S.No. |
Title |
Page |
Downloads |
1. |
FPGA Based Implementation of Pipelined 32-bit RISC Processor with Floating Point Unit
FPGA Based Implementation of Pipelined 32-bit RISC Processor with Floating Point Unit
Abstract: This paper presents 32-bit RISC processor with floating point unit to be designed using pipelined architecture; through this we can improve the speed of the operation as well as overall performance. This processor is developed especially for Arithmetic operations of both fixed and floating point numbers, branch and logical functions. The proposed architecture is able to prevent pipelining from flushing when branch instruction occurs and able to provide halt support. Floating point operations are widely used these days for many applications ranging from graphics application to medical imaging. Thus, the processor can be used for diversified application area. The necessary code is written in the hardware description language Verilog HDL. Quartus II 10.1 suite is used for software development; Modelsim is used for simulations and then implementation on Altera DE 2 FPGA board.
Key words: FPGA, RISC and Altera DE2 board
Reference
[1] R. Uma, "Design and Performance Analysis of 8-bit RISC processor using Xilinx Tool", International Journal of Engineering Research and Applications (IJERA), ISSN: 2248-9622, Vol-2, Mar-Apr-2012.
[2] J. Poornima, G.V.Ganesh, M. Jyothi, M. Shanti and A.Jhansi Rani,"Design and implementation of pipelined 32-bit Advanced RISC processor for various D.S.P Applications", Proceedings of International Journal of Computer Science and Information Technology, ISSN: 3208-3213, Vol-3(1), June-2012.
[3] Xiao Li, Longwei Ji, Bo Shen, Wenhong Li, Quianling Zhang, " VLSI implementation of a High-performance 32-bit RISC microprocessor", Communications, Circuits and Systems and West Sino Expositions, IEEE , International Conference, ISSN:1458-1461,Vol-2,2002.
[4] http://elearning.vtu.ac.in/12/enotes/Adv_Com_Arch/Pipeline/Unit2-KGM.pdf.
[5] Asmita Haveliya "Design and simulation of 32-point FFT using Radix-2 Algorithm for FPGA Implementation" IEEE, 167-171, 2012.
Jinde Vijay Kumar, Chintakunta Swapna, Boya Nagaraju , Thogata Ramanjappa |
01-07 |
 |
2. |
LabVIEW based real time implementation of dual controller scheme for robust tuning in level process
LabVIEW based real time implementation of dual controller scheme for robust tuning in level process
Abstract: The aim of this work is to implement a dual controller scheme for robust tuning in level process. This method contributes for the independent adjustment of servo response and regulatory response. The dual controller design has better robustness than single conventional scheme. The three main loop attributes has been maintained using this scheme with fast settling time. The independent tuning without interaction will improve the performance of this scheme as compared with other scheme. Dual controller scheme has been implemented in real time using Lab VIEW platform.
Key words: Robust Tuning, servo- regulatory response, LabVIEW, dual controller scheme
Reference
[1] O. Arrieta, A. Visioli , R. Vilanova, PID
autotuning for weighted servo/regulation
control operation: Journal of Process Control
20 (2010) 472–480.
[2] Y.C Tian,F Gao,Double controller scheme for
process with dominant time delay,IEEE
procedings control theory application vol
145,september 2008
[3] Sigurd skogestad,simple analytical rule for
model reduction and PID controller tuning,
journal of process control 13(2003) pages
291-309
[4] Zhuo-Yun Niea, Qing-Guo Wangb, Min
Wua, Yong Hea, Tuning of multi-loop PI
controllers based on gain and phase margin
specifications: Journal of Process Control 21
(2011) 1287– 1295
[5] George Stephanopoulos,An introduction to
theory and practice,chemical process
control:page 174-175
Veena Madhu, Sanjeevi Gandhi A |
08-11 |
 |
3. |
QoS oriented MapReduce Optimization for Hadoop Based BigData Application
QoS oriented MapReduce Optimization for Hadoop Based BigData Application
Abstract: Due to increase in data load on cloud infrastructure the maintenance of quality services for BigData applications has become a major issue [1]. The data storage of structured as well as unstructured kinds are also a big concern to be considered while operating with certain search engine or data exploring applications[2]. On the other hand data intensive computation for cloud services is also increasing with vast pace. The predominant requirement for quality services in cloud infrastructure are optimized resource utilization, efficient processing in terms of execution time and data portability [1].
Reference
[1] Demirkan, Haluk, and DursunDelen. "Leveraging the capabilities of service-oriented decision support systems: Putting analytics and big data in cloud."Decision Support Systems 55, no. 1 (2013): 412-421. [2] Herodotou, Herodotos, Harold Lim, Gang Luo, NedyalkoBorisov, Liang Dong, FatmaBilgen Cetin, and ShivnathBabu. "Starfish: A Self-tuning System for Big Data Analytics." In CIDR, vol. 11, pp. 261-272. 2011. [3] Prekopcsák, Zoltán, Gabor Makrai, TamasHenk, and Csaba Gaspar-Papanek. "Radoop: Analyzing big data with rapidminer and hadoop." In Proceedings of the 2nd RapidMiner Community Meeting and Conference (RCOMM 2011), pp. 1-12. 2011. [4] Dittrich, Jens, and Jorge-ArnulfoQuiané-Ruiz. "Efficient big data processing in Hadoop MapReduce."Proceedings of the VLDB Endowment 5, no. 12 (2012): 2014-2015. [5] Abadi, Daniel J. "Data Management in the Cloud: Limitations and Opportunities." IEEE Data Eng. Bull. 32, no. 1 (2009): 3-12.
Burhan Ul Islam Khan, Rashidah F. Olanrewaju |
12-15 |
 |
4. |
Android NDK Graphics: Open GL ES Air Hockey Basis Application
Android NDK Graphics: Open GL ES Air Hockey Basis Application
Abstract: When it comes to beautiful visual rendering and games on the Android handsets that we use today, much of that credit has to be given to the various graphic libraries which come along with programming paradigms. Just like anything in programming and technology, there are good and bad ways to implement and get certain things done both at the front end and the backend. What the Android Native Development Kit (NDK) does is that it works alongside the Software Development Kit (SDK) and injects the native powers of any C/C++ application into your Android application which can be packaged as any normal application and run on an emulator/device of choice. The SDK, the NDK, the ADT and Eclipse are primarily what one requires to directly hit on towards Android Native Development. So now how does one enjoy the seamless graphics, multimedia, physics and games on an Android device? It is the Native API's which come as a result of relying on performance critical native code which makes this possible. In this paper we develop a basis game of Air Hockey, which is more of a concept game made using the technological paradigm of the NDK in Android Programming. Right from defining the structure of the table up to defining and implementing the shaders and 3D rendering, almost every important aspect has been researched and put into working through this paper.
Key words: Air Hockey, Android, Java, OpenGL, Drawing, Shaders, Graphics API, Android 3D Rendering
Reference
[1] Ed Burnette. Hello, Android: Introducing Google's Mobile Development Platform, Third Edition. The Pragmatic Bookshelf, Raleigh, NC and Dallas,TX, 2010. [2] Android NDK group (http://groups.google.com/group/android-ndk) [3] The Android Developer BlogSpot (http://android-developers.blogspot.com/) [4] Google Code (http://code.google.com/hosting/) for lots of NDK exampleapplications.
