, considering also the emissions of industrial enterprises. To solve the problem on reducing the emissions of polluting agents to the specified level, the authors developed a simulation model that is able to consider a large number of the road network parameters. An optimization experiment was conducted that enabled to determine emission allowances through the optimization of the traffic flow speed, density and intensity.

   

Full Text

 

Title: Calorimeter for measurement internal heat release in foodstuff
Author (s): Stanislav Proshkin
Abstract:

The article deals with aspects of development features of manifestation and the cause of the emergence of the sources of an internal heat release in foodstuff. The article considers the theory of the method, which allows measuring the sources of internal heat release of various types of objects and also a design of the heat measuring cell created on its basis. Experimental results of measurement of a heat release are given in the sprouting wheat seeds.

   

Full Text

 

Title: Fractal color image encoding scheme based on nearest neighborhood interpolation using isosceles triangle segmentation
Author (s): Shimal Das and Dibyendu Ghoshal
Abstract:

Image compression based on fractal coding is a lossy compression technique and normally utilize for gray level images in range and domain blocks of rectangular shape. Fractal based digital image compression techniques’ provides a large compression ratio and it is proposed using nearest neighborhood interpolation using isosceles triangle segmentation. In the present study a partitioned iterative function searching based on isosceles triangle shape dimension of image plane has been considered. During the searching the intensity of each pixel needs be transformed and this is done with intensity interpolation based on nearest neighborhood intensity interpolation. The proposed method has yielded higher PNSR with marginally lesser processing time but with very high compression ratio. It is established that the proposed method is suitable for face image as well as natural object images.

   

Full Text

 

Title: Design and implementation of a vacuum plant for the simulation of the system pick and place for laboratory control of Surcolombiana University
Author (s): Agustin Soto Otalora, Cindy Liliana Vargas Duque and Nicolas Castelblanco
Abstract:

This work provides a tool to enhance the practical and theoretical knowledge of the students in the program of electronic engineering in the Surcolombiana university, specifically for the areas of control, automation and industrial instrumentation, proposing the development of a vacuum plant for the simulation of a pick and place system. It is also implemented an ON/OFF control for the plant, and a friendly graphic interface for the user. Finally, it is delivered a laboratory guide, as well as the recommendations and conclusions from the process of design and development of the project.

   

Full Text

 

Title: Home security alert system using moving object detection in Video Surveillance system
Author (s): Godlin Jasil S. P., Shaik Asif Moinuddin, Shaik Baba Ibrahim, M. Sakthivel and B. Sakthi Arjun
Abstract:

Video Surveillance systems have long been being used to watch security touchy territories. The making of video Observation frameworks "keen" needs speedy, solid and solid calculations for moving article recognition, classification, pursue and action examination. Moving article discovery is that the essential stride for any examination of video. It handles division of moving articles from video and arrange those things through stationary foundation objects. Object classification step arranges distinguished items into dressed classifications such as human, vehicle, creature, mess, and so on it's crucial to differentiate one from the other articles starting with one sub outline then onto the next sub outline in order to follow and examine their activities loyally. In past framework they have performed foundation subtraction by exploitation vigilant Edge Identification. In vigilant Edge Identification technique we tend to square measure taking two pictures for correlation those square measure foundation picture and forefront picture. This paper propose a secure alert to the users while unknown object detected in the surveillance area. Saliency map is the concept which handles this algorithm efficiently. Rest of the paper discussed about the alert system handling by a GSM.

   

Full Text

 

Title: Estimation of Doppler spread fading using modified jake’s model
Author (s): N. V. K. Ramesh, D. Venkat Ratnam Y. Aravind, G. Pallavi, K. Uma Alekhya and M. Tejaswi
Abstract:

Vehicular networking is a developing range of networking in the middle of vehicles and including roadside equivalence base. Progress in remote interchanges are making imaginable sharing of data through constant equivalence. Two courses for adjusting the established Jake’s blurring test system to create different uncorrelated blurring convolutions are proposed. The order measurements of single yield convolutions of probability density function and autocorrelation are determined and are appeared to concur good with hypothetical desires. The cross relationship among various convolutions is about 0. The aim of this paper is to distribute excellent peer–reviewed papers in the territory of vehicular communication.

   

Full Text

 

Title: Click Jacking prevention in websites using iframe detection and IP scan techniques
Author (s): P. Asha, Roshni Sridhar and Rinnu Rose P. Jose
Abstract:

Distributed Denial of Service (DDOS) is said to be an attack that is faced by many prominent web sites currently. Tight security policies and active measures like using firewalls, Vendor paths can be used to face the former security threats. Though protections are available, for click jacking attack vulnerability can be used to exploit the browser’s weaknesses. In addition, it becomes easier for an attacker to detect and frame a page. In this paper we have proposed a solution for preventing the DDOS attack along with Click Jacking attack method. The impact of this click jacking vulnerability is difficult to access or demonstrate.

   

Full Text

 

Title: Design and simulation of energy harvesting system using PMN-PT and PZT-5H integrated with Silica
Author (s): S. Nagakalyan, K. L. Narayana and B. Raghu Kumar
Abstract:

In this paper, we made an attempt to maximize the power output in the different piezoelectric materials in a unimorph cantilever beam configuration. In the present study, an attempt has been made to macro -scale uni-morph piezoelectric power generator prototypes consists of an active piezoelectric layer, silver substrate and Silica base was designed for frequencies 60 Hz - 200 Hz. An analytical model of a micro power generator is used to obtain displacement, voltage and generated power which are the figures of merit for energy harvesting. This model is presented for three different piezoelectric materials like, PZT-5H and PMN-PT with and without silica base. The designed unimorph piezo energy harvesting system was modeled using COMSOL multi physics and the observed parameters are compared with analytical results.

   

Full Text

 

Title: A novel template matching implementation on object based image classification based on Multikernel Fusion Sparse Representation
Author (s): Shivakumar G. S., S. Natarajan and K. Srikanta Murthy
Abstract:

This paper introduces and implements a novel object based image classification method on remote sensing images. The novelty introduced in this implementation is the application of a Multikernel Sparse Representation method on the Object based image classification implementation. The template-matching algorithm inspired from the object tracking implementation replaces the process of segmentation usually applied in object based image classification. The Multikernel fusion sparse representation based learning and prediction method is developed for remote sensing image classification. A particle filter framework for the sample template selection with the Multikernel Fusion Sparse Representation optimization technique is used to develop the image classification algorithm. The particle filter will act as the template-matching framework for our classification algorithm and the optimization of the observation model of this framework is carried out using the Multikernel Fusion Sparse Representation. Multikernel implementation has been proved to be more accurate than the feature extraction techniques since it extracts the internal intricacies of the image vector. The Kernels consume lesser memory space and the lesser computational complexity compared to the traditional feature extracting methods. Multikernel Sparse representation was also had proved to be more accurate and less computationally complex while implemented in other applications like the video object tracking. Affine transform based templates are extracted from the image which has to be trained and the kernel matrix is generated which is used for comparison with the templates extracted from the test images. Kernel Coordinate Descent (KCD) algorithm is used to find the similarity measure between the database kernel and the testing kernel. The weight values updated using the observation likelihood method that would indicate whether the test template matches with the database templates. The comparison is carried out with the Multikernel method using the SVM classifier. The results that are observed are kappa coefficient and overall accuracy, which measures the classification accuracy, for images with higher and lower illumination and the images are given as input to analyze the robustness to direction change, performance with different number of classification classes, performance by changing the number of training and testing templates.

