- Real Time Implementation Of Face Recognition System
Megha Manchanda
[Abstract]
[PDF]
[Cite]
Abstract:
This paper proposes face recognition method using PCA for real time implementation. Nowadays security is
gaining importance as it is becoming necessary for people to keep passwords in their mind and carry cards. Such
implementations however, are becoming less secure and practical, also is becoming more problematic thus
leading to an increasing interest in techniques related to biometrics systems. Face recognition system is amongst
important subjects in biometrics systems. This system is very useful for security in particular and has been
widely used and developed in many countries. This study aims to achieve face recognition successfully by
detecting human face in real time, based on Principal Component Analysis (PCA) algorithm.
Index Terms: PCA, eigenvector, eigenfaces , covariance matrix, MATLAB
×
Copy and PasteMegha Manchanda , "Real Time Implementation Of Face Recognition System"
Vol. 4 - Issue 10 (October - 2014), International Journal of Engineering Research and Applications (IJERA) , ISSN: 2248-9622 , www.ijera.com
×
- Security Attacks and its Countermeasures in Wireless Sensor Networks
Rajkumar, Vani B. A, G. Rajaraman, Dr. H G Chandrakanth
[Abstract]
[PDF]
[Cite]
Abstract:
Wireless Sensor Networks have come to the forefront of the scientific community recently. Present WSNs typically communicate directly with a centralized controller or satellite. Going on the other hand, a smart WSN consists of a number of sensors spread across a geographical area; each sensor has wireless communication ability and sufficient intelligence for signal processing and networking of the data. This paper surveyed the different types of attacks, security related issues, and it's Countermeasures with the complete comparison between Layer based Attacks in Wireless Sensor Networks
Keywords: Wireless Sensor Network, Layer based Attacks, Security and Countermeasures.
×
Copy and PasteRajkumar, Vani B. A, G. Rajaraman, Dr. H G Chandrakanth , "Security Attacks and its Countermeasures in Wireless Sensor Networks" Vol. 4 - Issue 10 (October - 2014), International Journal of Engineering Research and Applications (IJERA) , ISSN: 2248-9622 , www.ijera.com
×
- Approaches for Keyword Query Routing
Mrs. Suwarna Gothane, Srujana.P
[Abstract]
[PDF]
[Cite]
Abstract:
The growing number of datasets published on the Web as linked data brings both opportunities for high data availability of data. As the data increases challenges for querying also increases. It is very difficult to search linked data using structured languages. Hence, we use Keyword Query searching for linked data. In this paper, we propose different approaches for keyword query routing through which the efficiency of keyword search can be improved greatly. By routing the keywords to the relevant data sources the processing cost of keyword search queries can be greatly reduced. In this paper, we contrast and compare four models – Keyword level, Element level, Set level and query expansion using semantic and linguistic analysis. These models are used for keyword query routing in keyword search.
Index Terms: Keyword search, Keyword query routing, Graph-structured data, linguistic and semantic analysis
×
Copy and PasteMrs. Suwarna Gothane, Srujana.P, "Approaches for Keyword Query Routing" Vol. 4 - Issue 10 (October - 2014), International Journal of Engineering Research and Applications (IJERA) , ISSN: 2248-9622 , www.ijera.com
×
- An Investigative and Concise Review on Evaporation and Condensation Processes Using Vapour Adsorption Technique
Dim Dim Kumar, S A Mohan Krishna
[Abstract]
[PDF]
[Cite]
Abstract:
The vapour adsorption refrigeration is based on the evaporation and condensation of a refrigerant combined with adsorption or chemical reaction. The towering fossil fuel price and the responsiveness of environmental problems offer many potential applications to thermal powered adsorption cooling. However, the adsorption cooling machines still have some disadvantages that hinder their wide application. The patents surveyed are classified into four main groups: adsorption system development, adsorbent bed innovation, adsorbent/adsorbate material development and novel application of adsorption cooling system. The adsorption refrigeration is based on the evaporation and condensation of a refrigerant combined with adsorption or chemical reaction. Important targets are to reach a high efficiency through optimization measures at various components and the control system. On the other hand measures are to verify to simplify the construction with regard to a low-cost manufacturing, as well as to reach long periods with maintenance-free operation. This review paper gives a comprehensive review on the work carried out on vapour adsorption refrigeration for cryogenic applications.
Key words: Vapour Adsorption Refrigeration, Evaporation, Condensation, Cooling System, Refrigerant and cryogenic.
