Volume 4, Issue 4, April 2013 Edition


IJSER Research Group https://www.ijser.org/forum/index.php Register for IJSER Research Forum      IJSER Xplore IJSER Xplore Research Paper Database

Pages   [1] [2] [3] [4] [5] [6]
 



Fuzzy Noble Cluster Based Algorithm for Removal of Mixed Gaussian and Impulse Noises[ ]


Digital images are often corrupted by noise during their acquisition and transmission. A fundamental problem in image processing is to effectively suppress noise while keeping complete the desired image features such as edges, textures, and fine details. In particular, two common sources of noise are the so called additive Gaussian noise and impulse noise which are introduced duringthe acquisitionand transmission processes, respectively. Many methods have been introduced in the literature to remove either Gaussian or impulse noise. However, not all methods are able to deal with images which are simultaneously corrupted with a mixture of Gaussian and impulse noise.The Noble group of an image pixel is a pixel similarity based concept which has been successfully used to devise image denoising methods. However, since it is difficult to define the pixel similarity in a crisp way, propose to represent this similarity in fuzzy terms. Introduce the fuzzy noble cluster concept, which extends the noble cluster concept in the fuzzy setting. A fuzzy noblecluster will be defined as a fuzzy set that takes a noble group as support set and where the membership degree of each noble group member will be given by its fuzzy similarity with respect to the pixel under processing. The proposed filter is able to efficiently suppress Gaussian noise and impulse noise, as well as mixed Gaussian-impulse noise.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Experimental Analysis of Secondary Gas Injection Strategies[ ]


CO2 injection is a potentially viable method of enhanced oil recovery (EOR) for medium oil reservoirs. This paper compares the effect of gas injection strategy (SWAG, WAG, and CGI) on recovery in immiscible, near miscible, and miscible modes of injection. It has been proved that continuous gas injection (CGI) is not the most efficient injection scenario in oil-wet reservoirs. Miscible and near miscible core flood tests demonstrated high oil recoveries in all injection strategies due to high capillary numbers achieved as a result of miscibility. The fluid mechanics of floods were discussed using pressure drop data, different mechanics was observed for SWAG, WAG, and CGI and better mobility control of SWAG was proven. Results show that tapering postponed gas breakthrough and less amount of gas was injected using this technique, this makes tapering favorable both economically and operationally. Experiments with different gas to water ratios were performed and the results show that the ultimate oil recovery during SWAG injection is almost independent of gas to water ratio. This makes SWAG injection a promising recovery process especially for reservoirs where continuous and high rate gas injection is not possible.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Use of EyeOS in Higher Education System for Rural Area Students[ ]


Now a day's most of the WebOS (Web based operating system) at present introduce and offer virtual desktop environment. EyeOS is an open source web operating system which follows the concept of cloud computing. It contains applications like Word Processor, Address Book, PDF reader, and many more. In this paper we focus on, How EyeOS useful in Higher Education System for Rural Area's Students? Today's higher education system must require computer or laptops to store their data and run the application. But rural area's student can't afford such a types of issues. By using EyeOS don't worry about all the things. If EyeOS concept adopt by higher education system, then rural area student get their own account provided by education system with free of cost. So no need to purchase computer system or laptop. Rural area student can access their own account by portable devices via, mobile gadget, smart- phone & tabs front end.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Test Case Prioritization: Various Techniques-A Review[ ]


Regression testing is extremely very expensive process for software development and maintenance. Whenever software is modified then re-executing all the test cases that have previously tested to ensure that there no new errors have been introduced in the code due to modification. For this researchers can prioritize the test cases to increase the effectiveness of the testing process and to reduce the cost of regression testing. With the help of test case prioritization researchers can schedule test cases in a test suite by ordering them in such a way that those with higher priority according to some criterion are executed earlier than those with lower priority. In this paper we present the review of some popular test case prioritization techniques like Average Percentage of Fault Detection (APFD), Severity of Faults, Mutation Faults, Ordered Sequence of Program Elements, and Search Algorithm are some popular techniques of test case prioritization with their pros and cons.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Soc Bus Architecture For Detecting And Thwarting Ic Functional Viruses With Reduced Activation Time[ ]


While the issue of Trojan ICs has been receiving increasing amounts of attention, the overwhelming majority of anti-Trojan measures aim to address the problem during verification. While such methods are an important part of an overall anti-Trojan strategy, it is statistically inevitable that some Trojans will escape verification-stage detection, in particular in light of the increasing size and complexity of system-on-chip (SOC) solutions and the increasing use of third-party designs. In contrast with much of the previous work in this area, we specifically focus on run-time methods to identify the attacks of a Trojan and to adapt the system and respond accordingly. We describe a solution including a bus architecture in which the arbitration, address decoding, multiplexing, wrapping, and other components protect against malicious use of the bus.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
System Simulation for Coupling Nuclear Power Plants and Desalination in Different Scenarios[ ]


Nuclear power plants generate low carbon electricity, but also a lot of waste heat. That is what makes them particularly suitable for co-location with desalination plants. Analysis of coupling nuclear power with desalination plants is a mandatory prerequisite for such project establishment. This paper describes detailed analyses of power and water costs for several nuclear reactors operating in a cogeneration mode (e.g. PWR, the PHWR, the BWR, high temperature reactors, such as the gas cooled GT-MHR and the small modular reactor SMR). NPP's are coupled to three main desalination processes, multiple effect distillation (MED), (MSF), reverse osmosis (RO) and two scenarios for hybrid plants (MED+RO, MSF+RO). Comparisons are verified for desalination costs from the cheapest of conventional energy based systems, the 600 MW(e) gas turbine and combined cycle plant (CC-600) to the nuclear energy in various analysis settings for selected site specific conditions. System simulations are performed using IAEA- Desalination Thermodynamic Optimization Program (DE-TOP) and DEEP-4 software. Results have been tabulated or plotted for facilitate taking decisions.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Fingerprint Recognition Using Local Ridge Attributes Only[ ]


Fingerprint recognition is always the key issue in intelligent technology and information security. Feature Extraction is a critical step in the recognition of fingerprint images. The performance of fingerprint feature extraction and matching processes decreases when handling poor-quality images. In this paper, we use a set of local ridge attributes and explain their effect on recognition performance in comparison with the case of using a combination of the local ridge attributes, minutia, and pores. The system has been tested experimentally using a database of 160 low quality fingerprint images. The test results indicated good system ability to signify low-quality fingerprint images even through with existence of partial loss in fingerprint images.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Fractal Character of Drying Paint Films[ ]


