TITCON 2015- 2nd International Conference on Trends in Technology for Convergence
"TITCON 2015 Conference Papers "
Efficient Analysis of Frequent itemset Association Rule Mining Methods[Full-Text ]
M. Inbavalli, Dr. Tholkappia ArasuData mining is the analysis of huge amounts of data in order to discover meaningful patterns.The growing demand of finding pattern from huge data makes the association rule mining (ARM) one of the most important data mining tools. It intends to extract interesting frequent patterns, associations, correlations or casual structures among sets of items in the transaction databases or other data repositories.Frequent itemset is groups of items which appear together in a sufficient number of transactions.The Frequent pattern mining helps to discover customer behaviors such that the quality of business decisions can be improved in the tremendous globalization era.Various efficient algorithms support association mining but this paper shows the efficient analysis of only the two very popular approach Apriori and FP-tree method.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
QoS Ranking Prediction Framework for Cloud Services[Full-Text ]
J.Subathra, P.LatchoumyThe rising popularity of cloud computing makes building high quality cloud applications a critical and urgently required research problem. QoS rankings provide valuable information for making optimal cloud service selection from a set of functionally equivalent service candidates. To obtain QoS values, real-world invocations on the service candidates are usually required. The existing system focuses on QoS ranking prediction for cloud services by taking advantage of the past service usage experiences of other consumers. This framework requires no additional invocations of cloud services when making QoS ranking prediction. Two personalized QoS ranking prediction approaches are proposed to predict the QoS rankings directly. The Proposed system is designed to improve the ranking accuracy of the approaches by exploiting additional techniques. When a user has multiple invocations of a cloud service at different time, the proposed system will explore Levenshtein distance calculation approach to find similarity for cloud services by employing information of service users and cloud services. Cloud Rank approach provides reliable service to the user.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Provenance based Adaptive Heuristic Scheduling in Cloud Environment[Full-Text ]
I.M.Maywish Rajakumari, Mrs.R.NarayaniCloud computing can be partitioned as a fine granularity and pool of resources to serve multiple consumers. The on-demand delivery of cloud computing is mainly based on internet services. The remote users can access the cloud systems by IaaS service. It provides the full infrastructure of the cloud environment. The multiuser parallel jobs are allocated to the host is really a challenging task. So, the flow of jobs can be handled by adaptive heuristic scheduling process. It helps to allocate the consumer jobs to the most appropriate fitted servers. In this paper, our system proposes to create a single datacenter with five servers which have static memory size. In adaptive heuristic scheduling processing, the parallel jobs have to be allocated to the servers. The frequent of server usage reductions are controlled using flag values. Then the system tracks all the information about the servers and its allocation process and stored it in a separate database. This database is referred as a provenance database. Finally a new jobs comes, it directly allocated to the fitted server with the reference of provenance database. This system helps to avoid the frequent allocation of particular server and also minimize the total execution time.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Affective Multi-Term Analysis using Distributional Semantic Similarity Measures[Full-Text ]
B.SUREKA, Mrs T.R AKILA DEVIAffective text analysis is a high quality text to handle large amount of noise data and very time consuming that combine the af-fective rating of multi-word terms. To generating the sentence rating have to improve the performance of unigram and bigram models by using the n-gram models. The affective rating for n-grams is estimated and the corpus based method using distributional semantic similarity metrics between the seed and the unseen words. Finally, it combines to form the sentence level rating through simple algebraic formula. The proposed framework produces the state of art results for word level tasks in English and Germany and the sentence level news headlines classification in semEval’07-Task 14 task. The inclusion of bigram terms provides significant performance improvement even if selection term is not applied.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
An Efficient Approach for Load Balancing in Cloud Environment[Full-Text ]
