Volume 4, Issue 4, April 2013 Edition
Register for IJSER Research Forum
IJSER Xplore Research Paper Database
Pages
[1]
[2]
[3]
[4]
[5]
[6]
Ash Content and Its Relevance with the Coal Grade and Environment in Bangladesh[Full-Text ] Mahamudul Hashan, M. Farhad Howladar, Labiba Nusrat Jahan and Pulok Kanti DebThis study presents the ash concentration and grading of coal of major coal fields in Bangladesh. Thirteen coal samples have been collected from Barapukuria coal field to measure the ash content whereas the values of ash concentration of other coal fields have been taken from a reference source. Ash concentration of Barapukuria coal field have been measured by standard method in laboratory. The results show that the average ash content of Barapukuria coal field is 9.61 % while Jamalgonj, Khalashpir, Phulbari and Dighipara contain 22.4-24.2, 21.8, 15.0 and 11.29% respectively. The grade of Jamalgonj, Barapukuria, Khalashpir, Phulbari and Dighipara coal fields are poor, good, poor, fair and good respectively based on ash concentration. This study also deals with the common constituents of coal ash. Several kinds of impacts (e. g. health, environmental and boiler) of coal ash are also discussed in the study. From the values of ash concentration, it can be seen that the coal of Barapukuria, Phulbari and Dighipara might cause less environmental and health destruction while Jamalgonj and Khalashpir coalmine's coal will cause much hazard.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
State of The Art Report on Steel-Concrete Infilled Composite Column[Full-Text ] Kirubha Roseline.J, Dr.D.Tensing Steel-concrete composite systems for buildings are composed of concrete components that interact with structural steel components within the same system. By their integral behavior, these components give the required attributes of strength, stiffness and stability to the overall system. Composite members, as individual elements of a system, have been in use for a considerable number of years. In this paper, a review of the research carried out on composite columns with infills is given with emphasis on experimental work.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Context-Sensitive Modeling for Intrusions Detection in Multitier Web Applications[Full-Text ] Mounika B, A. Krishna ChaitanyaThis strategy is mainly focus on to detect intrusion in multitier web applications. Multitier web application include two ends that is front end as well as back end of the applications. Modern multi-tier application systems are generally based on high performance database systems in order to process and store business information. Containing valuable business information, these systems are highly interesting to attackers and special care needs to be taken to prevent any malicious access to this database layer. In this work we propose a novel approach for modeling SQL statements to apply machine learning techniques, such as clustering or outlier detection, in order to detect malicious behavior at the database transaction level. The approach incorporates the parse tree structure of SQL queries as characteristic e.g. for correlating SQL queries with applications and distinguishing benign and malicious queries. We demonstrate the usefulness of our approach on real-world data.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Bianchi Type IX Two Fluids Cosmological Models in General Relativity[Full-Text ] D. D. Pawar , V. J. DagwalIn this paper we have studied Bianchi Type IX two fluids cosmological models with matter and radiating source. In the model one of the fluids represents the matter content of the universe and another fluid is the CMB radiation. To get the deterministic model, we have assumed a supplementary condition a = bn where a & b are metric potentials and n is the constant. We have also investigated the behaviors of some physical parameters.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Area Efficient And Fault Tolerant Fir Filter[Full-Text ] Brajesh Kumar Gupta, R. SinhaTriple Modular Redundancy (TMR) and Hamming Codes have been used to protect different circuits against Single Event Upsets (SEUs). In this paper, the use of a Novel Hamming approach on FIR Filters is studied and implemented in order to provide low com-plexity , reduce delay and area efficient protection techniques for higher bits data.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Active Noise Cancellation System Using DSP Prosessor[Full-Text ] G.U.Priyanga, T.Sangeetha, P.Saranya, Mr.B.PrasadThis paper presents an integrated approach in designing a noise reduction headset for the audio and communication applications. Conventional passive headsets give good attenuation of ambient noise in the upper frequency range, while most of these devices fail below 500 Hz. Unlike the feed forward method, the adaptive feedback active noise control technique provides a more accurate noise cancellation since the microphone is placed inside the ear-cup of the headset. Furthermore, the system uses single microphone per ear cup, thus produces a more compact, lower power consumption, cheaper solution, and ease of integration with existing audio and communication devices to form an integrated feedback active noise control headsets. Simulation results will be done to show that the integrated approach can remove the disturbing noise and at the same time, allow the desired speech or audio signal to pass through without cancellation.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Progressive Image Hotspot Navigation for Successful Security Evaluation[Full-Text ] E.Nalina, Kotha Hari Chandana, B.Krishna Priya, K.Semmangai Selvi, R.RashmiPassword is a group of characters used to allow only authorized user to enter in to the computer system. Password protection is a security process that protects information from unauthorized user. This project is an integration of the password scheme in a graphical manner. Graphical password scheme includes usability, security evaluations and implementation considerations. An important usability goal for knowledge-based authentication systems is to support users in selecting passwords of very high security, in the sense of being from an expanded effective security space. Users were provided an option of selecting a stronger password (which is not comprised entirely of known hotspots or following a predictable pattern). The formation of hotspots across users is minimized since click- points are more randomly distributed.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Content Based Image Retrieval For Histology Image Collection Using Visual Pattern Mining[Full-Text ] U.Ravindran,T.ShakilaCBIR is trending to an enormous growth in the field of Artificial intelligence based on visual pattern mining in histology images extends the boundaries of CBIR in Genetic Research. This method starts by representing the visual content of the collection using a bag-of-feature strategy. Then, two main visual mining tasks are performed: finding associations between visual-patterns and high-level concepts, and performing automatic image annotation. Associations are found using minimum-redundancy-maximum-relevance feature selection and co-clustering analysis. Additionally includes an interpretation mechanism that associates concept annotations with corresponding image. A neural network as an classifier, It can improve the classification accuracy more than 80%.