With the progress in new materials and colloidal suspensions there has been progress in development of surface coating paints and oil paints. In this process of evaluating the performance of such paints under different conditions, the drying properties and formation of the final paint coats has been subject of interest. The properties of the dried paint film, in addition to its intrinsic properties depend on the substrate and the conditions under which the film is deposited. It has been shown that the porosity of substrate and the presence of moisture adversely affect the film properties and its strength. Under severe cases pealing of film and pitting of the surface is also caused by the seepage or percolation of moisture from the substrate below the paint coating. The thickness of the paint film and the rate of drying of the paint also determine the final structure and texture of the coat. Once the paint is applied, the process of drying commences and proceeds gradually, however as the upper surface tend to be little harder as the film solidifies, the thinner and solvents present in the paint finds it difficult to leave the free surface and get evaporated. As a result the rate of drying gets retarded as the top most layer of the paint solidified and become harder and harder. If the entire paint layer is not sufficiently dry at this stage, the physical stress present in the drying layer causes the layer to undergo deformation to arrive at a stable state. Such a drying of relatively thicker paint films is found to exhibit wrinkling of the paint coatings. We studied the drying process of thick paint films under different conditions and tried to estimate the irregularity of shape in relation to structure and texture associated with the dried film using the concept of fractal dimensions. The patterns formed exhibit broader wrinkles with relatively higher fractal dimensions for thick coats in contrast to those using thinner coat showing finer patterns with lower fractal dimensions indicating higher degree of complexity associated with the shape with lower thickness, results are presented.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Ethanol Synthesis Using Yeast Anchored on Clay and Charcoal Support[ ]


Batch and Fedbatch process of glucose fermentation were carried out with varying sucrose concentrations using yeast immobilized on clay and charcoal supports to evaluate their ethanol productions. Maximum ethanol production was at 8.65% and 9.4% for the batch and fedbatch processes respectively using clay support while ethanol production using charcoal support gave 8.43% and 8.7% for the batch and fedbatch process respectively. Fedbatch process in both supports gave higher ethanol yield and efficiency compared to the batch process, the clay support gave higher yields compared to the charcoal support. The result shows that clay and charcoal can be used as carrier support using fedbatch process during production.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
FPGA Based SCA Resistant AES S-Box Design[ ]


A new implementation scheme of AES (Advanced Encryption Standard) is proposed in this paper. The LUT based design of S-box consumes almost 75% of power. Instead of using LUT based S-box, composite field S-box design is used. That can reduce the amount of power consumption. The values of s-box are known to everyone. By masking the each value in the s-box by another masking function increase the system security and reduce the side channel attacks. This masking module can be implemented on any part of AES algorithm and re-masking module is used to remove the mask. It can be used as mask for the entire encrypted message. By using the new implementation of composite field s-box we can save the memory area up to 2.6 Mega Byte that optimizes the chip area and composite field S-box reduces the power consumption and masking module used to increase the system security.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A survey on RFID Authentication with different protocols[ ]


Security is an important concept in the process of communicating data across network. Although there are many authentication protocols implemented for the security of message from the sender to the receiver. It is also necessary in various communication devices such as RFID where the data from the tag can be read be the reader wirelessly over network and stored in a server. Here we are implementing token based authentication protocol for the authentication of tag and the reader where the concept of secrete key generation is on the basis of tokens.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Secure Data Storage in Mobile Cloud Computing[ ]


In cloud computing highly scalable computing resources are supplied as an outer service through internet on pay-as-usability basis. Portio research [1] estimates that mobile subscribers will reach 6.5 billion by the end of 2012, 6.9 billion by the end of 2013. Due to increasing use of mobile devices the requirement of cloud computing in mobile devices arise, which gave birth to Mobile Cloud Computing (MCC). Mobile Cloud Computing refers to an infrastructure where data processing and storage can happen away from mobile device. Mobile devices do not need to have large storage capacity and powerful CPU speed. Due to storing data on cloud there is an issue of data security. Because of the risk associated with data storage many IT professionals are not showing their interest towards Mobile Cloud Computing. This paper explores: (i) The concept of Mobile Cloud Computing and issues associated in it (ii) Security of data stored in cloud with various mechanisms (iii) Proposed a possible solution to provide confidentiality, access control as well as integrity of data.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Speech Signal Compression Using 2D Matrix Decomposition Technique[ ]


Speech compression is a field concerned with obtaining compact digital representation of voice signals for the purpose of efficient transmission or storage. This paper develops the method of speech signal compression using matrix decomposition. The range of speech signals usually contains positive, negative and zero values. But for decomposition based compression, the samples should be nonnegative and nonzero values. This could be done by DC shifting. Assuming a sampling rate of 8000 samples per sec and processing window of 1ms, we have to deal with the set of 8 samples. The most negative value in this set will decide the amount of DC shift. 8 such consecutive 1ms windows are placed one below the other forming 8 row vectors of each 8 elements. This will lead to 8*8 samples represented in the matrix form. If we could find 1*8 row matrix multiplying with 8*1 column matrix, whose product of 8*8=64 values match 8*8 matrix of voice samples, then by simply transmitting the 8 elements of the column matrix and 8 of row matrix, we could recreate 64 product values at receiving end. The values of 8 elements of the column vector and 8 elements of row vector are obtained by iteration process. The RMSE and quality of recreated data are estimated in comparison with original data.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Arduino Based Mobility Cane[ ]


Rehabilitating the handicapped by devising useful aid forms a part of portfolio for the biomedical engineers. Assistive technology helps in neutralizing the impairment. Recent advancements in embedded systems have opened up a vast area of research and development for affordable and portable assistive devices for the visually impaired. Right from the simple white cane up to the most advanced electronic stick, many designs have been proposed for the noble cause of aiding the visually impaired. But there have always been some ergonomic or financial constrains in the newer designs which have kept the white cane as the first choice for the maximum number of visually handicapped people. This project aims at the design and development of a detachable unit which is robust, low cost and user friendly, thus, trying to aggrandize the functionality of the existing white cane, to concede above-knee obstacle detection as well as below-knee detection. The designed mobility stick which is low cost, sturdy, and robust can be easily operated uses ultrasound sensors for detecting the obstructions before direct contact. It offers haptic feedback to the user in accordance with the position of the obstacle.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Algorithm for the Detection of Microcalcification in Mammogram on an Embedded Platform[ ]


