ICMEST-2016-International Conference on Modern Engineering, Science & Technology
"ICMEST 2016 Conference Papers "
A Novel approach for unsupervised change detection in multi spectral images[Full-Text ]
Ms.V.Vidhya, Mrs.K.R.Ishwarya, Mr.G.Jeyaram , Mrs.R.Hema The paper a novel approach for unsupervised change detection in multi spectral images presents a novel approach to unsupervised change detection in multispectral remote-sensing images. The proposed approach aims at extracting the change information by jointly analyzing the spectral channels of multitemporal images in the original feature space without any training data. This is accomplished by using a selective Bayesian thresholding for deriving a pseudo training set that is necessary for initializing an adequately defined binary semisupervised support vector machine (S3VM) classifier. Starting from these initial seeds, the S3VM performs change detection in the original multitemporal feature space by gradually considering unlabeled patterns in the definition of the decision boundary between changed and unchanged pixels according to a semisupervised learning algorithm. The values of the classifier parameters are then defined according to a novel unsupervised model-selection technique based on a similarity measure between change-detection maps obtained with different settings. Experimental results obtained on different multispectral remote-sensing images confirm the effectiveness of the proposed approach.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Automated Methodology for Context Based Semantic Anomaly Identification in Big Data[Full-Text ]
Hema.R, Vidhya.V, Ishwarya.K.R and Jeyaram.GPerforming anomaly detection in Big Data is a difficult task. There are several existing solutions for anomaly detection. Since the existing systems are not scalable, they are not suitable for large scale systems. In this paper, we propose an automated methodology for anomaly detection which concerns not only the content of the data but also the context of the data in streaming sensor network. Additionally, we present a method of inferring invariants about the normal behaviour of dynamic data feeds. These invariants are used as proxies for specification to perform on-going semantic anomalies detection in the data feed. Finally, we show the feasibility of our approach and its usefulness for the context based semantic anomaly identification in Big Data.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Meticulous Study on Text Mining Techniques[Full-Text ]
Mr.M.Arumugam, Miss.T.Dhivya Bharathi, Miss.S.Sowmiyaa, Mr.N.DeepanragulText Mining is an important step of Knowledge Discovery process. It is used to extract hidden information from not-structured or semi-structured data. This aspect is fundamental because most of the Web information is semi-structured due to the nested structure of HTML code, is linked and is redundant. Web Text Mining helps whole knowledge mining process in mining, extraction and integration of useful data, information and knowledge from Web page contents. Web Text Mining process able to discover knowledge in a distributed and heterogeneous multi-organization environment. In this paper, our basic focus is to study the concept of Text Mining and various techniques. Here, we are able to determine how to mine the Plain as well as Structured Text. It also describes the major ways in which text is mined when the input is plain natural language, rather than partially-structured Web documents.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Power Generation with Simultaneous Aeration using a Gravity Vortex Turbine[Full-Text ]
Anjali Mohanan MThe primary aim of this paper is to determine and prove the possibility of using a gravitational vortex turbine for free flowing drainage water. Departing from the principles that normally govern hydraulic machines, this new turbine utilizes energy transformation taking place in a free vortex flow. An idea of a power plant that houses these turbines is outlined in this paper. Aeration of drainage water is an added advantage in vortex flow. Such a power plant is a new idea that combines hydraulics, environmental engineering and mechanical engineering. The central drain of Delhi is considered for study and the potential of Delhi’s Najafgarh drain is also calculated. To the best of author’s knowledge such a system of aeration cum power generation from low head drainage water is absent anywhere else. The suitability of Delhi’s drainage system for hydraulic power generation is amplified in this paper. The paper outlines drain water as a source of renewable energy, that can be tapped year long especially in metropolitan cities of India. An economic analysis was carried out to study the efficiency of using a vortex turbine in power plant for power generation from drainage water.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
The Application of the most suitable Impact Model(s) for simulating the Seismic Response of a Straight Bridge under Impact due to Pounding[Full-Text ]