[5] Stack Overflow (http://stackoverflow.com/)
Sabyasachi Patra, Prathamesh Patel, KarishmaVelisetty, Mr. Abhay Kolhe |
16-22 |
 |
5. |
Experimental Analysis of Performance and Emission Parameters of Neem Oil Ethyl Ester and HHO Gas Addition with Neem Oil Ethyl Ester in a Single Cylinder Four Stroke Compression Ignition Engine
Experimental Analysis of Performance and Emission Parameters of Neem Oil Ethyl Ester and HHO Gas Addition with Neem Oil Ethyl Ester in a Single Cylinder Four Stroke Compression Ignition Engine
Abstract: Need for alternate fuel is increasing day by day due various problems associated with the conventional fuels. Present work is focussed on analysing experimentally the performance and emission characteristics of Neem oil biodiesel and addition of HHO gas along with Neem oil biodiesel in a single cylinder compression ignition engine. Biodiesel is extracted by tranesterification of non edible crude Neem oil using ethanol and Naoh as catalyst. The biodiesel is blended with diesel. The blends used are N30 and N40. HHO gas is produced from the process of electrolysis the HHO gas is the combination of hydrogen and oxygen. The produced gas is made to pass through a moisture separator and sent along the intake manifold with the intake air. The performance and emission characteristics are noted down and compared. It was observed that there was a rise in brake thermal efficiency and lesser specific fuel consumption, Reduced Oxygen content in exhaust gases, lesser HC and CO emission and there was a rise in NOX emission when HHO is supplemented with biodiesel
Key words: Biodiesel, HHO (oxygen enriched hydrogen),Neem oil, Tranesterification
Reference
[1] Premkarthik SR Annamalai Effectiveness of oxygen enriched hydrogen along with intake air in a CI engine performance and emission 2011
[2] Ali can yilmaz Effects of HHO Gas addition on performance and exhaust emission in compression ignition engine 2010 1-7 Science direct
[3] S.Brai Effects of H2/O2 gas addition in increasing the thermal efficiency Elseiver fuel 89 (2010) 378-383
[4] Ngarajan and Tamilporai Evaluation of performance and emission of NOME in a DI engine AJCSIT 3:4 2013 50-55
[5] Adrian Birtas the Effect of HRG gas addition on diesel engine combustion and emission characteristics 2011 internal journal hydrogen energy 36
J. Allen Jeffrey, M Subramanian |
23-28 |
 |
6. |
Warm Server
Warm Server
Abstract: Educational Organization is largest growing industries in India and all over the world. The advent of modern technologies at the beginning of the last century has brought in development of various technologies, which has substantially increased computer uses in Educational Organization. This system is used monitor and track organizations resources like computers hardware and software resources used in private network of organization. This system monitor all the resources available in intranet, if one of the resources get out dated it can be tracked using system and after it will be upgrade or if any resource changed it also be tracked. Today, India ranks Tenth in worldwide in computer users in educational Institution and other organization. This application helps system admin to monitor all the information about computer software and hardware resource immediately.
Key words: Anticipated, Reboot, Tracked, Upgrade, Warm Server
Reference
[1] Cardellini V, Colajanni M, P.S.Yu, "Redirection Algorithms for Load sharing in Distributed Web Server [2] www.aquabluesolution.com [3] Cardellini V, Colajanni M, "Dynamic Load Balancing on Web Server Systems"
[4] Tolia,Niraj;Andersen,David G.; Satyanarayanan, M. (March 2006). "Quantifying Interactive User Experience on Thin Clients" (PDF). Computer (IEEE Computer Society).
[5] Nieh, Jason; Novik, Naomi; Yang, S. Jae (December 2005). "A Comparison of Thin-Client Computing Architectures" (PDF). Technical Report CUCS-022-00 (New York: Network Computing Laboratory, Columbia University
Manisha Bahir, Rewati Kapse, Pooja Bembde, Prof.B.G.Dhake. Prof.Y.R.Nagargoje |
29-32 |
 |
7. |
Cloud Storage and its Secure Overlay Techniques
Cloud Storage and its Secure Overlay Techniques
Abstract: In this paper we have tried to explain in detail about cloud storage its need, importance and how much useful it is for the upcoming future. As we know that it provides us flexibility to store and use data to anywhere and from anywhere so it is cost effective and beneficial at all places. The storage of data however has some kind of security issues in accessing the authorized data. Some of the data in the cloud should be deleted for certain reasons to maintain confidentiality. And many other issues are to be overcome by the cloud. There are certain techniques discussed in this paper to address the problems in the cloud communication. We get an idea of the available methods in which the data can be secured. Anyway each architecture has its own shortcomings. But without these techniques, it is difficult to maintain a good client-server storage mechanism in the cloud computing.
Index Terms: Cloud Storage, cloud services, security, Fade, Plutus.
Reference
[1] Greg Schulz, "Cloud And Virtual Data Storage Networking "published -CRC Press, Issue-AUG 2011. [2] Nabil Sultan, "Cloud Computing for education: A new dawn" International Journal of Information Management 30(2010), pp 109-116. [3] Ajilth Singh. N and M. Hemalatha, "Cloud Computing for Academic Environment", International Journal of Information. [4] Velte, "Cloud Computing - A Practical Approach", TMH, 2012. [5] Buyya ,Selvi, "Mastering Cloud Computing", TMH Pub.
Susheel Kumar, Naval Kishore Dogra |
33-37 |
 |
8. |
Effect Of Salt Water On Compressive Strength Of Concrete
Effect Of Salt Water On Compressive Strength Of Concrete
Abstract: In this research work, the effect of salt water on the compressive strength of concrete was investigated. This paper therefore presents the result and findings of an experimental research on the effect of salt water on compressive strength of concrete. For this concrete cubes were cast using fresh wi and salt water for a design mix of M-30 1:1.8:3.31 by weight of concrete, and 0.45 water- cement ratio. Half of concrete cubes were cast and cured with fresh water and remaining half cubes were cast and cured with salt water. The concrete cubes were cured for 7,14 and 28 days respectively. The result of the average compressive strength of concrete obtained using fresh water ranges from 27.12 - 39.12N/mm2 and using salt water ranges from 28.45 – 41.34N/mm2.
Key words: concrete cubes,fresh water, salt water, compressive strength.
Reference
[1.] Building research Station(1956), Analysis of water encountered in construction, Digest No. 90, London, H.M.S.O.
[2.] Osei, Y. A. (2000). Neutralization, New School Chemistry" African First Publisher Onitsha Nigeria.
[3.] Water Encyclopaedia. (2012). Earth: The water Planet, (Ed). Earth Sylvia. Retrieved from www.watercyclopedia.com/ Da-En/ Earth- The water-planet.html # b.
[4.] Adebakin, H. I. (2003). Effect of Salinity on Compressive Strength on Concrete.
[5.] Akinkurolere O.O. et.al. (2007), Journal of Enginering and Applied Sciences 2(2). Medwell Journals, p 412-415.
