S.No. |
Title |
Page |
Downloads |
1. |
Phonetic Dictionary for Natural Language Processing: Kannada
Phonetic Dictionary for Natural Language Processing: Kannada
Abstract: India has 22 officially recognized languages: Assamese, Bengali, English, Gujarati, Hindi, Kannada, Kashmiri, Konkani, Malayalam, Manipuri, Marathi, Nepali, Oriya, Punjabi, Sanskrit, Tamil, Telugu, and Urdu. Clearly, India owns the language diversity problem. In the age of Internet, the multiplicity of languages makes it even more necessary to have sophisticated Systems for Natural Language Process. In this paper we are developing the phonetic dictionary for natural language processing particularly for Kannada. Phonetics is the scientific study of speech sounds. Acoustic phonetics studies the physical properties of sounds and provides a language to distinguish one sound from another in quality and quantity. Kannada language is one of the major Dravidian languages of India. The language uses forty nine phonemic letters, divided into three groups: Swaragalu (thirteen letters); Yogavaahakagalu (two letters); and Vyanjanagalu (thirty-four letters), similar to the vowels and consonants of English, respectively.
Key words: Information Retrieval, Natural Language processing (NLP), Phonetics
Reference
[1] http://en.wikipedia.org/wiki/Kannada_language
[2] "BhashaIndia.com :: Kannada". Archived from the original on 2008-04-14. Retrieved 2014-05-01.
[3] http://en.wikipedia.org/wiki/Kannada_alphabet
[4] http://en.wikipedia.org/wiki/Phonetics
[5] Phonetic coding methods for Malay names retrieval, Semantic Technology and Information Retrieval (STAIR),2011,Mutalib, IEEE International Conference on 28-29 June 2011 Page(s):125 - 129 E-ISBN :978-1-61284-353-7 Print ISBN:978-1-61284-354-4 INSPEC Accession Number:12192197
Mallamma V. Reddy, Hanumanthappa M., Jyothi N.M, Rashmi S. |
01-04 |
 |
2. |
Design and noise, vibration, harshness analysis of engine bonnet of the car
Design and noise, vibration, harshness analysis of engine bonnet of the car
Abstract: Unique the car auto body have different sort of Bonnet. Bonnet is a vital segment of the auto which is utilized for some reasons. Bonnet is utilized to design the auto include extravagant look. It blankets the motor, radiator and numerous different parts. Subsequently it planned in such a route, to the point bonnet all the support parts ought to be available and it gives a base effect on the motor. At the point when auto over any mischance from the front divide more often than not hood framework gets harmed. So there is a requirement for dissection of bonnet. This paper concentrates on Analysis and strategies utilized for NVH of bonnet.
Key words: NVH, Analysis, car bonnet
Reference
[1] Estimation of NVH of the sandwich constructed components of the automotive vehicle by Dr. Suresh P. M. [2] J. B. Park International Journal of Automotive Technology, Vol. 13, No. 2, pp. 223−229 (2012) [3] International Journal of Automotive Technology, Vol. 12, No. 4, pp. 555−559 (2011) [4] M. Grujicic: International Centre for Automotive Research. [5] Int. J. Vehicle Noise and Vibration, Vol. 1, Nos. 3/4, 2005.
Vinay V Nesaragi, Maruthi B.H, Chandru B T, Dileep Kumar |
05-11 |
 |
3. |
Neonatal Monitoring System
Neonatal Monitoring System
Abstract: Childbirth is generally time of joy for parents and families. As per the medical reports each year 4 million newborns die within 28 days of birth and more suffer from disability, disease, infection and injury. The enabling environment for safe childbirth depends on the care and attention required to newborns by health personnel and the availability of adequate health-care facilities, equipment, and medicines and emergency care when needed. Neonatal monitoring refers to the monitoring of vital physiological parameters of premature infants. Continuous health monitoring of the neonates provides crucial parameters for early detection of adverse events. Health monitoring for the neonates provides crucial parameters for urgent diagnoses and corresponding medical procedures, subsequently increasing the survival rates. In the present paper, we propose a proto type design of a neonatal monitoring system. The system is designed and integrated with different health measurement and display devices. The prototype design is very much useful for monitor the physiological parameters of infants.
Key words: Neonatology, Neonatal Intensive Care Unit, Health parameters
Reference
[1] The EPICure study: Outcome to discharge from hospital for infants born at the threshold of viability. Costeloe, K.; Hennessy, E.; Gibson, A. T.; Marlow, N. & Wilkinson, A. R. Pediatrics, Vol. 106, No. 4, 2000, pp. 659-671. [2] Neurobehavioral deficits in premature graduates of intensive care -Potential medical and environmental risks factors. Perlman, J. M. Pediatrics, Vol. 108, No. 6, 2001,pp. 1339-1348.
[3] The genesis of cognitive and behavioural deficits in prematuregraduates of intensive care. Perlman, J. M. Minerva Pediatr., Vol. 55, 2003, pp. 89-101.
[4] Fetal and Neonatal Physiology, W. B. Saunders Company, Polin, R. A. & Fox, W. W. (Eds.). 1992
[5] Sensors in neonatal monitoring: Current practice and future trends. Technology and Health Care, Murković, I.; Steinberg, M. D. & Murković, B. Vol. 11, IOS Press, 2003, pp. 399–412.
L. Suresh, N. Anju Latha, B. Rama Murthy, K. Tanveer Alam, K. Jyothi Babu |
12-15 |
 |
4. |
Design and Simulation of First Order Sigma-Delta Modulator Using LT spice Tool
Design and Simulation of First Order Sigma-Delta Modulator Using LT spice Tool
Abstract: A switched-capacitor single-stage Sigma-Delta ADC with a first-order modulator is proposed. Efficient low power first Order 1-Bit Sigma-Delta ADC designed which accepts input signal bandwidth of 10 MHz. This circuitry performs the function of an analog-to-digital converter. A first-order 1-Bit Sigma-Delta (Σ-Δ) modulator is designed, simulated and analyzed using LTspice standard 250nm CMOS technology power supply of 1.8V. The modulator is proved to be robustness, the high performance in stability. The simulations are compared with those from a traditional analog-to-digital converter to prove that Sigma-Delta is performing better with low power and area.
Key words: 1-Bit Sigma-Delta ADC, CMOS Technology, LTspice Tool.
Reference
[1] L. Yin, S.H.K. Embadi and E. Sanchez-
Sinencio, "A floating gate MOSFET D/A
converter", Proc. of IEEE International
symposium on Circuits and Systems, vol. 1,
June 1997, pp. 409-412.
[2] Y. Ke, S. Radiom, H. R. Rezaee, G.
Vandenbosch, J. Craninckx, and G. Gielen,
"Optimal design methodology for high-order
continuous-time wideband Delta-Sigma
converters," in Proceedings of the 14th
IEEE International Conference on
Electronics, Circuits and Systems (ICECS
‟07), Marrakech,Morocco, December 2007,
pp. 743–746.
[3] Anup G. Dakre, Prof. A.M.Chopde, "Design
and Simulation of 1-Bit Sigma-Delta ADC
using NGSPICE Tool", ISSN: 2277-9043
International Journal of advanced research
in computer science and electronics
engineering Vol.1, Issue 2, April 2012, pp.
124-128. [4] Neil H. E. Weste, David Money Harris,
"CMOS VLSI Design: A Circuits and
Systems Perspective", Pearson Education,
Inc.,Addison-Wesley, 2011.
[5] Roubik Gregorian, "Interoduction to CMOS
Op-amps and Comparators", Wiley Eastern,
1999.
Prince Kumar Pandey, Madhuraj, Ravendra Singh |
16-19 |
 |
5. |
Computational Design and Analysis of Core Material of Single-Phase Capacitor Run Induction Motor
Computational Design and Analysis of Core Material of Single-Phase Capacitor Run Induction Motor
Abstract: A Single-phase induction motor (SPIM) has very crucial role in industrial, domestic and commercial sectors. So, the efficient SPIM is a foremost requirement of today's market. For efficient motors, many research methodologies and propositions have been given by researchers in past. Various parameters like as stator/rotor slot variation, size and shape of stator/rotor slots, stator/rotor winding configuration, choice of core material etc. have momentous impact on machine design. Core material influences the motor performance to a degree. Magnetic flux linkage and leakage preliminary depends upon the magnetic properties of core material and air gap. The analysis of effects of core material on the magnetic flux distribution and the performance of induction motor is of immense importance to meet out the desirable performance. An increase in the air gap length will result in the air gap performance characteristics deterioration and decrease in air gap length will lead to serious mechanical balancing concern. So possibility of much variation in air gap beyond the limits on both sides is not feasible. For the optimized performance of the induction motor the core material plays a significant role. Using higher magnetic flux density, reduction on a magnetizing reactance and leakage of flux can be achieved. In this thesis work the analysis of single phase induction motor has been carried out with different core materials. The four models have been simulated using Ansys Maxwell 15.0. Higher flux density selection for same machine dimensions result into huge amount of reduction in iron core losses and thereby improve the efficiency. In this paper 2% higher efficiency has been achieved with Steel_1010 as compared to the machine using conventional D23 material. Out of four models result reflected by the machine using steel_1010 and steel_1008 are found to be better.
Key words: Single-Phase induction motor, core material, Maxwell 15.0
Reference
[1] G. Lee et al. "Optimal Shape Design of Rotor Slot in Squirrel-Cage Induction Motor Considering Torque-Characteristics", IEEE Trans. on magnetics, Vol. 49, No. 5, 2013, pp. 2197-2200. [2] S. Sobhani et al. "Optimize efficiency and torque in the single-phase induction motor by adjusting the design parameters", International conference on Environment and Electrical Engineering (EEEIC-2013), pp. 237-241. [3] M.S. Alshamasin, "Optimization of the Performance of Single-Phase Capacitor-Run Induction Motor" American-Journal of Applied Sciences, 2009, pp. 745-751. [4] Z. Rui et al. "Optimal Design of Single-Phase Induction Motor Based on MAXWELL-2D Rmxprt", International conference on Electrical machines and Systems (ICEMS-2010), pp. 1367-1370. [5] Claudia A. da Silva et al. "Analysis of Single-Phase Induction Motors with Centrifuged Rotors", International Electric Machines & Drives Conference (IEMDC-2013), pp. 1305-1309.
Gurmeet Singh, Gurlad Singh, Mohd. Afaque Iqbal |
20-25 |
 |
6. |
New Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral Recognition
Abstract: The present paper proposes a new approach of preprocessing for handwritten, printed and isolated numeral
characters. The new approach reduces the size of the input image of each numeral by discarding the redundant
information. This method reduces also the number of features of the attribute vector provided by the extraction
features method. Numeral recognition is carried out in this work through k nearest neighbors and multilayer
perceptron techniques. The simulations have obtained a good rate of recognition in fewer running time.