Avishek Chanda, Arnab Banerjee and Raj DasThe impact is a phenomenon which is most significant in the field of multi-body dynamics, that is, the dynamics prevalent between two or more bodies, in close proximity, experiencing contact. This results in an impulsive force between the interacting bodies, depending on the geometry and the interaction properties, for an infinitesimal time duration. Simulating the impact phenomenon has formed an intrinsic part of the modern day technology in structural pounding, robotics and bio-mechatronic applications and all other engineering aspects involving contacts between two or more bodies. Literature, containing models for simulating the impact phenomenon, can be found from the time of Newton and, therefore, it is of utmost importance to understand which models give the ideal response for a system experiencing impact.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Support Vector Machine with Improved Particle Swarm Optimization Model for Intrusion Detection[Full-Text ]
S P Yazhini, Dr. R DevipriyaIntrusion Detection System (IDS) is a computer-based data system which purports to observe attacks against computer systems and networks or, against any information system. Its job is to supervise the utilization of such system to detect any insecure states. IDS detect attempts and active misuse of the scheme either by lawful users of the information systems or by outside parties to abuse privileges or exploit security vulnerabilities. It gets information about target system to perform diagnosis on security status. Data mining techniques used for intrusion detection are classification, clustering, frequent pattern mining and mining data streams. The classification method called Support Vector Machine (SVM) has been used to provide potential results for the intrusion detection problem. Nevertheless, the practicability of SVM is affected due to the trouble of selecting appropriate SVM parameters and feature selection.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
SECURITY DRIVEN MULTI-CONSTRAINED SCHEDULING FOR COMPUTATIONAL GRID[Full-Text ]
N. V. Keerthana and Dr. P. SureshGrid computing is a collection of heterogeneous, dynamic resources from multiple administrative domains which are geographically distributed that can be applied to achieve a common goal. Development of resource provisioning-based scheduling in extensive distributed environments like grid computing brings in new requirement challenges that are not being considered in traditional computing environments. Computational grid is applying the resources of many systems in a pervasive network to a single issue at the same time. Grid scheduling is the method by which work specified by some means is assigned to the resources that complete the work in the environment which cannot satisfy the user requirements considerably. The resources may leave the grid network at any time resulting in occurrence of faults and vulnerability. The satisfaction of users while providing the resources might increase the beneficiary level of resource providers. Resource scheduling has to meet the multiple constraints specified by the user.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Improved Fake Iris Recognition System Using Decision Tree Algorithm[Full-Text ]
P.Jasmin Jemi , K.Rajasundari, D.C.Joy Winnie Wise,rjjemiraja@gmail.comBiometric recognition systems are more advantageous than traditional methods of recognition as they allow the recognition of an individual for what he is and not for what he possesses or knows. Two of the currently most used biometric traits are the iris and the fingerprint. These traits have unique characteristics that allow people’s recognition and distinction. However, they can also be reproduced or used fraudulently. A possible way of accessing the system fraudulently is by presenting a fake reproduction of the biometric trait to the sensor, which can prevented by studying the liveness of the biometric trait. Therefore, in the context of this work, liveness detection algorithms for iris will be studied. Concerning this, for the iris images the study is focused on cases where contact lenses are used to spoof the recognition system. For the iris, databases with fake samples obtained from molds of real iris are used to test the methods. Decision tree algorithm is used to compare the iris in database. The results show that it is possible to obtain results comparable or even better than the state-of the art ones, using other iris databases, but that does not occur for every database tested. This proves that it is still necessary to improve or maybe combine the algorithms, so that the classification error rate drops.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Prototype for Composing SOAP, RESTful and Mobile Web Services[Full-Text ]