×
Copy and PasteDim Dim Kumar, S A Mohan Krishna, "An Investigative and Concise Review on Evaporation and Condensation Processes Using Vapour Adsorption Technique" Vol. 4 - Issue 10 (October - 2014), International Journal of Engineering Research and Applications (IJERA) , ISSN: 2248-9622 , www.ijera.com
×
- Adaptive overcurrent relay for the rural Agricultural feeder Based on Niranthara Jyothi Yojana
Harish.K, Navneeth C V, Sunil Fernandes, Dr. Srivani S.G
[Abstract]
[PDF]
[Cite]
Abstract:
In certain states like Karnataka and Gujarat of India, farmers are provided with free 3-phase power supply to run their irrigation pump-sets under schemes like Niranthara Jyothi Yojana (NJY). Under this scheme, the rural feeders were bifurcated into agricultural feeders and non-agricultural feeders in order to facilitate 24 hours Supply for Non-agricultural Consumers and 8-10Hrs Supply for Agricultural Consumers. Due to power shortage, the 3-phase supply at the agricultural feeder is given only during the off-peak hours. Rest of the time, the supply is either 2-phase or the feeder is under Load Shedding. 2-phase supply at the station is given exclusively for lighting purpose at Farm houses. But, this 2-phase supply is being illegally tapped and converted to 3-phase by using condensers. Although, this is reflected in the sub-station load curve, it often takes time to detect such misuses. The conventional Overcurrent relay fails to respond to this misuse, unless the set points or pick up values are changed appropriately by human intervention, often the locals influence the substation personnel to keep the set points in such a way that the misuse is not reported. This, at times, may cause cascading disasters in the power system. The proposed relay would not only act as a protective element at the feeder, but also detect the misuse and trip the respective feeder by changing the set points appropriately without involving any human activity, eventually increasing the security of the system. Proposed relay has two working states namely active state and the event log state. The Event log keeps record of the events with real time and date by making use of Real time clock (RTC). This relay also consists of a GSM module which sends SMS to farmers and utility heads regarding the supply status.
Keywords: PCA, Adaptive protection, Open delta Operation, Group operated switch (GOS), Irrigation pump sets (IP sets), Numerical Overcurrent relay, Special Design Transformers(SDT)
×
Copy and PasteHarish.K, Navneeth C V, Sunil Fernandes, Dr. Srivani S.G, "Adaptive overcurrent relay for the rural Agricultural feeder Based on Niranthara Jyothi Yojana" Vol. 4 - Issue 10 (October - 2014), International Journal of Engineering Research and Applications (IJERA) , ISSN: 2248-9622 , www.ijera.com
×
- Distributed Power-Flow Controller (DPFC) Simulation
T Jagan Mohan Rao, B.Ravi kumar
[Abstract]
[PDF]
[Cite]
Abstract:
This paper describes the steady-state response and control of power in transmission line equipped with FACTS devices. Detailed simulations are carried out on two-machine systems to illustrate the control features of these devices and their influence to increase power transfer capability and improve system reliability. The DPFC is derived from the unified power-flow controller (UPFC) and DPFC has the same control capability as the UPFC. The DPFC can be considered as a UPFC with an eliminated common dc link. The active power exchange between the shunt and series converters, which is through the common dc link in the UPFC, is now through the transmission lines at the third-harmonic frequency. The interaction between the DPFC, the network and the machines are analyzed.
Keywords: FACTS, DPFC, modelling, power transmission, AC-DC power conversion, semiconductor devices, power system control.
×
Copy and PasteT Jagan Mohan Rao, B.Ravi kumar, "Distributed Power-Flow Controller (DPFC) Simulation" Vol. 4 - Issue 10 (October - 2014), International Journal of Engineering Research and Applications (IJERA) , ISSN: 2248-9622 , www.ijera.com
×
- Examination passive defense role in spatial distribution of urban region
Salman Hasanvand, Mohammad Amin Khojasteh Ghamari, Shabnam shakouri partovi
[Abstract]
[PDF]
[Cite]
Abstract:
Cities due to the compact and densely populated urban context and diverse urban networks usually are considered in the wars against ground and air attacks as a barrier. And on the other hand, struggles wanted or unwanted wars have led to the cities and sometimes causing high civilian casualties and damage to the city. Expert and track record militaries believe that urban warfare is one of the hardest battles of the model because of the possibility of resistance in the cities due to high intensive residential context and use different weapons to militants in their application package is limited. However, the military forces moved in is very difficult and may well lead them to the attacker's losses also increase under these conditions. Research methodology in this study was a descriptive - analytical. In this paper, after introducing key items affecting the spatial distribution and role of each one in the establishment and development of urban areas first, it will pay the expression of passive defense and civil defense in Tehran metropolitan area and second, to analyze the role of passive defense and settlement of the spatial distribution of urban infrastructure deals and the strengths and weaknesses of the studies discussed and finally, after a review and analysis of all factors will pay conclusions and provide effective strategies taking into account the spatial distribution and effective passive defense will be the key factor.