Key words: features extraction, handwritten and printed numeral recognition, k nearest neighbors, multilayer
perceptron , preprocessing.
Reference
[1] R.G.1. Benne, B.V.1. Dhandra and M. Hangarge, "Tri-scripts handwritten numeral recognition: a novel approach". Advances in Computational Research, ISSN: 0975–3273, Vol 1, Issue 2, pp: 47-51,2009.
[2] Anuja P. Nagare. "License Plate Character Recognition System using Neural Network". International Journal of Computer Applications (0975-8887), Vol.25, N°.10, July 2011.
[3] N. Abu Bakar, S. Shamsuddin, and A. Ali. "An integrated formulation of zernike representation in character images". In Nicolás García-Pedrajas, Francisco Herrera, Colin Fyfe, José Benítez, and Moonis Ali, editors, Trends in Applied Intelligent Systems, volume 6098 of Lecture Notes in Computer Science, pages 359–368. Springer Berlin / Heidelberg, 2010.
[4] X. Dupré, "Contributions à la reconnaissance de l'écriture cursive à l'aide de modèles de Markov". Thèse, Université René Descartes-Paris 5, 2003.
[5] R.Ebrahim, M.R.Moradian, A.Esmkhani, F.M.Jafarlou. "Recognition of Persian handwritten digits using characterization Loci and mixture of experts". International Journal of Digital Content.Technology and its Applications, Vol.3,N°.3, 2009 .
S. Benchaou, M. Nasri, O. El Melhaoui, B. Bouali |
26-30 |
 |
7. |
A Single Phase to Three Phase PFC Half-Bridge Converter Using BLDC Drive with SPWM Technique
A Single Phase to Three Phase PFC Half-Bridge Converter Using BLDC Drive with SPWM Technique
Abstract: In this paper, a buck half-bridge DC-DC converter is used as a single-stage power factor correction (PFC) converter for feeding a voltage source inverter (VSI) based permanent magnet brushless DC motor (BLDC) drive. The front end of this PFC converter is a diode bridge rectifier (DBR) fed from single-phase AC mains. The BLDC is used to drive a compressor load of an air conditioner through a three-phase VSI fed from a controlled DC link voltage. The speed of the compressor is controlled to achieve energy conservation using a concept of the voltage control at DC link proportional to the desired speed of the BLDC. Therefore the VSI is operated only as an electronic commutator of the BLDC. The stator current of the BLDC during step change of reference speed is controlled by a rate limiter for the reference voltage at DC link. The proposed BLDC drive with voltage control based PFC converter is designed, modeled and its performance is simulated in Matlab-Simulink environment for an air conditioner compressor driven through a 1.5 kW, 1500 rpm BLDC motor. The evaluation results of the proposed speed control scheme are presented to demonstrate an improved efficiency of the proposed drive system with PFC feature in wide range of the speed and an input AC voltage.
Index Terms: PFC, BLDC, Air conditioner, Buck Half- bridge converter, Voltage control, VSI.
Reference
[1] T. Kenjo and S. Nagamori, Permanent Magnet Brushless DC Motors, Clarendon Press, oxford, 1985. [2] T. J. Sokira and W. Jaffe, Brushless DC Motors: Electronic Commutation and Control, Tab Books USA, 1989. [3] J. R. Hendershort and T. J. E. Miller, Design of Brushless Permanent- Magnet Motors, Clarendon Press, Oxford, 1994. [4] J. F. Gieras and M. Wing, Permanent Magnet Motor Technology – Design and Application, Marcel Dekker Inc., New York, 2002. [5] Limits for Harmonic Current Emissions (Equipment input current ≤16 A per phase), International Standard IEC 61000-3-2, 2000.
Srinu Duvvada, Manmadha Kumar B |
31-38 |
 |
8. |
Design & Performances of Coconut De-Shelling Machine
Design & Performances of Coconut De-Shelling Machine
Abstract: The traditional method used in India, for the separation of copra and shell from partially-dried split coconuts, is labour intensive. To overcome this problem, a power operated coconut de-shelling machine was designed and developed. A coconut de-shelling machine comprising of cutter with belt drive. Performances test analysis conducted show that the machine de-shelled the fruits without nut breakage and also that its average de-shelling efficiency and capacity are 90% and 195 coconut per hour. All materials used in the fabrication of this machine are of standard specification and locally sourced. The estimated cost of producing one unit of the machine is twenty five thousand six hundred (Rs.25, 600). The machine also eliminated dependency on the epileptic public electric power supply in our rural areas which constitutes the major obstacle in the use of other mechanized coconut de-shelling equipment in the rural area.
Key words: Coconut De-shelling machine, de-shelling efficiency, capacity, small scale farmers
Reference
[1] Foale, M.A. The Coconut Palm. In: Chopra, V.L. and Peter K.V. edited Handbook of Industrial Crops. Haworth Press, New York, 2005. [2] APCC. Coconut Food Process – Coconut Processing Technology. Information Document. Arancon, Jr, R.N., ed. Asian and Pacific Coconut Community. Jakarta, Indonesia,1996. [3] Brandis, C. and Glaser, F. (1973). Specification for separations of kernels from coconuts. Philippine patent No: 9865. [4] Madhavan, K. (1985). Design and development of copra moisture meter. J. Planta. Crops. 16: 113-116. [5] Tilledaratne, H.A. Processing of Coconut Products inSri Lanka. Asian and Pacific Coconut Informantion Document. Arancon, Jr., R.N., ed. Asian and Pacific Coconut Community. Jakarta, Indonesia.
Mr. Ketan K.Tonpe, Mr. Vinod P. Sakhare, Dr. C. N. Sakhale |
39-44 |
 |
9. |
Comparative Study for Adsorptive Removal of Coralene Blue BGFS Dye from Aqueous Solution by MgO and Fe2O3 as an Adsorbent
Comparative Study for Adsorptive Removal of Coralene Blue BGFS Dye from Aqueous Solution by MgO and Fe2O3 as an Adsorbent
Abstract: Textile industries represent biggest impact on the environment due to high water consumption and waste water discharge as government control water pollution by setting strength regulation for waste water discharge, removal of color from waste water becomes more and more essential and attractive. Adsorption technology is very efficient in treatment of textile effluent. In this paper comparison of adsorption phenomena of textile dye Anthraquinone blue onto two different adsorbents MgO nano powder and Fe2O3 amorphous powder has been studied for removal of said dye from aqueous solutions. The adsorption of Anthraquinone blue on adsorbents occurs by studying the effects of adsorbent amount, dye concentration, contact time and pH of solution. All results found that MgO nano powder and Fe2O3 provide a fairly high dye adsorption capacity, which combined with their fulfilment of pollution control board's standards, lack of pollution, lower environmental hazard and low-cost makes them promising for future applications. The present work also provides information on optimum value of different operating parameter for dye removal by two adsorbent.
Key words: Textile industries, dye removal, MgO nano powder, Fe2O3 amorphous powder, Adsorption, Anthraquinone blue dye.
Reference
[1] A. Dabrowski, "Adsorption from theory to practice". Adv Colloid Interface Sci. 2001 Oct 8; 93(1-3):135-224.
[2] A. Mahapatra, B.G. Mishra. G.Hotan, "Adsorptive removal of Congo red dye from wastewater by mixed iron oxide–alumina nano composites", Department of Chemistry, NIT Rourkela, Orissa 769008, India.
[3] A. Afkhami and R. Mcosavi, "Adsorptive removal of Congo red, a carcinogenic textile dye, from aqueous solutions by maghemite nanoparticles", Journal of Hazardous Materials, 19 September 2009, pp 398-403.
[4] A. Bizuneh (2012) "Chemistry: textile effluent treatment and decolourisation techniques—a review", Bul J Sci Educ 21(3):434–456
[5] A. Dorthy C. , R. Sivaraj and R. Venckatesh, "Decolorization of Reactive Violet – 2RL Dye by Aspergillus Flavus and Aspergillus Fumigatus from Textile Sludge", International Research Journal of Environment Sciences, ISSN 2319–1414,Vol. 1(2), 8-12, September (2012)
Parth Desai, Kartik Gonawala, Mehali Mehta |
45-56 |
 |
10. |
An Efficient Data Communication Using Conventional Codes
An Efficient Data Communication Using Conventional Codes
Abstract: The BER performance of conventional FFT-OFDM system is compared with DWT-OFDM system and DCT-OFDM system in an AWGN environment and Saleh-Valenzuela (SV) channel model at 60 GHz. Several wavelets such as Haar, Daubechies, Symlet, biorthogonal are considered. The BER is calculated for signaling format BPSK and the performance is analyzed at 60 GHz. Simulation results show that DCT based scheme yields the lowest average bit error rate. While out of all wavelet mother used Haar and Daubechies wavelet based scheme yields lower BER than FFT-OFDM for an AWGN channel. But it may include the implementation of forward error correction techniques such as convolution codes. An efficient channel estimation algorithm may be included for performance evaluation of DCT-OFDM and DWT- OFDM working at 60 GHz band. We introduce the Interfacing Techniques for Accessing data transfer data delivery. By using our approach we are increasing the efficiency of the data communication.
Index Terms: orthogonal frequency-division multiplexing (OFDM), Fourier-based OFDM (FFT-OFDM), discrete cosine transform (DCT), DCT, FPGA, OFDMA, QAM, VHDL.
Reference
[1] Achala Deshmukh1 and Shrikant Bodhe "Comparison of DCT and Wavelet Based OFDM System Working in 60 GHz Band", International Journal of Advancements in Technology http://ijict.org/ ISSN 0976-4860. [2] Haleh Hosseini," Wavelet Packet based Multicarrier Modulation for Cognitive UWB Systems", Signal Processing – An International Journal (SPIJ), Volume (4): Issue (2) [3] Syed Mohammed Sajid, Lakshmi C R," DCT Based Improved OFDM Communication", International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 12, June 2013. [4] Ramjee Prasad, OFDM for Wireless Communications Systems, Artech House, Inc. Boston, London, 2004. [5] Peng Tan, Norman C. Beaulieu, "A Comparison of DCT-Based OFDM and DFT-Based OFDM in Frequency Offset and Fading Channels", IEEE Trans. Commun, vol 54, NO.11, Nov. 2006.