Balasundaram AnanthakrishnanCloud computing has become one of the key paradigms in distributed computing today. It provides the end users to access the resources in a distributed, scalable and virtualized fashion. The distributed nature of cloud in itself poses lots of challenges. Resource availability and load management across resources available in cloud environment pose a serious challenge. Thus load balancing plays a vital role in the performance of cloud computing. This paper focuses on listing the various techniques available for improving load balancing in cloud environment. Also, a comparative study of the load balancing techniques have been performed and tabulated. In addition, a new strategy to enhance load balancing in cloud environment has also been suggested
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Cloud Service Providers Ranking System Using Ontology[Full-Text ]
K.Niha, Dr. W.Aisha Banu, Ruby AnetteCloud computing plays an important role in the access of infrastructure and application services on a subscription basis. As a result, several enterprises have started to offer different cloud services to their customers. Due to the vast diversity in the available cloud services, from the users point of view, it is difficult for them to choose the service that fits best into their requirements though there are ample number of system that help the users assist in choosing the appropriate service provider, they are still not completely satisfactory. This paper discusses an ontology based system that help the users evaluate the cloud service providers based on their requirements and quality of service by the providers. Here the system is designed as three phases, they are (i) processing of functional requirements (ii) processing of non-functional requirements and (iii) ranking of service providers. The using ontology with explicit meaning, making it easier to automatically process and integrate information available for comparison, selection and ranking of cloud service providers using Analytic Hierarchy Process (AHP) to prioritize the cloud services. This system also enables the service providers to improve their Quality of Services (QoS).
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
ECG-DEFF: ENHANCED CLOCK GATING BASED DOUBLE EDGE TRIGGERED FLIP-FLOP[Full-Text ]
BALAKUMAR.M, BHARATHI.SIn integrated circuit, total power consumption is due to the storage elements and clock distribution. Energy competence from the clock elements plays a biting role in low power circuit design. Double edge triggered flip-flop is one artistry for energy efficiency. It is keep the throughput as single edge triggered flip-flops. Because double edge triggered flip-flop using a semi of the clock frequency. Clock gating is another well accepted artistry to chop the dynamic power of otiose modules or cycles. However, combination of clock-gating with double edge triggered flip-flops to further reduce dynamic power consumption. But it is introduce an asynchronous data sampling error. Three special clock-gating techniques are evaluated to extenuate this issue. This technique has some limitation of reducing the error. In this paper by eliminating limitations and design the errors free circuits.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
ECG-DEFF: ENHANCED CLOCK-GATING BASED DOUBLE EDGE TRIGGERED FLIPFLOP[Full-Text ]
M.Balakumar,. B.E., S.Bharathi,. M.EIn integrated circuit, total power consumption is due to the storage elements and clock distribution. Energy competence from the clock elements plays a biting role in low power circuit design. Double edge triggered flip-flop is one artistry for energy efficiency. It is keep the throughput as single edge triggered flip-flops. Because double edge triggered flip-flop using a semi of the clock frequency. Clock gating is another well accepted artistry to chop the dynamic power of otiose modules or cycles. However, combination of clock-gating with double edge triggered flip-flops to further reduce dynamic power consumption. But it is introduce an asynchronous data sampling error. Three special clock-gating techniques are evaluated to extenuate this issue. This technique has some limitation of reducing the error. In this paper by eliminating limitations and design the errors free circuits.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
3D Human-Computer Intelligent Interaction by Facial Expression analysis using Facial Action Coding System-FACS[Full-Text ]