Keywords: passive defense, civil defense, territory, spatial distribution, spatial structure, land use.
×
Copy and PasteSalman Hasanvand, Mohammad Amin Khojasteh Ghamari, Shabnam shakouri partovi, "Examination passive defense role in spatial distribution of urban region" Vol. 4 - Issue 10 (October - 2014), International Journal of Engineering Research and Applications (IJERA) , ISSN: 2248-9622 , www.ijera.com
×
- Growth and Characterizations of Pure and Calcium Doped Cadmium Tartrate Crystals by Silica Gel Method
N. S. Patil, S. K. Bachhav, M. S. Kale, D.S. Bhavsar
[Abstract]
[PDF]
[Cite]
Abstract:
In the present course of investigation, pure and calcium doped cadmium tartrate crystals were grown in silica gel at room temperature. The optimum conditions were obtained by varying various parameters such as pH of gel, concentration of gel, gel setting time, concentration of reactants etc. Crystals having different morphologies were obtained such as whitish semitransparent, star shaped, needle shaped. Especially, effect of doping of calcium into cadmium tartrate has been studied with respect of size and transparency. It is found that doping enhances the size and transparency of the crystals. As-grown crystals were characterized using scanning electronic microscope (SEM), UV, Energy dispersive X-ray spectroscopy (EDAX).
Keywords: Crystal Growth, XRD, SEM, UV, EDAX
×
Copy and PasteN. S. Patil, S. K. Bachhav, M. S. Kale, D.S. Bhavsar, "Growth and Characterizations of Pure and Calcium Doped Cadmium Tartrate Crystals by Silica Gel Method" Vol. 4 - Issue 10 (October - 2014), International Journal of Engineering Research and Applications (IJERA) , ISSN: 2248-9622 , www.ijera.com
×
- Use of iron oxide magnetic nanosorbents for Cr (VI) removal from aqueous solutions: A review
Nirmala Ilankoon
[Abstract]
[PDF]
[Cite]
Abstract:
This review paper focuses on the use of iron oxide nanosorbents for the removal of hexavalent Chromium [Cr(VI)], from aqueous media. Cr(VI) is a well-known toxic heavy metal, which can cause severe damages to the human health even with the presence of trace levels. Chromium continuously enters into water streams from different sources. Several methods are available for Cr(VI) removal and some of them are well established in industrial scale whilst some are still in laboratory scale. Reduction followed by chemical precipitation, adsorption, electro-kinetic remediation, membrane separation processes and bioremediation are some of the removal techniques. Each method is associated with both advantages and disadvantages. Currently, the use of nanosorbents for the aqueous chromium removal is popular among researchers and iron oxide nanoparticles are the most frequently used nanosorbents. This review paper summarizes the performance of different iron oxide nanosorbents studied on the last decade. The direct comparison of these results is difficult due to different experimental conditions used in each study. Adsorption isotherms and adsorption kinetics models are also discussed in this review paper. The effect of solution pH, temperature, initial Cr(VI) concentration, adsorbent dosage and other coexisting ions are also briefly discussed. From the results it is evident that, more attention needs to be paid on the industrial application of the technologies which were successful in the laboratory scale.
Key words: Adsorption, Adsorption capacity, Chromium, Iron oxide nanoparticles, Nanosorbents
×
Copy and PasteNirmala Ilankoon, “Use of iron oxide magnetic nanosorbents for Cr (VI) removal from aqueous solutions: A review” Vol. 4 - Issue 10 (October - 2014), International Journal of Engineering Research and Applications (IJERA) , ISSN: 2248-9622 , www.ijera.com
×
- The application of queue theory in cloud computing to reduce the waiting time
N.N. Bharkad, Dr. M.H. Durge
[Abstract]
[PDF]
[Cite]
Abstract:
Cloud computing is a new technology in computer field to provide on line service to the customers. -Cloud computing has got enormous popularity as it offers dynamic, low-cost computing solutions. To get the service of cloud the user has to be in queue until he is served. Each arriving Cloud computing User (CCU) requests Cloud computing Service Provider (CCSP) to use the resources, if server is available, the arriving user will seize and hold it for a length of time, which leads to queue length and more waiting time. A new arrival leaves the queue with no service. After service completion the server is made immediately available to others. From the user's point of view he needs to be served immediately and to prevent waiting the CCSP's can use infinite servers to reduce waiting time & queue length. The arrival pattern is often Poisson in queuing theory. In this article we analyzed the dynamic behavior of the system with infinite servers by finding various effective measures like response time, average time spend in the system, utilization and throughput.