Mrs. Nikam Pratibha Madhavrao, Mr. B.G.Hogade |
57-59 |
 |
11. |
Background Subtraction Algorithm Based Human Behavior Detection
Background Subtraction Algorithm Based Human Behavior Detection
Abstract: Phase shifter is a key component in phase array antenna for the Radar application and the wireless communication system. This paper presents a novel design of miniaturised 2bits phase shifter using Koch fractal shapes of one iteration orders. The 3-section branch line coupler is used to extend the bandwidth of the phase shifter,this type of coupler is characterised by a low cost and simplicity of fabrication.Using the Koch fractal geometry the circuit size of the coupler is reduced to 6.36cm ×2.14cm at 2.4GHz. The simulation results show a good performance. So, over 2.1GHz-2.7GHzThe novel design of 2bits fractal reflection phase shifter based on the 3section show a return loss less than -20dB and the phase error varied between 0.1° and 0.4°for the four output phases . The circuit size of the phase shifter is reduced to9.5cm×2.1cm.
Index Terms: Digital phase shifter, phased antenna array, Directional coupler, Koch fractal geometry
Reference
[1] V K Manoharan, S. Sindhja, S Deepak Ram Prasath, S Raju and V Abhaikumar, ―A novel miniaturized loaded line phase shifter,‖ Journal of Scientific & Industrial Research, vol. 69, pp. 823–829,November2010
[2] Mercy.J1, Muthukumaran.P2,―Design and implementation of 2-bit loaded line phase shifter ‖, Proceedings of the 8th National Conference on Advances in Electronic Communications (ADELCO' 12), 24th Feb, 2012, [3] Nagaveni D. Doddamanil, Harishchandra2 and Anil V. Nandi―Design of SPDT Switch, 6 Bit Digital Attenuator, 6 Bit Digital Phase Shifter for L-Band T/R Module using 0.7 p.M GaAs MMIC Technology‖,IEEE - ICSCN 2007, MIT Campus, Anna University, Chennai, India, pp.302-307, Feb. 22-24, 2007 [4] Hong-Teuk Kim, Jae-Hyoung Park, Sanghyo Lee, Seongho Kim, Jung-Mu Kim, Yong-Kweon Kim, and Youngwoo Kwon, ―V -Band 2-b and 4-b Low-Loss and Low-Voltage Distributed MEMS Digital Phase Shifter Using Metal–Air–Metal Capacitors‖, IEEE transactions on microwave theory and techniques, vol. 50, no. 12, December 2002 [5] R. K. Mongia, I. J. Bahl, P. Bhartia, J. Hong, ―RF and Microwave Coupled-Line Circuits ,‖ book,2007
Prof. D. D. Dighe, Patil Kalpana Vishwas |
60-64 |
 |
12. |
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Vehicular Adhoc Network
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Vehicular Adhoc Network
Abstract: Designing a protocol structure which contains the control system, VANET device and the type of communication message structures which will implement the message packets for v2v or v2I infrastructure . The different message packets contain the information required to transfer from one node to another in vehicular network for communication. Design various algorithm required for Control, Alert and Infotainment messages. Time stamping lowering data rate efficient packet delivery and proper communication of required messages. Implementation of proposed algorithms and comparison of them with existing algorithms and study of different factors affecting the working of theses algorithms. Analysis of proposed design approach and improvements in results if required.
Key words: v2v Vehicle to Vehicle, v2I Vehicle to Infrastructure
Reference
[1] Sherali Zeadally ·Ray Hunt · Yuh-Shyan Chen
·Angela Irwin · Aamir Hassan, "Vehicular ad
hoc networks (VANETS): status, results, and
challenges",,© Springer Science+Business
Media, LLC 2010.
[2] Anthony Busson, Alain Lambert, Dominique
Gruyer, and Denis Gingras," Analysis of
Intervehicle Communication to Reduce road
Crashes". IEEE Transactions on Vehicular
Technology, vol. 60, no. 9, November 2011 .
[3] Yasuharu OHTA, Tomoyuki OHTA, and
Yoshiaki KAKUDA . "An Autonomous
Clustering-based Data Transfer Scheme Using
Positions and Moving Direction of Vehicles
for VANETs", IEEE Wireless Communications
and Networking Conference: Mobile and
Wireless Networks. 2012
[4] G¨ unther Brandner, Student Member, IEEE,
UdoSchilcher, member IEEE, Torsten Andre
and Christian Bettstetter, "Packet Delivery
Performance of Simple Cooperative Relaying
in Real-World Car-to-Car Communications ",
IEEE Wireless Communications Letters, vol.1,
no.3, June 2012
[5] Sadaf Momeni, Mahmood Fathy,"VANET's
Communication" Spread Spectrum
Techniques and Applications, 2008. ISSSTA
'08. IEEE 10th International Symposium on
Digital Object Identifier:
10.1109/ISSSTA.2008.115 , Page(s): 608 -
612 Publication Year: 2008
Amita Meshram, Smita Kawade, Nilima Jichkar, Rasika Ingle, Supriya Thombre |
65-67 |
 |
13. |
Modelling And Miniaturization of A 2-Bits Phase Shifter Using Koch Fractal Shape Microstripline
Modelling And Miniaturization of A 2-Bits Phase Shifter Using Koch Fractal Shape Microstripline
Abstract: Phase shifter is a key component in phase array antenna for the Radar application and the wireless communication system. This paper presents a novel design of miniaturised 2bits phase shifter using Koch fractal shapes of one iteration orders. The 3-section branch line coupler is used to extend the bandwidth of the phase shifter,this type of coupler is characterised by a low cost and simplicity of fabrication.Using the Koch fractal geometry the circuit size of the coupler is reduced to 6.36cm ×2.14cm at 2.4GHz. The simulation results show a good performance. So, over 2.1GHz-2.7GHzThe novel design of 2bits fractal reflection phase shifter based on the 3section show a return loss less than -20dB and the phase error varied between 0.1° and 0.4°for the four output phases . The circuit size of the phase shifter is reduced to9.5cm×2.1cm.
Index Terms: Digital phase shifter, phased antenna array, Directional coupler, Koch fractal geometry.
Reference
[1] V K Manoharan, S. Sindhja, S Deepak Ram Prasath, S Raju and V Abhaikumar, ―A novel miniaturized loaded line phase shifter,‖ Journal of Scientific & Industrial Research, vol. 69, pp. 823–829,November2010
[2] Mercy.J1, Muthukumaran.P2,―Design and implementation of 2-bit loaded line phase shifter ‖, Proceedings of the 8th National Conference on Advances in Electronic Communications (ADELCO' 12), 24th Feb, 2012, [3] Nagaveni D. Doddamanil, Harishchandra2 and Anil V. Nandi―Design of SPDT Switch, 6 Bit Digital Attenuator, 6 Bit Digital Phase Shifter for L-Band T/R Module using 0.7 p.M GaAs MMIC Technology‖,IEEE - ICSCN 2007, MIT Campus, Anna University, Chennai, India, pp.302-307, Feb. 22-24, 2007 [4] Hong-Teuk Kim, Jae-Hyoung Park, Sanghyo Lee, Seongho Kim, Jung-Mu Kim, Yong-Kweon Kim, and Youngwoo Kwon, ―V -Band 2-b and 4-b Low-Loss and Low-Voltage Distributed MEMS Digital Phase Shifter Using Metal–Air–Metal Capacitors‖, IEEE transactions on microwave theory and techniques, vol. 50, no. 12, December 2002 [5] R. K. Mongia, I. J. Bahl, P. Bhartia, J. Hong, ―RF and Microwave Coupled-Line Circuits ,‖ book,2007
Mariem. Mabrouki, Lassaad.Latrach, Ridha.Ghayoula And Ali.Gharsallah |
68-73 |
 |
14. |
A cloud solution for medical image processing
A cloud solution for medical image processing
Abstract: The rapid growth in the use of Electronic Health Records across the globe along with the rich mix of multimedia held within an EHR combined with the increasing level of detail due to advances in diagnostic medical imaging means increasing amounts of data can be stored for each patient. Also lack of image processing and analysis tools for handling the large image datasets has compromised researchers and practitioner‟s outcome. Migrating medical imaging applications and data to the Cloud can allow healthcare organizations to realize significant cost savings relating to hardware, software, buildings, power and staff, in addition to greater scalability, higher performance and resilience. This paper reviews medical image processing and its challenges, states cloud computing and cloud computing benefits due to medical image processing. Also, this paper introduces tools and methods for medical images processing using the cloud. Finally a method is provided for medical images processing based on Eucalyptus cloud infrastructure with image processing software "ImageJ" and using improved genetic algorithm for the allocation and distribution of resources. Based on conducted simulations and experimental results, the proposed method brings high scalability, simplicity, flexibility and fully customizability in addition to 40% cost reduction and twice increase in speed.
Key words: Medical Image Processing, Cloud Computing, Eucalyptus, ImageJ, Improved Genetic Algorithm.
Reference
[1] Sh. Hallett, G. Parr, S. McClean1, A. McConnell, B. Majeed, "Cloud-based Healthcare: Towards a SLA Compliant Network Aware Solution for Medical Image Processing," CLOUD COMPUTING 2012 : The Third International Conference on Cloud Computing, GRIDs, and Virtualization, pp. 219–223, 2012. [2] ZH. Tiecheng, T. Robert James, L. Gang, W. Junnan, J. Chunguang, "Cloud-based medical image processing system with access control," Pub. No.: WO/2013/123086, Publication Date: 22.08.2013,. [3] T. Bednarz, D. Wang, Y. Arzhaeva, P. Szul, S. Chen, A. Khassapov, N. Burdett, T. Gureyev, J. Taylor, "Cloud-Based Image Analysis and Processing Toolbox for Biomedical Applications," CSIRO, Australia, 2012. [4] B. Li, B.S. Caffo, A.S. Gokhale, B.A. Landman, "Medical Image Processing in the Cloud," 9th International Imaging Genetics Conference, 2013. [5] Eucalyptus official site: https://www.eucal yptus.com.
Ali Mirarab, Najmeh Ghasemi Fard and Mahboubeh Shamsi |
74-82 |
 |
15. |
A Decision tree and Conditional Median Filter Based Denoising for impulse noise in images
A Decision tree and Conditional Median Filter Based Denoising for impulse noise in images
Abstract: Impulse noise is often introduced into images during acquisition and transmission. Even though so many denoising techniques are existing for the removal of impulse noise in images, most of them are high complexity methods and have only low image quality. Here a low cost, low complexity VLSI architecture for the removal of random valued impulse noise in highly corrupted images is introduced. In this technique a decision- tree- based impulse noise detector is used to detect the noisy pixels and an efficient conditional median filter is used to reconstruct the intensity values of noisy pixels. The proposed technique can improve the signal to noise ratio than any other technique.
