S.No. |
Title |
Page |
Downloads |
1. |
Detection and Control of Vampire Attacks in Ad-Hoc Wireless Networks
Detection and Control of Vampire Attacks in Ad-Hoc Wireless Networks
Abstract: Ad-hoc low-power wireless networks are the most promising research direction in sensing and pervasive computing. Prior security work in this area has focused primarily on denial of service at the routing or medium access control levels. Earlier, the resource depletion attacks are considered only as a routing problem, very recently these are classified in to a new group called "vampire attacks". This thesis work explores the identification of resource depletion attacks at the routing protocol layer and in the application layer, which permanently disable networks by quickly draining nodes' battery power. These Vampire attacks are not specific to a particular protocol, but rather rely on the properties of many popular classes of routing protocols. It is clear that all examined protocols are susceptible to Vampire attacks, which are devastating, difficult to detect, and are easy to carry out using as few as one malicious insider sending only protocol compliant messages. In the worst case, a single Vampire can increase network-wide energy usage by a factor of O(N), where N in the number of network nodes. In this work a detection and control strategy is proposed for these vampire attacks, along with a secure packet forwarding mechanism, which will save Ad-hoc wireless nodes from power drainage due to vampire packets.
Key words: Vampire attack, Wireless Ad-Hoc network power drainage, PLGPa etc.
Reference
[1] E Y Vasserman , N Hopper ,Vampire Attacks: Draining life from wireless Ad hoc sensor networks, IEEE Transactions on Mobile Computing,volume 12, issue 2 , published on feb 2013(pages 318-332) [2] Bryan Parno, Mark Luk, Evan Gaustad, and Adrian Perrig, Secure sensor network routing: A clean-slate approach, CoNEXT, 2006. [3] INSENS: Intrusion-tolerant routing for wireless sensor networks, Computer Communications 29 (2006), no. 2. [4] Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly, Denial of service resilience in ad hoc networks, MobiCom, 2004. [5] Gergely Acs, Levente Buttyan, and Istvan Vajda, Provably secure on demand source routing in mobile ad hoc networks, IEEE Transactions on Mobile Computing 05 (2006), no. 11.
Anoopa S, Sudha S K |
01-07 |
 |
2. |
Capacity Managed Adaptive Videostreaming Based On Peer Cache Adaptation Mechanism
Capacity Managed Adaptive Videostreaming Based On Peer Cache Adaptation Mechanism
Abstract: Tolimit the crash against users demand for smooth video, clear audio, andperformance levels specified and guaranteed by contractquality, an innovative approach to face these challenges in streaming media is considered. Here a new idea of boosting the capacity of seed servers to serve more receivers in peer to peer data streaming systems is focused .These servers complement the limited upload capacity offered by peers. The peer requests for a data segment is handled by the server or another peer with a seeding capacity of any finite number with a local cache attached in each peer, which enable the peer to temporarily store the data once requested,so it can be directly fetched by some other node near to the peer without accessing the server there by improving the performance of rendering data. The capacity of the cache in each peer can be designed based on popularity of the segment in cache. Once the peers are cached the peer , data segment request are handled by performing a distributed hash table search strategy, and seed servers boost the capacity of each peer based on utility to cost factor computed each time till it exceeds the seeding capacity. Apart from this selfish peers connected in system can be traced to check for unfaithful peers. This system efficiently allocates the peer resources there by considering the server bandwidth constraints.
Key words: peer to peer streaming systems, resource allocation,scalable video streams
Reference
[1] K. Mokhtarian and M. Hefeeda,A Capacity Management of Seed Servers in Peer-to- Peer Streaming Systems With Scalable Video Streams,IEEE Transactions on Multimedia, vol. 15, no.1, January 2013.
[2] Annapureddy,S.Guha,C.Gkantsidis,D.Gunawardena,andP.Ro driguez,Exploring VoDinP2Pswarmingsystems,inProc.IEEE INFOCOM'07,Anchorage,AK,May2007,pp.2571–2575.
[3] M.HefeedaandC. Hsu,Rate-distortionoptimizedstreamingoffine grainedscalablevideosequences,ACM Trans.MultimediaComput., Commun.,Appl.(TOMCCAP),vol.4,no.1,pp.2:1–2:28,Jan.2008.
[4] X.Hei,C.Liang,J.Liang,Y.Liu,andK.Ross,Ameasurementstudy ofalarge-scaleP2PIPTVsystem,IEEETrans.Multimedia, vol.9, no.8,pp.1672–1687,Dec.2007.
[5] O.Hillestad,A.Perkis,V.Genc,S.Murphy,andJ.Murphy,Adaptive H.264/MPEG-4SVCvideooverIEEE802.16broadbandwirelessnet- works,in Proc.PacketVideoWorkshop(PV'07),Lausanne,Switzer- land,Nov. 2007, pp.26–35.
Seema Safar, Sudha S K |
08-14 |
 |
3. |
Detection of Stuck at Fault Indigital Circuits at Register Transfer Logic (RTL)
Detection of Stuck at Fault Indigital Circuits at Register Transfer Logic (RTL)
Abstract: Due to the increasing complexity of modern circuit design, verification has become the major bottleneck of the entire design process. Most efforts are to verify the correctness of the initial Register-Transfer Level (RTL) descriptions written in Hardware Description Language (HDL).Major drawback of high level design methodologies such as RTL can be seen in the following facts. First, they lack of sufficiently precise fault models - compared to sophisticated models available for low level description levels such as logic gate level. Second, since the structure of a design changes significantly with every logic synthesis run, testability analysis is typically performed only after final logic synthesis.So in this paper, we detect the stuck-at fault using the concept of textio.