Breast cancer incidence varies across countries, but in most cases this type of cancer is the second cause of death for the female population. The existing technology for early detection of breast cancer is the mammography, which outperforms auto-exploration and manual exploration by the specialist. It is estimated that the actual prevention by screening programs fails to detect around 25% of the cancer that are visible in a retrospective analysis .Screening programs have draw backs like high cost, inexpert radiologist and visual fatique.Digital Mammographic machines are common now a days which captures the photographic image of the suspected breast and with the help of a computer aided tool ,the result is predicted by the radiologist. Inexpert and careless radiologist may misinterpret the result and increases the number of false positive and false negative. Portability is also an issue.Incorparating an embedded system to the existing mammographic machine may avoid these risks. Micro calcifications are tiny calcium deposits, present in 30-50 % of all cancer found mammographically.However 10- 30 % of the microcalcifications are missed by radiologist .Detection of micro calcification is an area of scope and resarch.The texture and shape of these increases its detection risk. Designing an Embedded system for its detection is also a challenge.The paper describes a method for the efficient detection of microcalcification in mammogram.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Histogram Equalization Techniques And Its Application In Eye[ ]


Histogram equalization (HE) is commonly used for improving contrast in digital images. It has proved to be a simple and effective image contrast enhancement technique. It is a simple and effective image enhancing technique, however, it tends to change the mean brightness of the image to the middle level of the permitted range, and hence is not very suitable for consumer electronic products, where preserving the original brightness is essential to avoid annoying artifacts In this paper we have studied various Histogram equalization and divide the input histogram according to the criteria .In the first part we have discussed Histogram equalization,In the second part we have differentiate various methods of HE. In third part we have filtered an image and applied the program code in the filtered image to get HE. Finally Discussions and conclusions.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Interventions for Zero-Error Operation in a Digitally Controlled warehouse[ ]


This paper, presented as a case analysis, is based on first-hand observations and examines dispatch in a digitally controlled warehouse of a manufacturing unit, which is a subset of an MNC and is located in Eastern India. Essentially, it aims to suggest enhanced visual control in the Cartons for Local Delivery (CLD)s to reduce interchange of Stock Keeping Unit(SKU)s during dispatch. Even though the number of incidences is very low, but for an organization striving for Zero-Defect operations, each incident is viewed in all seriousness.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Kinetic Energy Regeneration System for Fuel Efficiency and Performance Enhancement[ ]


Advancements in technology and ever increasing demands of the society are putting huge pressure on the existing fuel resources and are a constant threat to its sustainability. To bring out the best in automobile, optimum balance between performance and fuel efficiency is essential. In the present scenario, either of the above two factors are taken into consideration during the design and development process which jeopardises the other as increment in fuel efficiency leads to decrement in performance and vice-versa. In-depth analysis of the vehicle dynamics clearly shows that large amount of energy is lost during braking and large quantity of fuel is consumed to regain the initial state, leading to lower fuel efficiency to gain same performance. Current Kinetic Energy Regeneration Systems are used for motorsports and are temporary in nature as power can be extracted during a small time interval only and use of superior parts leads to high cost, concentrating on performance only. In this paper Kinetic Energy Regeneration system for harnessing the power and then using the same while accelerating has been discussed. The major energy storing element in this system is a spring that will store energy by compression and torsion.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Enhancing the Security of Biometrics in ATM[ ]


Biometrics based authentication provides various advantages over other authentication methods, it has replaced the password based authentication and token based authentication. Biometrics plays a major role in Automated Teller Machine (ATM) system, E-Commerce, Online banking, Passports. The growth in electronic transactions has been increased tremendously; there is a greater demand for fast and accurate user identification and authentication. In distributed system like ATM system the security is a main issue. The security levels have been grown from providing PIN (Personal Identification Number) to Smart Card to Biometrics. Even though the security has been increased, at the same time fraudulent activities have grown to equal level. So to overcome the hacking activities, the proposed work is developed to provide protection to the biometric template and to enhance the security in the ATM system with Multibiometrics, Multimodal biometrics and Two-tier security. Biometrics along with cryptography is used to encrypt the template which is stored in the database. Biometric cryptosystem scheme namely fuzzy vault and fuzzy commitment is used to protect the template which is extracted from the biometrics.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Survey on the Applications of Fuzzy Logic in Medical Diagnosis[ ]


In real world computing environment, the information is not complete, precise and certain, making very difficult to derive an actual decision. Various Clinical Decision Support Systems have been constructed by the aid of Artificial intelligence. These systems are now widely used in hospitals and clinics. They are proved to be very useful for patient as well as for medical experts in making the decisions. An essential element of the medical profession is making numerous decisions. In this process doctors rely on gained knowledge and experience. However, it seems necessary for them to have the ability to think logically, to use reasoning, to infer, to precisely and clearly express their thoughts and justify the assertions made. This paper will present the importance of logic in the medical field.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
OFDM Channel Estimation by an Adaptive MMSE Estimator[ ]


In this paper, an extremely low-complexity adaptive infinite impulse response (IIR) filters that approximate minimum mean square error (MMSE) channel estimation in multi-band orthogonal frequency-division multiplexing (MB-OFDM) systems has been proposed. It has been showed that, how the packet error rate (PER) can be significantly improved over conventional zero-forcing (ZF) estimation without incurring a significant increase in computational complexity. Computational complexity and minimum- mean-square-error(MMSE) analysis are presented to evaluate the efficiency of the proposed algorithm.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Study of the effect of Luminous Ambience in an IT Company at Nagpur, India[ ]


Architecture is experienced with all our senses including vision. We adapt our vision to available light. The ability of users to adapt to changing dynamic conditions of the environment around them is very important. Other than lending visual capabilities, lighting has other quality - aesthetic and emotional. Light is an extremely efficient way of altering perception. Daylight and controlled artificial lighting are not only able to affect physical attributes of design but also provoke different visual and emotional experiences. Light constitutes an element of fundamental relevance for the design of spaces and therefore it plays a significant role in architecture. It has been researched upon extensively that lighting levels have significant effect on human performance. We can think that human performance varies in different luminous ambiences. Thus we can understand that light, space and function has effect on the human mind. Luminous ambience is defined as the part played by light in the way an environment influences a subject. The paper discusses the effect of luminous ambience through a study at an IT company at Nagpur.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Controlling Database Access by Providing Access Permissions on Database Objects[ ]


The paer focuses on securing a table in the database, to the row level, implying that not all the rows in a database can be accessed by the end user. A user can access and perform operations on only those rows which he has been assigned right to access. Traditionally, there are various ways and techniques to achieve this. The approach adopted by us is analogous to the NTFS security and Permission model, where every row in the database table corresponds to an NTfs object, i.e a folder or file. Permissions controlling access are applied to every database object. Moreover, a hierarchial structure of the objects can be enabled using the Role Based Access Policy (RBAC). Using RBAC principles, multiple hierarchy could also be supported, where in an object could act as a parent object to another object, thus implementing inheritance of permissions from parent to child object. The resultant permission obtained on the child object could be calculated and resultantly enforced when a user wants to access it.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Three Phase Five Level Inverter With Coupled Inductor Using SVPWM[ ]