Reference
[1] P.-Y. Chen, C.-Y. Lien, and H.-M. Chuang, "A Low-Cost VLSI Implementation for Efficient Removal of Impulse Noise," IEEE Trans. Very Large Scale Integration Systems, vol. 18, no. 3, 2010 [2] R.C. Gonzalez and R.E. Woods, Digital Image Processing. Pearson Education, 2007 . [3] W.K. Pratt, Digital Image Processing. Wiley-Inter science, 1991. [4] I. Aizenberg and C. Butakoff, "Effective Impulse Detector Based on Rank-Order Criteria," IEEE Signal Processing Letters, vol. 11,no. 3, pp. 363-366, Mar. 2004. [5] S.-J. Ko and Y.-H. Lee, "Center Weighted Median Filters and Their Applications to Image Enhancement," IEEE Trans. Circuits Systems, vol. 38, no. 9, pp. 984-993, Sept. 1991.
Shiby. S, Asha Sunil |
83-88 |
 |
16. |
Human Segmentation Using Haar-Classifier
Human Segmentation Using Haar-Classifier
Abstract: Segmentation is an important process in many aspects of multimedia applications. Fast and perfect segmentation of moving objects in video sequences is a basic task in many computer visions and video investigation applications. Particularly Human detection is an active research area in computer vision applications. Segmentation is very useful for tracking and recognition the object in a moving clip. The motion segmentation problem is studied and reviewed the most important techniques. We illustrate some common methods for segmenting the moving objects including background subtraction, temporal segmentation and edge detection. Contour and threshold are common methods for segmenting the objects in moving clip. These methods are widely exploited for moving object segmentation in many video surveillance applications, such as traffic monitoring, human motion capture. In this paper, Haar Classifier is used to detect humans in a moving video clip some features like face detection, eye detection, full body, upper body and lower body detection.
Key words: Object Segmentation, background subtraction, temporal, Tracking, Haar Classifier and object detection
Reference
[1]. http://www.merl.com/areas/video-segmen tation. [2]. "Background Subtraction Techniques" Alan M. [3]. "Temporal video segmentation: A survey"Irena Koprinska!, Sergio Carrato. [4]. http://www.slideshare.net/ravi5raj_88/bac kground-subtraction. [5] "Occlusion Tolerant Object Recognition Methods For Video Surveillance And Tracking Of Moving Civilian Vehicles" Nishikanta Pati
Dharani S, Gowri S, Ramya S |
89-93 |
 |
17. |
Behavior Analysis Of Malicious Web Pages Through Client
Honeypot For Detection Of Drive-By-Download Malwares
Behavior Analysis Of Malicious Web Pages Through Client
Honeypot For Detection Of Drive-By-Download Malwares
Abstract: Malwares which is also known as malicious software's is spreading through the exploiting the client side applications such as browsers, plug-ins etc. Attackers implant the malware codes in the user's computer through web pages; thereby they are also known malicious web pages. Here in the paper, we present the usefulness of controlled environment in the form of client honeypots in detection of malicious web pages through collections of malicious intent in web pages and then perform detailed analysis for validation and confirmation of malicious web pages. First phase is collection of malicious infections through high interaction client honeypot, second phase is validations of the malicious infections embedded into web pages through behavior based analysis. Malwares which infect the client side applications and drop the malwares into user's computers sometimes overrides the signature based detection techniques; thereby there is a need to study the behavior of the complete malicious web pages.
Key words: Malwares, Network Security, Intrusion Detection System, Client Honeypot
Reference
[1] http://www.sans.org/reading-room/whitepap ers/detection/intrusion-detection-systems-de finition-challenges-343
[2] Van Lam Le, Two-Stage Classification Model to Detect Malicious Web Pages, 2011 International Conference on Advanced Information Networking and Applications.
[3] K. Wang, "Honeyclient," vol. 2007, no. 1/2/2007, 2005, p. available from http://www.honeyclient.org/trac; accessed on 2 Janurary 2007.
[4] Y.-M. Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski, S. Chen, and S. King, "Automated web patrol with strider honeymonkeys: Findingweb sites that exploit browser vulnerabilities," in 13th Annual Networkand Distributed System Security Symposium. San Diego: Internet Society, 2006.
[5] A. Moshchuk, T. Bragin, S. D. Gribble, and H. M. Levy, "A crawlerbased study of spyware on the web," in 13th Annual Network and Distributed System Security Symposium. San Diego: The Internet Society, 2006.
Supinder Kaur, Harpreet Kaur |
94-101 |
 |
19. |
Fabrication, Designing & Performance Analysis of Solar Parabolic Trough
Fabrication, Designing & Performance Analysis of Solar Parabolic Trough
Abstract: A parabolic trough solar collector uses a parabolic cylinder to reflect and concentrate sun radiations towards a receiver tube located at the focus line of the parabolic cylinder. The receiver absorbs the incoming radiations and transforms them into thermal energy, the latter being transported and collected by a fluid medium circulating within the receiver tube.This method of concentrated solar collection has the advantage of high efficiency and low cost, and can be used either for thermal energy collection, for generating electricity or for both, This paper focused on the fabrication and designing of solar parabolic trough, The designing of trough is depend upon the following parameters : Aperture of the concentrator , Inner diameter of absorber tube, Outer diameter of absorber tube, Inner diameter of glass tube, Outer diameter of glass tube, Length of parabolic trough, Concentration ratio, Collector aperture area, Specular reflectivity of concentrator, Glass cover transitivity for solar radiation, Absorber tube emissivity/emissivity, Intercept factor, Emissivity of absorber tube surface and Emissivity of glass. The performance analysis will be based on the Experimental data collection and calculations with reference to: Thermal performance calculations, Overall loss coefficient and heat correlations. Heat transfer coefficient on the inside surface of the absorber tube and Heat transfer coefficient between the absorber tube and the Cover.
Key words: absorber tube, aperture, receiver, solar parabolic trough
Reference
[1]. Sukhatme S.P. (2007) principles of thermal collection and storage. McGraw Hill, New Delhi
[2]. Administration, U. E. I., 2010. International energy outlook. Tech. Rep. DOE/EIA-0484(2010), Office of Integrated Analysis and Forecasting, U.S. Department of Energy, Washington, DC.
[3]. Kalogirou S. The potential of solar industrial process heat application. Appl Energy 2003;76:337-61
[4]. Sagade et al., "Performance evaluation of low-cost FRP parabolic trough reflector with mild steel receiver", International Journal of Energy and Environmental Engineering, pp 3-8, 2013
[5]. Ruby, Steve (American Energy Assets, California L.P.). 2012. Industrial Process Steam Generation Using Parabolic Trough Solar Collection. California Energy Commission. Publication number: CEC-500-2011-040.
Mayur G. Tayade, R. E. Thombre, Subroto Dutt |
107-112 |
 |
20. |
Under Water Wireless Control Using Zigbee For Transmissions Systems
Under Water Wireless Control Using Zigbee For Transmissions Systems
Abstract: The aim of this project is to develop under water communication system using the zigbee protocol stack. A robot can be defined as a programmable, self-controlled device consisting of electronic, electrical, or mechanical units. An industrial robot is officially defined by as an automatically controlled, reprogrammable, multipurpose, manipulator, programmable in three or more axes. Robots are especially desirable for certain work functions because, unlike humans, they never get tired. They can endure physical conditions that are uncomfortable or even dangerous; they can operate in airless conditions.
Reference
[1] Ciardiello, T. "Wireless communications for industrial control and monitoring", Computing & Control Engineering Journal Volume 16, Issue 2, April-May 2005 Page(s):12-13 [2] Geer, D., "Users make a Beeline for ZigBee sensor technology", Computer Volume 38, Issue 12, Dec. 2005 Page(s):16-19 [3] Ville Särkimäki, R. Tiainen, T. Lindh, J. Ahola, "Applicability of ZigBee Technology to Electric Motor Rotor Measurements". International Symposium on Power Electronics, Electrical Drives, Automation and Motion, Italy 2006
Sreenivsa Reddy P, R Koteswara Rao |
113-115 |
 |
21. |
MoO3 Nanoparticles: Synthesis, Characterization and Its Hindering Effect on Germination of Vigna Unguiculata Seeds
MoO3 Nanoparticles: Synthesis, Characterization and Its Hindering Effect on Germination of Vigna Unguiculata Seeds
Abstract: Molybdenum trioxide nanoparticles have been synthesized by sol-gel method. The X-ray diffraction analysis was done to confirm that the obtained product was MoO3. The scanning electron microscopy was done to study the shape, size distribution and surface morphology of nanoparticles; they had a hexagonal shape with smooth surface and uniform size distribution. The functional groups were studied using Fourier transform infrared spectroscopy. The effect of MoO3 nanoparticles on seed germination of vigna unguiculata was studied for 6 days from the day of sowing, by comparing the time taken for seeds to germinate and length of shoot with respect to time of the seeds sowed in heavy black soil whose nutrient composition was known with seeds sowed in the same heavy black soil but which was made rich with MoO3 nanoparticles. It was observed that the MoO3 nanoparticles hampered the germination of vigna unguiculata seeds and this restraint continued in the shoot growth also.
Key words: Heavy black soil, MoO3 nanoparticles, Seed germination, Shoot growth, Vigna unguiculata
Reference
[1] ARNAB GANGULY and RAJI GEORGE "Synthesis, characterization and gas sensitivity of MoO3 nanoparticles" Bull. Mater. Sci., Vol. 0, No. 2, April (2007), pp. 183–185. © Indian Academy of Sciences.
[2] F.A. Deorsola a, N. Russo a, G.A. Blengini b, D. Fino "Synthesis, characterization and environmental assessment of nanosized MoS2 particles for lubricants applications" Chemical Engineering Journal 195–196 (2012) 1–6.
[3] J. Sivakumar, C. Premkumar, P. Santhanam and N. Saraswathi (2011)," Biosynthesis of Silver Nanoparticles Using Calotropis gigantean Leaf", African Journal of Basic & Applied Sciences, Vol. 3, No.6, pp. 265-270.
[4] Ravindra P. Singh, Vineet K. Shukla, Raghvendra, S. Yadav, Prashant K. Sharma, Prashant K. Singh, Avinash C. Pandey (2011), "Biological approach of zinc oxide nanoparticles formation and its characterization", Advanced Materials Letters, Vol. 2 No.4, pp.313-317.
[5] M. Zheng, F. Davidson, and X. Huang, J. Am. Chem. Soc. 125, 7790 (2003).