P.Thangaraj, P.Balasubramanie, D.Jugisathvi, S.A.BhuvanasoundaryaMobile web services play a major role in recent years due to its flexibility in access at different location and sites. A method is required for retrieval of appropriate web services using mobile web services from various sources such as Simple Object Access Protocol (SOAP) services, Representation State Transfer service (RESTful) and Mobile Web Services. The main drawbacks faced by mobile web service composition are i) Communication media used by the mobile device to connect internet ii) operating system used in the mobile device
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
ANALYSIS AND MINIMIZATION OF LOW POWER VLSI DESIGN BY USING DYNAMIC PHASE FREQUENCY DETECTOR IN ADPLL[Full-Text ]
Eswaran.G, Sathish Kumar.T.MA dynamic phase frequency detector has been used which mainly concentrates on reducing the power consumption, and has the ability of fast locking and reducing the delay moments. A low power All Digital Phase Locked Loop (ADPLL) have become more attractive because they yield better testability, programmability, stability, and portability over different processes and the ADPLL has better noise immunity. The goal of the Time-to-Digital Converter TDC is to measure the time difference between the rising edges of the signals. A phase prediction algorithm via the assistance of the DTC reduces required TDC range thus saving substantial power. The complete ADPLL system improves the performance of the locking ability and the system DTC linearity. The design is implemented using DPFD technique was more suitable for high speed phase frequency detector. The proposed system of dynamic phase frequency detector has been fabricated and the corresponding power consumed is 20 µW.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
DESIGN OF MINIMUM PARTIAL EUCLIDEAN DISTANCE BASED K-BEST ALGORITHM FOR HIGH PERFORMANCE MIMO DETECTOR[Full-Text ]
MOUNIKA R,POORNIMA R, Dr A Mahabub BashaMinimum Partial Euclidean Distance (PED) based K-best algorithm using wavelet modulation is proposed. It is based on breath- first search methods. The proposed design is independent of the constellation size, number of transmit and receive antenna. The minimum PED based K-best detector guarantees a Signal to Noise Ratio (SNR)-independent fixed throughput with a performance close to Maximum Likelihood Detection (MLD) method and constant Bit Error Rate (BER) with irrespective of constellations. The main innovations are the nodes are expanded and visited based on minimum PED rather than exhaustively, as well as it keep track of finally selecting the best candidates at each search phase.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
REDUCTION OF OFFSET AND LOW VOLTAGE OF DYNAMIC COMPARATOR FOR ADCs[Full-Text ]
NATHIYA J, RAMESHKUMAR J and SUBRAMANI MA low-offset dynamic comparator using new dynamic offset cancellation technique is proposed. The technology scaling of MOS transistors enables low voltage and low power which decreases the offset voltage and delay of the comparator. The new technique achieves low offset and low voltage without pre-amplifier. Furthermore the overdrive voltage of the input transistor can be optimized to reduce the offset voltage of the comparator independent of the input common mode voltage. The input transistor drain nodes and use of buffers at the output nodes can further reduce the offset. The modifications made to the typical differential pair dynamic comparator will be reducing the overall offset voltage. Moreover, the proposed comparator has an advantage that the offset voltage does not change by increasing the input common mode voltage compared with the conventional comparator. By implementing this in dynamic comparator technique a low voltage and offset voltage can be achieved.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Novel Patch Antenna With A U-Shape Parasitic Strip For 2.4/5.4 GHz WLAN Applications[Full-Text ]
Diptanuprasad ChakrabortyA Novel Dual-Band Design Of Patch Antenna is presented in this paper. The design of the original Antenna has been optimized to yield better results in terms of Gain, Bandwidth and Radiation Efficiency. The T-Shape Parasitic Strip has been changed to U-Shape Strip, which resulted in Higher gain, better radiation efficiency, and bandwidth. The U-Shape strip has been given finite conductivity, and thus improved gain and return loss characteristics are obtained. The ultimate antenna resonated in two resonant frequencies viz.2.45Ghz(S11<-10db) and 5.42Ghz(S11<-10db), and a Gain of 4.2db and 5.01 db are obtained respectively. The frequency domain characteristics of the Antenna has been studied thoroughly, and is presented in this paper. The Antenna is simulated using High Frequency Structure Simulator(HFSS) software.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Investigation of Store Separation and Trajectory of Weapons in Military Aircraft[Full-Text ]