PWM are widely applied in many industrial applications that require notable performance. Lately, developments in power electronics drives and semiconductor technology have lead amendments in power electronic systems. Hence, distinct circuit configurations namely multilevel inverters have become trendy and considerable interest by researcher are given on them. Variable frequency and voltage supply to a.c drives is consistently obtained from a three-phase voltage source inverter. A number of Pulse width modulation proposals are used to obtain variable frequency and voltage supply. The most widely used PWM schemes for three-phase voltage source inverters are sinusoidal PWM and space vector PWM (SVPWM). There is an rising trend of using space vector PWM (SVPWM) because of their easier digital realization and better dc bus utilization. This project focuses on A Three phase 5-Level Inverter with coupled inductor using SVPWM . The archetypal of a three-phase a voltage source inverter is discussed based on space vector concept. Simulation results are obtained using MATLAB/ Simulink environs for value of the study.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Comparative Study of Page Ranking Algorithms for Online Digital Libraries[ ]


With the increasing use of academic digital libraries, it becomes more important for authors to have their publications or scientific literature well ranked in order to reach their audience. Web mining is a potential candidate to meet this challenge. These techniques when applied on the search results of a user query, provide them an order so that users can easily navigate through the search results and find the desired information content. This is also called Page Ranking. The ranking mechanisms can arrange the scientific literature or publications in order of their relevance, importance and content score. In this paper, a survey of some prevalent page ranking algorithms for academic digital libraries is being carried out and comparison of these algorithms in context of performance has been done.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Review on Image Search Engines[ ]


In this paper we have reviewed and analyzed different techniques to search images from database. We have reviewed different techniques like text based image retrieval (TBIR), content based image retrieval (CBIR), CBIR with relevaeedback.We also reviewed different Generic CBIR systems (QBIC,Virage,Photobook,andFourEyes,Mars,VisualSeek,Netra) and World Wide Web Image search engines(Alta Vista photo and media finder WebSeek,ImageRover,WebSeer) that are available today .Variety of features used by these content-based image retrieval are also overviewed in this paper. We have also represented analysis of these systems by considering different factors like number of reference images,relevance feedback, user provided reference images, sketch support, implementation.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Perceived Problems in using Microscale Chemistry Experimentation [ ]


This study focuses on the perceived problems in using microscale chemistry experimentation in teaching General Chemistry course by the participant teachers of the "Workshop on Microscale Chemistry'' last October 19-21, 2009. The self-made questionnaire includes percecieved problems in using microscale chemistry experimentation in terms of materials/resource, values and skills and results of the experiments. Most of the participants agreed on the presented problems in the questionnaire since 13 items out of 15 have a mean value of 2.55-3.32, e.g. they agreed that materials/resources are not readily available and its precision and accuracy are difficult to attain.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Equilibrium, Kinetic and Thermodynamic studies of biosorption of Methylene Blue dye using plant biomass as biosorbent: Optimization using Response Surface Methodology (RSM).[ ]


The use of low cost and eco-friendly biosorbent was investigated as an ideal alternative to the current expensive methods of removing dyes from wastewater. In this study, the sorption of Methylene Blue (MB) on Bauhinia purpurea L. (BPL) biomass was investigated in a batch system. The rate of biosorption was investigated under various parameters such as temperature, biosorbent dosage, pH, contact time and initial dye concentration on the sorption of MB. Response surface methodology (RSM) was used to optimizing the process parameters. BPL was characterized by using scanning electron microscope (SEM) and Fourier Transfer for infrared spectrophotometer (FTIR). Equilibrium isotherm was analyzed using the Langmuir, Freundlich and Temkin isotherm models. The characteristic parameters for each model have been determined. The sorption kinetics of MB onto BPL was described by pseudo-second order kinetic equation. Thermodynamic activation parameters such as ?G0, ?S0 and ?H0 were also calculated.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Screening for antimicrobial compounds in Gardenia volkensii fruits (Rubiaceae)[ ]


A modified iridoid (GV2) was isolated as a yellow powder in the yield of 0.3% of the dichloromethane crude extract of Gardenia volkensii fruits. It showed some antimicrobial activity on Escherichia coli with a Minimum Inhibitory concentration (MIC) of less than 20 µL of 10 mg/mL solution. The Inhibition Concentration (IC50) for for the Gardenia volkensii stem was 1166.809 mg/mL and for Doxycycline antibiotic was 0.335 mg/mL. The stem bark IC50 was found to be 3,483 times active as compared to Doxtcycline antibiotic, an indication that the plant can be used to treat microbial diseases though a higher dose is needed.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Mobility Traces for User Accuracy in Mobile Network[ ]


Location Prediction has attracted a significant amount of research effort. Being able to predict user's movement would benefit a wide range of communication systems for better resource allocation. The user location prediction problem can be framed as a classification problem, where for a given input of contextual data of the current visit, try to output the correct next location of the user's. The method is to estimate the physical location of users from a large trace of mobile devices associating with Base Station (BS) in a wireless network. The Soft Classifier Fusion Technique (SCFT) is used to predict the user's future location. The collection of models, each to model a set of context information best suited it, and focuses on fusing their outputs to provide accurate predictions of the user's next location. Contextual information may refer to the user's location, time, and velocity. Each and every user's behaviors will be noted by the mobile agent in the terms of prediction algorithm EDT (Effective Decision Tree). In this project EDT is implemented for predicting the user's next location. Different types of users are used such as regular, and irregular. The fusion approach is outperforms the standard supervised classification algorithms such as SVM or decision tree.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Design and Implementation of a Vehicle Monitroring System for Toll Collection[ ]


Vehicle Monitoring System for toll collection is a globally accepted system.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Dynamic Point Bug Algorithm For Robot Navigation[ ]


The main task of a robot is to search a collision free path in order to reach the target specified. The main problem in robot navigation is localization i.e. the robot should know its present location. Here in this algorithm the localization problem is solved by using graphical method. This algorithm can be included in Bug Algorithm family. Dynamic point bug algorithm has been implemented for robot navigation system in NI-sbRIO 9631. This proposed work provides solution to identify the present location of the robot while moving towards target based on coordinates estimation.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Reduction of Wingtip Vortices by Using Active Means[ ]


Wingtip vortices are strongly associated with induced drag for a three-dimensional wing. So it is important to study the characteristics of wing tip vortices in order to reduce the induced drag. In this paper, Numerical simulations of the tip vortices for an unswept and untwisted rectangular wing (NACA 0012) are carried out at a geometric angle of attack 10° using the commercial Computational Fluid Dynamics code(CFD). And Numerical results are compared with the low speed wind tunnel experimental measurements carried out by Chow at NASA. The numerical results that were obtained by using CFD code shows a good agreement with the experimental results. Few different configurations by using active means rather than wing tip shaping have been evaluated computationally to explore their potential to reduce the wing tip vortex qualitatively. It is shown by numerical calculation that the strength of the vorticity is significantly reduced when suction is applied on the wing tip and along a slot on the bottom surface near to trailing edge.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Development and Validation of Stability Indicating HPLC Assay Method for Determination of Tapentadol in Tablet Formulation[ ]