Key words: stuck-atfaults; fault coverage ;testpoints; validation sets
Reference
[1] R. C. Ho and M. A. Horowitz, "Validation coverageanalysis for complex digital designs," in Proc. Int. Conf. Comput.-Aided Des., Nov. 1996.
[2] I. Ghosh, A. Raghunathan, and N. K. Jha, "A design for testability technique of RTL circuits using control/data flow extraction," in Proc. Int. Conf. Comput.-Aided Des., Nov. 1996.
[3] D. J. Moundanos, J. A. Abraham, and Y. V. Hoskote, "Abstraction techniques for validation coverageanalysis and test
generation," IEEE Trans. Comput. Jan. 1998.
[4] IndradeepGhosh and Srivaths Ravi, "On AutomaticGeneration of RTL Validation Test BenchesUsing Circuit Testing Techniques" Fujitsu Laboratories of America, Sunnyvale, CA 94086,NECLaboratoriesAmerica, Princeton, NJ 08540, 2001.
[5] IndradeepGhosh and MasahiroFujita, "Automatic Test Pattern Generation for FunctionalRegister-Transfer Level Circuits UsingAssignmentDecisionDiagrams" ieee transactions on computer-aided design of integrated circuits and systems, vol. 20, no. 3, march 2001.
Ms. Nainaa. Udgedr, S. A. Ladhake, Prof. P. D. Gawande |
15-18 |
 |
4. |
Survey on Contrast Enhancement Techniques for Medical X-Ray Images to Highlight The Abnormalities
Survey on Contrast Enhancement Techniques for Medical X-Ray Images to Highlight The Abnormalities
Abstract: When medical X-rays are sent to certified radiologists for interpretation, accuracy of the results is strongly affected by poor contrast and high percentage of noise. It is thus necessary to develop suitable contrast enhancement techniques which not only highlights the Region of Interest but also removes the inherent noise from radiographs. Considerable research is cited in the literature to improve the visibility of abnormality in low contrast x-ray images. In this paper, a detailed literature survey on the various techniques used in spatial, frequency and spectral domains for contrast enhancement is presented.
Key words: Medical radiographs, Histogram, Butterworth, Gaussian, Haar
Reference
[1] Faisel G.Mohammed, Huda M.Rada, Sega G. Mohammed, 2013, Contrast and Brightness Enhancement for Low Medical X-Ray Images, International Journal of Scientific & Engineering Research, Volume 4, Issue 5, May-2013. ISSN 2229-5518.
[2] G.N.Sarage, Dr.SagarJambhorkar, 2012, Enhancement of Chest X-Ray images Using Filtering Techniques, Volume 2, Issue 5, May 2012 ISSN: 2277 128X.
[3] R.B.Tiwari, A.R.Yardi, 2012, Dental x-ray image enhancement based on human visual system and local image statistics.
[4] Ritika, (2012), A Novel Approach for Local Contrast Enhancement of Medical Images using Mathematical Morphology, IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS), ISSN: 2249-9555 Vol. 2, No.2, April 2012.
[5] Ying Shen and Weihua Zhu,(2013), Medical Image Processing using A Machine Vision-based Approach, International Journal of Signal Processing, Image Processing and Pattern Recognition Vol. 6, No. 3, June, 2013.
Godwin D., Edward Stephen Prasanth, Krishna Kumar S., Kishan Kumar K, Chitra P., Nandhitha N.M |
19-24 |
 |
5. |
Remote Configuration Monitoring of Autonomous Information Processing Machine on LAN.
Remote Configuration Monitoring of Autonomous Information Processing Machine on LAN.
Abstract: Remote Information Configuration is advanced software for capturing automatically the configuration of Computers available in the LAN. The software will collect all the configuration of computers in the network and store the information in the Data Base. The configuration such as the Processor, Memory such as RAM and Hard Disk, System Software and Application software installed will be captured from remote and stored in the Data Base with the timestamp. Any change in the configuration will be captured on time to time basis and updated; this will bring in a change management control of the components. Provision for manual recording of owner of the computer asset and location details will be provided for Asset Management. This module will also include the process of allotment of asset, removal of asset, re-allotment of asset, new asset request management, asset procurement planning.
Key words: LAN, IP address, MAC address, psInfo, psexec Sigar, JAR file
Reference
[1] Harsh Mittal, Manoj Jain and Latha Banda, Monitoring Local area Network using remote method invocation , International Journal of Computer Science and Mobile Computng, vol. 2, Issue. 5, May 2013 [2] T Rajat Y Joshi and Ashish Gupta, programmatically connecting to remote systems, Java Technology Community, no. 2, November 2012
[3] Samir Kumar Sarangi and Dr. Vivek Jaglan, Performance Comparison of Machine Learning Algorithms on Integration of Clustering and Classification Techniques. Proceedings International Journal of Emerging Technologies in Computational and Applied Sciences, 2013 [4] Dinesh C. Verma, Simplifying Network Administration Using Policy-Based Management, IEEE Network, March/April 2002. [5] J. Han and M. Kamber, ―Data Mining: Concepts and Techniques,‖ Morgan Kaufmann, 2000.
Hema Thomas |
25-28 |
 |
6. |
High Security Masked AES Based On Retina Image as a Key
High Security Masked AES Based On Retina Image as a Key
Abstract: In order to protect "data-at-rest" in storage area networks from the risk of differential power analysis attacks without degrading performance, a high-throughput masked advanced encryption standard (AES) engine is proposed. However this engine adopts an unrolling technique which requires extremely large field programmable gate array (FPGA) resources. In this brief, we aim to optimize the area for masked AES with an unrolled architecture. We achieve this by mapping its operations from GF (28) to GF (24) as much as possible. We reduce the number of mapping for GF (28) to GF (24) and inverse mapping for GF (24) to GF (28) operations of the masked SubBytes step from ten to one. In order to be compatible, the masked Mixcolumns, masked AddRoundKey, and masked ShiftRows including the redundant masking values carried over GF (24). BRAM in FPGA block can be used to reduce hardware resources and with this we can achieve 40.9-Gbits/s.