Madasamy.S, Priyeswari.B, Thilagapathy.G and Arulalagan.RFlow separation, due to presence of weapon attachment and deployment leads both the aircraft and missile to be unstable. The study concentrates more on prediction of the separation movements of the external store weapons carried out on military aircraft wings under supersonic range and various angles of attack. It is an important task to define the safe operational-release envelopes, in perspective view of Aerodynamics. Predicting the trajectory of the store in highly dynamic separations such as the release of multiple store, during maneuvers is very difficult to simulate in a wind tunnel. Thus a computational approach is well suited, to predict the various underlying information about its physics of store separation.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Studies on Layering and Orientation of Foldcore Composites Subjected to Impacts[Full-Text ]
Mr. Arun Babu, Dr. Ganesh Prasad, Mr.Shashank AgarwalThe mechanical behaviour of sandwich structure with folded cores produced by folding Aluminium sheets to zigzag structures is evaluated under metal fragment impact loading. The impact performance under Transverse Low Velocity Impact with different layering and orientations of foldcore composites with subsequent damage assessment is addressed. For geometrical optimization, the influence was studied by impacting metal ball against the specimen fabricated with different geometrical core designations, number of layers and their arrangements over one another.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
SPEED CONTROL OF THREE PHASE INDUCTION MOTOR USING PREDICTIVE TORQUE METHOD[Full-Text ]
Ms. P.M.Sneha Angeline,N.Haripriya,S.Kalaivani,V.Kowsalya and M.Sowmya BharathiOur paper deals with the four-switch three-phase (B4) inverter, having a reduced number of switches, was designed for the possibility of reducing the inverter cost but if has more benefits than expected as it can be utilized in fault-tolerant control to solve the open and short-circuit fault of the six-switch three-phase (B6) inverter. However, due to imbalance of the phase current causes fluctuation of two dc link capacitor voltages; therefore, its application is limited. This can be overcome with a predictive torque control (PTC) scheme for the B4 inverter-fed induction motor (IM) with the offset suppression of dc link voltage. The three-phase currents are made to be balanced by simply controlling the stator ?ux With the predictive view, the voltage offset of the two dc-link capacitors is modeled and controlled. The vectors voltage of the B4 inverter under the ?uctuation of the two dc-link capacitor voltages are taken for prediction precisely and control of the torque and stator ?ux using genetic algorithm.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Optimization of a Single Finger Keyboard Layout using Genetic Algorithm and TOPSIS[Full-Text ]
Govind M and Vinay V PanickerThe aim of this paper is to develop a new layout for single finger keyboard used in smartphones. The layout problem is modeled as a Quadratic Assignment Problem (QAP). The meta-heuristic, Genetic Algorithm is used to solve the QAP problem. Three performance measures such as flow distance, average words per minute and learning percentage are used to evaluate the layouts. The objective of the work is to minimize the flow distance, learning percentage, and maximize the typing speed. As the problem belongs to a multiple attribute decision making problem, Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) is applied to find out the best layout
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A REVIEW OF DIFFERENT SEGMENTATION TECHNIQUES USED IN BRAIN TUMOR DETECTION[Full-Text ]
NICER NAVID K R and Dr. K C JAMESA tumor is a solid lesion formed by an abnormal growth of cells which looks like a swelling.Each year more than 200,000 people in the United States are diagnosed with a primary or metastatic brain tumor.The use of advanced computer technology is now extensevily used in fields such as cancer research. MRI is a currently popular for the study of tumor in body tissues. MRI is a magnetic field which builds up a picture and has no known side effects related to radiation exposure.In MR images, the amount of data is high for manual interpretation and analysis.Segmentation is the process of partitioning a digital image into multiple segments. The goal of segmentation is to simplify and/or change the representation of an image into something that is more meaningful and easier to analyse.The segmentation of brain tumor from images is composed of several steps. Manual segmentation of brain MR images is a very difficult and time consuming task. Numerous segmentation techniques have been proposed for the detecting and isolating the tumour by various authors. In this paper we perform a comparative analysis of the segmentation techniques currently available for tumor detection. This paper investigates the performance of the existing segmentation techniques that are currently used using different performance parameters.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
HAND GESTURE BASED WHEELCHAIR CONTROLLER FOR THE DISABLED[Full-Text ]