The purpose of the research described herein was to develop simple, precise and accurate isocratic stability indicating reversed phase HPLC assay method for determination of Tapentadol solid dosage forms. Isocratic RP-HPLC method was developed on Phenomenex Luna C8 150 4.6mm, 5µm column using mobile phase as methanol - 0.002 M potassium dihydrogen phosphate buffer pH 3.0 (60: 40 v/v) at a flow rate of 1.0 ml/min and the detection was carried out at 272 nm using photo-diode array detector. The drug was subjected to oxidation, hydrolysis, photolysis and heat to apply stress condition. The validation element investigated showed that the method has acceptable specificity, accuracy, linearity, solution stability, precision and robustness.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Integration of wind farm in power system using STATCOM[ ]


The need for energy is an attention required issue for the developing countries. Developing countries are in the grip of the deficit of fossils or hydrocarbons sources of energy. Many countries are looking for the optimal solutions of energy production which are more reliable, pollution free and presume less cost. India is also in the list of those countries who want to get rid of expensive and polluted means of power production. Power production to fulfill the demand of the country is the biggest challenge for India. Wind farms interconnected to power system bring new challenges to power system economic operation. Wind power is going through a very rapid development. The integration of wind power in the power system is now an issue in order to optimize the utilization of the resource and to continue the high rate of installation of wind generating capacity, which is necessary so as to achieve the goals of sustainability and security of supply. This project presents the main technical challenges that are associated with the integration of wind power into power systems. These challenges include wind site selection, effects of wind power on the power system, the power system operating cost, power quality, power imbalances, power system dynamics, and impacts on transmission planning. The main conclusion is that wind power's impacts are most on systems power quality and power imbalances. To minimize this we use STATCOM , which is used to mitigate the effect of power imbalances

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Comparison and Analysis of Channel Estimation Techniques in performance for Wireless OFDM System[ ]


Current and future communication schemes tend to use OFDM systems in order to provide high data transmission and less inter symbol interference.In this paper, we present the benefits of exploiting the a prior information about the structure of the Wireless channel on the performance of channel estimation for orthogonal frequency-division multiplexing (OFDM) systems. The work presented here mainly focus on channel Estimation for the various algorithm techniques which is used for OFDM system. The analytic treatment is complemented by thorough numerical investigation in order to validate the performance of the different techniques. A complete model including in both the time domain and the frequency domain is used for the multicarrier system, which models the received signal to noise ratio (SNR) of each subcarrier and further presents the estimation techniques which is describe the behavior of the OFDM system model in the wireless channel.On the other hand, the fast-varying fading amplitudes are tracked by using least-squares techniques that exploit temporal correlation of thefading process (modal filtering).

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Computer-Aided Design and Simulation of Working Fluid Pairs for Absorption Refrigerators[ ]


The performance of real absorption refrigeration systems is influenced by their working fluids. Despite there being many pairs that can act as working fluids, the conventional pairs (ammonia-water and water-lithium bromide) are still the most used. This paper reports an investigation to find an alternative pair via a three-step approach. The first is computer-aided molecular design using ICAS-ProCAMD software to preliminarily find a pair with analogous thermophysical properties. The second step is plotting Dühring curves to display the thermodynamic behaviour of the proposed pair, the required data for which are obtained from Aspen plus. Upon obtaining satisfactory results from the second step, the third step is simulation of an absorption refrigerator operating under different conditions. The results show that n-butane-ethanol can act as a suitable pair, where butane is the refrigerant and ethanol the absorbent. It has an acceptable pressure range (high pressure of approximately 4 atm, low pressure of around 1 atm) and generator temperature (91°C). In addition, there is no crystallisation probability at 0°C. However, the coefficient of performance is up to 0.33, which is low compared to both of the conventional pairs.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Demarcation of Surface Water Protection Perimeters by Using GIS: Case of Gagnoa Reservoir in West Central of Cote d'Ivoire[ ]


The water retention Gagnoa built on a sub-tributary of the river Sassandra named Gueri. It drains a catchment area of approximately 700 km2 with a storage capacity of 2,336,000 m3 of water. This water retention which serves drinking water to the city of Gagnoa and its surroundings is subject to frequent pollution from domestic and agricultural degrading the quality of this resource. Indeed, several source of pollution were identified in the reservoir basin. The latters have led to the damage of resource the quality. Thus, seen its usefulness for the population, it appear important to fit a management tool through protective perimeters. These will allow reducing the risk of pollution, preserve and protect this surface water resource intended for drinking water. The methodological approach employs a spatial analysis model integrating several previously parameters defined such as slope, land use, soil type, drainage density and runoff. They will be prioritized and weighted and then integrated into a geographic information system (GIS). Our study allowed delineating three protection zones around the reservoir through the cartography of vulnerabilities areas. Certain activities are regulated or prohibited inside of areas

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Modeling for Assured Quality Control in Flexible Pavements through e-Control - A Case Study[ ]


The highways are the most widely accepted mode of transport system. So, in addition to the wide and efficient road network, the quality of the roads should be as per best available standards. Presently, the quality control tests are conducted physically in the field to check the quality of work. These tests are very large in number and take lot of time. There is no fool proof method to check that 100% material has been used at site as per desired standards. This paper deals with a model for the electronic control on the quality during the execution of flexible pavements. This study involves a real life problem faced by an engineer during the construction stage. In this paper, we present a methodology for assured quality control in the construction of a flexible pavement through e-control. To understand the methodology, a field case study is also presented here.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Performance of a Plastic Packed Distillation Column for Ethanol-Water Separation[ ]


The performance of a distillation column was investigated using plastic packing materials of different shapes using binary mixture of water and ethanol at 80oC. The vapour generated was passed through three different polyethylene packing materials each to create resistance to the flow of vapour and provide the surface area that will facilitate mass transfer between the fluid phases. A hollow packing material A of 0.48 voidage,1.3cm particle diameter and a surface area of 72x10-6m2, created a pressure drop of 4.574N/m2, the product distribution of the distillate decreased from 87.5% to 75.5% by volume. A similar hollow material B with 0.54 voidage, 1.5cm particle diameter and a surface area of 128x10-6m2, created a pressure drop of 2.135N/m2, the product distribution of the distillate decreased from 81.25% to 53.13% by volume. A star shaped packing material C with 0.58 voidage, 2cm particle diameter and surface area of 117x10-6m2, it created a pressure drop of 0.885N/m2, the product distribution of ethanol decreased from 81.25% to 53.13% by volume. Plastic packings can be used in Ethanol-water distillation to reduce cost of production and energy consumption.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Mathematical Modelling: A way of life[ ]