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Reduce Data Utilization Scheme for Biometric Hand Recognition using Six Features[Full-Text ] S.Mohammed Basheer, Ms.Joy RobinsonThis system provides a novel method for Person verification using hand matching with improved performance in large hand pose variations. Normally hand recognition systems are too complex and needs more datasets and algorithms at each level of processing. The proposed approach introduces a reduced data utilization scheme of providing both identification and authentication from contact free hand images using pattern matching technique. A generic and secure approach is proposed to upgrade the already existing template based Eigen finger authentication towards Pattern matched recognition to reduce its complexity and data utilization. Here the proposed approach is a hand based biometric system which allows both user identification as well as authentication using six features of user hand. The features used here are Little finger, Ring finger, Middle finger, Point finger, Thumb and the Palm print. The method is well suitable for implementing hand based authentication over a wide variety of technologies such as embedded systems and mobile phone technologies which requires a minimized data utilization scheme to provide user authentication.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Theoretic Metrics for Measuring the Quality of Software[Full-Text ] Ashutosh Lahariya, Aman Jain, Rosedeep Singh, Rachana NemadeWe present in this paper a new set of metrics that measure the quality of modularization of a non-object-oriented software system. We have proposed a set of design principles to capture the notion of modularity and defined metrics centered around these principles. These metrics characterize the software from a variety of perspectives: structural, architectural, and notions such as the similarity of purpose and commonality of goals. (By structural, we are referring to intermodule coupling-based notions, and by architectural, we mean the horizontal layering of modules in large software systems.) We employ the notion of API (Application Programming Interface) as the basis for our structural metrics. The rest of the metrics we present are in support of those that are based on API. Some of the important support metrics include those that characterize each module on the basis of the similarity of purpose of the services offered by the module. These metrics are based on information-theoretic principles. We tested our metrics on some popular open-source systems and some large legacy-code business applications. To validate the metrics, we compared the results obtained on human-modularized versions of the software (as created by the developers of the software) with those obtained on randomized versions of the code. For randomized versions, the assignment of the individual functions to modules was randomized.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Studies on Dielectric Properties of Zinc Doped Manganese Titanate (ZnxMn1-xTiO3, x=0.1, 0.3 & 0.5) Ceramics with Different Compositions[Full-Text ] M. Maddaiah, A. GuruSampath Kumar, T. Subba RaoIn this present study the Zinc Doped MnTiO3 ceramic powders were synthesized by solid state reaction route using metal oxides with heat treatments at and 1200oC for 12h. The characterizations of the ceramic samples were carried out by SEM, EDAX for structural studies and HIOKI 3532-50 LCR Hitester for dielectric measurements. It shows that the dielectric constant and Dielectric loss were increased with temperature and decreased with frequency and observed the moderate increase of dielectric constant with the addition of small amount of Zinc to the Manganese Titanate ceramics. The result were discussed in this study.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A survey of Identity Based Multireceiver Signcryption scheme[Full-Text ] Shweta Khullar, Vivek Richhariya, Vineet RichhariyaThese Identity based signcryption is the technique of signcrypting the message on the basis of identity of the receiver. Although the signature-then-encryption increases the computational cost, hence signature-then-encryption is performed in a single logical step. Here we are implementing the concept of signcryption using the identity of multi receiver so that the security of these receivers and the message authentication is maintained. Identity based encryption is the technique of encrypting the message using the concept of generating a flag string of the receiver and on the basis of identity of the receiver the sender is authenticated. In this paper we use an efficient implementation of the combination of the identity based multireceiver and then signcryption scheme using elliptic curve cryptography.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
An Efficient Image Segmentation of Contrast Enhanced MR Images of Brain Tumor[Full-Text ] R.Nithiya (M.Tech) , S.Ananadalatchoumy M.Tech.,(Ph.d), R.Vithiya (M.Tech), A.Sundaravadivelan (M.E)Segmentation of brain tissues in gray matter, white matter and tumor on medical images is not only of high interest in serial treatment monitoring of "disease burden" in oncologic imaging, but also gaining popularity with the advance of image guided surgical approaches. In this paper, we present a fast and robust practical for segmentation of solid tumors with minimal user interaction to assist clinicians and researchers in radio surgery planning and assessment of the response to the therapy. Particularly, cellular automata (CA) based seeded tumor segmentation method on contrast enhanced T1 weighted magnetic resonance (MR) images, which standardizes the volume of interest (VOI) and seed selection, is proposed. As the change in necrotic and enhancing part of the tumor after radiation therapy becomes important, we also applied the Tumor-cut segmentation to partition the tumor tissue further into its necrotic and enhancing parts. We presented a database from Harvard tumor repository and another from a clinical database of tumors that underwent radio surgery planning at Radiation Oncology Department of ASM. The performance over particularly datasets of highly heterogeneous tissue content demonstrated an overlap in the range 80%-90%, however, with a desired low surface distance error, average median surface distances of 1.0-1.5 mm, respectively.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Scheduling In Instance-intensive Cost-constrained Workflows In A Cloud[Full-Text ] S. Mukute, G. Hapanyengwi, B. Mapako, B. M. Nyambo, A. MudzagadaCloud computing has been growing tremendously, as it has been accepted recently. Cloud computing has many unique strengths which can be utilized to facilitate workflow execution. This paper investigates the issue of dynamic scheduling in cloud computing with a special attention to the case of instance-intensive cost-constrained workflows. This paper seeks to address the following issues: A study of this 'new' technology taking its gradual migration from Grid computing, their similarities, differences, weaknesses and strengths. Also there will be a study on the metrics of comparing existing scheduling algorithms with a comparison on how they are fairing. Lastly this paper seeks to propose a dynamic scheduling algorithm that will be based on a simulation model. In this research the problem of workflow scheduling has been discussed. The efficiency of the proposed algorithm was tested in comparison with the fixed algorithm that come along with the simulator used (CloudSim 2.1).