Ms. Jose Infant Puvani S, Ms. Divyashree T, Ms.Dhivya K, Ms. Jayadevi R, Ms. Thiregha TObjective of this project is to make the user more comfortable, secure, and independent and many added advantage at a low cost with the high response circuit design. To be simple and easy to handle the wheel chair by themselves (disabled person); at the same time it should be reliable.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Numerical Study on Ejector Refrigeration System With Special Reference To Geometrical Parameters[Full-Text ]
Adarsh Abi Mathew, Dr M.P Sudesh Kumar, Garima Nema, Robin JamesVapour compression refrigeration system consumes high grade energy which is utilized to get the desired output and the remaining part is rejected as waste heat. This waste energy is used to drive an ejector refrigeration system. This work describes the numerical study on the effect of geometrical parameters like nozzle exit position, convergent angle of suction chamber, divergent angle of diffuser on the performance of ejector. Analysis is done for all the design with fixed operating conditions and the entrainment ratio variation corresponding to each geometrical parameter are analysed. The design which gives the maximum entrainment ratio is considered as the optimum design.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Experimental investigation on TIG welded of austenitic stainless steel L304[Full-Text ]
K.Perumal, N.Vivek, M.S.Venkataaramanan, R.GurubalajiThe purpose of the present study is to investigates the effects of the different kinds of oxides fluxes(TiO2,SiO2,MnO2,CaF2,) used in tungsten inert gas (activated TIG) process on weld bead penetration, mechanical properties(hardness) of type 304 stainless steel. The TIG welding was applied to 6mm thick stainless steel plates through a thin layer of flux to produce a bead-on –plate welded joint. The fluxes used were packed in powdered form, the bead-on –plate test was performed ,then the depth and width of the weld were measured using an optical projection machine, hardness were measured using Vickers hardness machine, Activating flux materials consisted of a different type of combination mixture. Experimental result indicate that using CaF2 fluxes leads to a increase the depth of penetration compared with conventional TIG weldig process, but TiO2 fluxes leads to decrease the bead width of penetration compared with conventional TIG weldig process.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Emotion Recognition using discrete cosine transform and discrimination power analysis[Full-Text ]
Shikha SurendranThe paper states the technique of recognizing emotion using facial expressions is a central element in human interactions. Discrete cosine transform (DCT) is a powerful transform to extract proper features for face recognition. The proposed technique uses video input as input image taken through the webcam in real time on which discrete cosine transform is performed. After applying DCT to the entire face images, some of the coefficients are selected to construct feature vectors. Most of the conventional approaches select coefficients in a zigzag manner or by zonal masking. In some cases, the low-frequency coefficients are discarded in order to compensate illumination variations. Since the discrimination power of all the coefficients is not the same and some of them are discriminant than others, so we can achieve a higher true recognition rate by using discriminant coefficients (DCs) as feature vectors. Discrimination power analysis (DPA) is a statistical analysis based on the DCT coefficients properties and discrimination concept.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Automation of Pulsed Thermography using Computer Numerical Controlled Manipulator for CFRP Circular Parabolic Honeycomb Structures[Full-Text ]
M. B. Sobhanan and S. ManivannanPulsed Thermography (PT) is a non-contact nondestructive testing (NDT) technique which is suitable for testing of circular parabolic Carbon Fiber Reinforced Plastic (CFRP) honeycomb sandwich structures. Commercially available PT systems have smaller coverage area in a single exposure which is mainly constrained by the number of heating elements required for providing near uniform surface heating. Automation facilitates repeatability and precise location of defects especially for testing of large structures is essential. Compared to other C-scan systems, automation of PT system is easier as it is an area interrogation method and does not need precise alignment of the imaging hood (enclosure with heating system and infrared camera). In this paper, the attempts made in programming the path of the PT imaging hood for covering the surface of circular parabolic structures are given.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Effect of Reflecting Sheet on the Back of Stripline fed Slotted Hexagonal Patch Antenna[Full-Text ]