The paper will consist of three parts. In part-I, we shall present some background considerations which are necessary as a basis for what follows. We shall try to clarify some basic concepts and notions and we shall collect the most important arguments and related goals in favor of problem solving modeling and applications to other subjects in mathematics instructions. In the main part-II we shall review the present state, recent trends and prospective lines of development, both in empirical or theoretical research and in the practice of mathematics education, concerning applied problem solving, modeling, applications and relations to other subjects. In particular, we shall identify and discuss four major trends; a widened spectrum of arguments, an increased globality, an increased unification and an extended use of computer. In the final Part-III, we shall comment upon some important issues and problems related to our topic.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Intelligent Mobile Agents for Heterogeneous Devices in Cloud Computing[ ]


Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A software agent offers a new computing paradigm in which a program, can suspend its execution on a host computer and can transfer to another agent enabled computer on network so that it could run there. Such mobile agents are used when there is limited capacity in computers. But at times, the systems could not be able to run even the mobile agents. This paper proposes an approach to execute mobile agents on any sort of systems even with limited capacity of Cloud. A platform that supports various mobile agents depending upon the capacity of the system will be developed. The mobile clients are differentiated into two types depending upon their capacity and the corresponding mobile agent is chosen for the traversal.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
SCF Based Cyclostationary Spectrum detection for Mobile Radio signals[ ]


Spectrum sensing problem is one of the most challenging issues in Cognitive Radio (CR) systems in licensed as well as unlicensed bands. It basically determines the vacant bands and makes use of these available bands in an opportunistic manner. CR may be exploited to design wireless sensor nodes to form wireless sensor networks (WSNs), which are traditionally assumed to employ fixed spectrum. A CR Sensor Node (CRSN) can access the mobile radio channel as long as it does not cause interference to the primary users who have the priority to access the channel with a specific license to communicate over the allocated band. Signal detection for spectrum sensing is one of the major functionalities distinguishing CRSNs from traditional WSNs. In this paper authors present a method of detection and identification of mobile radio signals using the concept of cyclostationary spectral analysis based on Spectral Correlation Density (SCD) function. SCD functions of several signals used for mobile radio communication like BFSK, BPSK, GMSK and CDMA have been simulated in MATLAB and analysis have been made based on the results, which can be used to classify and identify these signals for identifying underutilized frequency bands.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Laser processes to help reduce the cost of manufacturing of solar panels[ ]


As a source of energy, nothing matches the sun. It out-powers anything that human technology could ever produce. Only a small fraction of the sun's power output strikes the Earth, but even that provides 10,000 times as much as all the commercial energy that humans use on the planet. Already, the sun's contribution to human energy needs is substantial - worldwide, solar electricity generation is a growing, multibillion dollar industry. But solar's share of the total energy market remains rather small, well below 1 percent of total energy consumption, compared with roughly 85 percent from oil, natural gas, and coal.Those fossil fuels cannot remain the dominant sources of energy forever.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Review Model On Query Optimization Using Open Source Database[ ]


Query optimization is used to optimize the efficient result with less time and minimum cost. The query formatted according to particular search engine and then the translated query is passed to the search engines. HTML screen scrapping is used to parse the data from each individual search engine. Then these results are combined to make the single result. The purpose of this method is ensuring that no duplicate results are displayed to users. This will improve the quality of search engine and reduce the unnecessary noise before displaying to the user. The filter function is used to remove the unnecessary results. The SPARQL protocol and RDF graph are used. In this paper, the query is optimized in case of cloud computing. Due to increase the business technology, the customers move towards cloud computing. In this paper, the various approaches are reviewed for query optimization.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Recent Trend in Casting Cleaning Technique[ ]


In the manufacturing technology casting cleaning plays an important role. A variety of casting cleaning techniques is used in manufacturing. Cleaning the casting is major problem in manufacturing industry. Due to sticky sand and roughness, life of castings decreases. Hence it is necessary to clean the castings in a certain cleaning value, but it also increases the lead time. The lead-time raises the cost of production. Hence casting protection is essential from the economic point of view. The application of cleaning of casting increases the life of product. Jet cleaning is generally used after shot blasting or any other machining process to remove the impurity like core sand particle inside the casting and burr. Case study has taken in paper is to clean the casting of OIL PAN. For this we will be using the jet cleaning system to clean the casting from inner side and Multinozzle system is used to clean the outer surface of the casting. We will be using multistage centrifugal pump, water and cleaning solvent as Tectyl 5205. We will be putting required high pressure of water in between 8-12 bars. So we will be designing and manufacturing machine to clean the oil pan casting and get required Millipore value 16. Millipore is Italian terminology defined as maximum value of the impurities present in the component after cleaning the casting.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Eco - Textiles: For Sustainable Development[ ]


Textile industry is considered as the most ecologically harmful industry in the world. The eco-problems in textile industry occur during some production processes and are carried forward right to the finished product. In the production process like bleaching and then dyeing, the subsequent fabric make toxic substances that swell into our ecosystem. During the production process controlling pollution is as vital as making a product free from the toxic effect. The utilization of rayon for clothing has added to the fast depleting forests and opened the door to the development in natural sustainable fibres like organic Cotton, Hemp and Bamboo fibres. Petroleum-based products are harmful to the environment. In order to safeguard our environment from these effects, an integrated pollution control approach is needed. Luckily there is an availability of more substitutes. Textile industry has a heavy impact on the environment as the current practices are unsustainable; and companies, environmentalist and consumers are looking at strategies for reducing the textile carbon footprint. So, there is need to produce the textile materials which are eco-friendly through using different processes like enzyme technology, plasma technology, super critical carbon-di-oxide dyeing or foam technology etc.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Ubiquitous Data Mining for Road Safety[ ]


The number of accidents caused every year is disastrously high 95% of these are attributed to drivers' errors. Risk assessment is at the core of the road safety problem. The system is based on ubiquitous data mining (UDM) concepts i.e a combination of association and clustering algorithms. It fuses and analyses different types of information from crash data and physiological sensors to diagnose driving risks in real time. The system diagnoses and chooses a counter measure by taking into account the contextual situation of the driver and the road conditions. The types of context include vehicle dynamics, drivers' physiological condition, driver's profile and environmental conditions. Thus it deals with proposing an innovative, intelligent system which aids the drivers take a proper decision to pre-decide their next move, hence reducing drastically the probability of many road accidents.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
An LQR Controller Design Approach For Pitch Axis Stabilisation Of 3-DOF Helicopter System[ ]