K.S.Jayareka, S.RajaMohamedFacial expressions are the natural way to show emotions of human creature. A knowledge based emotion recognition approach for human and computer intelligent interaction based on tree structure can be developed. Decision Tree (DTA) and Sequential Tree Approaches (STA) are examined in the Facial Expression analysis process. From which, computer is trained to recognize and reproduce the six basic emotional states such as Surprise, Anger, Fear, Happy, Sad and Disgust using Facial Action Coding System (FACS). It is based on the enumeration of all Action Units of a face that causes minute facial movements. Facial Expression Recognition Process (FERP) involves both Facial Parameter Extraction and Facial Parameter Analysis. With the FERP, Human-Computer Intelligent Interaction (HCII) aims at providing natural ways for computers to talk, encourage, console, support, share and calm humans during their different states of emotions. In Neural Network, Feed Forward Back Propagation and hierarchical based clustering algorithm is used on each node of these trees to improve the efficiency and robustness of Facial Expression Analysis.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Shredded Newspaper as a Physical Conditioner for Improving Drainability of Brewery Sludge[Full-Text ]
Hema Nalini. A.V, Dr. P.R. Sreemahadevan Pillai, Dr. Y.V.K.S. Rao Sludge dewatering is an essential criterion for the disposal of industrial sludge. Conditioning of the sludge is required for improving the drainability of raw sludge. Physical and chemical conditioners are widely used for this purpose. The suitability of shredded newspaper as a physical conditioner along with inorganic chemical coagulants – alum, ferric chloride, polyaluminum chloride (PAC) and polyacrylamide (PAM) – are studied for conditioning brewery sludge. Among the different combinations, PAC with shredded newspaper is better. The results show that 4 g/L of shredded newspaper with 30 mL/L of 5 % PAC yield a SVI of 37.662 and an efficiency of 39 % in reducing moisture content at the end of 168 hours in sludge drying bed. 4g/L of shredded newspaper alone gives a SVI of 65.254 and efficiency of 36 % in reducing moisture content at the end of 168 hours of drying.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Implementation of Saliency Detection in Motion Fields[Full-Text ]
K.Shankar, Dr.S.Srinivasan, P.PriyaThis paper proposes Extracting salient objects from motion fields using Region Growing Segmentation Technique. Region growing segmentation Process is iterated for each boundary pixel in region. The proposed saliency measure is formulated using a statistical framework and local feature contrast in illumination, color, and motion information. For improving image contrast and illumination, Principle Component Analysis (PCA) technique is used. Salient object detection is an important technique for many content-based applications, but it becomes a challenging job when handling the cluttered saliency maps, which cannot completely highlight primary object regions and cannot suppress background regions. The proposed method used for removing random noise has been researched extensively due to its effectiveness and simplicity
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Computational Fluid Analysis of Lithium-Ion Battery Using ANSYS Fluent[Full-Text ]
Arunkumar.R, S.Anbumalar, AvilaPriya.F, Poongothai.KThis paper presents the thermal management of lithium-ion battery is the most important parameter towards battery life and state of charge and discharge. Li-Ion battery is the major source among the Electric Vehicles and Hybrid Electric Vehicles. TO improve the thermal efficiency and to increase the battery life, the recently introduced orthosilicate compound Li2MSiO4 is used as cathode material. It is the cheapest material with high initial charge profile and improved ionic conductivity and has better temperature with stand capacity. The computational fluid flow analysis is done using ANSYS FLUENT V6.3.2.6 software to analysis thermal system of battery and to investigate the thermal flow in battery during state of charge and discharge
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
An Efficient Area Utilization of FM0, Manchester and Miller Encoding Architecture for DSRC Applications[Full-Text ]
RAGHAVAN V VOriginally the DSRC applications requires encoding techniques for secure communication which include FM0 and Manchester encoding architecture. On analysis and observing the FM0 and Manchester encoding together in an initial hardware architecture. An effective utilization is more which leads to substantial area consumption. Hence, we adopt SOLS technique which merges architecture together and synchronize the operation. The circuit obtained is an integrated architecture of FM0, Manchester and Miller encoding to overcoming various drawbacks of traditional method. This deduced architecture of FM0 and Manchester coding would well support the DSRC standards. The performance of this paper is evaluated on Xilinx FPGA Spartan-3E kit. This paper not only develops a fully reused VLSI architecture, but also exhibits an effective performance compared with existing works.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
SFICAN BASED INFRASTRUCTURE FOR AUTOMOTIVE APPLICATION[Full-Text ]