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Vibration Analysis of In-coach Rail Travel and its Effects on Health[Full-Text ] Esther Jennifer Gabriel, Uday.P.ChhatreThe objective of this study was to design the vibration sensing device for the purpose of sensing, measuring and monitoring of vibrations felt by the commuters on the rail tracks. The block diagram basically includes two sensors namely 3 axis accelerometer sensors and the Magnetic Compass/Pressure/Altitude/Temperature Sensor which are interfaced to the arduino board for processing and display the measured data on the PC through data loggers. The commercial accelerometer from Analog Devices was selected as a detection sensor where each axis comprises of analog output. Accelerometer sensor can measure static (earth gravity) or dynamic acceleration in all three axes. The 3 axis accelerometer sensor is a triaxial, low noise and low power accelerometer with signal conditioning on a single monolithic printed circuit board (PCB). The sensor sensitivity has a selectable range from ±1.5g to ±6g. The device is characterized with an acceleration range of up to 6g. The Serial Data Logger accepts incoming serial data and then logs data to text files. The Magnetic Compass/Pressure/Altitude/Temperature Sensor measures Direction, Atmospheric Pressure, Temperature and Altitude and outputs in simple serial data, which can be viewed on PC's terminal software at the rate of 9600 bps or read into arduino board for further processing. Compass data can be used for direction finding. It is a digital magnetic compass, which can be used to detect deviation from magnetic north pole (heading). This compass uses orthogonal two-axis magnetic sensor. The atmospheric pressure reading is converted to read the altitude of the sensor, as the environment pressure decrease as altitude increases. The data files collected through the two sensors are stored in micro SD card that can be accessed on PC with the use of external low cost card reader. Micro SD memory card ranges from 128MB to 32GB. These memory cards are available at very low cost due to wide use in mobile phones. An interface circuit and data storage circuit were built with respect to the arduino board. The experimental vibration results that were obtained are further related with commuter's health effects. Preliminary tests proved that the developed measurement unit is capable of sensing, measuring and condition monitoring.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Study of Population Dynamics of Normal and Immune Cells in Presence of Tumor Cells[Full-Text ] Dr. Naseem Ahmad,Gurpreet Kaur This paper deals with the population dynamics of normal, tumor and immune cells at cellular level. The competition model at cellular level has been evolved in equations which defines the dynamics of tumor growth or decay. Qualitative analysis of the nonlinear differential equations has been looked upon to see the behaviour of tumor cells with respect to normal and immune cells. The numerical analysis is one of the tools to see the effect of time.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Sustainable Development through the Environment Management Tool Ecological Footprint Analysis - A Study in Kochi City, India[Full-Text ] Athira Ravi, Dr. Subha VIn the past, natural resources were plentiful and people were scarce. But the situation is rapidly reversing. Our challenge is to find a way to balance human consumption and nature's limited productivity in order to ensure that our communities are sustainable locally, regionally and globally. Kochi, the commercial capital of Kerala, South India and the second most important city next to Mumbai on the Western coast is a land having a wide variety of residential environments. Due to rapid population growth, changing lifestyles, food habits and living standards, institutional weaknesses, improper choice of technology and public apathy, the present pattern of the city can be classified as that of haphazard growth with typical problems characteristics of unplanned urban development. Ecological Footprint Analysis (EFA) is physical accounting method, developed by William Rees and M. Wackernagel, focusing on land appropriation using land as its "currency". It provides a means for measuring and communicating human induced environmental impacts upon the planet. The aim of applying EFA to Kochi city is to quantify the consumption and waste generation of a population and to compare it with the existing biocapacity. By quantifying the ecological footprint we can formulate strategies to reduce the footprint and there by having a sustainable living. In this paper, an attempt is made to explore the tool Ecological Footprint Analysis and calculate and analyse the ecological footprint of the residential areas of Kochi city. The paper also discusses and analyses the waste footprint of the city. An attempt is also made to suggest strategies to reduce the footprint thereby making the city sustainable.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Performance Analysis Of Object Detection Using Modified Statistical Mean Method[Full-Text ] G. RAMACHANDRANMoving object detection is low-level, important task for any visual surveillance system. One of the aim of this project is to, to describe various approaches of moving object detection such as background subtraction, temporal difference. A statistical mean technique is used to overcome the problem in previous techniques. We propose a modified statistical mean technique with noise removing process that is computationally fast, by allowing the parallel processing. This proposed technique, overcome the drawbacks of traditional approach of moving object detection. The noise remove process removes the noise caused due to camera, reflectance noise and gives effective moving objects, as well as provides effective results in the change of light during the day and night, the model of background is changed.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Experimental Study of Heating of the Newtonian Suspensions made of Large Hard Spheres Based on the Glucose & Water Solutions Flowing in a Horizontal Duct[Full-Text ] Benoit Fanou Zinsou Fagla, Michel Gradeck, Christophe Baravian, Michel LeboucheIn this paper, we present the results of our research work. The current state of knowledge of Newtonian suspensions of heat flux does not fully understand the problems of flow of charged particles in the Agro-Food Industry. The influence of the hard spheres on the flow was studied. That determines the heat transfer in the mixture. This study highlights the interdependence of the dynamics and thermal of the suspensions of particles with an average diameter (D~4, 4 mm). Analyses of longitudinal and radial profiles of measured wall temperature permit to verify the convective effects of particles (perturbations of the boundary layer) in flows. Analysis of the heating of these suspensions show that the heat transfer increases with the concentration of particles. The organization of the carrier fluid in monophasic ring surrounding the area of the particles in the center of the pipe is relevant. This fluid ring is linked to the monophasic layer substantially free of particle ("monophasic'' layer). It is harmful because the particles migrate to the cold zone where sterilization is difficult and this layer due to a layer quasi-free particle ("monophasic" layer) that appears on the wall. This phenomenon raises the problem of regular sterilization of the solid-liquid suspensions in the Agro-Food Industries (AFI). The "effective medium" approach is validated for suspensions of large sized particles. This essential result served to validate the laws of heat transfer typically used for monophasic phase flow and show their implementation in case the two-phase approach is made.