Abhimanyu Kanneganti, Mounica Talasila |
116-120 |
 |
22. |
Transient Stability Enhancement of a Multi-Machine System using Particle Swarm Optimization based Unified Power Flow Controller
Transient Stability Enhancement of a Multi-Machine System using Particle Swarm Optimization based Unified Power Flow Controller
Abstract: In this paper an attempt has beenmade to investigate the transient stability enhancement of both SMIB and Multi-machine system using UPFC controller tuned by Particle Swarm Optimization. Power injection modelfor a series voltage source of UPFC has been implemented to replace UPFC by equivalent admittance. The admittance matrix of the power system is then modified according to the power injection model of UPFC. To mitigate the power oscillations in the system, the required amount of series voltage injected by UPFC controller has been computed in order to damp inter area & local mode of oscillations in multi-machine system.
Key words: UPFC, Transient Stability, Converters, SMIB, Multi-machine modeling, Capacitor Dynamics,UPFC(Unified Power Flow Controller), FACTS (Flexible AC Transmission System), Power injection model. Particle Swarm Optimization.
Reference
[1] N. G. Hingorani, L. Gyugyi, "Understanding FACTS", IEEE Press, 2001.
[2] P. Kundur, "Power System Stability and Control", Tata McGraw-Hill, 2006.
[3] Y. H. Song, A. T. Johns, "Flexible AC Transmission Systems (FACTS)", IET, 2009.
[4] Power System control & Stability by P.M Anderson & A.A. Foaud.
[5] Ali Ajami, S H Hosseini, G B Gharehpetian, "Modelling and Controlling of UPFC for power system transient studies", ECTI Transations on Electrical Eng., Electronics, And Communications Vol.5, No.2, August 2007.
Poonam Singhal, S. K. Agarwal, Narender Kumar |
121-133 |
 |
23. |
Use of Hidden Markov Mobility Model for Location Based Services
Use of Hidden Markov Mobility Model for Location Based Services
Abstract: These days people prefer to use portable and wireless devices such as laptops, mobile phones, They are connected through satellites. As user moves from one point to other, task of updating stored information becomes difficult. Provision of Location based services to users, faces some challenges like limited bandwidth and limited client power. To optimize data accessibility and to minimize access cost, we can store frequently accessed data item in cache of client. So small size of cache is introduced in mobile devices. Data fetched from server is stored on cache. So requested data from user is provided from cache and not from remote server. Question arises that which data should be kept in the cache? Performance of cache majorly depends on the cache replacement policies which select data suitable for eviction from cache. This paper presents use of Hidden Markov Models(HMMs) for prediction of user‟s future location. Then data item irrelevant to this predicted location is fetched out from the cache. The proposed approach clusters location histories according to their location characteristics and also it considers each user‟s previous actions. This results in producing high packet delivery ratio and minimum delay.
Key words: Cache replacement policy, Hidden Markov Model, Hidden state, Location Based Services, random Variables
Reference
[1] http://www.personal.psu.edu/sxr360/blogs/ mobileadhoc networkpic
[2] http://www.watblog.com/2008/04/16/mobile -positioning-and-location-based-services-an-insight-into-the-future-of-mobile/ [3] Ajey Kumar, Manoj Misra, Anil K. Sarje, "A Predicted Region based Cache Replacement Policy for Location Dependent Data in Mobile Environment",I. J. Communications, Network and System Sciences. 2008; 1: 1-103. [4] D. Barbara, "Mobile Computing and Databases: A Survey," IEEE Transactions on Knowledge and Data Engineering, Vol. 11, No. 1, pp. 108-117, January/February 1999. [5] D. Barbara and T. Imielinski, "Sleepers and Workaholics: Caching Strategies in Mobile Environments," In the Proceedings of the ACM SIGMOD Conference on Management of Data, Minneapolis, USA, pp. 1-12, 1994.
Bhakti D. Shelar, Mr. D. K. Chitre |
134-138 |
 |
24. |
Memristor Modeling Using PSPICE
Memristor Modeling Using PSPICE
Abstract: Since conventional CMOS technology is facing the challenges in scaling down the devices beyond 22nm level, there is urgent need of new nanoscale devices. Memristor, known as the fourth basic two-terminal circuit element, has attracted many research interests since the first real device was developed by HP labs in 2008. The concept was originally put forward by Dr. Leon Chua in September 1971. The memristor has a unique capability of carrying a memory of its recent past. The memristor holds the value of previously applied voltage even when the power is switched off, in the form of its resistance level. That's an effect that cannot be duplicated by any circuit combination of resistor, capacitor and inductor, which is why the memristor qualifies as the fourth fundamental circuit element. The research is in progress on the concept of the memristor and its practical implementation. However it has not been commercially manufactured yet. However since memristor is at the experimental level only, the memristance characteristics and its effects in different circuits can only be observed using software simulations only. To study the effect of implementation of memristor in various electronic circuits, there is need of a standard memristor model which can be accepted universally and its results should be mathematically true and should resemble the theoretically proposed concepts. The manuscript describes a new memristor model simulated using PSPICE and its results.
Key words: Charge—Flux relationship, I-V plot, Mathematical modeling, Memristance, Non volatile memory
Reference
[1] L. O. Chua, (Sep. 1971), "Memristors - the missing circuit element", IEEE Trans. Circuit Theory, vol. CT-18, no. 5, pp. 507-519.
[2] D. B. Strukov, G. S. Snider, D. R. Stewart & R. S. Williams, (2008), ―the missing Memristor found,‖ Nature, 453, Pp.80–83.
[3] Alon Ascoli, Fernando Corinto, Vanessa Senger, Ronald Tetzlaff, (May 2013) ―Memristor Model Comparison‖, IEEE Circuits and Systems Magazine, Digital Object Identifier 10.1109/MCAS.2013.225 6272, Pp-89-105.
[4] Z. Biolek, D. Biolek, and V. Biolkov´a. SPICE model of memristor with nonlinear dopant drift. Radio engineering J., 18(2):211, 2009b.
[5] Ahmad Fuad Adzmi, Azman Nasrudin, Wan Fazlida Hanim Abdullah, Sukreen Hana Herman, (July 2012), ―Memristor Spice Model for Designing Analog Circuit‖, 2012 IEEE Student Conference on Research and Development, S3-1, Pp-78-83.
Ketaki Bhave, Dr. Nisha Sarwade |
139-143 |
 |
25. |
Multi-Objective Optimization ( Surface Roughness & Material Removal Rate) of Aisi 202 Grade Stainless Steel in Cnc Turning Using Extended Taguchi Method And Grey Analysis
Multi-Objective Optimization ( Surface Roughness & Material Removal Rate) of Aisi 202 Grade Stainless Steel in Cnc Turning Using Extended Taguchi Method And Grey Analysis
Abstract: The present study applied Taguchi method through a case study in straight turning of AISI 202 stainless steel bar on CNC Machine ( Mfd by ACE DESIGNERS) using Titanium Carbide tool for the optimization of Material removal rate, Surface Roughness and tool wear process parameter.The study aimed at evaluating the best process environment which could simultaneously satisfy requirements of both quality as well as productivity with special emphasis on maximizing material removal rate and minimizing surface roughness and tool flank wear at various combination of cutting speed, feed, depth of cut. The predicted optimal setting ensured maximum MRR and minimum surface roughness and tool wear. Since optimum material removal rate is desired, so higher the better criteria of Taguchi signal to noise ratio is used for MRR – SNs = -10 log(Sy2/n) For surface roughness and tool wear – SNL = -10 log(S(1/y2)/n) The results have been verified with the help of S/N Ratios calculation and various graphs have been plotted to show the below mentioned observations.
a) MRR first increases with increase in cutting speed and then decreases.
b) With the increase in feed, MRR increases.
c) With the increase in depth of cut, MRR first increases and then decreases.
d) With the increase in cutting speed, Surface Roughness first decreases and then increases.
e) With the increase in feed, Surface Roughness increases.
f) With the increase in depth of cut, Surface Roughness first increases and then decreases.
Key words: CNC turning machine, Grey relational analysis, Material removal rate, Surface roughness.
Reference
[1] Optimization of process parameter of AISI 202 austenetic stainless steel in CNC Turning. ARPN Journal of engineering and applied sciences.Vol 5, No 9, sept 2010.M. Kaladhar, dept of Mech engineering, Neerukonda Institute of Technology, email-kaladhar2k@gmail.com. [2] Computer Numerical Control Turning on AISI410 with Single and Nano Multilayered Coated Carbide Tools under Dry Conditions. Kamaraj Chandrasekaran, Perumal Marimuthu1,-- K. Raja, Department of Mechanical Engineering, Anna University of Technology Madurai, and Syed Ammal Engineering College.
[3] International Journal of Scientific Engineering and Technology (ISSN : 2277-1581) Volume 2 Issue 4, PP : 263-267,1 April IJSET@2013 Page 263-Optimization of Turning Process Parameters Using Multivariate Statistical Method- Ananthakumar.P1, Dr.Ramesh.M2, Parameshwari3Department of Mechanical Engineering, SACS MAVMM Engineering College, Madurai-625301.Email address: 1ananthresearch@yahoo.co.in, 2 mramesh.sacs@gmail.com. [4] Journal of Engineering, Computers & Applied Sciences (JEC&AS) ISSN No: 2319 Volume 1, No.1, October 2012 Optimization of Process Parameters of Turning Parts:A Taguchi Approach-Neeraj Sharma, Renu Sharma. [5] International Journal of Engineering Research and applications-IJERA (ISSN : 2248-9622) Volume 2 Issue 5, PP : 1594-1602, Optimization of Turning Process Parameters of H13 using Taguchi method and grey analysis – Pankaj Sharma, Kamaljeet Bhambri Department of Mechanical Engineering, MM Engineering College, Mullana.
Ankush Aggarwal, Shanti Prakash, Brijbhushan |
144-150 |
 |
26. |
Implementation of Face Recognition in Cloud Vision Using Eigen Faces
Implementation of Face Recognition in Cloud Vision Using Eigen Faces
Abstract: Cloud computing comes in several different forms and this article documents how service, Face is a complex multidimensional visual model and developing a computational model for face recognition is difficult. The papers discuss a methodology for face recognition based on information theory approach of coding and decoding the face image. Proposed System is connection of two stages – Feature extraction using principle component analysis and recognition using the back propagation Network. This paper also discusses our work with the design and implementation of face recognition applications using our mobile-cloudlet-cloud architecture named MOCHA and its initial performance results. The dispute lies with how to performance task partitioning from mobile devices to cloud and distribute compute load among cloud servers to minimize the response time given diverse communication latencies and server compute powers
Key words: Face recognition, Principal component analysis (PCA), Artificial Neural network (ANN), Eigenvector, Eigenfaces.