   

Full Text

 

Title: Discovery of right binary pattern in key management using security matrix and magic cards
Author (s): K. R. Sekar, P. Saravanan and J. Sethuraman
Abstract:

In the era of networking, authentication is a critical issue. In any intra or inter subnet communication key management and authentication play a vital role. In the past two decades different methodologies were employed in the key management and its authentication. In this research work, a new ideological factor with collaborative techniques has been proposed. A series of procedures like substitution, transpose and compression have been used to encrypt the plain text and the selected key text. At sender side a critical region has been generated using traditional encryption. The work also studies varying issues with the traditional encryption mechanism and proposes the solution for the problem. At the receiver end the critical region has been verified through the proposed magic square.

   

Full Text

 

Title: A novel VAL: Quadrotor control technique for trajectory tracking based on varying the Arm’s Length
Author (s): Yasameen kamil N., D. Hazry, Khairunizam Wan and Zuradzman M. Razlan
Abstract:

This paper presents the design and analysis of quadrotor with a novel mathematical model based on varying the arm’s length instead of varying the motors’ speed. This model is named Variable Arms Lengths quadrotor (VAL-quadrotor). The objective of this design is to tackle the problem of nonlinear system model in attitude movement. This accomplished by exploiting the moments of arms to create variable torque around the center of gravity, through increasing or decreasing the length of VAL-quadrotor arms while fixing the motors speed. Thus, the model is converted to a linear controlling system. Since the controlling input to the attitude system is the arms length which is a function of a first order system. The effect of changing the design configuration on the moments of inertia is derived. The stability of the altitude, attitude, and position are achieved by adding a PID controller. The performance of VAL-quadrotor is evaluated by simulation which based on MATLAB code to perform the trajectory tracking.

   

Full Text

 

Title: Comprehensive comparison study for routing protocols in Mobile Ad-Hoc Network using NS2
Author (s): Yasir I. Mohammed and Raed A. Alsaqour
Abstract:

Mobile Ad Hoc Network (MANET) is a collection of wireless mobile nodes dynamically forming a tentative network without the use of any existing network infrastructure or centralized administration. Nodes of these networks function as routers which discovers and maintains the routes to other nodes in the network. In such networks, nodes are able to move and synchronize with their neighbors. Due to mobility, connections in the network can change dynamically and nodes can be added and removed at any time. In this paper, we compared and evaluated the performance of four routing protocols in MANET: Ad hoc On-demand Distance Vector (AODV), Ad-hoc on-demand multipath distance vector (AOMDV), Destination-Sequenced Distance-Vector routing (DSDV) and Dynamic Source Routing (DSR). Network Simulator version 2.35 (NS2) was used to perform the performance study. The performance of the routing protocols was evaluated based on the routing overhead, average end-to-end delay, packets delivery ratio and packet loss ratio. The simulation results shown that AODV and DSR have better performance than AOMDV and DSDV on varying the network size, whilst DSR, AOMDV and AODV are better than DSDV on varying node velocity.

   

Full Text

 

Title: Modified Grouping Efficacy and New Average Measure of Flexibility: Performance measuring parameters for cell formation applications
Author (s): K. V. Durga Rajesh, A. B. K. Chaitanya, V. Sairam and N. Anildeep
Abstract:

In cellular manufacturing, formation of cell is a complex and crucial step to increase the machine utilization and productivity of an organization. Binary format or ordinal data are given as input for the part-machine incidence matrix of the cell formation problem. The cell formation problem may contain two or more solutions due to its ill structure. These solutions may be compared using performance measures and the optimal solution can be identified. A standard measure known as Grouping Efficacy produce some conflicting results in some ill structure data. In this paper a new performance measure in binary data known as Modified Grouping Efficacy (MGE) is introduced to nullify the conflicting results obtained by standard Grouping Efficacy. Similarly there are only very few performance measures used as standard measures for ordinal data like GT Efficacy and Global Efficiency. However, these performance measures can lead to subjective decisions which reduce productivity of the organization. So, in order to improve productivity we have taken a new objective measure known as New Average Measure of Flexibility (NAMF). The advantages of both proposed performance measures are demonstrated by comparing with existing performance measures.

   

Full Text

 

Title: Performance estimation of microstrip antenna with Sierpinski gasket inverted fractals
Author (s): G. Asa Jyothi, B. Hema Pushpika, P. Siva Sankar, G. Sai Ramya and G. Priyanka
Abstract:

In many commercial and defense communication systems, there is a need of compact antennas with high performance, considerable gain and compactness in size. The modern communication systems need such antennas which operates at multiband with wide bandwidth. One of the technique to satisfy that needs is the implementation of fractal geometry on the microstrip antenna radiator. It has been proved that fractal antennas have their own unique characteristics without changing the antenna properties. In the current paper, the performance of the microstrip patch antenna with Sierpinski gasket fractals as inverted triangles has been presented. The base antenna without fractals has been designed at 8.45GHZ operating frequency. As the base antenna offers narrow band width with single resonant frequency, triangular fractal geometry was implemented on the patch up to the second iteration to improve the gain and wide band width at multi bands. The fractal antenna characteristics are analyzed at each iteration by using electromagnetic simulator HFSS 13.

   

Full Text

 

Title: Dynamic key gen: Dynamic and flexible group key generation based on user behavior monitoring
Author (s): A. Yovan Felix, Sneha and Malavika Sahithi Y.
Abstract:

Data storage and resource sharing in rental mode are the key features in cloud technology where clients will just change and share information as a cluster. To affirm shared information uprightness might be checked out in the open, clients inside of the group must be constrained to figure marks on every one of the pieces in shared information. Entirely unexpected squares in shared information are ordinarily marked by various clients in light of information adjustments performed by various clients. For security reasons, once some user is denied from the gathering, the check that were predecessor marked by this repudiated client ought to be re-marked by an associate in the current client. The simple technique, that allows associate in Nursing existing client to exchange the comparing a piece of shared information and re-sign it all through client denial, is wasteful on account of the gigantic size of the mutual information in the cloud. In this paper, we propose an interesting open inspecting system for the honesty of imparted information to efficient client repudiation. By using the considered intermediary re-marks, we have a tendency to empower the cloud to leave obstructs for the benefit of existing clients all through client disavowal, all together that current clients don't need to be constrained to exchange and again marking hinders without anyone else. Moreover, an open supporter is frequently prepared to review the honesty of shared information while not recovering the entire information from the cloud, despite the fact that nearly a piece of shared information has been again leaving by the cloud. In addition, our instrument is in a position to bolster clump validating so as to review numerous inspecting errands in the meantime. Our study demonstrates that our component will extensively enhance the power of client repudiation.

   

Full Text

 

Title: Efficient team development for IT companies using genetic algorithm and evolutionary strategies
Author (s): Lakshmanan K., Joseph Christ Nithin I. and N. Srinivasan
Abstract:

Selecting a team for project management is a challenging task. Validating one’s skill is a tough task to estimate. The traditional methods lag in time and skill strategy. We in this project proposed a novel method of finding one’s skill set and selecting employees for project development using genetic algorithm. The team selection by using genetic algorithm can be used in various field and organizations such as sports, companies, industries, etc. It is to assign efficient staffs for a project in IT-companies according to their skill, performance and other activities.

   

Full Text

 

Title: Focused crawling of online business Web pages using latent semantic indexing approach
Author (s): Thamer Salah and Sabrina Tiun
Abstract:

With the exponential growth of textual information available from the Internet, there has been an emergent need to find relevant, in-time and in-depth knowledge about business topic. The huge size of such data makes the process of retrieving and analyzing and use of the valuable information in such texts manually a very difficult task. In this paper, we attempt to address a challenging task i.e. a crawling business-specific knowledge on the Web. To do that, the main goal of this paper is to describe a new method of focused crawling with latent semantic indexing for online business web pages. We describe a new model for online business text crawling which seeks, acquires, maintains and filter business pages. This model consists mainly from two main modules: a crawling system and a text filtering system. The crawler is used to collect as many web pages as possible from the news websites. This focused crawler is guided by a latent semantic index and information from Word Net (business filter) which learns to recognize the relevance of a web page with respect to the business topic and it is also utilized a set of domain specific keywords. The obtained results also on online real word data show that the focused crawler is very effective for building high-quality collections of business Web documents.