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Parabolic Channel Design[Full-Text ] Richwell Mubita MwiyaThe parabolic shape is often a suitable shape for channel cross sections due to its various advantages over conventional shapes such as the trapezoidal, triangular and rectangular shapes. Methods have been developed for the design of optimal parabolic section shapes which often do not take freeboard or maximum or minimum side slope into consideration. It is well known that often the maximum side slope of a channel is predetermined by the field conditions of the project. Hence there is need for methods that take maximum allowable side slope into consideration. With this requirement in mind, a method is developed for the design of a parabolic channel with consideration of freeboard and maximum allowable side slope. This is compared with another method that produces a hydraulically optimal design for given project conditions without taking maximum side slope into consideration. A table is provided as a design aid.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Comparative Study of Steel Structures Design Using IS 800:1984 & IS 800:2007[Full-Text ] Prof. S.S.Patil, L.A.PasnurThe latest version of the Code of Practice for general construction in steel IS 800:2007 is based on Limit State Method of design. The design concept is totally changed in comparison to earlier IS 800:1984 which is based on elastic method. The design methodologies for the steel structures namely, working stress design method and limit state design methods are briefly explained. The importance of limit state design method is highlighted. In the present work, the detailed study of structural components as tension members and compression members by designing using Limit State Method and Working Stress Method has been carried out and submitted the comparative study of the same in the form of graphs.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Wormhole Attack Prevention By Next Hop Analysis[Full-Text ] Gouthamamani VenkatesanA Mobile Ad-hoc network (MANET) is an autonomous network that consists of mobile nodes that communicate with each other over wireless links. It uses open medium, dynamic topology and distributed co-operation. In the absence of a fixed infrastructure, nodes have to cooperate in order to provide the necessary network functionality. Routing is the primary function of each node. Mobile Ad-hoc Networks are highly vulnerable to many security attacks like black holes, denial of service, etc and the issue addressed here is one such attack called the "Wormhole attack". In this attack, a tunnel is created between two malicious nodes and packets are tunneled between them in such a way that tunneled packet arrives sooner than other packets transmitted over a normal multi-hop route and thus the route via the malicious nodes is selected. The wormhole puts the attacker in a very powerful position relative to other nodes in the network and the attacker could exploit this position. Existing solutions for this attack like packet leashes, directional antennas, etc either increase the overhead in processing or do not completely eliminate the tunnel. In this paper, the solution proposed is by analyzing the next hop of nodes and identifying the tunnel and thus removing the associated nodes from the network. The protocol under consideration is Ad-hoc On Demand Routing Protocol (AODV). The solution has been tested for throughput by using the simulation environment "GLOMOSIM" and the simulation results confirm the increase in throughput by implementing this solution.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Dry Sliding Friction and Wear Study of the Worn Surface of Cu-based Powder Metallurgy Train Brake Materials[Full-Text ] Glenn Kwabena GYIMAH, Dong CHEN, Ping HUANG, Gary C. BARBERThe characteristics of the worn surface of Cu-based powder metallurgy brake materials for trains after undergoing dry sliding working conditions were studied. A high pressure pad-on-disc tester was developed for this study. Three forms of wear mechanisms were observed during the process, namely; delamination, plowing, and abrasive. These wear mechanisms were found to be responsible for a high wear rate on samples sintered at 850oC and 900oC. The results showed that the main components of the worn surface are graphite, SO2, Fe, Cu and oxides of Fe and Cu (Fe203 and CuO) and AlFe. The samples were observed to be sensitive to sintering temperature. The samples sintered at high temperature experienced lower rate of wear compared to low temperature sintered samples. The worn surfaces were characterized as: destructive, medium, and low.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Review on Fatigue-Crack Growth and Finite Element Method [Full-Text ] Nirpesh Vikram, Raghuvir KumarThis article reviews the literature on Crack Propagation in fatigue and its numerical analysis using FEM published since 19th century and identifies new research lines. Review shows that fatigue life has been considered to be composed of three phases: (1) Crack initiation (2) Crack Propagation (3) Final Failure. Mechanism of Crack initiation, especially quantitative models are still not known. Initially crack length is subcritical and the crack is not dangerous. In some next cycles, the crack propagates to acquire critical length and then conventional fracture mechanics phenomenon like GIC, KIC, JIC, CTOD etc come in to picture. A large number of empirical and semi empirical fatigue crack growth laws have been proposed for many materials through experiments, numerical and analytical methods like FEM (Finite Element Methods). Summarization on crack propagation that the crack closure is affected by the material properties like yield stress "σy", fracture stress "σf", maximum intensity factor "km", stress range "Δσ", crack length "a", strain hardening component "n", working environment and geometry is presented in this paper.