Reference
[1] Yuille, A. L., Cohen, D. S., and Hallinan, P. W.,"Feature extraction from faces using deformable templates", Proc. of CVPR, (1989)
[2] Mayank Agarwal, Nikunj Jain, Mr. Manish Kumar and Himanshu Agrawal"Face Recognition Using Eigen Faces and Artificial Neural Network" International Journal of Computer Theory and Engineering, Vol. 2, No. 4, August, 2010 1793-8201 [3] Victor-Emil and Luliana-Florentina, "Face Rcognition using a fuzzy – Gaussian ANN", IEEE 2002. Proceedings, Aug. 2002 Page(s):361 –368 [4] [Howard Demuth,Mark Bele,Martin Hagan, "Neural Network Toolbox" [5] Kirby, M., and Sirovich, L., "Application of theKarhunen-Loeve procedure for thecharacterization of human faces", IEEE PAMI, Vol. 12, pp. 103-108, (1990).
Suguna M K, Shrihari M R, Mahesh M R |
151-155 |
 |
27. |
Moocs Impact in Higher Education Institution: A Pilot Study In Indian Context
Moocs Impact in Higher Education Institution: A Pilot Study In Indian Context
Abstract: Massive Open Online Courses (MOOCs) was developed in 2008 in US. Soon after that in 2011 MOOCs introduced at Stanford University. Year 2011 was a turning point in e-learning methodologies. MOOCs have given an open challenge to all current methods of higher education system such as on-line training, open learning methods, distance education system etc. MOOCs have high potential of acceptability among all kind of learners. MOOCs have become a label for many recent course initiatives from higher education institution. In the present paper the authors have made a through study on MOOCs methods and its impact on higher education institution. The authors have also tried to explore the impact of MOOCs in Indian higher education institution.
Key words: MOOCs, e-learning, distance education, higher education institution
Reference
[1] Asoke Nath, Shalabh Agarwal, "Massive Open Online Courses(MOOCs)- A Comprehensive study and its Application to Green Computing in Higher Education Institution", International Journal of Emerging Trends in Engineering Research, Vol 2, No 2, Page 7-14(February 2014).
[2] I. Maria Joseph, Asoke Nath, "Some issuesand Challenges in E-learning Methodologies and E-assessment System", Proceedings of International Conference Worldcomp 2013 held Las Vegas, USA in Jul 22-25,2013. Proceedings page138-143(2013). [3] I.Maria Joseph, Asoke Nath, "Integration of Massive Open Online Education(MOOC) System with in_Class Room Interaction and Assessment and Accreditation: An extensive report from a pilot study", Proceedings of International conference Worldcomp 2013 held at Las Vegas, USA in Jul 22-25, 2013. Proceedings Page 103-111(2013). [4] Shalabh Agarwal, Archana Vimal, Saima Ghosh, Asoke Nath, "Green Computing Endeavor in Higher Educational Institutes – a noble initiative towards Sustainable IT Infrastructure", Journal of Computing(USA), Vol 4, issues 5, May, ISSN- 9617, Page-217-222, 2012 [5] Shalab Agarwal, Asoke Nath, "Green Computing - a new Horizon of Energy Efficiency and Electronic waste minimization": a Global Perspective", Proceedings of IEEE CSNT-2011 held at SMVDU(Jammu) 03-06 June 2011, Page 688-693(2011).
Asoke Nath, Abhijit Karmakar, Totan Karmakar |
156-163 |
 |
28. |
Detecting Aspect Intertype Declaration Interference at Aspect Oriented Design Models: A Database Approach
Detecting Aspect Intertype Declaration Interference at Aspect Oriented Design Models: A Database Approach
Abstract: Implementing crosscutting concerns requires aspect oriented developers to be enabled to introduce some mem-bers to core concerns modules along with other. This may lead to a problem of interference among modules, either between classes and aspects or among aspects themselves. Such conflicts may cause program to crash at runtime. Interference problem is addressed but with complex solutions that become more complicated propor-tionally with the project size. In this work a relational database approach and relational algebra is used to detect intertype declaration interferences in aspect oriented design models in order to capture conflicts in an early stage before having it as runtime error. Detection is done in an approach not that complex as the previous ones.
Key words: Aspect Oriented Programming, Databases, Interference Detection, Intertype Declaration, Rela-tional Algebra.
Reference
[1] Berg, Klaas van den, Conejero, Jose Maria and Chitchyan, Ruzanna. AOSD ontology 1.0 public ontology of aspect orientation. s.l. : Common Foundation for AOSD, 2005. p. 90, Report.
[2] J.D. Meier, David Hill, Alex Homer, Jason Taylor, Prashant Bansode, Lonnie Wall, Rob Boucher Jr., Akshay Bogawat. .NET Application Architecture Guide,. 2nd Edtion. s.l. : Microsoft Corporation., 2009. [3] Harbulot, Bruno. SEPARATING CONCERNS IN SCIENTIFIC SOFTWARE USING ASPECT-ORIENTED PROGRAMMING. Computer Science, Manchester University. Manchester : Center of Novel Computing, 2006. p. 194, PhD Thesis. [4] Dessì, Massimiliano. Spring 2.5 Aspect-Oriented Programming. [ed.] Sneha Kulkarni. Olton : Packt Publishing Ltd., 2009. pp. 13-16. 978-1-847194-02-2. [5] Aspect-Oriented Programming. Gregor Kiczales, John Lamping, Anurag Mendhekar, Chris Maeda, Cristina Videira Lopes,. Finland : Springer-Verlag, 1997. European Conference on Object-Oriented Programming (ECOOP). pp. 220-242.
Ahmed Sharaf Eldin, Maha Hana, Shady Mohammed Elsaid |
164-171 |
 |
29. |
Performance Analysis of Acoustic Echo Cancellation Techniques
Performance Analysis of Acoustic Echo Cancellation Techniques
Abstract: Mainly, the adaptive filters are implemented in time domain which works efficiently in most of the applications. But in many applications the impulse response becomes too large, which increases the complexity of the adaptive filter beyond a level where it can no longer be implemented efficiently in time domain. An example of where this can happen would be acoustic echo cancellation (AEC) applications. So, there exists an alternative solution i.e. to implement the filters in frequency domain. AEC has so many applications in wide variety of problems in industrial operations, manufacturing and consumer products. Here in this paper, a comparative analysis of different acoustic echo cancellation techniques i.e. Frequency domain adaptive filter (FDAF), Least mean square (LMS), Normalized least mean square (NLMS) &Sign error (SE) is presented. The results are compared with different values of step sizes and the performance of these techniques is measured in terms of Error rate loss enhancement (ERLE), Mean square error (MSE)& Peak signal to noise ratio (PSNR).
Key words: Acoustic echo cancellation, Error rate loss enhancement, Frequency domain adaptive filtering, Least mean square, Mean square error, Normalized least mean square, Peak signal to noise ratio, Sign error.
Reference
[1] M. M. Sondhi, "The history of echo cancellation," IEEE Signal Process Mag., Vol. 23, No.5, Sep. 2006, 95-98. [2] Gerald Enzner, Peter Vary, "A soft-partitioned frequency-domain adaptive filter for acoustic echo cancellation,"Proc. IEEE Conference on Acoustics, Speech and Signal Processing, (ICASSP 2003),Vol. 5, 2003, 393-396. [3] Shynk, J.J., "Frequency-domain and multirate adaptive filtering," IEEE Signal Processing Magazine, Vol. 9, No. 1, Jan. 1992, 14-37. [4] KoenEneman and Marc Moonen, "Iterated partitioned block frequency-domain adaptive filter for acoustic echo cancellation," IEEE Transaction on Speech and Audio Processing, Vol. 11, No.2, March 2003. [5] S.Haykin, Adaptive Filter Theory, Prentice Hall, 3rd edition, 1996.
Rajeshwar Dass, Sandeep |
172-180 |
 |
30. |
Dual Authentication For Bluetooth Connection
Dual Authentication For Bluetooth Connection
Abstract: Recently, Bluetooth technology is widely used by organizations and individuals to provide wireless personal area network (WPAN). This is because the radio frequency (RF) waves can easily penetrate obstacles and can propagate without direct line-of-sight (LoS). These two characteristics have led to replace wired communication by wireless systems. However, there are serious security challenges associated with wireless communication systems because they are easier to eavesdrop, disrupt and jam than the wired systems. Bluetooth technology started with a form of pairing called legacy pairing prior to any communication. However, due to the serious security issues found in the legacy pairing, a secure and simple pairing called SPP was announced with Bluetooth 2.1 and later since 2007. SPP has solved the main security issue which is the weaknesses of the PIN code in the legacy pairing, however it has been found with some vulnerabilities such as eavesdropping and man-in-the-middle (MITM) attacks. Since the discovery of these vulnerabilities, some enhancements have been proposed to the Bluetooth Specification Interest Group (SIG) which is the regulatory body of Bluetooth technology; nevertheless, some proposed enhancements are ineffective or are not yet implemented by Manufacturers. Therefore, an improvement of the security authentication in Bluetooth connection is highly required to overcome the existing drawbacks. This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). The implementation of this proposal is based on the Arduino Integrated Development Environment (IDE) as software and a Bluetooth (BT) Shield connected to an Arduino Uno R3 boards as hardware. The result was verified on a Graphical User Interface (GUI) built in Microsoft Visual Studio 2010 with C sharp as default environment. It has shown that the proposed scheme works perfectly with the used hardware and software. In addition, the protocol thwarts the passive and active eavesdropping attacks which exist during SSP. These attacks are defeated by avoiding the exchange of passwords and public keys in plain text between the Master and the Slave. Therefore, this protocol is expected to be implemented by the SIG to enhance the security in Bluetooth connection.
Key words: Authentication, Bluetooth Security, HMAC Algorithm, Legacy Pairing, Secure and Simple Pairing.
Reference
[1] V. Garg, Wireless Personal Area Network-Bluetooth, in Wireless Communications & Networking: Series Editor, David Clark, M.I.T. (Amsterdam, the Morgan Kaufmann series in networking, 2010) pp. 653-674. [2] C. Gehrmann, J. Persson, and B. Smeets, Bluetooth security: Artech house, 2004. [3] K. Saravanan and D. Yuvaraj, "An new secure mechanism for bluetooth network," in Computer and Automation Engineering (ICCAE), 2010 The 2nd International Conference on, 2010, pp. 202-205. [4] J. Padgette, K. Scarfone, and L. Chen, "Guide to Bluetooth security," NIST Special Publication, vol. 800, p. 121, 2012.
[5] J. Barnickel, J. Wang, and U. Meyer, "Implementing an attack on bluetooth 2.1+ secure simple pairing in passkey entry mode," in Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on, 2012, pp. 17-24.