P.Sheela, J.GobinathStar based infrastructures have been proposed for automotive application. In the existing system physical fault-injection is carried out using sfiCAN protocol in which CAN-Compliment hub allows injecting fault independently in transceiver bits. It recreates fault scenarios beyond the capability of the injectors of the CAN. Here only Software implementation is carried out with the lack of time resolution. This conflict is rectified in proposed system. The proposed system designs a CAN topology, which is converted to star formation in order to increase the efficiency of the system which is implemented in motor control and energy consumption application. Automated systems are governed and controlled by server unit. It saves the times resolution and implementation of hardware is carried out efficiently.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Weather Master:Mobile Application of Cyclone Disaster Refinement Forecast System in Location Based on GIS Using Geo-Algorithm[Full-Text ]
R.Kavitha and Mr.S.AnuvelavanCyclone is the serious geological disaster,and effective way to prevent cyclone disaster is forecasting weather changes.Development of wireless networking technologies provides a straight forward approach to collect live Geospatial data from service provider’s API services and shared through internet to present weather data on Android Smartphone.In this paper,a new algorithm is proposed to integrate the different service provider’s API services and use cloud to carry the management of these services. An application of WeatherMaster provides a location based mobile weather forecasts during the cyclone disaster in GIS. It depends on the user selected location via Google Map. A new algorithm is proposed that helps to find the nearest neighbor, possibilities of weather changes and finds out the causes of the changes of near cities. The nearest neighbor and weather data are passed to the Google Mapping Services that are integrated with an existing outline database to set their range gives information of cyclone disaster rating.The main function of this system is to achieve results of cyclone disaster risk rating forecast and cyclone disaster information management. Forecasting results, helps to give early warning to public take response and reduce losses to prevent from cyclone disaster
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
3D CFD simulation of a circulating ?uidized bed boiler Riser and cyclone[Full-Text ]
Vivekanandan M, Mercy Vasan, Gopalakrishnan VThe rapid depletion of oil and the environmental impact of combustion has motivated the search for clean combustion technologies. This has open various research area in CFBC boiler. In the current work, a model of the ?uid mechanics in the riser of a circulating ?uidized bed (CFBC) has been implemented using computational ?uid dynamics (CFD). Understanding the hydrodynamic processes in ?uidised beds is essential as the ?ow behaviours causing heat distributions and mixing determine the combustion processes. The inlet velocities and di?erent particle sizes in?uence the ?ow behaviour signi?cantly, particularly on the transition from bubbling to fast ?uidising regimes. Computational modelling has shown great advancement in its predictive capability and reliability over recent years. Whilst 3D modelling is preferred over 2D modelling, the majority of studies use 2D models for multiphase models due to computational cost consideration. In this paper simulation results were presented in terms of the pressure pro?le around the whole loop of solids circulation, pro?les of solids volume fraction and fluid velocity, as well as the non-uniform distribution of solid ?uxes into cyclone
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
An Advanced Obliging System for Quick Rescue In Automobile Mishaps[Full-Text ]
R.Anu, N.VinodhaThis project proposes a novel intelligent system which is able to automatically detect road accidents, estimate its severity and the information are sent to emergency services in a much faster way. The accident information is also sent to the concern persons relative. To attain our proposed system a crash sensor, a MEMS sensor, GPS, GSM, ZigBee is used. The severity of the accident is found using MEMS sensor and crash sensor. GSM sends the accident information to the emergency service and the ZigBee is used to transmit the information to the other vehicles on road which are in and around the accident spot. When accident occurs vehicle motor (engine) will stop automatically
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Design of Baugh Wooley Multiplier with Adaptive Hold Logic[Full-Text ]