Key words: Advanced Encryption Standard (AES), Masking, field programmable gate array (FPGA), Throughput
Reference
[1] Advanced Encryption Standard (AES), FIPS-197, Nat. Inst. of Standards and Technol., 2001. [2] P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," in Proc. CRYPTO, 1999, vol. LNCS 1666, pp. 388 397. [3] L. Goubin and J. Patarin, "DES and differential power analysis (the "duplication‟ method)," in Proc. CHES LNCS, 1999, vol. 1717, pp. 158–172. [4] S. Messerges, "Securing the AES finalists against power analysis attacks," in Proc. FSE LNCS, 2000, vol. 1978, pp. 150–164
[5] A. Jaya Lakshmi, I. Ramesh Babu, "Design of security key Generation algorithm using Fingerprint based Biometric Modality", ISSN: 2250-3021, Vol 2, Feb 2012.
N. Balachandrarao, S. Parvathi Nair |
29-33 |
 |
7. |
Auto Adjusting Astronomical Telescope
Auto Adjusting Astronomical Telescope
Abstract: Astronomical telescope is powerful and basic tool for star or celestial observation. Here we proposed integrated system using Raspberry Pi for auto adjusting astronomical telescope. This integrated circuit helps to control stellar monitoring, stellar targeting, and tracking functions of telescope. Astro compass gives the direction of the celestial objects.
Key words: Astro Compass, Online stellar Database, Python Language, Raspberry Pi.
Reference
[1] Kenzi Watanabe, Hisaharu Tanaka, Makoto Otani, Misami Okyudo "The Simple and Compact Remote Telescope System" 2010 International Conference on Complex, Intelligent and Software Intensive Systems, 2010, 1129-1134. [2] JOEL GREENE, "The Celestial Tracker as an Astro Compass", IEEE TRANSACTIONS ON AEROSPACE AND NAVIGATIONAL ELECTRONICS, 1963, 221-235. [3] Jitong Chen, Lingquan Meng, Xiaonan Wang, Chenhui Wang "An Integrated System for Astronomical Telescope Based on Stellarium"2011 3rd International Conference on Advanced Computer Control (ICACC 2011), 2011, 431-434. [4] J. Lee, J. E. Kim, G. W. Na, J. A. Jeon, S. Jeong, A. Jung, H. Y. Lee, J. W. Nam, J. E. Suh, Garik Garipov, Pavel Klimov, Boris A. Khrenov, Mikhile I. Panasyuk, Nikolay N. Vedenkin, and I. H. Park "A New Type of Space Telescope for Observation of Extreme Lightning Phenomena in the Upper Atmosphere" IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, VOL. 50, NO. 10, OCTOBER 2012, 2012, 3941-3949. [5] Shiwei Tian, Guangxia Li, Jiang Chang, Zhiqiang Li, "COMPASS Augmentation using LEO Telecommunication Satellites" 2010 International Conference on Communications and Intelligence Information Security, 2010, 192-195.
Rohit R. Ghalsasi, Prof. N. D. Dhoot |
34-37 |
 |
8. |
Comparative Study of Apriori Algorithm Performance on Different Datasets
Comparative Study of Apriori Algorithm Performance on Different Datasets
Abstract: Data Mining is known as a rich tool for gathering information and apriori algorithm is most widely used approach for association rule mining. To harness this power of mining, the study of performance of apriori algorithm on various data sets has been performed. Using Java as platform implementation of Apriori Algorithm has been done and analysis is done based on some of the factors like relationship between number of iterations and number of instances between different kinds of data sets. Conclusion is supported with graphs at the end of the paper.
Key words: Association Rule Mining, Confidence, Data Mining, Data Warehousing, Knowledge Discovery Process
Reference
[1] A Comparative study of Association rule Mining Algorithm – Review Cornelia Győrödi*, Robert Győrödi*, prof. dr. ing. Stefan Holban [2] Image Processing and Image Mining using Decision Trees - KUN-CHE LU AND DON-LIN YANG [3] IMAGE MINING TECHNIQUES: A LITERATURE SURVEY - Mahendra S.Makesar [4] An Experiential Survey on Image Mining Tools, Techniques and Applications – C. Laxmi Devasena [5] http://ijana.in/papers/6.11.pdf
Prof. Prashasti Kanikar, Twinkle Puri, Binita Shah, Ishaan Bajaj, Binita Parekh |
38-43 |
 |
9. |
Physics and Simulation of Diffusive Transport in Nanoscale Transistors MESFET Device Ga0.49 In0.51P Using Monte Carlo Method of Electronic Transport
Physics and Simulation of Diffusive Transport in Nanoscale Transistors MESFET Device Ga0.49 In0.51P Using Monte Carlo Method of Electronic Transport
Abstract: The field of microelectronics has made surprising advances in the last decade, mainly pushed by the enormous progress in semiconductor technology. Such a reduction of dimensions allows the fabrication of chips with more than one million components. In addition, it opens the way to new physical phenomena, which were not present in traditional structures. In this context, the Monte Carlo simulation has particular significance. This approach allowed conceiving applicable model for GaInP MESFET operating in the turn-one or pinch-off region, and valid for the short-channel and the long-channel GaInP MESFET, in which the two-dimensional potential distribution contributed by the depletion layer under the gate is obtained by conventional 1D approximation
Key words: Monte Carlo simulation, transient electron transport, MESFET device,
Reference
[1] Zhibin Ren, Nanoscale Mosfets Physics Simulation and Design, Purdue University, p211, 2001.