   

Full Text

 

Title: Prevention of surreptitious denial of service in cloud computing
Author (s): K. Sathiyapriya and Uday Bhaskar Reddy
Abstract:

An approach to orchestrate stealthy assault patterns, which exhibit a slowly-increasing-depth pattern, designed to inflict the maximum financial rate to the cloud consumer, while respecting the job measurement and the carrier arrival cost imposed by way of the detection mechanisms. We describe both find out how to apply the proposed technique, and its results on the target process deployed within the cloud. In precise, we suggest an object-centered approach that enables enclosing our logging mechanism at the side of users’ information and policies. We leverage the JAR programmable capabilities to both create a dynamic and touring object, and to make certain that any entry to users’ knowledge will set off the authentication and the automated logging to the JARs. To give a boost to consumer’s manage, we also furnish allotted auditing mechanisms. We furnish broad experimental studies that show the efficiency and effectiveness of the proposed systems.

   

Full Text

 

Title: A novel approach to build a low cost architecture for off the shelf target tracking using wireless communication
Author (s): W. Sai Raghavendran, Sure Venkatapathi Raju and K. Srilatha
Abstract:

Now a day’s border security that incorporate social, cultural, behavioral and organizational aspects of interactions among border security forces and smugglers. The integrated technology architectures made up of fixed mobile sensor and surveillance networks. These tools plays important role in border security operations, planning, analysis and training. Sensors are being used to improve border security and also collecting the large number of data and databases. These sensors can improve variety of problems, sometimes reacting to events and sometimes triggered by random events which are called false alarms. The aim of this project is to enhance the ideas in a sensor network framework that can help to increase the security for the border crossing. In our project proposed system provides security to the boat using GPS tracking and objects. Indian government is planning to introduce the new technology for tracking with in the border which carry illegal things (like government issued sugar, rice distribution without legal permission). The explosive materials for industrial purposes can be tracked by various wireless sensor networks.

   

Full Text

 

Title: Implementation of online signature verification using Matlab and GSM
Author (s): C. Prem Reddy, D. Santhosh Kumar and K. Srilatha
Abstract:

Online signature verification using MATLAB and GSM is based on the simulations in MATLAB and mobile devices. We introduce a effective method for online signature verification. An online signature is computed in linear time. The resulting signature template is compact and requires same space. This has been verified over a set of images. The results show that the performance of the proposed technique is similar and often higher level to state-of-the-art algorithms despite its simplicity and efficiency. In order to verify the proposed method on signatures on camera devices, a data set was collected from an uncontrolled environment and over multiple periods. Experimental results on this data set confirm the effectiveness of the proposed algorithm. The results demonstrate the problem of within user variation of signatures over multiple sessions.

   

Full Text

 

Title: Channel Allocation and Braided Disjoint Multipath Routing in wireless sensor network
Author (s): S. Elamathy and S. Ravi
Abstract:

In wireless sensor networks, concurrent transmission causes performance degradation. In this paper, channel allocation based on a new combinatorial technique of Latin square generation and Braided Disjoint Multipath Routing Algorithm (BDMRA) is proposed. The number of nodes in the network is set as the order of the Latin square. The row and column of Latin square is indexed with numbers are used for Channel Allocation. BDMRA algorithm reduces the network redundancy. The established braided paths are disjoint and maintained between the source and destination as an end-to-end transmission path. Path establishment time is reduced since the path connecting the source and destination node requires only the connectivity between the source and destination clusters.

   

Full Text

 

Title: Incident mapping and EAS using decision support system
Author (s): A. Yovan Felix and T. Sasipraba
Abstract:

In traditional emergency alerting system, we have to inform the emergency team manually by calling them. Even though there are some applications for emergency alert which is time consuming to recover the accident. To overcome these difficulties in our system we are developing a mobile application which will send an alert to emergency team directly by uploading the photos taken at the accident scene. Use of Online source, our application will automatically identify the incident location using GPS from the user mobile. Then the emergency team will take decision to rescue the accident place by analyzing the data which will be stored in database. To extract the relevant data using the concept called data mining. After making decision by the emergency team, they will pass the information to the nearby emergency service like Ambulance, Fire service, Police service, etc. Because of this system, time consuming is less than the other systems, User friendly, motivate the public to help society. The system views in both table form as well as the map form of the process. This system takes the advantage of the Social media to help the public by passing the information among society.

   

Full Text

 

Title: RTL level power optimization of Ethernet media access controller
Author (s): V. Baskar and K. V. Karthikeyan
Abstract:

Ethernet is the most popular layer-2 protocol and widely used in Local Area Networks (LAN’s) and Metropolitan Area Networks (MAN’s). Ethernet connectivity due to its broad existence had become a part of Internet-of-Things (IoT) for gateway solutions. With broader market opportunity there is a need for Ethernet connectivity devices with low power consumption. In this paper, the experimental analysis and results of power consumed by Ethernet MAC design, with and without low power techniques, at Register Transfer Logic (RTL) level are presented.

   

Full Text

 

Title: Mitigation of GPS multipath effects using adaptive normalized LMS algorithm
Author (s): M. Sridhar, Ch. Sai Krishna, K. Jaya Sai Reddy, M. Manikranth Kumar, N. Sri Lakshmi and D. Venkata Ratnam
Abstract:

The objects surrounding the GPS receiver easily distorts the satellite signal. With the increasing Global Navigation Satellite System (GNSS) based applications, they require reliable and accurate navigation solutions in challenging environments such as urban communities. In such situations, receiver accuracy and reliability are restricted due to multipath signals. Multipath is the phenomenon of propagation in which the signals traveling through two or more paths are received by the receiver. Multipath signals are those received signals other than LOS signal by antenna. Multipath signal is the combination of the direct as well as indirect signal. Finally, multipath leads to poor measurement accuracy and fading. In this paper Normalized LMS adaptive filter algorithm is mainly used to mitigate multipath signals. Other adaptive filters are also have been implemented to compare the results.

   

Full Text

 

Title: Creation of a mapping system to generate objects similar to bit-coins
Author (s): Arun Karthik, Ashwin Joseph and R. Sethuraman
Abstract:

The Usage and Conversion of Images into numerical values - similar to QR Bar Codes with the intention of creating a substantially complex character value that would initially percolate, depending on, predominantly heavy processing, in order to generate characters with the end results matching a particular user to user feed. The ability to, for example, in the typical social media spectrum, that is, currently present in our eco-system, would be an ideal way to illustrate how this might, make better sense. Suppose the image, or images, such as your profile picture, would be used for the metamorphosis of that particular image to correspond to your phone number, this in turn would create a secure and stable way to re-define one’s vulnerability assets on said mobile device - every time there’s a change, in a particular image. What would be true - is the notion that, other people, in general, have access or possess with reasonable certainty - the ability to see and view - both your picture and phone number, as it would generally be in the public domain when you call, or inside an application. Though, this drawback could be easily overcome, with the help of Service Providers who, would be the only ones that would with reasonable flexibility be able to utilize someone’s network - whether GSM, CDMA, etc. to provide access to confidentially secured and locked networks along with the image at hand.