Preeti Tiwari, Rajiv Chandak, R.K. Yadav |
38-42 |
 |
9. |
Structure, Morphology and Chemical Synthesis of Mg1-xZnxFe2O4 Nano-Ferrites Prepared by Citrate-Gel Auto Combustion Method
Structure, Morphology and Chemical Synthesis of Mg1-xZnxFe2O4 Nano-Ferrites Prepared by Citrate-Gel Auto Combustion Method
Abstract: Mg-Zn Nano ferrites having chemical formula Mg1-xZnxFe2O4(where x=0.0, 0.2, 0.4, 0.6, 0.8, 1.0) were synthesized by the citrate-gel auto combustion method. Synthesized powders were sintered at 500oC for four hours in air and characterized by XRD, SEM and EDS.XRD analysis shows that cubic spinal structure of the ferrites and the crystalline sizes (D) were found in the range 25-35 nm. The values of the lattice parameter (a) increases and X-ray density (dx) increases with doping of Zn content. Scanning Electron Microscopy (SEM) studies revealed Nano nature of the samples. An elemental composition of the samples was studied by using Energy Dispersive Spectroscopy (EDS). The observed results can be explained on the basis of composition and crystallite size.
Key words: Mg-Zn Nano- Ferrites; Citrate Gel Auto Combustion Method; X-Ray Diffraction; Scanning Electron Microscope; Energy Dispersive Spectroscopy.
Reference
[1.] Surender Kumar, Tukaram J. Shinde, Pramod N. Vasambekar. Adv. Mat. Lett. 2013, 4(5), 373-377Doi: 10.5185/amlett.2012.10429
[2.] Dixit, Gagan.; Singh, J.P.; Srinivasa, R.C.; Agarwal, H.M.; Chaudhury, R.J. Adv. Mat. Lett.2012, 3(1),21-28Doi: 10.5185/amlett.2011.6280
[3.] T. Giannakopoulou; L. Kompotiatis; A. Kontogeorgakos; G. Kordas. J.magn. Magn. Magn. Mater.246,360.Doi: 10.1016/S0304-8853(02)00106-3
[4.] M.A. Ahmed, Phy.Status solidi A.1989,111,567.Doi: 10.1002/pssa.2211110222
[5.] E.Olsen;J.Thoustad,J.Appl.Electrochem.1999,29,293.Doi:10.1023/A:1003464304448
D.Ravikumar, B.Kiran Kumar, D.Ravinder, Ch.Abraham Lincoln |
43-51 |
 |
10. |
DETECTION OF MASSES IN MAMMOGRAM IMAGES USING ANT COLONY OPTIMIZATION
DETECTION OF MASSES IN MAMMOGRAM IMAGES USING ANT COLONY OPTIMIZATION
Abstract: This paper proposes the advances in edge detection techniques, which is used for the mammogram images for cancer diagnosis. It compares the evaluation of edge detection with the proposed method ant colony optimization. The study shows that the edge detection technique is applied on the mammogram images because it will clearly identify the masses in mammogram images. This will help to identify the type of cancer at the early stage. ACO edge detector is best in detecting the edges when compared to the other edge detectors. The quality of various edge detectors is calculated based on the parameters such as Peak signal to noise ratio (PSNR) and Mean square error (MSE).
Key words: Ant colony optimization, cancer, diagnosis, edge detection, mammogram.
Reference
[1] Malcolm R Alison, "Cancer", Imperial College School of Medicine, London, UK, Encyclopedia of Life Sciences / & 2001 Nature Publishing Group.
[2] Lukasz Jelen, Thomas Fevens, Adam Krzy˙ Ak, "Classification of Breast Cancer Malignancy Using Cytology Images of Fine Needle Aspiration Biopsis", Int. J. Appl. Math. Comput. Sci., 2008, Vol. 18, No. 1, 75–83.
[3] Jalil Addeh and Ata Ebrahimzadeh, "Breast Cancer Recognition Using a Novel Hybrid Intelligent Method".
[4] Indira Muhic, "Fuzzy Analysis of Breast Cancer Disease using Fuzzy c-means and Pattern Recognition", Sotheast Europe Journal of Soft Computing.
[5] Tobias Christian Cahoon, "Breast Cancer Detection Using Image Processing Techniques", 2000 IEEE.
Varsha Patankar, Prof. Devesh Nawgaje, Dr. Rajendra Kanphade |
52-56 |
 |
11. |
Survey on Mining Order-Preserving Sub Matrices
Survey on Mining Order-Preserving Sub Matrices
Abstract: Order-preserving sub matrices (OPSM's) have been shown useful in capturing concurrent patterns in data when the relative magnitudes of data items are more important than their exact values. For example, in analyzing gene expression profiles obtained from micro-array experiments, the relative magnitudes are important both since they represent the change of gene activities across the experiments, and since there is typically a high level of noise in data that makes the exact values un-trustable. To manage with data noise, repeated experiments are often conducted to collect multiple measurements.
Key words: Order-preserving sub matrices, Simultaneous Clustering.
Reference
[1]. Madeira, S.C., Oliveira, A.L.: Biclustering Algorithms for Biological Data Analysis: A Survey. IEEE/ACM Trans. on Comp. Biol. and Bioinfor., 24–45 (2004).
[2]. Charrad, M., Lechevallier, Y., Ahmed, M.b., Saporta, G.: Block Clustering for Web Pages Categorization. In: Corchado, E., Yin, H. (eds.) IDEAL 2009. LNCS, vol. 5788, pp. 260–267. Springer, Heidelberg (2009).
[3]. Bichot, C.E.: Co-clustering documents and words by minimizing the normalized cut objective function. JMMA 9, 131–147 (2010).
[4]. Grimal, C., Bisson, G.: Classification a partird'une collection de matrices.CAp2010 (2010).
[5]. Prelic, A., Bleuler, S., Zimmermann, P.: A systematic comparison and evaluation of bi clustering methods for gene expression data. Bioinformatics, 122–129 (2006).
Reeta Dangi, R.C. Jain, Vivek Sharma |
57-62 |
 |
12. |
Geothermal Energy : An Alternative Source of Energy
Geothermal Energy : An Alternative Source of Energy
Abstract: Nowadays renewable sources are preferred over the non renewable source to generate the energy. The rapid rates of exhausting non-renewable resources have completed us to look out for new avenues in energy generation. According to global energy scenario, developed countries are adopting renewable resources as major source of energy. Geothermal energy originates from the original formation of the planet, from radioactive decay of minerals, and from solar energy absorbed at the surface. Geothermal energy is derived from the hot interior of the earth. The earth is a reservoir of heat energy, most of which is buried and is observed during episodes of volcanic eruption at the surfaces. Geothermal is one of the most promising renewable source of energy which is plentiful, eco-friendly, reliable and clean source of energy available in earth crust. In our country there is wide scope for the utilization of geothermal energy with proper strategically approach to meet the energy requirement. The future prospects of this heat energy as a sustainable source of renewable energy are indeed promising. Today India is the fifth largest consumer of electricity and by 2030 it will become third largest overtaking Japan and Russia according to statistical data available by Energy Planning Commission, Government of India.
Key words: Non-renewable Energy, Geothermal energy.
Reference
[1.] Suryawanshi C. R., ―Geothermal Energy; The eco-friendly alternative source of energy‖ IJARET -2013, Volume 4 pp 81-84.