Diallo Alhassane Saliou, Wajdi Fawzi Mohammed Al-Khateeb, Rashidah Funke Olanrewaju and Sado Fatai |
181-191 |
 |
31. |
Leveraging the Power of Smartphones: Real Time Monitoring of Water Points
Leveraging the Power of Smartphones: Real Time Monitoring of Water Points
Abstract: In recent years, the world has become more sophisticated. Different aspects of today's life has been digitized, this include; business, education, health, communication and numerous community services. With the existing extended coverage of cellular networks, most services are constantly deployed to be accessed via mobile phones, as they are also the most pervasive pocket carried devices. Though, both regular and smartphone can be used to convey the basics of mobile based services such as mobile banking, calling and text messaging, smartphone goes extra mile. While regular phones are still the better choice for some, smartphones are tremendously taking over the cellphone market. Smartphones are powered by the vast amount of mobile apps available today which offer unprecedented features and functionalities and as well more advanced internet connectivity. To ensure reliable, sufficient and safe water supply to public, the installed water points need to be well monitored. Quality and quantity parameters of water produced from the water points are constantly tracked to determine if they are within the acceptable range. In case of acute condition, the identified parameters need to be instantly communicated to the District Water Engineer (DWE) for prompt intervention. In this paper we explore the popularity and advantages of smartphones and present a proposed prototype that exploit the power of smartphones in real time monitoring of water points.
Key words: Cellular Network, Mobile app, Smartphone, WAMIS
Reference
[1] Iftode, L, Borcea, C, Ravi N, Kang P, Zhou P. Smart Phone: an embedded system for universal interactions. Accessed from (cs.njit.edu/borcea/papers/ftdcs04.pdf) on 27th June 2014.
[2] Ericsson White Paper. 2013. App Coverage. Rethinking Network Performance for Smartphones.
[3] eMarketer. 2014. Smart Phone Users Worldwide. accessed from (http://www.emarketer.com/Article/) on 27th June 2014.
[4] GSMA. 2013. The Mobile Economy 2013. Accesses from (www.gsma.com) on 28th June 2014.
[5] Seja Patel, Priyadarshani Raskar, Pragati Badhe and Archana Lomte. 2014. Remote Control of Android Phones Using VNC Int. Journal of Engineering Research and Applications. ISSN : 2248-9622, Vol. 4, Issue 1( Version 3), January 2014, pp.141-144.
Ally S. Nyamawe |
192-196 |
 |
32. |
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
Abstract: As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. For the protection of data privacy, sensitive data usually have to be encrypted before outsourcing, which makes effective data utilization a very challenging task. Although traditional searchable encryption schemes allow a user to securely search over encrypted data through keywords and selectively retrieve files of interest, these techniques support only exact keyword search. This significant drawback makes existing techniques unsuitable in cloud computing as it is greatly affect system usability, rendering user searching experiences very frustrating and system efficiency very low. In this paper, for the first time we formalize and solve the problem of effective fuzzy keyword search over encrypted cloud while maintaining keyword privacy. In our solution, we exploit edit distance to quantify keyword similarity and develop new advanced technique on constructing fuzzy keyword sets which greatly reduces the storage and representation overheads. In this way, we show that our proposed solution is secure and privacy preserving, while realizing the goal of fuzzy keyword search.
Key words: String Matching Algorithm, System Architecture
Reference
[1] D. Parkhill, "The challenge of the computer utility,"Addison-Wesley Educational Publishers Inc., US, 1966. [2] P. Mell and T. Grance, "Draft nist working definition of cloud computing," Referenced on June. 3rd, 2009 Online at http://csrc.nist.gov/groups/SNS/cloud-computing/index.html, 2009. [3] M. Armbrust and et.al, "Above the clouds: A berkeley view of cloud computing," Tech. Rep., Feb 2009. [Online]. Available: http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html [4] Google, "Britney spears spelling correction," Referenced online at http://www.google.com/jobs/ britney.html, June 2009. [5] M. Bellare, A. Boldyreva, and A. O'Neill, "Deterministic and efficiently searchable encryption," in Proceedings of Crypto 2007, volume 4622 of LNCS. Springer-Verlag, 2007.
Yogesh K. Gedam, Prof. Mrs. Varshapriya J.N. |
197-202 |
 |
33. |
Performance Analysis of Low Power, High Gain Operational Amplifier Using CMOS VLSI Design
Performance Analysis of Low Power, High Gain Operational Amplifier Using CMOS VLSI Design
Abstract: The operational amplifier is one of the most useful and important component of analog electronics. They are widely used in popular electronics. Their primary limitation is that they are not especially fast. The typical performance degrades rapidly for frequencies greater than about 1 MHz, although some models are designed specifically to handle higher frequencies. The primary use of op-amps in amplifier and related circuits is closely connected to the concept of negative feedback. The operational amplifier has high gain, high input impedance and low output impedance. Here the operational amplifier designed by using CMOS VLSI technology having low power consumption and high gain.
Key words: Cascode Amplifier, , CMRR, Gain, Slew rate, Topology.
Reference
[1] R.J. Baker, H.W. Li, D.E. Boyce, CMOS circuit design layout and Simulation [2] P. E. Allen and D. R. Holberg, CMOS analog circuit design, 2nd edition [3] Roubik, G., "Introduction to CMOS op-amps and comparators", John Willy & Sons Inc, Vol. 189, (1999).
[4] You Zheng and Carlos E. Saavedra, "Feedforward-Regulated Cascode OTA for Gigahertz Applications ",IEEE Transactions on Circuits and Systems, 2008
[5] The International Technology Roadmap for Semiconductors (ITRS), 2006 [Online]. Available:http://www.itrs.net/Links/2006Update/2006UpdateFinal.htm
Ankush S. Patharkar, Dr. Shirish M. Deshmukh |
203-207 |
 |
34. |
Reliability Analysis of a 3-Machine Power Station Using State Space Approach
Reliability Analysis of a 3-Machine Power Station Using State Space Approach
Abstract: With the advent of high-integrity fault-tolerant systems, the ability to account for repairs of partially failed (but still operational) systems become increasingly important. This paper presents a systemic method of determining the reliability of a 3-machine electric power station, taking into consideration the failure rates and repair rates of the individual component (machine) that make up the system. A state-space transition process for a 3-machine with 23 states was developed and consequently, steady state equations were generated based on Markov mathematical modeling of the power station. Important reliability components were deduced from this analysis. This research simulation was achieved with codes written in Excel®-VBA programming environment. System reliability using state space approach proofs to be a viable and efficient technique of reliability prediction as it is able to predict the state of the system under consideration. For the purpose of neatness and easy entry of data, Graphic User Interface (GUI) was designed.
Key words: Failure Probability, Markov model, Reliability, Repair Rate and State Space
Reference
[1] Energy Commission of Nigeria, National energy policy report, Federal Republic of Nigeria, 2003, 8.
[2] O. I.Okoro,Conventional energy sources in Nigeria: A Statistical Approach,Seminar paper, 2008 pp1.
[3] S. Hadi,Power System Analysis, (New York, McGraw Hill, 2004) 11
[4] Z. F, Ayman, S. Sahra and M. M. Bruce, Reliability Modeling for the Advanced Electric Power Grid, (SAFECOMP, 2007) 370-383.
[5] Daellenbach, Introduction to Operations Research Techniques", (London, Allyn and Bacon 1983) 261-272
WasiuAkande Ahmed, Olalekan Ogunbiyi |
208-217 |
 |
35. |
Seismic Response of R C Building With Different Arrangement of Steel Bracing System
Seismic Response of R C Building With Different Arrangement of Steel Bracing System
Abstract: In general the most suitable choices in improvement of reinforcement concrete frame against lateral loading is used steel bracing system. The use of steel bracing has potential advantage over other scheme like higher strength and stiffness, economical, occupies less space, adds much less weight to existing structure. In this study, the seismic analysis of reinforced concrete (RC) buildings with different types of bracing (Diagonal, V type, inverted V type, X type) is studied. The bracing is provided for peripheral columns. A seven-storey (G+6) building is situated at seismic zone III. The building models are analyze by equivalent static analysis as per IS 1893:2002 using Staad Pro V8i software. The main parameters consider in this paper to compare the seismic analysis of buildings are lateral displacement, storey drift, axial force, base shear. It is found that the X type of steel bracing significantly contributes to the structural stiffness and reduces the maximum interstorey drift of R.C.C building than other bracing system.
Key words: Base Shear, Lateral Displacement, Retrofit, Seismic Analysis, Steel Bracing, Storey Drift, etc.
Reference
[1] Badoux M., Jirsa J. O., Steel bracing of R.C. frames for seismic retrofitting" J. Struct. Eng., 116, 1990, 55-74.
[2] Bush T. D., Jones E. A., Behavior of R.C. frame strengthened using structural steel bracing, Journal Of Structural Engineering, 117, 1191, 1115-1126
[3] Kevadkar M. D. and Kodag P. B., Lateral Load Analysis of R.C.C. Building, International Journal of Modern Engineering Research, 3(3), 2013, 1428-1434.
[4] Massumi A. and Absalan M., Interaction between bracing system and moment resisting frame in braced RC frames, Archives Of Civil And Mechanical Engineering, 2013, 260-268
[5] Ozel A. E. , Guneyisi E. M., Effects of eccentric steel bracing systems on seismic fragility curves of mid-rise R/C buildings: A case study, Structural Safety 33, 2011, 82–95
Krishnaraj R. Chavan, H.S.Jadhav |
218-222 |
 |
36. |
Ship Detection from SAR Imagery Using CUDA and Performance Analysis of the System
Ship Detection from SAR Imagery Using CUDA and Performance Analysis of the System
Abstract: Synthetic aperture radar (SAR) Ship Detection System SDS is an important application from the point of view of Maritime Security monitoring. It allows monitoring traffic, fisheries, naval warfare. Since full-resolution SAR images are heavily affected by the presence of speckle, ship detection algorithms generally employ speckle reduced SAR images at the expense of a degradation of the spatial resolution. The proposed Parzen-window-kernel-based algorithm and CFAR algorithm can be considered an alternative to manual inspection for large ocean areas. Promising results and high detection rates for the ships have been achieved. In Parzen-window-kernel-based algorithm for ship detection in synthetic aperture radar (SAR) images, first, the data-driving kernel functions of Parzen window are utilized to approximate the histogram of real SAR image, in order to complete the accurate modeling of SAR images. Then ship detection is implemented using a Constant False Alarm Rate (CFAR). After detecting threshold, the output is added to edge detection algorithm employed on SAR image. Clearer detection of ship candidates is obtained by applying Parzen-window-kernel-based algorithm by changing its window size. Experimental results show that SDS implemented using CUDA is faster than on CPU.