Riboy Cheriyan and Dr. K. P. ZachariaSince the Federal Communication Committee has released a bandwidth of 7.5 GHz from 3.10GHz to 10.60GHz, Ultra wideband technology (UWB) is advancing rapidly as a high data rate technology for wireless communication. The effect of placing a conducting reflecting sheet at the back of microstrip line fed slotted hexagonal patch antenna with finite ground for wireless application is presented here. It is shown that antenna design with reflecting sheet at the back of the radiating structure provides radiations with -10 dB return loss in the entire ultra wide band of 3.1GHz to 10.6GHz specified by FCC. The size of the ground plane considered is 34 X 29mm, which is suitable for portable wireless communication devices. The effect of placing a conducting reflecting sheet at the back of strip line fed slotted hexagonal patch antenna is investigated. It is shown that, the proposed antenna provide directional radiation pattern with acceptable level of back lobe with good impedance matching criteria. It is found that the antenna is matched with return loss (S11) better than -10dB within the frequency range 3.10GHz to 10.60GHz.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Innovation in Cryogenic Engine for Rapid Transit by NOS Propulsion[Full-Text ]
M.TAMILSELVAN, R.VENKATARAMANAN,K. HARIPRRASADThis paper deals with the Cryogenic Engine, Alternative fuel is used in this engine to increases the efficiency. Nowadays, Liquid Hydrogen is used as an fuel for cryogenic engine due to some drawbacks. Liquid Nitrogen is used as an fuel and Liquid Oxygen is used as an Oxidizer. Liquid Nitrogen have more merits than Liquid Hydrogen are high density, high boiling point, Easily produce, 78% of Nitrogen are available in atmosphere. The NOS Propulsion cryogenic engine are used in Rapid Transit. In LRT(Light Rapid Transit) the cryogenic engine are fit in the mid off the Metro Train due to avoid some effect.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Fertilizer Delivery Kit[Full-Text ]
S.Pranesh , S.Prashanth, S.Santhosh, K.Srikanth, G.RajamuruganAgriculture being the backbone of Indian economy has several simple problems which are not yet solved even after the advent of globalization. It plays a critical role in growth and development of Indian economy [1]. One such simple problem which is to be eradicated is the delivery of fertilizer to the plants by labours. Fertilizer for a plant plays a major role because the crops which are cultivated these days must be harvested soon for a productive purpose. At first there has been a decline in the trend growth rate of production as well as productivity for all most all the crops from the mid ninenties.Second there is an excessive dependence of a large section of the population on Agriculture [2].
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Virtual Student Advisor using NLP and Automatic Appointment Scheduler and Feedback Analyser[Full-Text ]
N. Suvethan, K. Avenash, M.A.Q. Huzaim, R. Mathusagar, M. P. A. W. Gamage, A. ImbulpitiyaVirtual Student Advisor is a research project that mainly concerned on addressing a comprehensive solution to overcome the difficulties faced by the academic departments of any academic institutions. According to the context, the role of the Student Advisor is focused on helping students with problems related to their academic carrier at the University and also answer the general queries made by students related to the procedures conducted at the Institute. This happens to be a tedious and a very inefficient task for the Academics as they have to repeat the same answers for many students and also students coming to meet the academic in ad hoc manner without proper appointments makes both the student and the academic face lot of problems.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Enhanced CoMP technique for interference cancellation in HETNets of LTE[Full-Text ]
K.S.R.S. Jyothsna, T. Aravinda BabuAdvanced interference mitigation techniques relying on multipoint coordination have attracted significant attention from the wireless industry and academia in the past few years. In 3GPP LTE-Advanced, a work item on Coordinated Multiple Point transmission and reception (CoMP) was initiated, and it is one of the core features of Release 11. The objective of this work item is to provide the necessary specification support to efficiently realize the benefits of cooperative transmission in the downlink and cooperative reception in the uplink. In this paper, LTE Comp techniques are explained and the interference problems are also been discussed. The main idea of this paper is to propose an advanced CoMP technique in order to mitigate the interference and to optimize the power compared to the other existing techniques in Heterogeneous networks.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Review on Security Improvements by Relay Selection in Cognitive Radio Networks[Full-Text ]
Hima Anna thomas, Sajan XavierIn this paper, various methods for security improvement in cognitive radio networks are discussed and relay selection methods have found more effective. Relay selection is utilizing the cooperative communication technique and along with decode and forward configuration various relay selection methods are found implemented successfully. According to relay selection the number of relays participating in secondary transmission is also act a vital role. The multi-relay relay selections methods can be treated as the most appropriate method that provides maximum security and reliability in CR networks.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Detection of Systematic and Retinal Diseases Using IPACHI Model[Full-Text ]