[2] Himadri Sekhar Pal, Device Physics Studies Of III-V and Silicon Mosfet For Digital Logic, Purdue University West Lafayette, Indiana Graduate School Form 20 (Revised 6/09), 127, December 2010.
[3] Farzin Assad, Computational and Experimental Study of Transport In Advanced Silicon Devices, Purdue University, 174, December 1999.
[4] Jung-Hoon Rhew, physics and simulation of Quasi-Ballistic Transport in Nanoscale Transistors, Purdue University, p144, 2003.
[5] Gerhard Klimeck, Electron-Phonon and Electron-Electron Interactions in QuantumTransport, January, 1994 School of Electrical Engineering Purdue University West Lafayette, Indiana 47907-1285.
Nourdine Massoum, Ahlem Guen Bouazza, Benyounes Bouazza, Chokria Sayah |
44-47 |
 |
10. |
Voice and GPS Based Navigation System For Visually Impaired
Voice and GPS Based Navigation System For Visually Impaired
Abstract: The paper represents the architecture and implementation of a system that will help to navigate the visually impaired people. The system designed uses GPS and voice recognition along with obstacle avoidance for the purpose of guiding visually impaired. The visually impaired person issues the command and receives the direction response using audio signals. The latitude and longitude values are received continuously from the GPS receiver. The directions are given to the user with the help of audio signals. An obstacle detector is used to help the user to avoid obstacles by sending an audio message.GPS receivers use NMEA standard. With the advancement in voice recognition it becomes easier to issue commands regarding directions to the visually impaired.
Key words: GPS, navigation system, visually impaired, voice recognition, ARM7 processor, NMEA protocol
Reference
[1] Somnath Koley, Ravi Mishra," VOICE OPERATED OUTDOOR NAVIGATION SYSTEM FOR VISUALLY IMPAIRED PERSONS", International Journal of Engineering Trends and Technology- Volume3Issue2- 2012 [2] 1999, K.Magatani, K.Yanashima et al. "The Navigation System for the Visually Impaired",Proceedings of the First Joint BMES/EMBS Conference, 652 [3] 2000, H.Yamasaki, K.Magatani et al. "Development of the Navigation System for the Visually Impaired", Proc. Of the World Congress on Medical Physics and Biomedical Engineering, WE-A305-01 [4] 2008, Sakmongkon Chumkamon, Peranitti
Tuvaphanthaphiphat, Phongsak
Keeratiwintakorn, A Blind Navigation
System Using RFID for Indoor
Environments, Proceedings of ECTICON:765-768 [5] http://articles.timesofindia.indiatimes.com
/2007-10-11/india/27977420_1_avoidableblindness
ophthalmologists-eye-diseases
Harsha Gawari, Prof. Meeta Bakuli |
48-51 |
 |
11. |
Face Recognition Based Door Lock System Using Opencv and C# with Remote Access and Security Features
Face Recognition Based Door Lock System Using Opencv and C# with Remote Access and Security Features
Abstract: This paper investigates the accuracy and effectiveness of the face detection and recognition algorithms using OpenCV and C# computer language. The adaboost algorithm [2] is used for face detection and PCA algorithm[1] is used for face recognition. This paper also investigates the robustness of the face recognition system when an unknown person is being detected, wherein the system will send an email to the owner of the system using SMTP [7]. The door lock can also be accessed remotely from any part of the world by using a Dropbox [8] account.
Key words: Recognition, Detection, OpenCV, C#, Adaboost [2], PCA [1], SMTP [7] , Dropbox [8] .
Reference
[1] M. Turk and A. Pentland, "Eigenfaces for Recognition", Journal of Cognitive Neuro science, March 1991. [2] P. Viola and Michael J. Jones. "Robust real-time face detection", International Journal of Computer Vision, 57(2):137-154, 2004. [3] "The System of Face Detection Based on OpenCV" Xianghua Fan, Fuyou Zhang, Haixia Wang, Xiao Lu Key Laboratory for Robot & Intelligent Technology of Shandong Province, Shandong University of Science and Technology, Qingdao 266590 [4] "Facial feature detection using haar classifiers*"Phillip Ian Wilson Dr. John Fernandez Texas A&M University – Corpus Christi 6300 Ocean Dr. CI334, Corpus Christi, TX 78412 361-825-3622. [5] " Miner Face Detection is Based on Improved AdaBoost Algorithm "Chao JIANG ,Gu-yong HAN ,Lei TIAN ,Song LU, Wei-xing HUANG Air Force Service College XuZhou JiangSu China.
Prathamesh Timse, Pranav Aggarwal, Prakhar Sinha, Neel Vora |
52-57 |
 |
12. |
Comparative Study between PI and FUZZY Logic Speed Controller in Vector Controlled PMSM Drive
Comparative Study between PI and FUZZY Logic Speed Controller in Vector Controlled PMSM Drive
Abstract: This paper is concerned with vector control of permanent magnet synchronous motor (PMSM) using two different type of speed controller, one is PI controller and another is FUZZY logic controller. Although Proportional Integral Controller usually preferred as a speed controller due to its fixed gain and integral time constant but the performance of PI controller is affected by parameter variation, such as load changing, speed variation etc. In PI controller THD of the stator phase current is more and torque ripple also more. To avoid this problem here we used FUZZY logic controller. In this paper the mathematical model of PMSM, using the powerful simulation modeling capabilities of Matlab/Simulink is implemented. The entire PMSM control system is divided into several independent functional modules such as PMSM body module, inverter module and coordinate transformation module and Sinusoidal pulse width modulation (SPWM) production module and so on. Here we used two loops, one is outer loop known as speed control loop, another is inner loop called current loop. we can analyzed a variety of simulation waveforms and it provide an effective means for the analysis and design of the PMSM control system.