   

Full Text

 

Title: Numerical analysis of reinforced concrete hollow-core slabs
Author (s): Adel A. Al-Azzawi and Sadeq Aziz Abed
Abstract:

A longitudinal voids through the one way reinforced concrete slabs are very important for utility services and for structural purposes by reducing the own weight of the structure. These types of slabs were analyze numerically by using nonlinear solution of a finite element program ANSYS with dimensions (2.05m) length, (0.6m) width and (250mm) thickness. Three sizes of circulars cores are used with core diameter (150, 100 and 75mm) by reducing in self-weight of slab (23.5%, 15.7% and 8.8%) respectively. The modeling of the materials, the concrete slabs, steel reinforcement bars and steel plates for loading and supports were done then meshing it before solution. The analysis results are compared with the solid slabs types under the same conditions. Some of parameters are studied such as the ratio of shear span (a) to effective depth (d) (a/d), size of cores, shape of core, type of loading and effective of top steel reinforcement. It was founded that reducing the self-weight of concrete caused reducing in ultimate capacity of slabs by (20.6%, 13% and 3.8%) compared with solid slab with core diameter (150, 100 and 75mm) respectively. The ultimate capacity of the slab reduces with increasing the ratio (a/d). Using the square shape of the holes reduces the cracking load and ultimate capacity by about (13.5%) with increasing the deflection by (39.5%).

   

Full Text

 

Title: Engineering geological study of Malino-Manipi landslide susceptibility South Sulawesi Indonesia
Author (s): Busthan, A. M. Imran, L. Samang and M. Ramli
Abstract:

Mountainous area of southern South Sulawesi Province, Indonesia is prone to landslides. During 2009 to 2013 more than 50 landslides have occurred causing road connecting MalinoGowa Regency to ManipiSinjai Regency heavily damaged. The aim of this research is to find out the influence of engineering geological aspect against landslide susceptibility in the study area. The research uses field survey method consisting of: characteristic study of tuff weathering profile: determining water content, infiltration rate and shear strength of weathered rock and residual soil, as well as laboratory analysis covering petrographic analysis of fresh rock composition. Field survey result indicates that tuff profile consists of six stages including unweathered tuff (fresh), slightly weathered tuff, moderately weathered tuff, , highly weathered tuff, completely weathered tuff, and residual soil. Most tuff mineral compositions are volcanic glass. The more the weathering stage increases, the higher the water content and infiltration rate. Conversely, the shear strength becomes low. Under this condition, landslide becomes susceptible.

   

Full Text

 

Title: Scaling process of continual k-nearest neighbour queries to locate from databases
Author (s): P. V. Vijaya Krishna, L. Lakshmanan and K. V. Rajesh Kumar
Abstract:

Location Based Services and Geographical Information System together have enabled a new era in the development of mobile based applications in all the industrial and commercial applications. Recently these services are widely used in military, naval and air force defense services to find the enemy location. Unlike the current information services such as those on the web and as mobile apps, the GIS has benefited greatly from developments in various fields of computing. Better database software allows the management of vast amounts of information that is referenced to digital maps. Computer graphics techniques provide the data models for storage, retrieval and display of geographic objects. Geographic Information Science, the field of science behind GIS, offers specialized knowledge about spatial data collection and processing, data modeling as well as modeling of spatial processes for analysis purposes. We propose a method for finding the locations of various places. According to user location using GPS, the user can access the important unique data without unwanted data Information related to the searched location.

   

Full Text

 

Title: Smart roadways lighting prototype system for public awareness
Author (s): Virendra R., Y. V. R. Sathyadeep, T. Ravi and N. Mathan
Abstract:

Saving and efficient utilization of electricity is utmost importance in the present world. Power saving concept is introduced to street lighting system with automatic detection of vehicles and rainfall. The proposed street lighting automation system is designed using Light dependent resistor (LDR), IR sensor and Raindrop sensor for day or night detection, vehicle detection and rainfall detection. The system is developed using ARM7 microcontroller. In the proposed system the sodium or halogen bulb are replaced with LED’s. During night LDR allows all lights to glow at less intensity, IR sensor detecting vehicles allow LED’s ahead of vehicle to glow at high intensity and dim the trailing lights, and intensity varied using PWM. Raindrop sensor detecting rainfall allows all lights to glow irrespective of vehicle movements. Implementation of this system saved energy to great extent.

   

Full Text

 

Title: Algorithm of autonomous vehicle steering system control law estimation while the desired trajectory driving
Author (s): Sergey Sergeevich Shadrin and Andrey Mikhailovich Ivanov
Abstract:

The article discusses an estimation algorithm of control actions on steering system in order to provide vehicle driving along desired trajectory with accounting of non-steady (transient) driving modes. Minivan tests on MADI proving ground are described, the developed theory is verified.

   

Full Text

 

Title: Improved performance of evolutionary game theory based on cooperation in VANET
Author (s): Merlin Mathew, V. Mouna Priyanka and K. V. Karthikeyan
Abstract:

By applying the principles of MANET (mobile ad-hoc network) the spontaneous creation of VANET (vehicle ad-hoc network) which are the key components of the intelligent transportation system belong to addition and deletion of nodes. In vehicular interaction networking properties plays an important role. This paper deals with handover scheme to investigate the effects of co-operation in vehicular networks. In different networking conditions like clustering of nodes which increases connectivity and lead to more number of hubs which indeed reduces probability for nodes to change their strategies so easily. In this way relatively more number of packets can be routed through the network cluster with relatively higher rate using efficient routing algorithm which also avoids the receiving of common packets at different nodes due to high cluster in the network. Simulation of this game theory is processed by using NS 2.34 to show the effectiveness of high cluster nodes with minimum payoff and higher efficiency.

   

Full Text

 

Title: Management of hospital supply chain: new methodology for improving the performance of the maintenance of medical devices
Author (s): Driss Serrou and Abdellah Abouabdellah
Abstract:

This paper is directed towards a study of the impact of grouping of pharmacies in the hospital supply chain performance for the maintenance of medical devices. The first part of the article shows the interest of the hospital logistics and the literature on the evaluation of performance. The second part describes the steps of our methodology. We finish our work by applying our approach to a hospital in Morocco.

   

Full Text

 

Title: Analysis of fading effects due to ionospheric scintillations using modern GNSS signals observed at northern low latitude station
Author (s): Miriyala Sridhar, Tirumalasetti Uday Bhaskar, Akkala Leela Prasanna, B. Rohit
Abstract:

The major threat to Global navigational system’s signal availability, accuracy, and processing is the signal fading caused due to ionospheric scintillations. In this paper the triple –frequency data of GPS signal collected at Koneru Lakshmaiah University, Guntur, India is processed to analyze the signal fading characteristics of GPS signal bands. Ionospheric scintillation parameter known as fade duration is calculated using GPS C/N0 measurements. It is observed that maximum fade duration is about 90 sec. It is evident that the L5 signal fading intensity is low as compared to L1 and L2 signals. The outcome of this work would be useful for developing inter-frequency aiding algorithms used in signal tracking and reacquisition in future GNSS receivers.

   

Full Text

 

Title: Synthesis of titanium oxide nanoparticle complemented with optical properties
Author (s): Ali H. AL-Hamdani, Alaa N. Abdalgaffar and Suma H. AL-Shaikh Hussin and Ahmed A. Al-Amiery
Abstract:

Titanium oxide nanoparticles were prepared via Sol-gel method by mixed of titanium tetra-iso-propoxide (TTIP) and nitric acid at (pH=1.85).The optical properties were studied. The wavelength and transmittance at ?=260 nm were 84.17 nm and 1.6% respectively. Maximum reflective (R) at ?=410 nm was 20% and decrease with wavelength increase; moreover the indirect allowed energy gap (Eg) was 3.2 eV. Optical constant such as absorption coefficient (?), extinction coefficient (k) are calculate and the reflective index (n) was 1.3438.

   

Full Text

 

Title: Effects of assembly errors on tooth contact ellipses and transmission errors of a double-crowned meshing gear pair
Author (s): Van-The Tran
Abstract:

A helical gear is crowned in both the cross-profile and longitudinal directions called a double-crowned gear. The tooth surface of the gear can be generated by hobbing, shaving, honing processes. In this paper, the hobbing process is used for double-crowning the tooth surface of work gear with three different hobbing methods included conventional method, variable tooth thickness (VTT) method and modifying the work gear rotation angle method. A computer simulation example is implemented to compare the meshing-conditions, contact ellipses, and transmission errors under various assembly errors of the double-crowned gear pairs that are generated by the three hobbing methods.