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Simulative Investigation of Zigbee based Wireless Star Networks by using NS-2[Full-Text ] Chavan S.G., Dhongade R.D.ZigBee offers unique advantages for wireless applications. With a this new technology, realizing a standard specifies the PHY Layer and MAC Layer for low data rate wireless PANs. It is based on the IEEE 802.15.4 standard. The IEEE 802.15.4 standard specifies the PHY Layer and MAC Layer for low data rate wireless PANs. This paper includes ZigBee Alliance, IEEE 802.15.4 model, applications and advantages of ZigBee, future scope of ZigBee. The performance of the zigbee networks for various areas have been analysed and also the network application area had been reviewed. This paper includes ZigBee Alliance, IEEE 802.15.4 model, applications and advantages of ZigBee, future scope of ZigBee. The performance of the zigbee networks for various areas have been analysed and also the network application area had been reviewed.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Bandwidth enhancement of triangular microstrip antenna using dual stub[Full-Text ] Mr. Govind Agarwal, Mr. Atif Rizwan, Mr. Rajeev kumar singh, Mr. Rajarshi SanyalA new stub loaded equilateral triangular microstrip antenna(ETMSA) has been proposed . The new structure has the enhanced bandwidth of 13.63% in the Ku band.Stub loading technique is used to enhance the bandwidth performance. Two rectangular stubs are inserted on the radiating edge of the patch. The gain of the antenna is stable at about 5.78 dBi.Detailed analysis of the patch has been done in this paper using MOM based IE3D simulator.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Study of Peak-to-Average Power Ratio Reduction Techniques for OFDM Signals[Full-Text ] Chhavi Choudhary, S.S. RattanOrthogonal frequency division multiplexing has drawn explosive attention as a new type of high data rate transmission scheme for wireless communication system. The main advantage of OFDM system are spectral bandwidth efficiency and robustness against frequency selective fading or narrowband interference etc. However a critical drawback of OFDM is high peak-to-average-power ratio (PAPR), which results in significant inter modulation, intercarrier interference (ICI), bit error rate (BER) performance degradation and undesirable out of band radiation when an OFDM signal passes through nonlinear devices such as high power amplifier (HPA). This paper reviews the conventional PAPR reduction techniques for OFDM (Orthogonal frequency division multiplexing) signals.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Mining the Data Using Aggregator From the Dynamic Web Page[Full-Text ] Mrs. S.AbiramiTypically a user wishes to acquire the value of some aggregation gathering over distributed data items, for example, to know value of collection for a client; or the AVG of temperatures sensed by a set of sensors. In these queries a client specifies a coherency condition as part of the query. We present a inexpensive, scalable technique to answer constant aggregation queries using a set of connections of aggregators of active data items. In such a network of records aggregators, each data aggregator serves a set of data items at exact coherencies. Just as various garbage of a active web-page are served by one or more nodes of a content sharing network, our system involves decayed a client query into sub-queries and executing sub-queries on sensibly chosen data aggregators with their individual sub-query incoherency limits. We provide a procedure for getting the best possible set of sub-queries with their incoherency bounds which satisfies customer query's coherency requirement with slightest number of energize messages sent from aggregators to the client. For estimating the number of refresh messages, we build a query cost model which can be used to guesstimate the number of statement required to satisfy the client specified incoherency hurdle. feat results using real-world traces show that our cost based query progress leads to queries being executed using fewer than one third the number of messages required by offered schemes.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Channel Quality Improvement for BER using Different Channel Estimation Techniques for OFDM Systems[Full-Text ] Rajeshwar Singh,Gurpreet Singh SainiIn this paper we present an improved and robust channel estimation algorithm for OFDM mobile communication systems based on the use of pilot subcarriers.Specifically we present an iterative channel estimation technique to improve the performance of channel estimators.In iterative receiver structures, soft information becomes available after the decoding stage. This information is used to enhance the quality of the channel estimates for the next iteration. The low complexity proposed receiver including LMS algorithm, has a higher efficiency than conventional methods (without channel estimation,LS & LMMSE ) and it can work in lower amount of SNRs.We derive a generalized estimator based on the linear minimum mean square error (LMMSE) principle for deterministic pilot information combined with soft information. The performance is presented in terms of Bit-error rate (BER) for a system using 16-quadrature amplitude modulation (QAM). Simulation results validate that the proposed channel estimation scheme can achieve tremendous performance as the existing channel estimation methods.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Synthesis of Chitosan-Silver Nanocomposites and their Antibacterial Activity[Full-Text ] Pawan Kaur, Ashok Choudhary and Rajesh ThakurThe present study explores the in situ fabrication of chitosan-silver nanocomposites in view of their increasing applications as antimicrobial packaging, wound dressing and antibacterial materials. Chitosan/Silver nanocomposites were prepared by embedding of silver nanoparticles in Chitosan polymer. Synthesis of nanocomposites was confirmed Fourier Transform Infrared (FTIR) spectroscopy, X-ray Diffraction (XRD) analysis and Differential Scanning Calorimetry (DSC) etc. In addition, the formed nanocomposites have an average particle size of ~10-15 nm as observed by Transmission Electron Microscopy (TEM). Their antibacterial activity was assessed by zone of inhibition method against Staphylococcus aureus MTCC 1809, Pseudomonas aeruginosa MTCC 424 and Salmonella entrica MTCC 1253 in vitro.