Key words: FUZZY logic speed controller, Mathematical model of Permanent magnet synchronous motor, Park Transformation, Sinusoidal pulse width modulation, Vector control.
Reference
[1] Chen Junfeng, Permanent Magnet Motor[M], (Beijing, china Machine Press, 2002).
[2] Zhonghui Zhang and Jiao Shu, Matlab based Permanent Magnet Synchronous Motor Vector Control Simulation, IEEE, 978-1-4244-5540-9/10.
[3] Kaushik Jash, Prof. Pradip Kumar Saha and Prof. Goutam Kumar Panda, Vector Control of Permanent Magnet Synchronous Motor Based On Sinusoidal Pulse Width Modulated Inverter with Proportional Integral Controller, international Journal of Engineering Research and Applications, ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.913-917.
[4] J. N. Lygouras, P. N. Botsaris, J. Vourvoulakis, V. Kodogiannis, Fuzzy Logic Controller Implementation for a Solar Air Conditioning System, Applied Energy 84, vol. 20, pp. 1305-1318, 2007.
[5] A. G. Aissaoui, M. Abid, H. Abid, A. Tahour, A. K. Zeblah, A Fuzzy Logic Controller for Synchronous Machine, Journal of Electrical Engineering, vol. 58, pp. 285-290, 2007.
Kaushik Jash, Nirban Chakraborty, Prof. Pradip Kumar Saha, Prof. Goutam Kumar Panda |
58-62 |
 |
13. |
Android Application Agriculture Decision Support System
Android Application Agriculture Decision Support System
Abstract: Android mobile use in Agriculture is as the core components to more helpful to increase productivity of crops and indirectly to increase GDP of India reduce poverty. The main challenges for crop selection traditional methods. This is android application which will be useful for farmers & agricultural institutes for cultivation of various kind of crops in various type of atmosphere. This smart phone app is easy to use and in affordable cost which will suggest most probable matching crops to people according to weather condition. By this farmers can cultivate more suited crop and increase production ratio .Here application needed basic inputs like water availability in mm , average temperature , average soil Ph of farm , locality of farm , soil type etc so by certain calculation at backend this application will show most probable crops for that farm . It is one farmer's friend kind of application.
Reference
[1] Analysis of Trends in India's Agricultural Growth by Elumalai Kannan ,Sujata Sundaram ISBN 978-81-7791-132-9 [2] Policy Research Working Paper 4307 Crop Selection Adapting to Climage Change in Africa by Pradeep Kurukulasuriya Robert Mendelsohn [3] An Open Access Journal published by ICRISAT Changes in Climate will modify the Geography of Crop Suitability: Agricultural Biodiversity can help with Adaptation A Lane1 and A Jarvis2,3 1 Bioversity International, Via dei Tre Denari 472/a, 00057 Maccarese, Rome, Italy 2 Bioversity International, Regional Office for the Americas, c/o CIAT, AA6713, Cali, Colombia
Ms Rachana P.Koli, Mr.Suhas D.Raut |
63-66 |
 |
14. |
Automated Water Supply System and Water Theft Identification Using PLC and SCADA
Automated Water Supply System and Water Theft Identification Using PLC and SCADA
Abstract: In today's world rapid growing urban residential areas, to avoid scarcity of water problems and requirements of consumers, therefore it is supposed to supply adequate water distribution networks are managed automatically. Along with this another problem in the water supply system is that public is using suction pumps to suck the water directly from the home street pipeline. The best way to improve the automation and monitoring architectures which contain a supervision and control system for the real time installation, programmable logic controllers with basic functions communication systems, standard interfaces or dedicated ones with proximity sensors, electrical drive elements, measuring devices, etc. In this project it is proposed to develop the PLC & SCADA based water monitoring and theft prevention. Control System is further coupled to SCADA unit .This paper focuses particularly to a control system for controlling and monitoring within a Water Distribution System. Process automation system based upon utilization of an industrial PLC and PC systems including all the network components represents the best way to improve the water distribution technological process.
Key words: Analysis, Data Acquisition, Monitoring, PLC, SCADA
Reference
[1] Mrs. Gaikwad Sonali Ashok, "Water antitheft and quality monitoring system by using PLC and SCADA",International journal of electrical and electronic engineering research, ISSN 2250-155X vol3 issue 2 ,June 2013,pp-355-364. [2] Gouthaman.J, Bharathwajanprabhu.R & Srikanth.A "Automated urban drinking water supply control and water theft identification system" Proceeding of the 2011 IEEE Students' Technology Symposium14-16 January, 2011, IIT Kharagpur. [3] Stancil, Stoian, and kovacs "Urban water supply distributed system", Vol.3, pp.316-321, May 2004 [4] Mr.PrashantPalkar, Prof (Dr.)Shrinivas patil, Prof.Mrs.Pooja Belagali, Mr. Ashish Chougule "IOSR Journal of electronic and communication Engineering".ISSN:2278-2834,PP:36-38.