   

Full Text

 

Title: A rough set based data model for heart disease diagnostics
Author (s): Aaron Don M. Africa
Abstract:

Heart disease is one of the leading causes of death to human beings. This disease has taken numerous lives throughout human history. Heart disease describes a range of conditions that affects the heart. This disease refers to conditions that involve blocked blood vessels that can lead to a heart attack or stroke. Heart failure caused by damage to the heart that has developed over time cannot be cured. But it can be treated to improve its symptoms. In general, the earlier that a heart disease is detected the better options are available to diagnose it. This pape r presented how Rough Set theory is applied to develop a data model to aid a physician to diagnose heart disease. In particular this research will utilize the data obtained from the Hungarian database UCI Machine Learning Repository. The results of the research showed that the rough set theory successfully reduced the dimensionality of the heart disease data set by approximately 49%. Empirical testing was used to validate the rules and gave a 100% result.

   

Full Text

 

Title: A low power Multi Bit Flipflop Merging technique using WSN nodes
Author (s): S. Vimalsree and S. Karthikeyan
Abstract:

In a wireless sensor network nodes, the highest energy consumption exhibits by wireless communication. The low power VLSI designs plays a vital role in today’s wireless devices because of limited energy supply from the batteries. The consumption of power reduction not only enhancing the battery life but also reduce the overheat problem. In a modern IC, the power consumption done by the clock which plays the major part in the VLSI designs. Here, the low power is attained by Multi Bit Flipflop Merging technique in WSN using Parallel Prefix Operations (PPO). Along with the power, the minimization of area and Delay is also considered.

   

Full Text

 

Title: Design of Low Power Low voltage CMOS Amplifiers in Subthreshold region
Author (s): L. Premalatha and P. Kavi Priya M. E.
Abstract:

The growing demand of portable electronics equipment makes the circuit designer think about low power low voltage integrated circuit design. The major drawback on implementing strong inversion low-voltage CMOS circuits is the threshold voltage which does not scale down as the same rate as compared to the power supply. Hence the design of electronic circuits operated in subthreshold region has become an absolutely necessary feature in order to provide efficient benefits by technology scaling. This Project focuses on the weak inversion design of low power low voltage Inverter, Nand gate, common source amplifier, Differential amplifier and Operational Transconductance Amplifier (OTA). The CMOS OTA is designed in 350 nm CMOS TSMC process technology and BSIM 3v3 SPICE model and obtained 66db gain, 61 degree phase margin with 160nW power consumption by applying 0.9V supply voltage. In design of CMOS OTA TANNER EDA TOOL is used.

   

Full Text

 

Title: An overview of character recognition focused on offline handwriting
Author (s): A. Jailin Reshma, J. Jenushma James, M. Kavya and M. Saravanan
Abstract:

The programmed acknowledgment of written by hand content -, for example, letters, compositions or whole books - has been a center of serious examination for a very long while. Especially in this field of unconstrained penmanship acknowledgment the written work styles of different journalists were managed, serious challenges are encountered. Engagement is basic to the achievement of learning exercises, for example, composing, and can be advanced with suitable feedback. Here, we portray a learning scientific framework called Tracer, which infers behavioral engagement measures which makes perceptions of behavioral examples of understudies composing on a cloud-based application. Be that as it may, the discoveries from the present study recommend that envisioning power could be helpful to recognize diverse understudy practices when drawing nearer a composition task. It is gotten from a system neural based framework for unconstrained penmanship acknowledgment. As such it performs template-free spotting, i.e. it is a bit much for a catchphrase to show up in the preparation set. The watchword spotting is complete utilizing a change of the binarization calculation in conjunction with an intermittent neural system. This paper exhibit that the proposed frameworks beats not just an established element time contorting based approach moreover a present day watchword spotting framework.

   

Full Text

 

Title: Simplified interest classification using social media
Author (s): Vignesh Rajkumar, Siva Vikram and Kamalesh
Abstract:

There are many non profit organizations incorporated but only few survive the long run. This is because of the increased financial constraints and lack of volunteers. Considering the fact that the primary source of income for such organizations are donations and the primary source of manpower is by word of mouth and mass communication means, this proposed hypothesis is to connect non profit organizations to potential volunteers and donors who will be interested in the organization’s cause and vision, eventually supporting them by donations and manpower during community events hosted by the organization, at an affordable cost.

   

Full Text

 

Title: Flower image segmentation: A comparison between watershed, marker controlled watershed, and watershed edge wavelet fusion
Author (s): Syed Inthiyaz, B. T. P Madhav, P. V. V. Kishore Kumar, Vamsi Krishna M., Sri Sai Ram Kumar M., Srikanth K. and Arun Teja B.
Abstract:

Watershed Transformation is one of the powerful tools for image segmentation. Watershed transformation based segmentation is generally referred to marker controlled segmentation. This paper proposes a new approach of image segmentation that includes histogram equalization and image smoothening techniques with the Prewitt or sobel edge detection operator. The results when compared with the previous method, shows that this can achieve more accurate segmented results and can reduce the over segmentation effect.

   

Full Text

 

Title: An implementation framework for integrated lean construction system for Indian scenario
Author (s): Kasiramkumar T. and Indhu B.
Abstract:

Indian Construction projects suffer from cost and time overruns which leads to wastage and productivity problems that directly affect overall industry’s profitability and economy. Today’s economically developed nations also face these problems. As a result, researches and methodologies have been developed to reduce the risk of overruns and improve project outcomes. A number of these methods are based upon Lean production principles that focus on identifying value, eliminating wastage and creating a smooth flow of materials, information and work. Slow adaptation of these Lean concepts by contractors has also been noticed from the past decade. This principle has been found to improve the reliability of project delivery in complex construction environments. However, implementation of this technique is being a great challenge as it requires technical expertise as well as lots of paper works behind. This paper focus mainly on incorporating traditional management system followed with Lean construction thereby developing a simplified lean implementation framework and recording format to measure daily performance occurred and required in construction projects. By effectively utilizing these data, various analyses generating value adding reports and information for continual improvement of the project shall be achieved. Proper investigation of these reports and finding out the root cause would facilitate construction projects to be free from time and cost overrun.

   

Full Text

 

Title: EB monitor - LIFI based integration of user behavior monitoring, privacy preserving
Author (s): A. Yovan Felix, M. Balaji and B. P. Abinesh
Abstract:

Light Fidelity technology is a data transmission method which employs illumination for transferring light or data as a communication medium. This paper illustrates development of advanced infrastructure electric metering, user privacy and power management system is maintained. Energy saving plays a more important role in world scenario. The smart meters adoption conveys new privacy anxiety to general public. The individual factories/homes data metering is accumulate each 15 minutes. The probable to infer electricity consumption patterns of entity users. To protect user privacy completely de-centralized scenery. In this paper propose a method to monitor the user behavior and calculate current consumption. This system tracks the user like TV Programmer through monitoring TV Remote as of remote Place. Various control modes and Device control Time are monitored. This information preserves and stored securely. The data transmits using LED variation intensity and it has faster than human eye. This is also known as visible light communication or optical wireless technology. Through LIFI technology EB meter interfaced and the data transmitted to EB server. To confirm switching state device Current Sensor connected to device. Android Application is arranged to consumer to Payment System. Dual Cost is accused in Permitted maximum Current service. By simulated data, verify proposed method feasibility and reveal performance recompense over existing methods.