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Revenue Based Call Admission Control and Dynamic Channel Allocation Using Optimization Tool[Full-Text ] Sathyapriya.R, Malathy.S, Amsaveni.MNowadays the advanced services in cellular networks efficient bandwidth management and channel availability increase the problem in data and voice. Dynamic channel allocation (DCA) strategy is used for supporting the data and video with Quality of Service (QoS) by using the parameters such as call handoff probability and call blocking probability. DCA has been used to avoid traffic modeling of audio/video conference. Call Admission Control (CAC) mechanism with Genetic which makes decisions on the possible acceptance of a video call into the network is not only based on the fulfillment of user's bandwidth prediction, but also it based on the revenue that the provider will make when degrading current users in order to accommodate new ones. Providers need to use the resource management schemes effectively in order to keep existing users satisfied and attract new users, so that they can increase their revenue. Genetic algorithm is an optimization tool, by this optimization tool the best match can be found out. Genetic algorithm is used for time management and for predicting accurate result here it is used with two stages one with regular interval assignment and another with genetic algorithm assignment. This methodology will provide high QoS to wireless Audio and video users.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
FPGA Implementation of Cryptographic Algorithms: A Survey[Full-Text ] Ambika R, Sahana DevanathanCryptography is the art of using mathematics to address the issue of information security. The basic operation in RSA algorithm is modular exponentiation on large integers, and this operation requires a long computation time. The square and multiply method is the most popular and effective algorithm for computing modular exponentiation . The development of a modular multiplication algorithm suitably mapped to a systolic array architecture targeted for implementation in a reconfigurable logic device. The features of the Altera FLEXIKE that makes it mostly suitable to implement the systolic array architecture. This device consists of four types of reconfigurable elements, the logic array blocks (LAB), embedded array blocks (EAB), the I/O elements (IOE) and the routing resource.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Design and Development of Low Cost Micro Hydro Power Station for Agro based Application[Full-Text ] Hrishikesh. U. Patankar, Prof. Dilip. I. Sangotra.The aim of this study is to utilize the wastage of water energy supplied by the canals and hydraulic pumps in agriculture areas. In this study we will utilizes the nozzle type of arrangement to discharge pipe to supply the water jet to drive pelton wheel then the revolution obtained from the wheel will be increased by the gear box and then it will be supplied to the alternator which will generate electricity to drive agro based application.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Adaptive Intelligence Model to Enhance Dynamic Performance of Grid Enabled Applications[Full-Text ] Mosleh M. Al-Harthi, Hatim Ghazi Zaini , Mohamed T. Faheem Recently, exploring effective ways for distributed resources that allow sharing large amounts of enabled applications among users in minimum time sharing are presenting new challenges to Grid Enabled Applications (GEA) in computer networks. A dynamical delay time model of GEA based on Neural networks (NN) technique is introduced. A new method for designing a dynamical adaptive intelligence controller based on a free delayed transmission factor is utilized in the adaptation process. An alternative unique and exact model without delays in the variables is also introduced. This alternative model which has no delayed in the state nor in the control is utilized in obtaining an identifier-based adaptive control based on the slow part of this alternative model. Two effective tools for designing this identifier which leads to have an intelligent adaptive controller based on the slow part of the exact model are presented. This exact model has the ability to overcome the drawback due to the presence of delayed transmission inquiry problem which leads to gain maximum resource utilization of GEA while minimizing task completion time. Using this slow part a classical time optimization scheduling algorithm based on back-propagation neural network is presented based on an algorithm that predicts the submitted task run time by training neural network through a training set of samples. In order to show the effectiveness of the proposed scheduling algorithm, a comparison with the bench mark min-min[1] scheduling algorithm and the GridSim time optimization(GridSim TO) [2] is presented.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Design and Performance Analysis of 2.45 GHz Microwave Multilayer Interdigital Band Pass Filter[Full-Text ] Md. Kamal Uddin , Ibrahim Azad, Md.Amran Hossen BhuiyanFilters with advanced features have numerous applications in many modern technologies. Microwave bandpass filter is one of those filters that can be used for wireless communication .This paper emphasis how to design an interdigital microwave bandpass filter for 2.45GHz. So, this paper focuses on the design of parallel coupled line bandpass filter, two sets of interdigital band-pass filter at 2.45 GHz on single and multilayer structure, compare among these filters, proposed one suitable for users. Primarily coupled line filter, then asymmetrical and symmetrical interdigital band pass filters have been designed for single and multilayer structure. Simulated results are very close to the desired response. The results showed that each filter works well at operating frequency. Asymmetric filters have excellent return loss at center frequency, very sharp roll off factor. In contrast, symmetrical interdigital band-pass filters have narrow bandwidth and minimized ripple. Finally, the multilayer configuration with dielectric substrates showed that the bandwidth is broaden up, insertion loss and return loss are reduced than single layer configuration.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Applications of data mining in health and pharmaceutical industry[Full-Text ] Sandhya Joshi, Hanumanthachar JoshiThe Data mining is gradually becoming an integral and essential part of health and pharmaceutical industry. Data mining techniques are being regularly used to assess efficacy of treatment, management of ailments, and also in various stages of drug discovery and process research. Off late, data mining has become a boon in health insurance sector to minimize frauds and abuse. A good number of health care companies, medical hospitals and pharmaceutical manufacturing units are employing the data mining tools due their excellent efficiency. The identification and quantification of pharmaceutical information can be extremely useful for patients, physicians, pharmacists, health organizations, insurance companies, regulatory agencies, investors, lawyers, pharmaceutical manufacturers, drug testing companies. This review deals with the major applications of data mining techniques in health care and pharmaceutical industries with relevant examples.