Ms. MINI.V, and Mr. JINTO CHACKOWe propose a method for detection of systematic diseases and retinal diseases using IPACHI model. The segmentation of blood vessel in retinal images support early detection, diagnosis, and optimal treatment. Various systematic diseases such as Hypertension, Stroke, Diabetes, Cardiovascular diseases and retinal diseases such as Glaucoma, Retinal Detachment, Retinitis Pigementosa, Macular Pucker, Cataract ,Branch retinal vein occlusion (BRVO), Branch retinal artery occlusion (BRAO), Central retinal vein occlusion (CRVO), Central retinal artery occlusion (CRAO) are recognized based on the features and MAs. Fundus images are categorized based on these features using different classifiers
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A review on cluster based VANET with Integrated design[Full-Text ]
Ms. RANJINI.B, Mrs. NASLIN SITHARA.NVehicular Ad Hoc Networks (VANETs) is intelligent vehicular communication systems consist of a Road Side Unit (RSU) as main propagation module. Modeling based clustered VANET processed under three factors such as Media Access Control (MAC), channel status and traffic separately. The proposed model of VANET comprises the three factors. The comprehensive model dispenses an efficient wireless network for data exchange in the domain of vehicles. In this paper we are pointing the Cluster based communication and overall performance is efficient in proposed system under the reference of packet loss probability and MAC operations. Adding privacy and security using a special verification scheme is our future research.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A NOVEL RANGE FREE LOCALIZATION METHOD FOR MOBILE SENSOR NETWORKS[Full-Text ]
Anju Thomas, Remya RamachandranThis Range free localization methods are commonly used in mobile sensor networks as they have many advantages over other methods. They are of low cost. They don’t need more complex hardwares. But this type of localization also have some bad effects like more power consumption at nodes, which reduces network life time. And as a result communication cost is very large. For solving these problems, in this paper, the localization is done using beacon signals, anchor nodes, sensor nodes and Received Signal Strength(RSS). By using these parameters, a novel low cost localization method is introduced. This reduces the communication cost and network lifetime is improved. Theoretical analysis and simulations are done. Coding is done in NS2. The simulation and calculations shows that this method has more accuracy than previous methods.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Secure EDTM For Wireless Sensor Network[Full-Text ]
Nefilda K Joseph, Jithin Jose KalladaTrust is an important factor in transferring data from the source to destination in wireless sensor networks. If any sensor node fails to transfer the data Protocol calculates the alternate path. Trust models have been recently suggested as an effective security mechanism for Wireless Sensor Networks (WSNs). Considerable research has been done on modeling trust. However, most current research work only takes communication behavior into account to calculate sensor nodes’ trust value, which is not enough for trust evaluation due to the widespread malicious attacks. In this paper propose a Secure Efficient Distributed Trust Model (EDTM) for WSNs. First, according to the number of packets received by sensor nodes, direct trust and recommendation trust are selectively calculated. Then, communication trust, energy trust and data trust are considered during the calculation of direct trust. Furthermore, trust reliability and familiarity are defined to improve the accuracy of recommendation trust. In this proposed the method using a modification of cryptographic algorithm. In which find an alternate path in presence of a deactivated node in the rout.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A comparison study on the SNR values by using digital modulation schemes with multiple fading channels[Full-Text ]
Ambily Govindan, Jithin Jose KalladaSignal to noise ratio is used as an indicator for evaluating the quality of communication. Due to this feature it is very important to estimate the SNR value for the modern wireless communication. In this paper a comparison study on the SNR value for different modulation schemes through fading channels is proposed. The proposed estimator is moment based one and performance evaluated on different channel conditions. For the performances analysis an expression for the moments of the received signals be developed .Modulation schemes like bipolar phase shift keying (BPSK), Quadrature amplitude modulation (QAM) and quadrature phase shift keying (QPSK) are performed for the SNR estimator. This estimator works on Additive White Gaussian Noise AWGN, Nakagami and Rayleigh fading channels. The existing model SNR estimation methods were degraded for higher level modulation scheme. As an extension we propose a moment based SNR estimator for different modulation scheme using AWGN, Rayleigh and Nakagami. Results provide that proposed estimator works better in low SNR conditions which are applicable to different communication scenarios.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A MDR BASED DTR PROTOCOL TO INCREASE THROUGHPUT, CAPACITY AND SECRECY OF WSN[Full-Text ]