   

Full Text

 

Title: Development of Geo-spatial maps for maintenance of water supply schemes
Author (s): P. Mariappan, A. Raja Jeyachandra Bose, P. Alex Praveen, S. Sreechanth and T. R. Neelakantan
Abstract:

Recently, multi-village water supply schemes are erected for quality affected habitations in India. Operation and maintenance of multi-village water supply schemes require a lot of data viz: source, pumping stations, pipe line alignment, sizes of pipes, pressure, elevation, soil type etc. Various drawings and plans are prepared rarely with geo-reference during project planning and design. For Engineers in charge of maintenance, Geo-spatial maps with the above details will help in effective operation and maintenance of water supply schemes like for planning for augmentation, identifying leakages, pollution control etc. An attempt has been made to prepare different utility maps for a multi-village water supply scheme, named Vellur and 24 habitations in Musiri union, Trichy district, India, using GIS tools. Methods adopted to prepare maps and uses of developed maps are presented.

   

Full Text

 

Title: Survey on VANET technologies and simulation models
Author (s): Yusor Rafid Bahar Al-Mayouf, Mahamod Ismail, Nor Fadzilah Abdullah, Salih M. Al-Qaraawi and Omar Adil Mahdi
Abstract:

Vehicular ad hoc network (VANET) is a distinctive form of Mobile Ad hoc Network (MANET) that has attracted increasing research attention recently. The purpose of this study is to comprehensively investigate the elements constituting a VANET system and to address several challenges that have to be overcome to enable a reliable wireless communications within a vehicular environment. Furthermore, the study undertakes a survey of the taxonomy of existing VANET routing protocols, with particular emphasis on the strengths and limitations of these protocols in order to help solve VANET routing issues. Moreover, as mobile users demand constant network access regardless of their location, this study seeks to evaluate various mobility models for vehicular networks. A comparison of IEEE 802.11p and Long-Term Evolution (LTE) technologies for several applications in the vehicular networking field is also carried out in the study. One key component in the VANET structure that this study intends to draw special attention is the warning structure consisting of Intelligent Traffic Lights (ITLs), which is designed to inform drivers regarding the existing traffic situation, thus enabling them to make appropriate decisions. Last but not least, the VANET simulation tools for data collection are also evaluated.

   

Full Text

 

Title: Production performance of horizontal gas wells associated with non-Darcy flow
Author (s): Jing Lu, Sima Li, Md Motiur Rahma and Freddy H. Escobar
Abstract:

In the petroleum literature, non-Darcy flow is assumed to be a near wellbore phenomenon; consequently a gas reservoir could be divided into Darcy’s flow domain and non-Darcy’s flow domain. Assume only radial flow occurs in the near wellbore non-Darcy’s flow domain, and assume the radius of this domain is integer multiple of wellbore radius, Lu et al. (2011) proposed binomial deliverability equations for partially penetrating vertical gas wells and horizontal gas wells. By solving a set of simultaneous equations with respect to non-Darcy’s flow domain rn and flow rate at standard conditions Qsc, this paper presents new binomial deliverability equations for horizontal gas wells, which can account for the advantages of horizontal gas wells where non-Darcy effect is less pronounced than that in vertical gas wells. The calculation results show that non-Darcy flow domain radius is smaller than 15 times wellbore radius, which further proves turbulent effect only occurs in the vicinity of wellbore. The calculation results also show that the production rate loss of horizontal wells caused by the turbulent flow is small.

   

Full Text

 

Title: Pro-SMS using cloud: A protocol for end-end private messaging
Author (s): N. Mohamed Azharudeen, P. Saravanan M. E. and Melvin Abraham
Abstract:

Privacy has been a major concern with respect to messaging now a day. In the traditional SMS system, the messages have the danger of being observed due to the presence of the SMS center in between the users who help to transfer of messages. A concern when confidential data needs to be shared through an SMS. These messages are transmitted as plaintext from the mobile user (MS) to the SMS center (SMSC) across a wireless net. The contents of these messages are stored in the systems of the network operators and can well be read by their personnel during the whole transmission process. And then the traditional SMS service offered by several mobile operators does not assure privacy of messages being transmitted over the net. To overwhelm, a protocol provides end-to-end privacy during the transmission of SMS over the mesh. This is accomplished by integrating Google’s GCM service with information hiding techniques incorporated using cryptographic algorithms of AES.

   

Full Text

 

Title: Performance evaluation of ACS in Viterbi decoder using parallel prefix adders
Author (s): M. Balaji, P. Arun and V. Balamurugan
Abstract:

Modern Digital Communication System usually employ convolutional codes with large constraint length for better decoding action, which leads to large intricacy and power consumption in Viterbi decoders. It is essential to use radix 2 in Viterbi decoder to prune significant portions of trellis state to dramatically power consumption, high rate, and area lessening. In these project, we are using the parallel prefix adder like kogge stone adder in ACS unit for the improvement of Viterbi decoders. To design and increase the performance evaluation of (Add/Compare and select) ACS unit in Viterbi decoder. To analyze the Viterbi Decoder algorithm. Implementation of efficient ACSU with different fast adders. Achieve more efficient power consumption and decreasing computational complexity.

   

Full Text

 

Title: Boosting the accuracy of weak learner using semi supervised COGA techniques
Author (s): Kanchana S. and Antony Selvadoss Thanamani
Abstract:

This article elucidate and appraise a technique for imputing missing values using right machine learning approach for predictive analytics solutions. Using supervised and unsupervised learning techniques make predictions based on historical dataset. This survey carried out using comprehensive range of databases, for which missing cases are first filled by several sets of reasonable values to create multiple finalized datasets, later standard data procedures are inserted to each destination dataset, parallel multiple sets of output are merge to produce a single inference. In statistics, the Naïve Bayesian approach provide supplemented information in the form of a prior probability distribution, prior information about the function to generate and estimates misplaced parameters. The main goal of this article provides suitable data imputation algorithms and also implementing Bolzano Weierstrass in machine learning techniques to evaluate the performance of every sequence of rational and irrational number has a monotonic subsequence. To reducing bias data, implementing Boosting algorithms to perform the process of turning the noisy classifier into final classifier then to correlate with true classification. This articles represent AdaBoost techniques to improve the performance of the final classifier. Experimental results shows the proposed approach have good accuracy and results of simulation studies are also presented.

   

Full Text

 

Title: Probabilistic prediction of time performance in building construction project using Bayesian Belief Networks-Markov Chain
Author (s): Tri Joko Wahyu Adi, Nadjadji Anwar and Fahirah F.
Abstract:

Time performance is one of the main success criteria of construction project. There are many uncertainty factors that affecting the time performance of building construction projects. However, time performance measurement on the previous research didn't calculate probability the correlation of uncertainty factors. This study aims to predict the probability of project time performance using Bayesian Belief Networks (BBN)-Markov Chain (MC) hybrid. MC is used to represent the dynamic progress of the project and connected the uncertainty factors by BBN. Data is collected by literature study, location survey, questionnaire and interview with expert. Model validation is investigated by applying in a case study of construction projects, building P, Q and R in the city of Surabaya. The results showed that the time performance prediction of the building construction project using the BBN- Markov Chain hybrid was accurately. It can be used measurement method of time performance and provide early warning of time delay in construction project.

   

Full Text

 

Title: Multiband MSP spiral slot antenna with defected ground structure
Author (s): K. Phani Srinivas, Habibulla Khan, B. T. P. Madhav, M. Tejaswi, Sk. Md. Feroz, P. Durga Madhuri and M. V. Mahesh
Abstract:

Defected ground structures are one of the key important structures to attain multiband characteristics in the microstrip antennas. In this paper, spiral shaped defected ground structures are proposed to improve the performance of different passive circuits, including dual, triple and multiband characteristics and to suppress harmonics in the patch antennas. The proposed defected ground structure monopole antenna is resonating at multiband with size reduction to perform LC resonant property in the operating band. By incorporating defected ground structure in the antenna model, additional resonant frequencies are attained due to the abrupt change in the current path of the antenna. The proposed antenna is prototyped on FR4 substrate and measured results are obtained from ZNB Vector Network Analyzer. The simulated results are in good agreement with measured results of the fabricated antenna model.