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Mechanical Properties of Synthetic Fibers Reinforced Mortars[Full-Text ] Ahsan Habib, Razia Begum, Mohammad Mydul AlamAn investigation has been carried out into synthetic fibers (glass, nylon, and polypropylene fibers) effects on the mechanical properties of mortars (cement: sand composition (1:1.5)). Addition of fibers in to the mortars increases the compressive strength of mortar composites except glass fiber. On the other hand, tensile and flexural strength have little influence with the addition of fibers. Increasing the size of the fibers also increases the strength of the mortars but a little extent. Among the fibers, nylon containing mortar composite shows promising mechanical strength that could be easily used as low cost partitioning wall, false ceiling, and other household purpose in the developing countries. We have presented a plausible explanation in accordance with fiber reinforced composite polymer. Other physical properties of the fibers containing mortars were also studied and discussed.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A CMOS Current-Mode Implementation of Multiple Input Fuzzy MIN and MAX Circuits for Analog Fuzzy Processors[Full-Text ] Abdulla K P and Mohammad Fazle AzeemThe design and simulation of a multi-input fuzzy MIN and MAX circuits based on a new strategy taking analog design advantages such as low die area, high speed, and simplicity is considered in this paper. Modular current-mode circuits to obtain the minimum and maximum of N analog inputs are described. For implementing this idea, new current mode circuits are proposed which is based on the Wilson current mirror. The proposed circuit has a very sharp transfer characteristic and can be used for the hardware realization of real-time fuzzy inference system. The realization method is suitable for fabrication using CMOS technology. The performances of the proposed circuit were studied by the use of the spice analog simulation program. The circuit shows the merit of having high accuracy and a large dynamic range. Its operation is discussed and illustrated with simulation results.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Occupational Stress among Male and Female Elementary School Teachers of District Pulwama[Full-Text ] Irshad Ahmad Kumar, Zahoor Ahmad Wani, Aijaz Ahmad ParreyStress, in general, and occupational stress in particular is a fact of modern day life that seems to have been on the increase. Teacher stress is a real phenomenon and is associated with problems of recruitment, health and retention of teachers. The main purpose of the study was to find out and compare the occupational stress level among male and female elementary school teachers of District Pulwama (J & K) India. The sample consisted of 100 elementary school teachers, 50 male and 50 female teachers. A. K Srivastava and A. P Singh's Occupational Stress Index was administered on selected sample for collection of data. The collected data was statistically analyzed and interpreted by applying Mean, S.D and t-test. The investigators found that male and female elementary school teachers differ significantly on overall occupational stress level. It was found that female elementary school teachers have more occupational stress level than their male counter parts.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Efficient Cryptographic Key Generation Using Fingerprint[Full-Text ] Ginu Thomas, K.Rahimunnisa, Sonima ParayilT Biometrics are used for the high secure applications in cryptography. Cryptography is intended to ensure the secret and authenticity of a message. Identity theft can be easily solved by the integration of biometrics and cryptography. To establishing identity biometrics system has been used in various commercial, civilian and for forensic applications. In this paper fingerprint is used as biometric system. Our main aim is to integrate the volatility of the user's biometric features into the generated key and it make unpredictable to the hacker. If a biometric key is missing or stolen ,it is lost completely and possibly for every application where the biometric is utilized ,because a biometric is permanently linked with a user and cannot be altered. In this paper 256-bit secure cryptographic key is generated from the fingerprint biometric feature. The experimental results have showed that the generated 256-bit cryptographic key is capable of providing better security.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Process Parameters Modelling Of Wire Electrical Discharge Machining On Al/Sic10% MMC Using Dimensional Analysis[Full-Text ] R. A. Kapgate, V. H. Tatwawadi, J. P. ModakThe complex phenomenon of wire electrical discharge machining (WEDM) is reducing its utilization to process aluminium silicon carbide with 10% weight metal matrix composite (Al/SiC10% MMC) for industrial applications. This paper presents an experimental investigations and development of mathematical models using dimensional analysis for selection of WEDM process parameters. Sequential classical experimentation technique has been used to perform experiments for triangular, circular and rectangular shape cuts on Al/SiC10% MMC as majority of industrial products are manufactured by these shapes or combinations. An attempt of mini-max principle and linear programming (LPP) has been made to optimize the range bound process parameters for maximizing material removal rate and minimum surface finish to machine Al/SiC10% MMC. The test results proved that MRR and Ra values were significantly influenced by changing important five dimensionless p terms. The process parameters grouped in p terms were suggested the effective guidelines to the manufacturer for improving productivity by changing any one or all from the available process parameters.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Modelling Batch Reactor for Milk Bush (Thevetia peruviana) Oil Transesterification in the Production of Biodiesel.[Full-Text ] M.F.N Abowei, O. M. Olatunji and A. J. AkorIn this study, modelling equations for the simulation of batch reactor functional dimensions at isothermal condition are proposed exploiting the transesterification kinetic of Olatunji et. al. (2012). The kinetic model proposed by Olatunji et. al. (2012) was obtained through the laboratory experiment on which Biodiesel was produced using alcohol to oil molar ratio of 6:1, 9:1 and 12:1; the reaction temperature was put at constant 500C, and the catalyst loading percentages is between 0.5% and 1.5% as proposed by Olatunji et. al. (2012). From the results obtained, the modelling equations proposed are capable of simulating reactor dimensions as a function of the kinetic parameters. The simulated results obtained was analysed with MATLAB programming language which has demonstrated the dependency of reactor dimensions as proposed by the kinetic parameters proposed by Olatunji et. al. (2012).