[2.] Kakkar V., Agarwal N.K and Kumar N., ―Geothermal Energy: New prospects‖ IJAET- 2012, Sept.
[3.] Sukanta Roy and Harsh Gupta, ―Geothermal Energy: An Overview‖ Akshay Urja, MNRE- 2012 April.
[4.] Yeha A., O'Sullivana ,‖Renewability of geothermal recourses,‖ Geothermics,2010, Vol. 39, pp. 314-320
[5.] ―Renewable Energy in India‖ Report prepared by Western Australia Trade office- India.
R R Shah, Bala Dutt |
63-68 |
 |
13. |
Optimization of Material Removal Rate in Cnc Turning of Mild Steel 1018 Using Taguchi Method
Optimization of Material Removal Rate in Cnc Turning of Mild Steel 1018 Using Taguchi Method
Abstract: Engineering materials are presently in use at a very vast range in today's industries. As Mild steel 1018 has a wide variety of applications in construction of pipelines, products, construction as structural steel, car manufacturing industries and other major industries. The machining of these types of materials requires very important consideration. There are a number of parameters like cutting speed, feed and depth of cut etc. which must be given consideration during the machining of this alloy. So it becomes necessary to find out the ways by which it can be machined easily and economically. For the present work the parameter to be optimised selected is material removal rate that is optimised by using selected combination of machining parameters by using taguchi orthogonal array.
Reference
[1] Yigit Kazancoglu1, Ugur Esme, "Multi objective optimization of the cutting forces in the turning operations using the grey based Taguchi method", Materiali in tehnologije / Materials and technology ,45 (2011) 2, 105–110. [2] LB Abhang and M Hameedullah, "Optimal machining parameters for achieving the desired surface roughness in turning of steel", TJER 2012, Vol. 9, No. 1, 37-45, Received 26 July 2010; accepted 1 January 2011.
[3] M. N. Islam, "An investigation of surface finish in dry turning", Proceedings of the World Congress on Engineering 2011 Vol I, WCE 2011, July 6 - 8, 2011, London, U.K. [4] Samir Khrais, Adel Mahammod Hassan, "Investigations Into the Turning Parameters Effect on the Surface Roughness of Flame Hardened Medium Carbon Steel with TiN-Al2O3-TiCN Coated Inserts based on Taguchi Techniques", World Academy of Science, Engineering and Technology 59 2011. [5] M.Y. Noordin, V.C. Venkatesh, "Application of response surface methodology in describing the performance of coated carbide tools when turning AISI 1045 steel", Journal of Materials Processing Technology 145 (2004) 46–58, Received 19 June 2002; received in revised form 28 June 2003; accepted 2 July 2003.
Sandeep Kumar, Prof. Sushil Kumar Sharma |
69-73 |
 |
14. |
Atm Client Authentication System Using Biometric Identifier & Otp
Atm Client Authentication System Using Biometric Identifier & Otp
Abstract: In this paper we propose a design, to add more security to the current ATM systems by using biometric and GSM technology. In conventional method identification is done based on ID cards and static 4 digit password. Whereas in our purposed system, Bankers will collect the customer fingerprints and mobile number at the time of opening the accounts then only customer will be able to access ATM machine. The primary step of this project is to verify currently scanned fingerprint with the fingerprint which is registered in the bank during the account opening time. If the two fingerprints get matched, then a message will be delivered to the user's mobile which is the random 4 digit pin number to access the account. For every transaction new pin numbers will be send to the user's mobile thus there will not be fixed pin number for every transaction. Thus, Pin number will vary during each transaction .
Key words: ATM Terminal, Fingerprint Recognition, GSM Module, LINUX.
Reference
[1] Pennam Krishnamurthy & M. Maddhusudhan Redddy, "Implementation of ATM Security by Using Fingerprint recognition and GSM "International Journal of Electronics Communication and Computer Engineering Volume 3, Issue (1) NCRTCST, ISSN 2249–071X, 2012. [2] D. Vinod kumar, & Prof.M R K Murthy "Fingerprint Based ATM Security by using ARM7" IOSR Journal of Electronics and Communication Engineering ISSN : 2278-2834 Volume 2, Issue 5 (Sep-Oct 2012), PP 26-28.
[3] http://en.wikipedia.org/wiki/Automated_te llermachine [4] Mr. John Mashurano & Mr. Wang liqiang "ATM Systems Authentication Based On Fingerprint Using ARM Cortex-M3"International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol.2 Issue 3, March – 2013. [5] Moses Okechukwu Onyesolu & Ignatius Majesty Ezeani "ATM Security Using Fingerprint Biometric Identifer: An Investigative Study" International Journal of Advanced Computer Science and Applications, Vol. 3, No.4, 2012.
Jaydeep Shamdasani, Prof .P.N.Matte |
74-78 |
 |
15. |
Analysis of a Three-Level LLC Series Resonant Converter for
High- and Wide-Input-Voltage Applications
Analysis of a Three-Level LLC Series Resonant Converter for
High- and Wide-Input-Voltage Applications
Abstract: In this paper, the analysis of a three-level LLC series resonant converter (TL LLC SRC) for high- and wide
input-voltage applications is presented. It consists of two half-bridge LLC SRCs in series, sharing a resonant
inductor and a transformer. Its main advantages are that the voltage across each switch is clamped at half of the
input voltage and that voltage balance is achieved and simple driving signals . Thus it is suitable for high-inputvoltage
applications. Based on the results of these analyses, a design example is provided and its validity is
confirmed by an experiment involving a prototype converter with an input of 600V and an output of 48 V/20 A.
Key words: High and wide input voltage, LLC series resonant converter (SRC), three-level (TL).
Reference
[1] X. Ruan, L. Zhou, and Y. Yan, ―Soft-switching PWM three-level converters ,‖IEEE Trans. Power Electron., vol. 16, no. 5, pp. 612–622, Sep.2001. [2] K. Jin and X. Ruan, ―Hybrid full-bridge three-level LLC resonant converter—a novel DC–DC converter suitable for fuel-cell power system,‖IEEE Trans. Ind. Electron., vol. 53, no. 5, pp. 1492–1503, Oct.2006. [3] J. P. Lee, B. D. Min, T. J. Kim, D. W. Yoo, and B. K. Lee, ―A novel topology for photovoltaic series connected DC/DC converter with high efficiency under wide load range,‖ in Proc. IEEE Power Electron. Spec.Conf. 2007, pp. 152–155. [4] B. M. Song, R. McDowell, A. Bushnell, and J. Ennis, ―A three-level DC–DC converter with wide-input voltage operation for ship-electric power-distribution systems,‖ IEEE Trans. Plasma Sci., vol. 32, no. 5,pp. 1856–1863, Oct. 2004. [5] J. R. Pinheiro and I. Barbi, ―The three-level ZVS-PWM DC-to-DC converter,‖IEEE Trans. Power Electron., vol. 8, no. 4, pp. 486–492, Oct.1993.