   

Full Text

 

Title: An FPGA based adaptive Viterbi Decoder implementing path metric calculation
Author (s): Vijaya Iyyappan A. and Balamurugan V.
Abstract:

Wireless networks sometimes use refined Forward Error Correction (FEC) techniques like Viterbi rule to combat with with the channel distortion effects like multipath weakening and inter symbol interference. Viterbi rule is utilized in wireless communication to rewrite the Convolution codes; these square measure the category of FEC codes. Such decoder’s square measure complicated and dissipates great deal of power. Therefore this paper presents the planning of associate degree reconciling Viterbi Decoder (AVD) that finds the trail and to cut back the facility and price and at constant time increase in speed. Most of the researches aimed to cut back power consumption or work with high frequency for mistreatment the decoder within the fashionable applications like three GPP, DVB, and wireless technology. Field Programmable Gate Array technology (FPGA) is taken into account as extremely configurable choice for implementing several refined signal process task. The planned Viterbi decoder style is simulated on Modelsim.SE6.3f and enforced mistreatment VHDL code.

   

Full Text

 

Title: Clonal algorithm for emission constrained economic dispatch problem in thermal power plants
Author (s): R. Mathi and S. Jayalalitha
Abstract:

These days, power system planners are looking for ways to reduce emission from power generating stations especially coal based thermal power plants without compromising the load factor. The economic dispatch problem allocates units for a given load without considering its emission. The present paper proposes a multi-objective optimization method, which uses Artificial Immune System based Clonal Selection Algorithm to solve problems related to emissions and economic dispatch along with unit commitment of generators in a thermal power system. A penalty factor has been imposed for violating the critical emission limits which is subject to the impact it causes on the environment. An 'Artificial Immune System' based Clonal Selection principle is used to select a suitable generator from a pool of generator units. Fitness has been evaluated for the proliferated units. EED problem involves power demand equality and inequality constraints under various operating conditions. Finally, the best units were selected and committed for a given load. The 'Clonal Selection' method has been compared with Non-Dominated Ranked Genetic Algorithm (NGDA) and Clonal Algorithms to prove its robustness and superior optimal selection. To understand the proposed method, a 'IEEE -30 bus 6 unit test system' (with and without load uncertainty) is considered for solving the EED problem using MATLAB simulation and results are compared.

   

Full Text

 

Title: Estimating above ground biomass in hill dipterocarp forest, Kelantan, Malaysia using Landsat 8 OLI
Author (s): N. S. Aisyah, M. F. Norashikin, B. Ibrahim and R. Rhushalshafira
Abstract:

Above ground biomass estimation for hill dipterocarp forest has received much attention in recent years because the change of biomass regionally is associated with important components of climate change. Accurate biomass estimation is necessary for better understanding of deforestation impacts on global warming and environmental degradation. This paper aims to develop allometric equations to estimate biomass in hill dipterocarp forest using satellite image Landsat 8 OLI. This study was executed in three different Permanent Reserved Forests (PRF) in Kelantan namely Bukit Bakar Recreational Forest (BB), Gunung Basor Forest Reserve (GB) and Gunung Stong Forest Reserve (GS). A total of 39 sampling plot were established. Regression analysis were used to developed several models. Model with NIR band is known to be the best model to estimate above ground biomass.

   

Full Text

 

Title: Tensile strength of abaca strands from Sangihe Talaud Islands
Author (s): Alfred Noufie Mekel, Rudy Soenoko, Wahyono Suprapto and Anindito Purnowidodo
Abstract:

The study of abaca strands from Sangihe Talud Islands North Sulawesi Indonesia has been developing for biocomposite materials. The aim of this research is to recognize abaca fiber’s tensile strength, so that it could be prepared for biocomposite application. Average diameter of abaca fiber is 0.151 mm. The result of this research had given its maximum tensile strength of 189.24 MPa. It shows that abaca fiber is potential to be developed as alternative material in biocomposite.

   

Full Text

 

Title: Performance of three-bladed Archimedes screw turbine
Author (s): Tineke Saroinsong, Rudy Soenoko, Slamet Wahyudi and Mega N. Sasongko
Abstract:

The study of Archimedes screw turbine as a micro-hydro power-plant is being developed in this decade. Screw turbine has some advantages, namely no need draft-tube, fish-friendly, and can be operated in low head (H<10 m). The aim of this research is to recognize the performance of Archimedes screw turbine due to flow rate effect and its slope and also to reveal flow phenomenon that occurred among blades of the screws. Physical model of the screw turbine was made with acrylic as represented laboratory scale. Geometrical shapes are three blades, screw angle of 300, ratio radius of 0.54, pitch of 2.4Ro. Measured and observed variables are turbine’s rotation, torsion, and flow visualization with inlet flow rate variable (c0) are 0.3 m/s, 0.4 m/s, and 0.5 m/s, respectively. And the turbine’s slope variables (a) are 250, 350, and 450. According to experimental data, the maximum turbine efficiency is 89% that occur at 0.5 m/s of flow rate and 250 of shaft slope. The result of this research reveals that the largest hydraulic power occurs in the turbine shaft’s slope (a) of 450 in the amount of 16.97 with turbine’s rotation of 350 rpm. Output power of screw turbine occurs in the turbine shaft’s slope (a) of 450 in the amount of 5.11 watt and rotation of 182 rpm. The highest efficiency is 89% occur in turbine’s rotation of 50 rpm in the turbine shaft’s slope of 250 with y = 1R0. The result of this study show that the performance of the screw turbine is more maximum on the lower shaft’s slope that automatically become better operating in low head and rotation.

   

Full Text

 

Title: The effect of the risk factors on the performance of contractors in Banda Aceh, indonesia
Author (s): Anita Rauzana
Abstract:

In the implementation of construction projects, contractors often face the risk factors that may affect the performance and hinder the success of a construction project. Construction project is a mission, undertaken to create a unique facility, product or service within the specified scope, quality, time, and cost (Chitkara, 2004). Many contracting companies along with the advent of growing development in Banda Aceh to make the contractor should be able to maintain its performance in order to compete with other contractors. The purpose of this study to identify risk factors that have a frequency of occurrence is very frequent in the implementation of construction projects in Banda Aceh experienced contractor in the execution of construction projects in the Province of Aceh. Risk factors reviewed are a risk factor in the implementation of construction projects in general. The collection of primary data collected through the distribution of questionnaires to the respondents that the small non-qualified contractor in Banda Aceh. Performance contracting is a result of work accomplished by the contractor in carrying out a construction project. Contractor performance associated with risk factors gained during the performance of construction projects and can influence the success of a construction project itself. The main problem in this study is what the risk factors that can affect the performance of the contractor. Barcarini (2004) noted that construction projects are notorious for overrunning budgets because of unforeseen factors.

   

Full Text

 

Title: Efficient block codes for error correction using low density parity check codes
Author (s): M. Shyam, G. Sreekanth and V. Balamurugan
Abstract:

This paper presents a novel high-speed BCH (hamming) decoder that corrects single-bit errors in parallel and multiple-bit errors corrects serial manner. The proposed decoder is constructed by a novel design and is suitable for nanoscale memory systems, in which multiple-bit errors occur at a probability comparable to single-bit errors and multiple errors occur at a higher probability. To prevent such soft or transient fault related attacks, we consider fault tolerance as a method of mitigation. Most of the current fault tolerant schemes are only multiple bit error detectable but not multiple bit error correctable. This paper also shows that the area, delay, and power overheads incurred by the proposed scheme are significantly lower than traditional fully parallelized BCH based hamming decoders capable of correcting any multiple bit error. This error detection and correction algorithm is synthesized and simulated by using XILINX ISE.