Keywords: Cloud computing, Poisson process, Queueing theory, Waiting time.
×
Copy and PasteN.N. Bharkad, Dr. M.H. Durge, “The application of queue theory in cloud computing to reduce the waiting time” Vol. 4 - Issue 10 (October - 2014), International Journal of Engineering Research and Applications (IJERA) , ISSN: 2248-9622 , www.ijera.com
×
- Image Interpolation Techniques in Digital Image Processing: An Overview
Shreyas Fadnavis
[Abstract]
[PDF]
[Cite]
Abstract:
In current digital era the image interpolation techniques based on multi-resolution technique are being discovered and developed. These techniques are gaining importance due to their application in variety if field (medical, geographical, space information) where fine and minor details are important. This paper presents an overview of different interpolation techniques, (nearest neighbor, Bilinear, Bicubic, B-spline, Lanczos, Discrete wavelet transform (DWT) and Kriging). Our results show bicubic interpolations gives better results than nearest neighbor and bilinear, whereas DWT and Kriging give finer details.
Keywords: Bicubic, Bilinear, DWT, Image Interpolation, Kriging
×
Copy and PasteShreyas Fadnavis, “Image Interpolation Techniques in Digital Image Processing: An Overview” Vol. 4 - Issue 10 (October - 2014), International Journal of Engineering Research and Applications (IJERA) , ISSN: 2248-9622 , www.ijera.com
×
- Catalytic Degradation of 4-Nitrophenol Using Gamma Irradiated PVA/Ag Nanocomposites.
Wael H. Eisa, Farag A. Ali, Mohamed S. Sadek
[Abstract]
[PDF]
[Cite]
Abstract:
In this work, PVA/Ag nanocomposites were prepared by adding different volumes of AgNO
3 to PVA solution. PVA/Ag nanocomposites used as a catalyst for the degradation of 4-nitrophenol (4-NP) to 4-aminophenol (4-AP). The responsive catalyst is easily synthesized, environmentally compatible, cost-effective and can be easily recovered by handling from the aqueous solution. The shape and particle size distribution were studied using Transmission Electron Microscope (TEM). The X-Ray diffraction (XRD) and UV-visible Absorption Spectra of Gamma-irradiated PVA/AgNO
3 Films were studied.
Keywords: PVA/Ag nanocomposites; 4-nitrophenol; TEM; XRD; UV-Visible.
×
Copy and PasteWael H. Eisa, Farag A. Ali, Mohamed S. Sadek, “Catalytic Degradation of 4-Nitrophenol Using Gamma Irradiated PVA/Ag Nanocomposites. ” Vol. 4 - Issue 10 (October - 2014), International Journal of Engineering Research and Applications (IJERA) , ISSN: 2248-9622 , www.ijera.com
×
- An Enhanced trusted Image Storing and Retrieval Framework in Cloud Data Storage Service Environment
Darapaneni Chandra Sekhar, M.Chandra Naik
[Abstract]
[PDF]
[Cite]
Abstract:
Today's image capturing technologies are producing High Definitional-scale images which are also heavier on memory, which has prompted many users into cloud storage, cloud computing is an service based technology and one of the cloud service is Data Storage as a Service (DSaaS), two parties are involved in this service the Cloud Service Provider and The User, user stores his vital data onto the cloud via internet example: Dropbox. but a bigger question is on trustiness over the CSP by user as user data is stored remote devices which user has no clue about, in such situation CSP has to create a trust worthiness to the costumer or user, in these paper we addressed the mention insecurity issue with a well defined trusted image Storing and retrieval framework (TISR) using compress sensing methodology.
Keywords: Compressed sensing, security and privacy, cloud computing, image reconstruction.
×
Copy and PasteDarapaneni Chandra Sekhar, M.Chandra Naik, “An Enhanced trusted Image Storing and Retrieval Framework in Cloud Data Storage Service Environment” Vol. 4 - Issue 10 (October - 2014), International Journal of Engineering Research and Applications (IJERA) , ISSN: 2248-9622 , www.ijera.com
×