S.Saravanan, Mr.J.Mohan, Mr.Vivekanand Kumar |
79-84 |
 |
16. |
Effectiveness of The Development And Expansion of The Steam Power Station Condensate To Centers Thermoelectric Dedicated To The Production of Electric Power And Water Desalination
Effectiveness of The Development And Expansion of The Steam Power Station Condensate To Centers Thermoelectric Dedicated To The Production of Electric Power And Water Desalination
Abstract: This research includes a mathematical form to study the effectiveness of development of basic design form condensation steam powers to dual pressure thermoelectric centers allocated for production of electric power and distillation water with the aspect of thermal effectiveness scale and preserving the lowest level of pollution for the surrounding media, in this study the scale of saving is used in the amount of fuel saved in the electric network due to the joint process of production for electric power and distillation water in suggested design compared to a separate production process for electric power and distillation water via a replacement station and distillation unit from the type of reverse osmosis. Hence the effect of design the multiple effect evaporation distillation unit and the gas turbine unit were studied, and so basic thermodynamic characteristics for this unit on the scale of effectiveness for development of basic design of steam station. Study findings provided the following:
Key words: Power plant ; steam turbine; gas turbine; pressure ratio ;fuel saving
Reference
[1] LEON AWERBUCH ( 2001) Desalination and Power Development in the New Millennium / Sustainable , Development International. ( Internet Communication ).
[2] GHASSAN EJJEH ( 2001 ). Desalination , A Reliable Source of New Water / IDA World Congress on Desalination and Water Reuse. ( Internet Communication )
[3] Cogeneration Plant with Desalination ( 1995 ) CMI , Power Division , Avenue Greiner - 1 ,B - 4100 , Seraing , Belgium .
[4] MIRO R. SUSTA & PETER LUBY ( 1997 ) Combined Cycle Power Plant Efficiency : a prognostic extrapolation / Modern Power Systems Journal , pp. 21 : 24 , April , 1997 .
[5] VINCENT BAUJAT (2000 Comparison of Multiple Effect and Multistage Flash Desalination Processes for power and Water Combined Plants /The International Conference and Exposition on Power and Water desalination , IEF/ISESCO, 20 : 21 June , Tripoli - LIBYA
Gamal Yaseen Salman/ Abdualrazzaq Abdualwhabe |
85-95 |
 |
17. |
Simulation studies of premixed ch4/air Microcombustion
Simulation studies of premixed ch4/air Microcombustion
Abstract: A numerical study of CH4-air premixed combustion in the micro combustors with a five step global mechanism is performed by solving the two dimensional governing equations of continuity, momentum and species, coupled with the energy equation. A reference case is defined as the combustion in a cylindrical tube with 1 mm inlet diameter and length 10 times its inlet diameter with a uniform velocity profile at the inlet plane. Different physical and boundary conditions have been applied in order to investigate their respective effects on the flame temperature. The conditions studied in the current paper include the combustor size, geometry and inlet velocities. Downscaling the combustion chamber and higher velocities leaded to reduction in residence time which results in lower combustion efficiency causing insufficient heat generation unable to maintain the self-sustained combustion. The effect of variation in inlet velocity has role in the determining the flame position in combination with given thermal conditions. The results of this paper indicate that these various boundary and physical conditions have effects on the flame temperature to different extent and should be carefully monitored when applied for different applications.
Key words: Micro combustion, CH4–air mixture, premixed flame, flame temperature, K-e model
Reference
[1]. Barrios, E., Prince, J.C., and Trevino, C., 2008. The role of duct thickness on the quenching process of premixed flame propagation, Combustion Theory and Modelling 12 (1), 115–133. [2] Bell, J.B., Day, M.S., Grcar, J.F., and Lijewski, M.J., A Computational Study of Equivalence Ratio Effects in Turbulent, Premixed Methane- Air Flames, Lawrence Berkeley NationalLaboratory, Berkeley USA. [3] Chen, M., Buckmaster, J., 2004, Modelling of combustion and heat transfer in 'Swiss roll' micro-scale combustors, Combust. Theory Modelling, 8, 701–720. [4] Embid, P.F., Majda, A.J., Souganidis, P.E., 1994, Effective Geometric Front Dynamics for Premixed Turbulent Combustion with Separated Velocity Scales, Combust. Sci. and Tech., 103, 85-115. [5] Fluent Inc., Fluent Release 6. 3 User Guide, Fluent Inc., 2006.
P.Bala Murali |
96-102 |
 |
18. |
Optimal Contrast Grayscale Visual Cryptography with Modified Multi-secret Sharing for Secure Application
Optimal Contrast Grayscale Visual Cryptography with Modified Multi-secret Sharing for Secure Application
Abstract: Core banking is a set of services provided by a group of networked bank branches. Bank customers may access their funds and perform other simple transactions from any of the member branch offices. The major issue in core banking is the authenticity of the customer. Due to unavoidable hackingof the databases on the internet, it is always quite difficult totrust the information on the internet. To solve this problemof authentication, we are proposing an algorithm based onimage processing, improved steganography and visual cryptography. This paper proposes a technique of encode the password of a customer by improved Steganography, most of the steganographic techniques use either three or four adjacent pixels around a target pixel whereas the proposed technique is able to utilize at most all eight adjacent neighbors so that imperceptibility value grows bigger.and thendividing it into shares. Total number of shares to be created isdepending on the scheme chosen by the bank. When two sharesare created, one is stored in the Bank database and the otheris kept by the customer. The customer has to present the shareduring all of his transactions. This share is stacked with the firstshare to get the original image. Then decoding method issued to take the hidden password on acceptance or rejection of the output and authenticates the customer.
Key words: Digital Image steganography, visual cryptography, Gray Scale, Secret Sharing
Reference
[1] F. A. P. Petitcolas, R. J. Anderson and M. G.
Kuhn, "Information hiding-A survey," Proc.
IEEE, vol. 87, pp. 1062-1078,1999.
[2] H. Wang and S. Wang, "Cyber warfare-
Steganography vs. Steganalysis,"
Commun.ACM, vol. 47, no. 10, pp. 76-82,
2004.
[3] X. Zhang and S. Wang, "Steganography
using multiplebase notational system and
human vision sensitivity," IEEE Signal
Processing Letters, vol. 12, pp. 67-70, Jan.
2005.
[4] M. Kutter and S. Winkler, "A vision-based
masking model for spread- spectrum image
watermarking," IEEE Trans. Image
Processing, vol. II,pp. 16-25, Jan. 2002. [5] H. Noda, J. Spaulding, M. N. Shirazi, and E. Kawaguchi, "Application of bit-plane decomposition steganography to JPEG2000 encoded images," IEEE Signal Processing Lett., vol. 9, no. 12, pp. 410-413, Dec. 2002.
S.Premkumar, R.Swathiramya |
103-106 |
 |
19. |
Segmentation of MRI Brain Image Using Fuzzy C Means For Brain Tumor Diagnosis
Segmentation of MRI Brain Image Using Fuzzy C Means For Brain Tumor Diagnosis
Abstract: Image segmentation aims to separate the structure of interest objects from the background and the other objects. Many good approaches have been developed to segmentation of brain MR images, among them the fuzzy c-mean (FCM) algorithm is widely used in MR images segmentation. Cluster analysis identifies groups of similar objects and therefore helps in discovering distribution of patterns in large data sets. Fuzzy C-means (FCM) is most widely used fuzzy clustering algorithm for real world applications. However accuracy of this algorithm for abnormal brains with edema, tumor, etc is not efficient because of limitation in initialization of this algorithm. In this paper, we have proposed an ant colony algorithm to improve the efficiency of fuzzy c-means clustering. The proposed algorithm is tested in medical images.