In this project an attempt has been made to adopt an LQR controller design approach for PITCH axis stabilization of 3DOF Helicopter System. The presentation in this report is not limited to only design a controller for the stabilization of PITCH axis model of 3DOF Helicopter but at same time it shows good performance. Some useful basic control systems concept related to Riccaati equation, controllability of the system and PID controller have been also presented to understand the content of the project. The report first develops a transfer function and state space model to represent the PITCH axis dynamics of 3DOF Helicopter system and then LQR controller design steps are explained in brief. The investigated state feedback controller design technique is an optimal design method and it is directly applicable to unstable pitch axis model of 3DOF Helicopter. To show the effectiveness of the investigated method, the report also demonstrates the comparative studies between LQR and PID controllers. The results of the closed loop system performance with LQR controller and PID controller separately are also shown.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
On Regular Generalised ß-closed Sets[ ]


In this paper, regular generalised ß-closed sets are introduced and their properties are investigated.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Cryptographic Provenance Verification For Secure Hosts[ ]


To improve the trustworthiness of a host and system data cryptographic verification technique is used.From these approach users keystroke to identify the legitimate user's to get the service from the server by using integrity verification and malicious traffic detection. But the main issue of this approach is keystroke hacking by the bots or autonomous program. The key logger's records the user's password or security code and send to the hacker to login the service when the user is no longer online. This project aims to propose a malware detection approach based on the characteristic behaviour of human user's. Finally explore the human-bots differences by using TUBA(Telling hUman and Bots Apart) thereby prevent bots forgeries. By using classifier algorithm the currentwork identify the human and malware activities.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Editorial for the Special Section on Ethics and Affective Computing[ ]


The sudden escalation in informational and computational technologies is quickly making things possible that were impossible just a few years ago.As these new possibilities become realities,very real ethical dilemmas arise which are challenging the very foundations of ethics,traditionally conceived. One need only consider the 3D printers that are about to hit the market and that will allow individuals to print working firearms at will. Such a possibility will, no doubt, have policy makers wondering how to handle the situation in the absence of existing laws to cover such an inevitability.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Impact of Node Mobility of Routing Protocols on MANET[ ]


A Mobile Ad-Hoc Network (MANET) is a self-configuring network of mobile nodes connected by wireless links to form an arbitrary topology without the use of existing infrastructure. In this dissertation, we studied the effects of various mobility models on the performance of three routing protocols Dynamic Source Routing (DSR), Ad hoc On-Demand Distance Vector (AODV) and Wireless Routing Protocol (WRP). For experiment purposes, we have considered the following three metrics to compare the routing protocols: Packet Delivery Ratio, Average End to End Delay and Drop Ratio. Performance comparison has been conducted across varying the mobility of nodes. Experiment results illustrate that performance of the routing protocol varies across different mobility models.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Improvement in the Handover Latency in Mobile IPv6[ ]


In this paper, we focus on the improvement in the handoff latency in Mobile IPv6. We introduce Hierarchical MIPv6 to overcome the packet losses and long delays in MIPv6. HMIPv6 reduces handoff latency by employing a hierarchical network structure and reducing the location update signaling with external network. Then we introduce Stealth-HMIPv6 (SHMIPv6) to get the better performance than HMIPv6. Then we introduce an efficient scheme for Fast handover over HMIPv6 (ES-FHMIPv6) to reduce the total handover latency in macro mobility. The proposed schemes improve the total handover latency and minimizing the packet losses during macro-mobility and micro-mobility.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Comparison of search data structures and their performance evaluation with detailed analysis[ ]


In the field of computer science and information technology , and many other related areas where large volumes of data are present we need to do many operations on those sets of data which are part of processing , analyzing and producing results and related conclusions . so in this paper we present one of the most commonly used operations - SEARCHING in the fields related to information processing. Along with a detailed study on sequential and binary search we also present performance analysis and a detailed technical view on the method of operation of the above said searching methods along with programmatic approach

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A VHDL Implementation Of Wireless Power Transfer Technique On Mobile Robot Drive System[ ]


The recharging system of a mobile robot must guarantee the ability to perform its tasks continuously without human intervention. Since mobile robots are powered by batteries, their energy and operating times are limited. Limited onboard power supplies significantly hamper long term autonomous mobile robot operation, particularly when working with swarm-sized populations. In this paper an efficient wireless power transfer system by running the vhdl code, that heats an IC which get connected to sensor that observes the heat and produces the electricity. The prototype consists of a power surface that provides power to an initial evaluation test robot consuming 350mW. An investigation on power transmission between a IC and sensor has carried out depending upon the alloy used. The power received is evaluated by the amount of heat that gets converted as electricity. Since Pyroelectricity is one of the form to generate the temporary voltage. Whether it is for business purposes or personal use, we need an efficient way of charging the battery of electronic drives. A possible application of this method includes powering of swarm robots.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Nanotechnology- Impacting in Life science and Technology[ ]


One of the most pressing issues facing nanoscientists and technologists today is that of communicating with the non-scientific community. As a result of decades of speculation, a number of myths have grown up around the field, making it difficult for the general public, or indeed the business and financial communities, to understand what is a fundamental shift in the way we look at our interactions with the natural world. This article attempts to address some of these misconceptions, and explain why scientists, businesses and governments are spending large amounts of time and money on nanoscale research and development.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Impact Evaluation of Locally Available Modifiers for Stabilization of Subgrade soil through Triaxial and Impact Hammer Testing Techniques[ ]


Pavements are founded upon the different layers of engineered soils. Being the ultimate load bearing layer of the pavement, sub-grade strength should be adequate to ensure the integrity of different layers. In Pakistan, majority of pavement failures may be attributed to improper functioning of sub-grade due to the use of inappropriate materials like Clayey soils. According to AASHTO Classification, clay is not suitable material for the sub-grade as it makes a pavement vulnerable to failure. In this research, it has been attempted to improve the stiffness properties of Clayey soil through commonly available and cheap modifiers like Lime, Marble Waste (pulverized) and Sand. The stiffness of the soil was determined by calculation of its Resilient Modulus (MR) and Impact Value (IV). MR and IV were measured in the laboratory through triaxial testing and Clegg Impact Hammer respectively. The modifiers were mixed with sub-grade soil in six different proportions to obtain optimum value for each. A correlation was developed between the MR, IV and other variables involved in the study using MINITAB software. The test results revealed that the Lime improved the stiffness of the Clayey soil more than the other two modifiers. Further, the statistical parameters calculated using the software showed that the formulated correlations are efficient.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Heart Disease Prediction System Using Bayes Theorem[ ]