M.Kavia, V.Meenakshi Mostly, the overall performance of the arithmetic functional units depends on the throughput of the digital multiplier. In order to increase the performance, clock period has to be minimized. Baugh Wooley Multiplier is one of the high performance parallel multiplier but its propagation delay is high compared to other arithmetic units in the system. So variable latency technique is implemented using adaptive hold logic, it will analyze the inputs and determine the number of clock cycle required for each input pair. At normal condition multiplier output will be taken in one clock cycle, depend upon the complexity of input, number of clock period is increased and for worst case two clock cycles is used for multiplier. By means of this technique the performance of the system will be increased depend upon the clock frequency used.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
ARTIFICIAL NEURAL NETWORK[Full-Text ]
Greeshma.U, Annalakshmi.SAn Artificial Neural Network (ANN) is an information processing paradigm that is inspired by the way biological nervous systems, such as the brain, process information. The key element of this paradigm is the novel structure of the information processing system. It is composed of a large number of highly interconnected processing elements (neurons) working in unison to solve specific problems. ANNs, like people, learn by example. An ANN is configured for a specific application, such as pattern recognition or data classification, through a learning process. Learning in biological systems involves adjustments to the synaptic connections that exist between the neurons. This is true of ANNs as well. This paper gives overview of Artificial Neural Network, working & training of ANN. It also explain the application and advantages of ANN.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Slot-Sharing model for Campus Recruitment in Professional Institutions - A Case Study[Full-Text ]
Mohamed Tajudeen.S, Dr. L.Aravindh KumaranThe number of professional institutions has grown manifold in the past decade. Though the academic process, the faculty qualification, the infrastructures are deciding the quality of the institution; finally Campus recruitment is a crucial factor that builds the brand and reputation of professional institutions across India. The brand of the recruiter and the pay offered by them are two important factors that influence the rating of the institution. The intention of any recruiter would be to recruit the best performing student in the class, so the demands first slot from institution for the campus recruitment issue in the campus placement scenario. It is a challenge to decide which company should be given the first day. Once the first slot is committed to a company it deprives the student’s opportunity of attending the campus of the dream company and many times the company given the first slot might not end up in recruiting as many numbers as expected. To overcome this issue a new strategy called the ‘slot sharing’ is practiced. This paper is aimed at slot sharing strategy for the professional institution, stu-dents and company.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
An Analysis on Routing & Issues in Network Layer in WMNs[Full-Text ]
C.Gayathri, Dr.V.KavithaWireless mesh networks is composed of nodes connected in mesh architecture, hence the network is highly connected and employed in various applications. Providing end – to – end security is a tricky task since a number of attacks are present in different layers of the network. As such all the layer network layer holds the importance of routing in the network . This analysis briefly discuss about the issues in network layer of WMNs and schemes adopted for the detection of some of the network layer attacks. Denial of Service (DoS) attacks are multi layer attack they can deny service at any possible layer. Some of the DoS attacks in network layer are Blackhole Attack, Greyhole Attack. Byzantine Attack etc. A greater concern is given to network layer since the foremost duty of network layer is routing. Any attack or malfunctioning in routing causes misrouting of packets and breakdown of the network or eavesdropping of the secure information being transmitted. To mitigate the effect of such attacks different approaches are used
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
D-STATCOM Based Load Compensation for Isolated Generation System[Full-Text ]
Manikandan.A,R.Thamizharasan ,Jaya Sree.LThe installation of Diesel Engine based electricity generation unit is widely used in practice to feed the power to some crucial equipment. Diesel Generator (DG) sets used for these purposes are loaded with unbalanced, reactive and non-linear loads such as power supplies in telecommunication equipment and medical equipment. The source impedance of the DG set is quite high and the unbalanced distorted currents lead to the unbalanced and distorted three-phase voltages at the Point of Common Coupling (PCC). All of these factors lead to the increased fuel consumption and reduced life of the DG sets [5]. The DG set is used to supply the load which is non-linear in nature. Due to the non-linear nature of the load, the load gets distorted which will affect the source voltage. To overcome these problems, a D-STATCOM (Distribution Static Compensator) can be used for the reactive power, harmonics and unbalanced load compensation which facilitate, to load the DG set. The D-STATCOM is used to inject the current source at the PCC [1]. The control of D-STATCOM is achieved using Space Vector Pulse Width Modulation (SVPWM) technique. The proposed system is simulatedunder MATLAB environment using Simulink