Key words: Magnetic Resonance Imaging (MRI), FIS technique, Fuzzy C-Means, Ant Colony Optimization
Reference
[1] Xianyi Cheng, Xiangpu Gong, ‗An image segmentation of fuzzy C-means clustering based on the combination of improved Ant Colony Algorithm and Genetic Algorithm', 2008 International Workshop on Education Technology and Training, IEEE Computer Society. [2] Dr. M. Karnan & K. Selvanayaki, ‗Improved implementation of brain MRI image segmentation using Meta Heuristic Algorithms', 2010 IEEE International Conference on Computational Intelligence and Computing Research. [3] Myung-Eun Lee, Soo-Hyung Kim, ‗Segmentation of brain MR image using Ant Colony Optimization algorithm', 2009 Ninth IEEE International Conference on Bioinformatics and Bioengineering. [4] R. Samet , M. Namazov, ― Using Fuzzy Sets For Filtering Topographic Map Images ‖, Appl. Comput. Math. 7 (2008), No.2, Pp.242-254. [5] Nutan Y.Suple , Sudhir M. Kharad, ― Basic Approach To Image Contrast Enhancement With Fuzzy Inference Sytem ‖, International Journal Of Scientific And Research Publications, Volume 3, Issue 6, June 2013, ISSN 2250-3153.
Sayali D. Gahukar, Dr. S.S. Salankar |
107-111 |
 |
20. |
Direct Vector Control of Induction Motor Based on Sinusoidal PWM Inverter with Fuzzy Logic Controller
Direct Vector Control of Induction Motor Based on Sinusoidal PWM Inverter with Fuzzy Logic Controller
Abstract: This paper presents the speed control scheme of direct vector control of Induction Motor drive (IM drive). The Fuzzy logic controller is (FLC) used as the controller part here for the direct vector control of Induction Motor using Sinusoidal PWM Inverter (SPWM). Fuzzy logic controller has become a very popular controlling scheme in the field of Industrial application. The entire module of this IM is divided into several parts such as IM body module, Inverter module, coordinate transformation module and Sinusoidal pulse width modulation (SPWM) production module and so on. With the help of this module we can analyze a variety of different simulation waveforms, which provide an effective means for the analysis and design of the IM control system using FLC technique.
Key words: IM drive system, Mathematical model of IM drive, Vector control, Fuzzy Logic speed Controller
Reference
[1] Minh Ta-Cao, J.L. Silva Neto, Hoang Le-Huy, "Fuzzy logic based controller for induction motor drives", IEEE IECON Record 1996 PP. 631-634.
[2] Sanjiv Kumar Bhim Singh J.K.Chatterjee, "Fuzzy Logic based speed controller for Vector Controlled Cage Induction Motor Drive", IEEE 1998/0-7803-4886-9/98
[3] Norman Mariun, Samsul Bahari Mohd Noor, Jasronita Jasni, Omar S. Bennanes, "A Fuzzy Logic Based Controller for an Indirect Vector Controlled Three-Phase Induction Motor", IEEE 2004/0-7803-8560-8/04.
[4] Tejavathu Ramesh, Anup Kumar Panda, "Direct Flux and Torque control of three phase Induction Motor drive Using PI and Fuzzy Logic Controller for speed Regulator and low torque ripple", IEEE 2012/978-4673-0455-9/12.
[5] J.holtz, "Sensorless control of Induction Motor Drives" Procedings of IEEE, Vol.90.No 8, August 2002,PP 1359-1394
Nirban Chakraborty, Kaushik Jash, Prof. Pradip Kumar Saha, Prof. Goutam Kumar Panda |
112-116 |
 |
21. |
Comparative Study between PI and Fuzzy Logic Controller Based Power Factor Correction and THD Minimization using Interleaved Boost Converter
Comparative Study between PI and Fuzzy Logic Controller Based Power Factor Correction and THD Minimization using Interleaved Boost Converter
Abstract: Boost converter is most widely used as active power factor due to its ability of drawing continuous input current which can be manipulated by current mode control technique. However boost power factor corrector suffers from the problem of presence of ripples in the input current. This problem can be overcome by using interleaved boost converter. In this paper power factor correction and THD minimization is performed by interleaved boost converter controlled by average current mode control by using two different controllers. Here at first simulation is performed by PI controller and thereafter fuzzy controller is used and comparison of performance of two controllers is discussed.
Key words: Interleaved boost converter, Fuzzy controller, PI controller, Power Factor, THD.
Reference
[1] Muhammad H. Rashid, Power Electronics Handbook (Academic Press, 2001).
[2] Brad Bryant, Member, IEEE, and Marian K. Kazimierczuk, Fellow, IEEE, Modeling the Closed-Current Loop of PWM Boost DC–DC Converters Operating in CCM with Peak Current-Mode Control, IEEE Transactions on circuit and systems—I: regular papers, vol. 52, no. 11, November 2005.
[3] Wei Ma, Mingyu Wang, Shuxi Liu, Shan Li, and Peng Yu, Stabilizing the Average-Current-Mode-Controlled Boost PFC Converter via Washout-Filter-Aided Method IEEE Transactions on Circuits and Systems-II, Express Briefs, vol. 58, no. 9, September 2011.
[4] Laszlo Huber, Member, IEEE, Brian T. Irving, and Milan M. Jovanovic´, Fellow, IEEE, Open-Loop Control Methods for Interleaved DCM/CCM Boundary Boost PFC Converters, IEEE Transactions on Power Electronics, vol. 23, no. 4, July 2008.
[5] M. S Jayakumar, Ajeesh G, A High Efficient High Input Power Factor Interleaved Boost Converter, International Journal of Electrical and Computer Engineering (IJECE), vol.2, no. 3, june 2012, pp 339-344, ISSN: 2088-8708.
Saubhik Maulik, Prof. Pradip Kumar Saha, Prof. Goutam Kumar Panda |
117-121 |
 |
22. |
Secure Cloud StorageForPrivacy-Preserving Public Audit
Secure Cloud StorageForPrivacy-Preserving Public Audit
Abstract: eIn Cloud Environment, using cloud storage service, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the outsourced data makes the data integrity protection in cloud computing a formidable task, especially for users with constrained computing resources. Moreover, users should be able to just use the cloud storage as if it is local, without worrying about the need to verify its integrity. Thus, enabling public auditability for cloud storage is of critical importance so that users can resort to a third-party auditor (TPA) to check the integrity of outsourced data and be worry free. To securely introduce an effective TPA, the auditing process should bring in no new vulnerabilities toward user data privacy, and introduce no additional online burden to user. In this paper, we propose a secure cloud storage system supporting privacy-preserving public auditing. We further extend our result to enable the TPA to perform audits for multiple users simultaneously and efficiently. Extensive security and performance analysis show the proposed schemes are provably secure and highly efficient.