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Survey on Different Methods of Image Segmentation[Full-Text ] Sreeji C, Vineetha G R, Amina Beevi A, Nasseena NMedical image segmentation place a crucial role in different medical imaging applications. Image segmentation is a process of partitioning a digital image into multiple segments. Segmentation makes the image into something, which are easier to analyse. Segmentation is needed in diagnosis, surgery planning and other medical applications. Current segmentation approaches are reviewed and reveals its advantages and disadvantages. Different segmentation methods are thresholding, region growing, clustering, artificial neural networks, deformable models, Markov random field models, deformable models, multi-agent system approach, wavelet segmentation and image segmentation using EIS.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Fabrication, Microstructure, Hardness and Wear properties of Extruded MWCNT- Reinforced with 6061Al Metal Matrix Composites[Full-Text ] Manjunatha L.H., P.DineshMMC's are popular in engineering applications because of low density and high stiffness. Carbon Nano tube of late, has emerged to be an excellent reinforcement material for Al6061alloy based metal matrix composites. In the present experimental investigation, Al6061alloy as matrix material and up to 0.5 wt% of multi-walled carbon nano tube particulate composite was fabricated using the liquid metallurgy route. The wear and friction characteristics of the composite in the extruded conditions were studied by conducting sliding wear test. The sliding wear behavior of the MMCs were investigated by varying parameters like normal load, percentage multi-walled carbon nanotubes. Pin-on-disc wear testing machine was used for investigating sliding wear behavior. The worn surfaces were analyzed using optical microscope and scanning electron microscope. The results indicate that the wear resistance of the MWCNT reinforced material increased with increase in MWCNT content, but decreases with increase in normal load, and track velocity. The microscopic examination of the worn surfaces, wear debris and subsurface shows that the base alloy wears primarily because of micro cutting.Hardness study revals that as MWCNT content increases the hardnes value also increases significantly. Wear study results for Extruded specimens have been discussed.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Monitoring Software Quality Economics Using By Defect-Detection Techniques for Defects[Full-Text ] Tanzillah Wahid, Suraiya Akhter, Md. Abdur RakibSoftware defect-detection techniques such as tests or reviews are still the prevalent means to assure the quality of a program. This research proposes a model of software quality economics for defect-detection techniques with an emphasis on the combination of diverse techniques. This is important because in real development projects a technique is never used in isolation but in combination with others. This, however, makes the evaluation of a technique very difficult because of the influences of early used techniques on the ones that are later used. The result is based on a model for software quality economics of single techniques and extended by a model for the diversity of defect-detection techniques. Software is constantly evolving owing to new user requirements, product features, bug fixes, and technologies. Software evolution is "the dynamic behavior of programming systems as they are maintained and enhanced over their lifetimes." The findings should continually monitor and control software to ensure it follows desirable evolution paths. This allows (1) estimating the effects of a combination, (2) to remove such influences when evaluating a single technique and (3) monitor software quality using C-chart.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Arduino Based Photovore Robot[Full-Text ] Pravin Kumar SinghA brief description of the light following robot is given in this project report. Objective of the project is to design a robot which can be controlled by using light. The chapters written in this report aims at various aspects of design, construction and application of the robot. Chapter 1 gives the brief introduction of the Photovore Robot and its various version and variants.Chapter 2 aims at design of robot. It also gives the sensor circuit that we used in the robot. Block diagram given in this chapter summarizes the working of the robot.Chapter 3 is devoted to the various hardware and software used in the robot. It provides the specifications of the components used in it. It gives a brief introduction of software used.Chapter 4 gives the detail of the Arduino board and software programming used in making robot.Chapter 5 is all about Project Implementation. It includes various stages of interfacing of the hardware used.Chapter 6 aims at the various applications of Photovore Robot.Chapter 7 is the gives the result, conclusion and future scope.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Parasitic distribution in relation to gender, season and length of fish hosts in Shallabugh wetland.[Full-Text ] Ibraq Khurshid Fayaz Ahmad and Tariq AhmadParasitism is of great interest to the ecologists because it poses great problem in the growth of the fish hosts. With the aim to evaluate the relationship between the infection levels, length of fish host, gender and season, the present study was undertaken on Shallabugh wetland for a period of one year from August 2011 to July 2012. This Wetland consists of larger area of riverine marshes and shallow fresh water with associated reed-beds on the floodplains of river Jhelum. The Wetland together with marshes is fed by the Anchar Lake and local runoff. The average depth of the water varies from 0.3 to 2.0 meters. The Wetland supports a locally important fishery and reed harvesting Industry, which provides excellent opportunities for sport Hunting. During the study period, 342 fish specimens belonging to the genus Schizothorax were examined from three collection sites in the wetland. The collection sites were inlet (where the anchar lake meets the Shallabugh wetland), middle of the Shallabugh wetland and third is the outlet ( where the shallabugh wetland meets river jhelum). Out of 342 specimens120 were taken from inlet, 113 from middle and 109 from outlet. A total of 106 specimens were infected (52 at inlet, 25 at middle and 29 at outlet) showing the intra wetland variations of 43.33% (inlet), 22.12% (middle) and 26.6% (outlet). Our results show that the prevalence of infection increased significantly with increase in the length of host.(r = 0.968). Season wise distribution also showed the +ve correlation (chi-square = 43.560) , (p = 0.001) and furthermore the gender showed the -ve correlation with the prevalence of infection as the male and female host specimens were equally prone to the helminth infection
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Pages
[1]
[2]
[3]
[4]
[5]
[6]
|