Key words: SAR, Parzen Window, CFAR, Ship detection
Reference
[1] Christina Corbane, Layrent Najman, Emilien Pecoul, A complete processing chain for ship detection using satellite imagery, International Journal of Remote Sensing Vol. 31, No. 22, 20 November 2010, 5837–5854.
[2] GUI Gao, A Parzen-Window-Kernel-Based CFAR Algorithm for Ship Detection in SAR Images, IEEE GEOSCIENCE AND REMOTE SENSING LETTER, VOL. 8, NO. 3, MAY 2011.
[3] Changren Zhu, Hui Zhou, Runsheng Wang, Jun Guo, A Novel Hierarchical Method of Ship Detection form Spaceborne Optical Images Based on Shape and Texture Features, IEEE TRANSACTION ON GEOSCIENCE AND REMOTE SENSING, VOL. 48, NO. 9, SEPTEMBER 2010.
[4] http://www.sandia.gov/~sjplimp/sar.html
[5] http://developer.nvidia.com
Chaitanya P. Chandgude, P. M. Chawan |
223-228 |
 |
37. |
Evolution of Modelling Techniques for Service Oriented Architecture
Evolution of Modelling Techniques for Service Oriented Architecture
Abstract: Service-oriented architecture (SOA) is a software design and architecture design pattern based on independent pieces of software providing functionality as services to other applications. The benefit of SOA in the IT infrastructure is to allow parallel use and data exchange between programs which are services to the enterprise. Unified Modelling Language (UML) is a standardized general-purpose modelling language in the field of software engineering. The UML includes a set of graphic notation techniques to create visual models of object-oriented software systems. We want to make UML available for SOA as well. SoaML (Service oriented architecture Modelling Language) is an open source specification project from the Object Management Group (OMG), describing a UML profile and meta-model for the modelling and design of services within a service-oriented architecture. BPMN was also extended for SOA but there were few pitfalls. There is a need of a modelling framework which dedicated to SOA. Michael Bell authored a framework called Service Oriented Modelling Framework (SOMF) which is dedicated for SOA.
Key words: BPMN, Service Oriented Architecture, Service Oriented Modelling Framework, SoaML, UML.
Reference
[1] David Linthicum, Chapter 1: Service Oriented Architecture (SOA), Msdn.microsoft.com. [2] "IEEE Standard Glossary of Software Engineering Terminology," IEEE std 610.12-1990, 1990.
[3] Tao Zhang, Shi Ying, Sheng Cao, and Xiangyang Jia , A Modeling Framework for Service-Oriented Architecture , Proceedings of the Sixth International Conference on Quality Software.
[4] Budan Wu, Zhi Jin, Service-Oriented Modeling: An Extensive Reuse Method, Annual IEEE International Computer Software and Applications Conference.
[5] Ken Sunderan, OO-Modelling Tools for Analysis and Design: A First Level Course, Software Engineering: Education & Practice, 1998. Proceedings. 1998 International Conference.
Mikit Kanakia, P. M. Chawan |
229-232 |
 |
38. |
Tri-State Buffer with Common Data Bus
Tri-State Buffer with Common Data Bus
Abstract: For the recent CMOS feature sizes power dissipation becomes an overriding concerns for VLSI circuit design. We propose a novel approach named tri-state buffer with common data bus which reduces the total power & delay of elastic buffer. The paper presents a design and implementation of tri-state buffer mechanism. This design offers also the advantage of third state (High Impedance state) of tri-state buffer. The proposed elastic buffer design using tri-state buffer is implemented in Cadence tools. The obtained result shows that our design is effective in terms 20.50 % reduction in total power, 89.67% reduction in delay.
Key words: Cadence; Static power; delay; Buffer mechanism;
Reference
[1] James Balfour and William J. Dally. Design tradeoffs for tiled CMP on-chip networks. In ICS '06: Proceedings of the 20th annual International Conference on Supercomputing, pages 187–198, 2006.
[2] Title-CMOS VLSI Design: A Circuits and Systems Perspective, Authors- Neil H. E. Weste, David Money Harris, Edition-4, Publisher-Addison Wesley, Length-838 pages
[3] William J. Dally. Virtual-channel flow control. IEEE Transaction son Parallel and Distributed Systems, 3(2):194– 205, 1992.
[4] William J. Dally and Hiromichi Aoki. Deadlock-free adaptive routing in multicomputer networks using virtual channels. IEEE Transactions on Parallel and Distributed Systems, 4(4):466–475, 1993.
[5] William J. Dally and Brian Towles. Route packets, not wires: On-chip interconnection networks. In DAC '01: roceedingsof the 38th Conference on Design Automation, pages 684–689, 2001.
Ravi Ranjan, Saima Ayub |
233-235 |
 |
39. |
Design and Simulation of Different Controllers for Stabilizing Inverted Pendulum System
Design and Simulation of Different Controllers for Stabilizing Inverted Pendulum System
Abstract: The Inverted Pendulum system has been identified for implementing controllers as it is an inherently unstable system having nonlinear dynamics. The system has fewer control inputs than degrees of freedom which makes it fall under the class of under-actuated systems. It makes the control task more challenging making the inverted pendulum system a classical benchmark for the design, testing, evaluating and comparing. The inverted pendulum to be discussed in this paper is an inverted pendulum mounted on a motor driven cart. The aim is to stabilize the system such that the position of the cart on the track is controlled quickly and accurately so that the pendulum is always erected in its vertical position. In this paper the linearized model was obtained by Jacobian matrix method. The Matlab-Simulink models have been developed for simulation for optimal control design of nonlinear inverted pendulum-cart dynamic system using different control methods. The methods discussed in this paper are a double Proportional-Integral-Derivative (PID) control method, a modern Linear Quadratic Regulator (LQR) control method and a combination of PID and Linear Quadratic Regulator (LQR) control methods. The dynamic and steady state performance are investigated and compared for the above controllers.
Key words: Inverted pendulum (IP), nonlinear system, double PID control, optimal control, LQR
Reference
[1] K. Ogata, Modern Control Engineering, 4th ed, Pearson Education (Singapore) Pvt. Ltd., New Delhi, 2005, chapter 12. [2] K. Ogata, System Dynamics, 4th ed, Pearson Education (Singapore) Pvt. Ltd., New Delhi, 2004. [3] Ajit K. Mandal, Introduction to Control Engineering, New Age International Pub., New Delhi, 2000, Chapter 13. [4] G. Ray, S. K. Das, and B. Tyagi, "Stabilization of Inverted Pendulum via Fuzzy Control", IE(I) Journal-EL, vol. 88, Sept. 2007, pp. 58-62. [5] Debasish Chetergee, Amit Patra, and Harish K. Joglekar, "Swing-up and stabilization of a cart-pendulum system under restricted cart track length", Elsevier Journal: Systems & Control Letters, vol. 47, 2002, pp. 355 -364.
Rahul Kr. Rai, Rekha, A.K.Singh |
236-242 |
 |
40. |
Secured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic Scheme
Abstract: Steganography is the art of hiding information in ways that avert the revealing of hiding messages. Video Steganography is focused on spatial and transform domain. Spatial domain algorithm directly embedded information in the cover image with no visual changes. This kind of algorithms has the advantage in Steganography capacity, but the disadvantage is weak robustness. Transform domain algorithm is embedding the secret information in the transform space. This kind of algorithms has the advantage of good stability, but the disadvantage of small capacity. These kinds of algorithms are vulnerable to steganalysis. This paper proposes a new Compressed Video Steganographic scheme. The data is hidden in the horizontal and the vertical components of the motion vectors. The PSNR value is calculated so that the quality of the video after the data hiding is evaluated.
Index Terms: Data hiding, least significant bit(LSB), encryption, decryption, PSNR
Reference
[1] Hussein A. Aly, "Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error", Ieee Transactions On Information Forensics And Security, Vol. 6, No. 1, March 2011
[2] J. Zhang, J. Li, and L. Zhang, "Video watermark technique in motion vector," in Proc. XIV Symp. Computer Graphics and Image Processing, Oct. 2001, pp. 179–182.
[3] C. Xu, X. Ping, and T. Zhang, "Steganography in compressed video stream," in Proc. Int. Conf. Innovative Computing, Information and Control (ICICIC'06), 2006, vol. II, pp. 803–806.
[4] P.Wang, Z. Zheng, and J. Ying, "A novel videowatermark technique in motion vectors," in Int. Conf. Audio, Language and Image Processing (ICALIP), Jul. 2008, pp. 1555–1559.
[5] S. K. Kapotas, E. E. Varsaki, and A. N. Skodras, "Data hiding in H.264 encoded video sequences," in IEEE 9th Workshop on Multimedia Signal Processing (MMSP07), Oct. 2007, pp. 373–376.
B.suneetha |
243-246 |
 |
41. |
Efficient Design of Ripple Carry Adder and Carry Skip Adder
with Low Quantum Cost and Low Power Consumption
Efficient Design of Ripple Carry Adder and Carry Skip Adder
with Low Quantum Cost and Low Power Consumption
Abstract: The addition of two binary numbers is the important and most frequently used arithmetic process on
microprocessors, digital signal processors (DSP), and data-processing application-specific integrated circuits
(ASIC). Therefore, binary adders are critical structure blocks in very large-scale integrated (VLSI) circuits.
Their effective application is not trivial because a costly carry spread operation involving all operand bits has to
be achieved. Many different circuit constructions for binary addition have been planned over the last decades,
covering a wide range of presentation characteristics. In today era, reversibility has become essential part of
digital world to make digital circuits more efficient. In this paper, we have proposed a new method to reduce
quantum cost for ripple carry adder and carry skip adder. The results are simulated in Xilinx by using VHDL
language.
Key words: Carry Skip Adder, Ripple Carry Adder, Quantum Cost, Reversible Logic, VLSI
Reference
[1] R. Landauer, "Irreversibility and Heat Generation in the Computational Process", IBM Journal of Research and Development, 5, pp. 183-191, 1961.
[2] R. H. M and T. Kaylani, "VLSI design of a quaternary carry ripple adder." System Theory," in Proceedings., Twenty-First Southeastern Symposium on. IEEE, 1989.
[3] C. C. Nez and E. A. Vittoz, "Digital Integrated Circuits: A design Perspective". "Charge-Based MOS Transistor Modeling," 1996.
[4] F. Chih-Jen, "Fast and compact dynamic ripple carry adder design," in ASIC, 2002. Proceedings. 2002 IEEE Asia-Pacific Conference on. IEEE, 2002.
[5] Md. M. H Azad Khan, "Design of Full-adder With Reversible Gates", International Conference on Computer and Information Technology, Dhaka, Bangladesh, 2002, pp. 515-519.
Nidhi, Gurinderpal Singh |
247-251 |
 |