[5] www.google.com
Prof. Anubha Panchal, Ketakee Dagade, Shubhangi Tamhane, Kiran Pawar, Pradnya Ghadge |
67-69 |
 |
15. |
Shape Optimization Of Front Axle Support Of Tractor
Shape Optimization Of Front Axle Support Of Tractor
Abstract: The front axle support of tractor is the part of tractor which holds the engine of tractor and also gives support to it and lies between engine and front axle of tractor. According to the present market demand of off highway vehicle the low cost and light weight vehicle is in demand to fulfill the requirement of cost efficient vehicle. In this paper analysis of front axle support is done for study of stress generated in the component and then after optimization of its shape and according to the shape its weight will also reduced. Considering the effect of forces acted on such a heavy parts in tractor designed by casting having dynamic loads of less frequency with greater amplitude may cause great damage to the component. According to the production techniques of components in tractor front axle requires a properly designed support with high stiffness. The design of component was modeled in Creo parametric 2.0 and the analysis was performed in solid works. Shape optimization technique is used for performing optimization cause miserable reduction in weight of connecting rod. The optimized component is 10.35% lighter compare to initial design.
Key words: Axle, Front axle support (FAS), Computer Aided Design (CAD), Finite Element Analysis (FEA)
Reference
[1] Ritesh Kumar Dewangan, Manas Patnaik, Narendra Yadav/ International Journal of Engineering Research and Application (IJERA) ISSN: 2248-9622 vol.2, Issue 4 July-August 2012, pp.457-460
[2] Rasekh, M., Asadi, M.R., Jafari, A. and Kheiralipour, K. 2009. Obtaining maximum stresses in different parts of tractor (MF-285) connecting rods using finite elementmethod, Journal of Basic and Applied Sciences. 3(2): 1438-1449. [3] Vinod Kumar Verma, Dinesh Redkar, Arun Mahaja, HTC 2012. Weight optimization of front axle support by optistruct technology application. [4] Rahman, M.M., Ariffin, A.K., Abdullah, S., Noor, M.M., Bakar, R.A. and Maleque, M.A. 2008b. Finite element based fatigue life prediction of cylinder head for two-stroke linear engine using stress-life approach. Journal of Applied Sciences, 8(19):3316-3327. [5] Rahman, M.M., Ariffin, A.K., Jamaludin, N. and Abdullah, S. 2007. Effect of nitrating treatment on fatigue life for free piston linear engine component using frequency response method: a finite element approach. Structural Durability and Health Monitoring, 3(4): 197-209.
Shree Dewangan, Ravi Kumar Pandey, Narendra Yadav |
70-73 |
 |
16. |
Reconstruction of the Sparse Signal by Using Approximate Message Passing Algorithm
Reconstruction of the Sparse Signal by Using Approximate Message Passing Algorithm
Abstract: Reconstruction of the Sparse signal such as for audio signal,video signal, image signal is the major important role.We are going to recover the signal for the audio signal. The signal is recovered by using two algorithm such as AMP-M and AMP-T. These two algorithm coding are written in matlab and simulation from simulink will be used to get the specific outputs. AMP-M used as multiply accumulate unit for the recovery of unstructured matrices. AMP-T used as the fast linear transform. Hence recovery of the Sparse signal with the two algorithm is the main aim of the project .According to the research we have two technique to reconstruct the audio signal like compressive sensing, building of the FPGA hardware but in our project new technique is introduced to recover the audio signal by using two algorithms such as AMP-M and AMP-T .
Key words: AMP-M ,AMP-T, MATLAB, SIMULINK
Reference
[1] M. Elad, Sparse and Redundant Representations – From Theory to Applications in Signal and Image Processing. New York, NY, USA: Springer, 2010. [2] Adler, V. Emiya, M. G. Jafari, M. Elad, R. Gribonval, and M. D. Plumbley, "A constrained matching pursuit approach to audio declipping," in Proc. IEEE ICASSP, Prague, May 2011 [3] "Recovery Of sparsely corrupted signal May 2012" IEEE Theory. Vol.58, no.5 [4] Bracher, G. Pope, and C. Studer, "Coherence-based probabilistic recovery guarantees for sparsely corrupted signals," in Proc. of IEEE Inf. Th. Workshop, Lausanne, Switzerland, Sep. 2012. [5] G. Kutyniok, "Data separation by sparse representations," in Compressed Sensing: Theory and Applications, Y. C. Eldar and G. Kutyniok, Eds., New York, NY, USA: Cambridge University Press, 2012.
Sana Kalyani, Prof .Vaishali Raut |
74-76 |
 |
18. |
Ramp Secret Sharing Approach to Authentication and Data Repairing For Document Image
Ramp Secret Sharing Approach to Authentication and Data Repairing For Document Image
Abstract: Digital images are widely used to protect confidential and important information. But the problem is to provide the authentication and integrity to these digital images is a very challenging task. Therefore a new efficient authentication method is proposed for document images with verification and data self-repair capability using the Portable Network Graphics (PNG) image. Here, an authentication signal is generated for each block of a document image which, combine with the binarized block data, is transformed into several shares using the Ramp secret sharing scheme. These several binarized block data shares are then embedded into an alpha channel plane. During the embedding process, the generated share values are mapped into a range of 238-255 to yield a transparent stego-image with a disguise effect. Alpha channel is combining with the original image and converted into PNG image format. While the process of image authentication, the image block is marked as tampered, if the authentication signal generated from the current block content does not match with share that extracted from the alpha channel plane. Then using reverse Ramp scheme, two shares from unmarked blocks are collected and then data repairing is applied. Some security measures are also proposed for protecting the security of the shares hidden in the alpha channel.
Key words: Image authentication, Portable Network Graphics, Ramp secret sharing.
Reference
[1] W.H. Tsai, "Moment-Preserving thresholding: a new approach." Computer Vision, Graphics, and Image Processing, vol. 29, no.3, pp.377-393, 1985.