   

Full Text

 

Title: Hydrothermal extraction of Phytochemical compounds from Polygonum Cuspidatum roots in a semi- batch reactor system
Author (s): Siti Machmudah, Wahyudiono, Hideki Kanda and Motonobu Goto
Abstract:

Hydrothermal extraction is known as a natural and green way for antioxidant compounds extraction. Antioxidant compounds from the roots of traditional Chinese medicinal herb Polygonum cuspidatum (P. cuspidatum) has been extracted at hydrothermal conditions. The antioxidant compounds were identified as polyphenolic compounds of resveratrol, rutin and quercetin. The effect of temperatures on the extraction yield of antioxidant compounds was studied. Based on the result, extraction yields of resveratrol, quercetin, and rutin significantly increased with increasing temperature at 10 MPa. After 180 min of extraction time, the yields of resveratrol, quercetin, and rutin were 0.95, 0.26, and 6.73 mg/g of feed loaded at 473 K, respectively. These results revealed that hydrothermal extraction is applicable method for the isolation of polyphenolic compounds from other types of biomass and may lead to an advanced plant biomass components extraction technology.

   

Full Text

 

Title: Hybrid prediction model for short term Wind speed forecasting
Author (s): M. C. Lavanya and S. Lakshmi
Abstract:

Due to notable depletion of fuel, non-conventional energy aids the present grid for Power management across the country. Wind energy indeed has major contribution next to solar. Prediction of wind power is essential to integrate wind farms into the grid. Due to intermittency and variability of wind power, forecasting of wind behavior becomes intricate. Wind speed forecasting tools can resolve this issue as prediction of wind power depends on the forecasting of Wind speed. A hybrid model is proposed and developed using both Auto Regressive integrated Moving Average (ARIMA) and Artificial Neural Network (ANN) to achieve best forecast of Wind speed in a given region.

   

Full Text

 

Title: Green inhibitor for API 5L x65 steel in HCL 0.5 m
Author (s): Femiana Gapsari, R. Soenoko, A. Suprapto and W. Suprapto
Abstract:

The research is the preliminary study of the ability of Cera alba (CA) extract inhibitors. The adsorption and corrosion inhibition characteristic of CA extract on API 5L X65 steel was investigated by weight loss and potentiodynamic polarization methods. The results showed that the inhibition efficiency increases with increasing inhibitor concentration. The weight loss and potentiodynamic polarization methods revealed that CA extract act as mixed type inhibitor.

   

Full Text

 

Title: Design and simulation of the SOLS technique applied for FM0, Manchester and miller encoding scheme
Author (s): R. Sangeetha Vani and M. R. Ebenezar Jebarani
Abstract:

Encoding techniques are fetching important role in communication. Techniques like Miller, Manchester, and FM0 encoding are used in numerous applications. Each technique has different operations depends on their needs. Each and every encoding scheme are used without losing any of its parameters. This paper adopt similarity oriented logic simplification technique (SOLS technique) which merges architecture together and synchronize the operation and also DSRC technique is used to maintain the dc-balance and signal reliability. By applying both the techniques we can reduce the number of transistors and maintains the DC balance. The present work deals with obtaining an integrated architecture of FM0, Manchester and Miller encoding to overcome several drawbacks of traditional method. A universal asynchronous receiver/transmitter (UART) is used here to translate data between parallel and serial forms for communication. In this proposed approach the number of hardware components is reduced, hence results in the reduction of the overall area consumed with the added functionality in DSRC.

   

Full Text

 

Title: Real time FPGA implementation for video creation VGA Frame rate conversion system
Author (s): Umarani E. and Vino T.
Abstract:

This paper introduces real time Full VGA display Frame rate conversion implemented on FPGA. By using the Frame rate conversion, we can display the Video game. This article gives a programming design of video game based on the FPGA using VHDL. The Game realized the function of the movement and rotation of blocks, randomly generating next blocks. The successful transplant of video game provides a template for the development of other visual control systems in the FPGA. This system improves the Quality of Video, can create Images and providing Animation to the Images and can control the system using Joy Stick, code in VHDL Language. Planning to add Encryption with the created video for Communication.

   

Full Text

 

Title: Analysis of outage probability, throughput in hybrid cognitive radio networks with and without transceiver impairments
Author (s): C. S. Preetham, M. Siva Ganga prasad, Ch. Abhinav, R. Monica and K. Harshitha
Abstract:

Cognitive radios in wireless networks is the efficient way of sensing and accessing the spectrum dynamically. In this paper we analyze the outage probability and capacity of hybrid network model in cognitive radios considering transceiver impairments. Every physical device has hardware impairments which degrades the performance of the system. Majority of technical contributions in wireless communications neglect transceiver impairments, assuming ideal hardware. Transceiver impairments like IQ imbalance, phase noise etc. have greater effect on system performance. A hybrid overlay/underlay transmission scheme has been proposed. This transmission method takes the effect of transceiver impairments into consideration and finds the best channel; best relay and best relay power. In this we develop a simulation test model to evaluate the performance and outage probability of hybrid model considering transceiver impairments. The manuscript provides how the effect of hardware impairments can be modeled. The manuscript also provides the analysis of the proposed hybrid cognitive radio model with the help of a case study, which considers various practical aspects.

   

Full Text

 

Title: Advanced motion tracking based mobility assistance for physically disabled
Author (s): Satyanarayana P., Sai Prajwal K., Chandra Naga Varma T., Sri Manojna E. and Sitara S.
Abstract:

In present-day scenario, many people aren’t able to control powered wheel chair using various interfaces like joystick, head control or voice control. For this reason, a new image-processing based mobility assistance system is proposed in this paper that automatically tracks the leg movement of the assisting person and follows him accordingly. In addition to this, an eye tracking feature has been inculcated into the proposed system that would help the disabled person in controlling the movement of wheel-chair using eye movement in the absence of an assisting person. The leg tracking module has been devised using the background subtraction and CamShift algorithms while the eye-tracking module utilizes the Haar cascades along with the Daugman’s algorithm to track the eye-movement.

   

Full Text

 

Title: Weight optimized dynamic hybrid fuzzy Jordan artificial neural network for intrusion detection
Author (s): A. Dhivya and S. N. Sivanandam
Abstract:

A Dynamic Hybrid Fuzzy Jordan Artificial Neural Network finds the intrusion very efficiently in timely behaviour varied networks. The development of DHFJAN is to influence the behavior of dynamic systems to achieve the pre-determinate objectives. In DHFJAN, the number of hidden layer in neural and Jordan networks and number of nodes in each hidden layers are determined at runtime based on error obtained in the training stage. Generally neural network and Jordan network approaches are inherent nonlinear optimization problem, the quality of Hybrid network local solution is determined the weight initialization. Stability and weight convergence are important issues in the performance analysis of dynamic networks. The weight initialization and optimization of hybrid networks is not discussed in DHFJAN. This paper finds the optimal weight values of each layer by utilizing the optimization techniques to improve the performance and final representation of hybrid network. Many researches were focused on the weight optimization of neural network using various optimization algorithm the PSO is best among them. Since two networks available in hybrid network, applying PSO leads time consumption because the search space size of PSO. This paper proposes a modified PSO algorithm named as CCPSO with constrained search space and controlled convergence degree. The constrained search space is achieved by generating initial weight values based on power-law distribution and Zipf's law. Convergence degree of population in the PSO is controlled by analyzing mean and variance values of fitness in each iteration. The optimal weights are updated in hybrid dynamic network while neuron state changing. Thus the proposed approach improves the performance of dynamic hybrid fuzzy Jordan neural network and also reduces the error rate significantly. Experimental result shows that the proposed WDHFJANN is better than the DIHFJANN.

   

Full Text

 


 

     

  

   

  

  

  

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

       arpnjournals.com                                                       Publishing Policy                                                  Review Process                                           Code of Ethics