Reference
[1] Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing," IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, May 2011. [2] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable Data Possession at Untrusted Stores," Proc. 14th ACM Conf. Computer and Comm. Security (CCS '07), pp. 598-609, 2007. 3] M.A. Shah, R. Swaminathan, and M. Baker, "Privacy-Preserving Audit and Extraction of Digital Contents," Cryptology ePrint Archive, Report 2008/186, 2008. [4] C. Wang, K. Ren, W. Lou, and J. Li, "Towards Publicly Auditable Secure Cloud Data Storage Services," IEEE Network Magazine, vol. 24, no. 4, pp. 19-24, July/Aug. 2010. [5] M.A. Shah, M. Baker, J.C. Mogul, and R. Swaminathan, "Auditing to Keep Online Storage Services Honest," Proc. 11th USENIX Workshop Hot Topics in Operating Systems (HotOS '07), pp. 1-6, 2007.
ShekhAhamadhusen D., Prof. Rahul Deshmukh |
122-126 |
 |
23. |
Performance Investigation of Plate Type Heat Exchanger (A Case
Study)
Performance Investigation of Plate Type Heat Exchanger (A Case
Study)
Abstract: Heat exchanger is a thermodynamic system which is most commonly used in the process industry for
exchanging heat energy between the fluids. flowing in the same or opposite direction. It is desired that
effectiveness of heat exchanger should remain as large as possible. Heat exchanger's performance may be
improved by the addition of fins or corrugations. These investigations include design of plate type heat
exchanger, heat transfer enhancement, flow phenomenon and cleanliness factor. In process plants, this type of
heat exchange is generally used for recovering heat content of exhaust steam. However, with the flow of fluid
for a long period, fouling occurs on the plate surface. Therefore, it is required to investigate the effect of fouling,
wherever the heat exchanger is installed. An extensive experimental investigation has been carried out under
clean and dirty condition of the said plate type heat exchanger. Heat transfer and flow data were collected in
experiment. From collected data heat transfer rate, overall heat transfer coefficient, fouling factor and
cleanliness factor were evaluated. Based upon the cleanliness factor data, next date of cleanliness for plate type
heat exchanger was predicted. It is felt that the outcome of the present research work may be quite useful for
efficient operation of plate type heat exchanger installed in Process plants.
Key words: Plate type heat exchanger, Fouling factor, Cleanliness factor
Reference
[1]. Bott T.R., 1995. Heat Exchanger Cleaning. Fouling of Heat Exchanger, Vol. 4, 357-407.
[2]. Butterworth D., 2002. Design of Shell and Tube Heat Exchangers when the Fouling Depends on Local Temperature and Velocity. HTFS, Vol. 22, 789–801. [3]. Bohnet M., 1987. Fouling of Heat Transfer Surfaces. Chemical Engineering Technology, Vol. 4, 77-82.
[4]. Coletti F., Macchietto S. T., 2010. Effects of Fouling on Performance of Retrofitted Heat Exchanger Networks. European Symposium on Computer Aided Process Engineering, Vol. 30, 323-329. [5]. Cunault C., Burton C.H., Pourcher A.M., 2013. The Impact of Fouling on the Process Performance of the Thermal Treatment of Pig Slurry using Tubular Heat Exchangers. Journal of Environmental Management, Vol. 117, 253-262.
Simarpreet Singh, Sanjeev Jakhar |
127-131 |
 |
24. |
Optimal Multilevel Control for Large Scale Interconnected Systems
Optimal Multilevel Control for Large Scale Interconnected Systems
Abstract: A mathematical model of the finishing mill as an example of a large scale interconnected dynamical system is represented. First the system response due to disturbance only is presented. Then,the control technique applied to the finishing hot rolling steel mill is the optimal multilevel control using state feedback. An optimal controller is developed based on the integrated system model, but due to the complexity of the controllers and tremendous computational efforts involved, a multilevel technique is used in designing and implementing the controllers .The basis of the multilevel technique is described and a computational algorithm is discussed for the control of the finishing mill system . To reduce the mass storage , memory requirements and the computational time of the processor, a sub-optimal multilevel technique is applied to design the controllers of the finishing mill . Comparison between these controllers and conclusion is presented.
Reference
[1] Sage, A.p.1977. methodologies for large-scale system.McGraw-Hill , New York. [2] Siljak ,D.D.1978.Large scale Dynamic System.Elsevier north Holland, New York. [3] G.M.Aly,M.M.Aziz and M.A.R. Ghonaimy "Optimal Multilevel Control of Hot Rolling Steel Mills ." ,Ain-Shams University, Cairo, Egypt. , M.Sc.Thesis,Ain-Shams University, Egypt ,1973 [4] M.M.Aziz , "Automatic Control of Steel Mills.", M.Sc.Thesis,Ain-Shams University, Egypt ,1973 [5] P.Sannuti , Near Optimum Design Of Time-Lag Systems by Singular perturbation Method",Proc.JACC,1970.
Ahmed M. A. Alomar, Bakr E. M. Shamseldin |
132-143 |
 |
25. |
Preventing Covert Channel Attacks By Using Software Agents
Preventing Covert Channel Attacks By Using Software Agents
Abstract: Information sharing and their protection is a major problem for organisations having sensitive data. Shared resources are utilized by the covert channel for indirectly transmit sensitive information to unauthorized parties. For security purpose some mechanism such as seLINUX rely on the tagging the file system with access control properties. Such mechanism does not provide strong protection so colored LINUX, an extension to seLINUX is used to "color" the content of the file according to security classification to enhance resistance information laundering. In this paper we discuss about the mobile agent based approach to provide the environment to automate the process of detecting and coloring the respective file system(host) and monitoring the colored file system for instance of potential information leakage.
Key words: covert channel, information laundering, information leakage, notify, overwhelming
Reference
[1.] National Computer Security Center. "A Guide to Understanding Covert Channel Analysis of Trusted Systems" NCSC-TG-30, November 1993, http://www.radium.ncsc.mil/tpep/library/rainbow
[2.] A. Melek and M. MacKinnon, "2006 Global Security Survey. Research Report" Deloitte2006. http://www.deloitte.com
[3.] H. Okhravi and S. Bak, "Colored LINUX: Covert Channel Resistant OS Information Flow Security",
[4.] http://www.mobilec.org/ [5.] Trusted platform module (tpm) summary Https://www.trustedcomputinggroup.org/.../trusted_platform_module_tp.
Deepika Sonal, D.Kiranmayi |
144-148 |
 |
26. |
Text Recognition from an Image
Text Recognition from an Image
Abstract: To achieve high speed in data processing it is necessary to convert the analog data into digital data. Storage of hard copy of any document occupies large space and retrieving of information from that document is time consuming. Optical character recognition system is an effective way in recognition of printed character. It provides an easy way to recognize and convert the printed text on image into the editable text. It also increases the speed of data retrieval from the image. The image which contains characters can be scanned through scanner and then recognition engine of the OCR system interpret the images and convert images of printed characters into machine-readable characters [8].It improving the interface between man and machine in many applications.