[2] Wen-Ai Jackson and Keith M.Martin, "A Combinatorial Interpretation of Ramp Schemes.'', Australasian Journal of Combinatorics, vol. 14, pp. 51-60,1996
[3] Chang-Chou Lin, Wen- Hsiang Tsai, "Secret Image Sharing With Steganography And Authentication" Department Of Computer And Information Science, National ChiaoTung University, Hsinchu 300, Taiwan,; Accepted 20 July 2003.
[4] M. Wu and B. Liu, "Data hiding in binary images for authentication and annotation," IEEE Trans. Multimedia, vol. 6, no. 4, pp. 528–538, Aug. 2004.
[5] H. Yang and A. C. Kot, "Binary image authentication with tampering localization by embedding cryptographic signature and block identifier, IEEE Signal Process. Lett., vol. 13, no. 12, pp. 741–744, Dec.2006.
Mary Linda P A, Larry Liston, Remya B Nair, Aswathy Mohan, Lisha P P |
81-86 |
 |
19. |
Signal Processing and Data Acquisition for Wind Profiler Using Labview
Signal Processing and Data Acquisition for Wind Profiler Using Labview
Abstract: This paper presents the design of Wind Profiler using LabVIEW. Wind speed is a useful weather parameter to monitor and record for many applications like shipping, aviation, meteorology, construction etc. Wind observations are crucial importance for general (operational) aviation meteorology, and numerical weather prediction. Wind profiler radars are vertically directed pulsed Doppler radars capable of analyzing the back-scattered signals to determine the velocity of air along the beams. Steering the beams typically 15° from zenith, the horizontal and vertical components of the air moment can be obtained. The extraction of zeroth, first and second moments is the key reason for doing all the signal processing. For measurements above 20 km, the 50 MHz frequency band can be used. The paper discusses the issues such as the principle of wind profiler radar, how wind profilers estimate the horizontal wind as a function of altitude in "clear air‟, Doppler Beam Swinging (DBS) technique for Wind velocity measurement. Moment calculation and Signal processing of recoded experimental data is performed by LabVIEW code developed in my project.
Key words: Radar, Doppler effect, Bragg‟s scattering, FFT etc
Reference
[1] May, P.T. (1990). Spaced antenna versus Doppler Radars: A Comparison of Techniques Revisited, Radio Science, Vol.25, No.6, pp.111–1119, doi: 10.1029/RS025i006p01111. [2] Srinivasa Rao ,V. K. Anandan , P. Narasimha Reddy, "Evaluation of DBS Wind Measurement Technique in Different Beam Configurations for a VHF Wind Profiler", Journal of atmosphere and oceanic technology, Vol. 25, June 2008, pp. 2304-2312 [3] Adachi, A., T. Kobayashi, K. S. Gage, D. A. Carter, L. M. Hartten, W. L. Clark, and M. Fukuda, 2005: Evaluation of three beam and four-beam profiler wind measurement techniques using five-beam wind profiler and collocated meteorological tower. Journal of atmosphere and oceanic technology, 22, 1167–1180. [4] Woodman, R.F., Kugel R.P, and Rotteger, A coherent integrator-decoder preprocessor for the SOUSY-VHF radar, Radio Science, 15, 233-242, 1980. [5] Hildebrand, P.H., and R.S Sekhon, Objective determination of the noise level in Doppler spectra, J.Appl.Meterol, 13, 808-811, 1974.
Priyank V. Gandhi, Ajay Khandare, Dr. M.S Panse |
87-91 |
 |
20. |
DESIGN OF 2.4 GHz CMOS POWER AMPLIFIER FOR WIRELESS COMMUNICATION
DESIGN OF 2.4 GHz CMOS POWER AMPLIFIER FOR WIRELESS COMMUNICATION
Abstract: This paper gives the information about designing the 2.4GHz CMOS power amplifier for wireless communication using 130nm technology. Previously work present different approaches for designing the CMOS power amplifier for different class with different technology. This paper proposed class-B power amplifier using 130 nm technology for gain more than 15dB.The class-B power amplifier is design and to meet the frequency response for 2.4 GHz with gain of 67.321dB, the proposed power supply work with the voltage from 1.3 to 3V, which means that we can used these design for battery aided hand held electronic moving or electronic mobile communication equipment .The proposed power amplifier is designed using ADS tool.
Key words: Gain, CMOS devices, radio frequency, design under test, error vector magnitude.
Reference
[1] Ahmad Rahati Belabad school of Electrical and Computer Engineering university of Tehran,Iran "A fully Integrated linear CMOS power amplifier with high output power and dynamic range of WiMAX application" 8th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS) 2013 IEEE. [2] Kuruveettil Haridas, T. Hui Teo, and Xiaojun Yuva Institute of Microelectronics, A *STAR (Agency for Science, Technology and Research)," A 2.4-GHz CMOS Power Amplifier Design for Low Power Wireless Sensors Network" 2009 IEEE [3] Libao Sun , Shiyou Yang, "RF Power Amplifier Design for Wireless Power Transfer Using Method of Moment " 978-1-4673-1335-3/12/$31.00 ©2012 IEEE [4] Ruili Wu, Jerry Lopez, Yan Li and Donald Y. C. Lie. A SiGe Bipolar-MOSFET Cascode Power Amplifier with ImprovedLinearity for Low-Power Broadband Wireless Applications, 2013 IEEE. [5] Sajay Jose, Hyung-Jin Lee and Dong Ha, A Low-power CMOS Power Amplifier for Ultra wideband (UWB) Applications, 2005 IEEE.