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Analyze The Floor Tiles Parameters To Select The Suitable Tiles For Buildings Using Plc And Scada[Full-Text ]
Gobinath J,Petchi Lingam SIn this project, analyzing the tiles with some parameters, such parameters are designing of tiles, cracking in the tiles. Image processing technology is one of the efficient tools to analyzing the tile’s structure. A fully manufactured tile will come on one conveyor with the help of proximity sensor. The conveyor will be stopped when tiles reached a camera unit. During that process, the camera will be ON and suddenly capture the image of current tiles. Then the camera will send the captured image to the MATLAB software. The software will compare the original image (required design and size) and the current image. The original image is previously stored in the software. According to the correct image, a separator will change the direction of tiles. The separator is nothing but one part of hardware hand module which is available in the conveyor mechanical set up. The conveyor control, sensing operations, diversion control and etc. each operation should be controlled by PLC. The PLC is one of the controller modules which can control the output devices with the help of input devices and developed a program. Now-a-days, industrial processes are monitored in a RTU unit. In similar way, this process will be monitored by SCADA (Supervisory Control and Data Acquisitions).
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Ontology of Dynamic Spectrum Sharing through Cognitive Radio Nodes in Wireless Networks[Full-Text ]
J.Suji Priya,T. PadmaCognitive radio (CR) can effectively deal with the growing demand and scarcity of the wireless spectrum. To exploit limited spectrum efficiently, CR technology allows unlicensed users to access licensed spectrum bands. Since licensed users have priorities to use the bands, the unlicensed users need to continuously monitor the licensed users’ activities to avoid interference and collisions. In traditional method spectrum sharing between licensed and unlicensed users are done by static method which is inefficient. In this method spectrum bands are wasted. Since spectrum bands are scarce resource it can be effectively used by dynamic spectrum sharing method. Recent research discovered various dynamic spectrum sharing methods. In this paper technique of spectrum sharing among service providers to share the licensed spectrum of licensed service providers in a dynamic manner is considered. The performance of the wireless network with opportunistic spectrum sharing techniques is analyzed with the help of cognitive radio has been investigated. This paper suggests the best method for sharing spectrum in which, the spectral utilization and efficiency is increased, the interference is minimized
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
SZRP - Hybrid approach of determining the optimal path in Mobile ad hoc network[Full-Text ]
R. Shanthy, Assistant Professor Dr.T.Padma, ProfessorA mobile ad hoc network has a dynamic nature that leads to constant changes in its network topology. As a end result, the routing problem becomes more complex and challengeable in large scale networks. In this paper, we proposed the hybrid approach of routing (SZRP) an enhancement of Independent Zone Routing which allows distributed configuration for the optimal size of each node’s routing zone, on per-node basis. Here in this SZRP, control messages and data packets are sent along with efficient tree like structure in order to reduce the network load and also here zone formation is based on the real time traffic of the network. We demonstrate the performance of SZRP with various performance metrics. Results indicate that SZRP is highly scalable for large networks compared to IZRP by considering performance metrics Packet Delivery ratio, End-to-End Delay and Normalized Routing overhead.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Design and Simulation of Soft Switched Interleaved Boost Converter in Continuous Conduction Mode for RES[Full-Text ]