Reference
[1] Optical Character Recognition using Neural Networks Deepayan Sarkar University of Wisconsin MadisonECE 539 Project, Fall 2003. [2] "Evaluation of OCR Algorithms for Images with Different Spatial Resolutions and Noises" School of Information Technology and Engineering Faculty of Engineering University of Ottawa©Qing Chen, Ottawa, Canada, 2003. [3] "A Neural Network Implementation of Optical Character Recognition" Technical Report Number CSSE10-05 COMP 6600 – Artificial Intelligence Spring 2009. [4] "Optical Character Recognition Techniques: A Survey" Sukhpreet Singh M.tech Student, Dept. of Computer Engineering, YCOE Talwandi Sabo BP. India. [5] OCR System: A Literature Survey
Shrinath Janvalkar, Paresh Manjrekar, Sarvesh Pawar, Prof. Laxman Naik |
149-151 |
 |
27. |
Design of ANFIS Controller for Quadruple-Tank Interacting System
Design of ANFIS Controller for Quadruple-Tank Interacting System
Abstract: This work deals with the design and simulation of an adaptive neuro fuzzy inference system(ANFIS) for controlling the level of the Quadruple Tank interacting system. The advantage of using ANFIS is that it trains the data and computes the membership functions parameters that best allows the associated fuzzy inference system to track the given input/output data. Since Quadruple-Tank is one of the benchmark MIMO system, in this work conventional PI, MPC (Model Predictive Control) and ANFIS controller were carried out. Initially independent PI controller were applied using BLT (Biggest Log – Modulus Tuning) method and module had developed, trained to a membership function. The conventional PI controllers are replaced with ANFIS controller, interaction between different tank is difficult to control it's level. The performance of the control strategy is studied on the control of Quadruple-Tank problem. The results confirmed the control quality improvement with MPC and PI controller.
Key words: ANFIS,MPC,NeuralModeling,PIcontroller,Quadruple-Tank
Reference
[1] R. Sivakumar, K. Balu, ANFIS based Distillation Column Control, International Journal of Computer Applications Specialissue on Evolutionary Computation, (2), 2010, 67-73. [2] Pedram Hjiani, Javad Poshtan,Reconfigurable Controller Design for Actuator Faults in a Four-tank System Benchmark, International Journal of Instrumentation and Control system(IJICS), (2), 2012, 69-76. [3] R.Sivakumar, C. Sahana, P.A. Savitha, Design of ANFIS based Estimation and Control for MIMO system, International Journal of Engineering Research and Applications (IJERA), 2(3), 2012, 2803-2809. [4] Vanamane V. S, Patel N. V, Modeling and Controller Design for Quadruple Tank System, Proc. of the intl. conf. on Advances in Computer, Electronics and Electrical Engineering,(1), 2010, 498-502. [5] Ademu Victor Okpanachi, Developing Advanced Control strategies for a 4-Tank Laboratory Process, Hans-Petter Halvorsen, Telemark University College, Norway, M.sc, 2010.
R. Sivakumar, H. Muthu, R. Siddhardhan |
152-157 |
 |
28. |
Cloud services with cataloging
Cloud services with cataloging
Abstract: In today's fast paced world, information and communication technologies are dramatically transforming our society. Now a days, cloud computing is fast growing technology in the computer as well as information technology field. It is a recent innovation that is helping the computing industry in distributed computing. Cloud computing is a variety of different types of computing concepts that involve a large number of computers connected through a real-time communication network. The term cloud computing implies access to remote computing services offered by third parties via a TCP/ IP connection to the public internet. Cloud computing allows the organizations to consolidate several hardware resources into one physical device. Cataloguing is most important in cloud computing because of anyone can access limited data as per requirements. Cloud provides so many services such as uploading and downloading data, sharing of data in group, group chat, different software etc. This concept is similar to the billing of the electricity, gas, internet services etc. as per client need. This paper is also, more commonly used to describe the network-based services which appear to provide by real server, which in fact are served up by virtual machine, simulated by software running on one or more real machines with cataloguing services.
Key words: Cataloguing, Cloud computing
Reference
[1] Michael Miller, "CLOUD COMPUTING" Web based application that changes the way you work and collaborate online, 4th edition, PEARSON publication, 2008.
[2] Roger Jennings, "Cloud Computing with the Windows Azure Platform", Wiley Publication, 2011.
[3] "The need for service catalog design in cloud services development" by cisco publication 2011.
[4] David E.Y. SARNA, "Implementing and Developing Cloud Computing Applications", CRC Press, 2010.
[5] W. T. Tsai and Yinong Chen, "Introduction to Service Oriented Computing", 2006
Sagar M. Gurav, Rohit R. Wadkar, Rohit E. Shelar, Nilesh R. Khochare |
158-161 |
 |
29. |
Investigation of Manufacturing Residual Stresses in Cold Formed Truck Frame Rail Sections
Investigation of Manufacturing Residual Stresses in Cold Formed Truck Frame Rail Sections
Abstract: Series of manufacturing processes such as coiling-uncoiling, cold forming and hole cutting processes involved in the making of truck frame rail sections leave certain amount of manufacturing imperfections into the frame rail. As the manufacturing imperfections in the form of residual stresses play a significant role in determining the dynamic structural behavior of truck frame rail members, a careful assessment of residual stresses resulting from coiling-uncoiling and cold forming processes is needed. In the present investigation, non-linear Finite Element (FE) simulation of coiling-uncoiling and cold forming processes were carried out and the resulting residual stresses in frame rail corner, flat web and flange sections were compared with the experimentally measured residual stress values using X-ray diffraction technique. It is observed that in corner sections, the numerically predicted residual stresses are in close agreement with the experimentally measured residual stresses in forming (transverse) direction. In the direction perpendicular to forming (longitudinal direction), while the trends of numerical and experimental residual stresses are observed to follow the same pattern, some deviation in stress values are observed in the inner half of the corner sections. As the coiling-uncoiling process is the main cause for the residual stress presence in flat web and flange sections, the computed coiling-uncoiling residual stresses in longitudinal directions are compared with experimentally measured residual stresses in frame web sections and the trends are observed to be in good agreement. Whereas the magnitudes of coiling-uncoiling residual stresses in transverse direction are found to be very low and considered to be insignificant for the comparative analysis. These residual stresses along with corresponding equivalent plastic strains and virgin material properties in terms of stress-strain relationships can be considered as initial conditions for the accurate prediction of truck frame rail fatigue behavior.
Key words: coiling-uncoiling, cold forming, plastic strain, residual Stress, Truck frame rail, x-ray diffraction.
Reference
[1] Quach W.M. "Residual stresses in cold-formed steel sections and their effect on column behavior", PhD thesis, The Hong Kong Polytechnic University, 2005.
[2] Moen C.D., Igusa T. and Schafer B.W. "Prediction of residual stresses and strains in cold-formed steel members". Thin-Walled Structures, Vol.46, 2008.
[3] Weng C.C. and White R.N., "Residual stresses in cold-bent thick steel plates", Journal of Structural Engg. ASCE, Vol.116 (1), 1990.
[4] Weng C.C. and White R.N. "Cold-bending of thick high-strength steel plates". Journal of Structural Engg, ASCE, Vol.116 (1), 1990.
[5] Batista E.M. and Rodrigues F.C., "Residual stress measurements on cold formed profiles", Experimental Techniques, Vol.16 (5), 1992.
Dr. Chinnaraj K., Dr. Sathya Prasad M., Prof. Lakshmana Rao C. and Nantha Kumar M. |
162-169 |
 |