Atul V. Jiwtode, Sanjay B. Tembhurne, Dr. Sanjay L. Haridas |
92-96 |
 |
21. |
Study of Nano Particles for Enhanced Heat Transfer Characteristics of Base Fluids for Cool Thermal Energy System
Study of Nano Particles for Enhanced Heat Transfer Characteristics of Base Fluids for Cool Thermal Energy System
Abstract: Reliable heat transfer is very crucial for heat demand and supply related applications where the optimum demand is not met. Cool thermal energy systems are the units which find application in conditioning and preserving items. A colloidal mixture of nano particles in a base fluid tremendously enhances the heat transfer characteristics of the original base fluid and is ideally suited for practical application due to its marvelous characteristics.
Key words: Aluminium Oxide, Copper Oxide, Distilled Water, LMTD, PVD
Reference
[1] C.H. Li, G.P. Peterson, Experimental investigation of temperature and volume fraction variations on the effective thermal conductivity of nanoparticle suspensions (nanofluids), Journal of Applied Physics, 99, (2006), 084314. [2] Y. Xuan, Q. Li, Investigation convective heat transfer and flow features of nanofluids, Journal of Heat Transfer, 125, (2002), 151–155. [3] S. Lee, S.U.S. Choi, S. Li, J.A. Eastman, Measuring thermal conductivity of fluids containing oxide nanoparticles, Trans. ASME, Journal of Heat Transfer, 121, (1999), 280– 289. [4] Y. Xuan, Q. Li, Heat transfer enhancement of nanofluids, International Journal of Heat Fluid Flow, 21, (2000), 58–64.
[5] Y. Xuan, W. Roetzel, Conceptions for heat transfer correlation of nanofluids, International Journal of Heat Mass Transfer, 43, (2000), 3701–3707.
Promit Choudhury, Priya Garg, Srishti Jha |
97-101 |
 |
22. |
Design AND Fabrication OF Homemade Air Conditioner
Design AND Fabrication OF Homemade Air Conditioner
Abstract: Human always tries for better comfort and sophistication at each level of his life. Considering air conditioning, evaporative cooler are used in less humidity and dry climate. The limitation of evaporative cooler is that it is not suitable in humid environment and also their performance is poor in the places where ventilation is not proper. The objective of this project is to increase the effectiveness of the ordinary table fan by using simple mechanism and overcome the limitation of evaporative cooler. In this project the table fan is wound with copper tube by copper wire. Vinyl tube is connected with one end of the copper tube and another end of vinyl tube is connected with pump. Pump immersed in the cooling chamber. Vinyl tube is connected with another end of copper tube another end of vinyl tube is immersed in the cooling chamber. Fan and pump connected with electricity pump and is sucks the cool water from the cooling chamber.
Index Terms: evaporative cooler, copper coil, pump, cooling chamber, refrigerant.
Reference
[1] J.O.Olorunmaiye (2008). Evaporative Cooling of Water of in earthen pots in Quiscent Air, NSE TECHNICAL TRANSACTIONS VOL.31.NO.3.
[2] Professor Wasim Sama n;Dr. Frank Bruno;Ms. Ming Liu(2009):Technical background Research on evaporative air Conditioners and feasibility of Rating their water consumption berry.
[3] GEOFFREY MILBURN(Sept 2005);Analysis of a Homemade Air Conditioning Unit .
Naikodi Mallappa, Mane Amit, Manave Ashish, Pangale Suhas, Shinde Vilas, Prof. Dongare Vaibhav |
102-103 |
 |
23. |
Analysis of Leakages and Leakage Reduction Methods in UDSM CMOS VLSI Circuits.
Analysis of Leakages and Leakage Reduction Methods in UDSM CMOS VLSI Circuits.
Abstract: This is the era of portable devices which need to be powered by battery. Due to scarcity of space and leakages in chips, battery life is a serious concern. As technology advances, scaling of transistor feature size and supply voltage has improved the performance, increased the transistor density and reduced the power required by the chip. The maximum power consumed by the chip is the function of its technology along with its implementation. As technology is scaling down and CMOS circuits are supplied with lower supply voltages, the static power i.e. standby leakage current becomes very crucial. In Ultra Deep-submicron regime scaling has reduced the threshold voltage and that has led to increase in leakage current in sub-threshold region and hence rise in static power dissipation. This paper presents a critical analysis of leakages and leakage reduction techniques.
Key words: leakage current, scaling, sub-threshold region, threshold voltage, UDSM.
Reference
[1] Md. Asif Jahangir Chowdhury, Md. Shahriar Rizwan, and M. S. Islam: "An Efficient VLSI Design Approach to Reduce Static Power using Variable Body Biasing", World Academy of Science, Engineering and Technology 64 2012. [2] Kaushik Roy, Saibal Mukhopadhyay, Hamid Mahmoodi-Meimand, "Leakage Current Mechanisms and Leakage Reduction Techniques in Deep Sub micrometer CMOS Circuits," Proceedings of the IEEE, vol. 91, No. 2, February 2003. [3] N. Hanchate and N. Ranganathan, "Lector: A technique for leakage reduction in CMOS circuits," IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 12, no. 2, pp.196-205, February 2004. [4] Srikanth Katrue and Dhireesha Kudithipudi,"GALEOR: Leakage reduction for CMOS circuits," 15th IEEE International Conference on Electronics, Circuits and Systems, pp. 574-577, Aug.2008. [5] Rajani H.P., Hansraj Guhilot and S.Y.Kulkarni, "Novel Stable SRAM for Ultra Low Power Deep Submicron Cache Memories", IEEE Recent Advances in Intelligent Computational Systems, RAICS 2011, in IEEE Explorer.
Sagar Ekade, Mr. Surendra Waghmare |
104-107 |
 |