Thasni P M, Nithin JoeIn hybrid wireless networks it incorporate MANETs and Infrastructure networks, so dynamic, efficient and decisive data routing is important for high capacity and throughput. A challenge here is if we can co-ordinately develop an efficient routing algorithm and effective reputation management for reliable routing. This paper presents a Distributed Three-hop Routing protocol (DTR) for hybrid wireless networks with a chance of peer-to-peer (P2P)-based Market-guided Distributed Routing mechanism (MDR). To take full advantage of the widespread base stations and effective reputation management and trading market management for reliable data routing .Furthermore, sending segments to a number of base stations simultaneously increases throughput and makes full use of widespread base stations. Theoretical analysis and simulation results show the superiority of DTR in comparison with other routing protocols in terms of throughput capacity, scalability and mobility resilience. The results also show the effectiveness of the congestion control algorithm in balancing the load between base stations. Here further propose market-based policies to strengthen cooperation incentives.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
OPTIMIZED SCHEDULING OF TASKS USING HEURISTIC APPROACH WITH COST-EFFICIENCY IN CLOUD DATA CENTERS[Full-Text ]
G.Ramya, Dr P. Keerthika, Dr P. Suresh and Ms M. SivaranjaniCloud computing is a promising approach to execute large programs, As this class of programs may be decomposed into multiple sequence of tasks that can be executed on multiple virtual Machines, the execution of the tasks can be viewed as a Directed Acyclic graph (DAG). In DAG, nodes are the tasks and edges are the precedence constraints between tasks. Users of cloud pay for what their programs actually consume according to the pricing models of the cloud providers. Earlier task scheduling algorithms are mainly focused on minimizing the makespan, but not the mechanisms to reduce the monetary cost incurred in the settings of cloud. The proposed scheduling algorithm mainly focuses on Cost-efficiency and it uses two heuristic methods. The First method dynamically maps task to the most cost-efficient VMs based on the concept of Pareto dominance. The second method, a complement to the first method, reduces the monetary costs of non-critical tasks.The simulation results show that our algorithm can substantially reduce monetary cost while producing makespan as good as the best known task-scheduling algorithm can provide.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
DESIGN OF LOWER-LIMB EXOSKELETON FOR WHEELCHAIR PATIENTS[Full-Text ]
Vasanth Sundaram, Senthil Kumar S, AhamedFaizA, Maheshwari SPersons with spinal cord injury (SCI) suffer impairment in lower extremities of the body causing a condition called paraplegia which leads to the loss of mobility. This immobilization limits their ability to access the world as they knew it. The extreme inactivity imposed from paralysis leaves these individuals at risk for many secondary medical conditions, such as adverse body composition alterations, increased risk for insulin resistance, diabetes and cardiovascular disease, and difficulty with bowel evacuation. In this project we aim at developing a device of a powered lower limb orthotic to aid walking in paraplegic individuals providing assistive torques at both hip and knee joints along with a user interface and control structure that enables control of the powered orthotic via upper-body influence which offer the possibility to adapt the paralyzed person to the existing environment, rather than adapt the environment to the wheelchair. Powered exoskeletons may permit the individual with paralysis to perform functional/vocational standing, and walking tasks. We aim at developing an exoskeleton with intelligent power management, lighter weight and low cost with improved mechanical design.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
INVESTIGATING THE MECHANICAL AND METALLURGIAL PROPERTIES OF CARBURIZED 16MnCr5 steel[Full-Text ]
C.m.Vivek, S.Vignesh Aravind, N.Shriram, J .Hari Vignesh16MnCr5 low alloy steel was carburized at 9250C. Carbon enriched up to 0.6% in case. The effective case depth is 0.47 - 0.50 mm. The tensile strength and hardness measured is 387.077N/mm2 and 720 HV. SEM analysis and fractography results shown are ductile fracture at the core and brittle fracture in the case.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------