A major challenge facing healthcare organizations (hospitals, medical centers) is the provision of quality services at affordable costs. Quality service implies diagnosing patients correctly and administering treatments that are effective. Poor clinical decisions can lead to disastrous consequences which are therefore unacceptable. Hospitals must also minimize the cost of clinical tests. They can achieve these results by employing appropriate computer-based information and/or decision support systems. Most hospitals today employ some sort of hospital information systems to manage their healthcare or patient data. These systems are designed to support patient billing, inventory management and generation of simple statistics. Some hospitals use decision support systems, but they are largely limited. Clinical decisions are often made based on doctors' intuition and experience rather than on the knowledge rich data hidden in the database. This practice leads to unwanted biases, errors and excessive medical costs which affects the quality of service provided to patients. The main objective of this project is to develop an Intelligent Heart Disease Prediction System using the data mining modeling technique, namely, Naive Bayes. It is implemented as web based questionnaire application .Based on the user answers, it can discover and extract hidden knowledge (patterns and relationships) associated with heart disease from a historical heart disease database. It can answer complex queries for diagnosing heart disease and thus assist healthcare practitioners to make intelligent clinical decisions which traditional decision support systems cannot. By providing effective treatments, it also helps to services at affordable costs. Quality service implies diagnosing patients correctly and administering reduce treatment costs.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Wireless Transmission of Real Time Electrocardiogram (ECG) Signals through Radio Frequency (RF) Waves[ ]


In this project the Electrocardiogram (ECG) is recorded with the help of three ECG electrodes and after amplification and frequency modulation it is transmitted as FM signal. By changing the position of ECG electrodes on the body the ECG signal of lead I, lead II and lead III are recorded. Instrumentation amplifier INA 114 is used to collect the ECG signal from the body which gives excellent accuracy. This also provides the gain of around 11. The amplifier section is used to amplify the signal so that it can be transmitted. The amplifier circuit is built around IC LM358. Total gain of around 1000 is achieved. This amplified signal is given to FM transmitter where it is frequency modulated and transmitted. The range of transmission is around 300 meters which is sufficient for the hospital applications.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Study of Quantum Cellular Automata Faults[ ]


The Quantum cellular automata is a new emerging technology with a high potential in digital circuit implementation, which is faster and more power efficient than the existing conventional MOS technology. The QCA implementation has a advantage of high fault tolerance which gives QCA implementation to use displaced cells in its circuit without losing the functionality. Here we are trying to study various outputs from a QCA array when the cells at different stages are given offset with respect to others. The results are explained with respect to output obtained from QCA Designer provided by University of British Columbia.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Signal Processing as a Probe to Study Dielectric Properties of Mouth Cancer Patient's Saliva[ ]


Dielectric relaxation study of saliva of mouth cancer patient, normal person and tobacco, gutaka-chewing person has been carried out at sampling frequency 12.4 GHz and at temperature 370C. Time domain reflectometry (TDR) in reflection mode has been used as a technique. In TDR a fast rising step pulse of 25 ps is incident on the saliva kept in the cell. The reflected pulse from the cell is sampled with incident pulse in sampling oscilloscope. The sampled pulses are digitized. The time dependent data were processed to obtain complex reflection coefficient spectra ?*(?) using Fourier transformation. The static dielectric constant (?0) and dielectric relaxation time (?) of " saliva'' were evaluated from complex reflection spectra.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Design and Precautionary Measure for Mobile Phone Accidents While Driving[ ]


Usage of cell phone is increasing worldwide in recent years, with more than 652 million Subscribers in India one step behind China as of July 2010 [17]. At the same time if we consider the risk associated with usage of mobile phone while driving, India is way ahead of china. According to World Health Organization (WHO) in its first ever Global Status Report on Road Safety says, India has recorded maximum number of road accidents in the planet [16]. According to Indian National Crime Records Bureau at least 14 people dies every hour in road accidents. Various Statistics also reveal that a large portion of road accidents in India is caused due to mobile phone usage while driving. Although various measures and rules placed on mobile phone usage, still it's highly impractical to prevent this type of events. In order to overcome this serious issue, we developed an application which helps in reducing the number of mobile accident considerably and we further extend our research, by comparing the obtained results after installing this application with recent study of US National Safety Council, conducted on 2010 and we also shown how far this application helps in reducing economic losses in India.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Virtual CMS Honeypot capturing threats in web applications[ ]


Now-a-days various types of attacks on different websites have increased drastically . This has led to raising interest for more aggressive forms of defence to improve the security and existing methods. One of these methods involves the use of honeypots. Generally it consists of a computer, data, or a network, but is actually isolated and monitored, and which seems to contain information or a resource of value to attackers. A honey pot is a security resource whose value lies in being probed, attacked or compromised. In this paper, we provide an overview of honeypots and explain about some traditional tools which can be used for website security, and early threat detection. Open source Content Management System(CMS) is used by web administrators. Web applications have increasingly been the focus of attackers of the unintentional web vulnerabilities that comes from the new introduced functionality .

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Unusual Presentation Of Tuberculosis In Head & Neck Region[ ]


3 case reports of tuberculosis at uncommon sites within head and neck region. Diagnosed on the basis of various clinical, histopathological and imaging studies. Managed either with DOTS regimen only or both surgery & antitubercular treatment. None of the cases showed non-compliance to treatment or recurrence of disease.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Assessing the validity of Regional Climate Simulations for Agricultural Impact Assessment: A Case study[ ]


Extensive statistical analyses were performed to test the validity of daily climate simulation by Hadley Center, UK, regional climate model version 2 (HadRM2) for agricultural impact assessment at local level in India. Observed and simulated climatic parameters which are used in crop simulation models for agricultural impact assessment such as daily maximum temperature, minimum temperature and rainfall were compared in terms of average and standard deviation, maximum and minimum values. Correlation between observed and simulated data were also computed in addition to annual variations in maximum temperature and minimum temperature in observed and simulated climate. Results indicate considerable deviations in the statistical properties of the simulated climate as compared to that of observed climate. Observed daily and annual variability in these climatic parameters is also not adequately replicated in simulated climate. Therefore these simulations can not be used directly into crop simulation models to be acceptable for realistic agricultural impact assessment. However some approaches may be developed where in these simulated climatic information can be applied for agricultural impact assessment. First approaches may be to use observed climate information into impact assessment models as baseline climate and creating the required future climate information by enforcing the baseline observed climate by changes derived from the model simulations of the present and future climate. The second approach may be to use climate model simulated data for both periods (present and future) into impact assessment models then the difference between two responses will represent the impact of climate change in that sector. Third approach can be to use the long term monthly mean of simulated climatic parameters into properly calibrated weather generator to generate the realistic daily weather data to be used in impact assessment models.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------


Pages   [1] [2] [3] [4] [5] [6]