Chitravalavan, Dr.R.SeyezhaiIn this paper, an interleaved soft switching boost converter employing ZVS and ZCS principle leads to reduce ripple contents and high efficiency is proposed for renewable energy systems (RES).The conventional hard-switched interleaved converter results in increased switching losses and ripples. To overcome, this drawback, a two-phase Interleaved Boost Converter (IBC) with ZVS and ZCS is proposed. This circuit consists of two identical boost converter connected in parallel and are controlled by interleaved switching signals.The circuit is analyzed in Continuous Conduction Mode (CCM) with various load ranges having duty cycle of more than 50%.Simulation studies of the proposed converter is carried out in MATLAB. The performance parameters such as output voltage ripple, output current ripple, inductor current ripple and efficiency of the proposed converter is computed to show the significance of the soft switching principle.The results are verified
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
PATH SELECTION IN COGNITIVE NETWORKS UNDER BROADCASTING SCHEME[Full-Text ]
A.Nithya,Ms.K.Fathima Begam M.EIn cognitive radio networks (CRN) unaccredited users might observe heterogeneous spectrum handiness. We have a tendency to tend to ponder unaccredited users are not conscious of constellation, spectrum handiness and time synchronization knowledge. Thus, it\'s terribly troublesome that broadcasts are successfully conducted whereas not knowing the spectrum handiness knowledge before. To boot, since broadcast collisions usually lead to the waste of network resources, they need to be efficiently lessened in multi hop eventualities. QB2IC is projected with the aim of obtaining a high success rate and short broadcast delay jointly considering with the energy economical is that the thought of this projected work. The foremost vital issue that has got to be resolved in planning a knowledge transmission algorithmic rule for psychological feature Radio networks (WSNs) is the way to save device node energy whereas meeting the wants of applications/users because the device nodes are battery restricted. Whereas satisfying the energy saving demand, it\'s conjointly necessary to attain the standard of service. just in case of emergency work, it\'s necessary to deliver the info on time. Achieving QoS in WSNs is additionally vital. so as to attain this demand, Power-efficient Energy-Aware routing protocol for psychological feature Radio networks is projected that saves the energy by with efficiency choosing the energy economical path within the routing method.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
An Improved Intelligent Algorithm for Solving the Unit Commitment Problem[Full-Text ]
MageshwariK,Rajalakshmi SIn this paper is used to reduce the generation cost and maximize the supply reliability using two-layer binary multi objective particle swarm optimization algorithm. Unfortunately some difficulties arise when we attempt to realize the above objectives. In the current power market, system operators strive to maintain, reliabilitystandards while minimizing the operating cost of the system. The complexity of the two-stage multi objective optimization problem makes the runtime cost is high, then to developed TLB-MOPSO algorithm can also find better spread of solutions and to reduce the iteration number.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Real Time Smart Security System for Motion Detection[Full-Text ]
Sanjay P N, Vijaya Krishna , Dr. Naveen Kumar S Security is increasingly viewed at all encompassing condition in which people and community lives in freedom, peace and safety. Object security is an important issue in all remote monitoring of confidential areas like museum or archaeological department.In general cases object security is ensured using human power, the work addresses the issue of video based security system for the security of the object in public area.This paper describe the Video processing technique is applied to extract the video frames and morphological operations is applied to the extracted frames together with threshold technique to ensure the security of the object, and also it gives security to sensitive area, if intersection comes it shows message (ON/OFF) and sounds the alarm. Video camera can be accessed local as well as from remote and it perform 24 hours verification with of alarm accuracy and displaying the message.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A comprehensive analysis of warehouse op-erations and product integrity management at Pon Pure Chem (P) Ltd., Chennai [Full-Text ]
Neha Uttam, Priyanka Verma, Aurobindo ParidaIn this paper, we study and address the some major supply chain and operational challenges at Pon Pure Chem (P) Ltd. Chemicals Co. Pon Pure Chem (P) Ltd. is a well-known chemical distribution company, which usually imports a large variety of chemicals from various countries and distributes them to customers in India. During this process, the aim of the company is to maintain the integrity of the chemicals with minimum loss during transporation and storage at the warehouse. The problems arise mainly due transporation of chemicals from sea port and storage at the warehouse. The study tracks the life cycle of the materials from the primary source of reception at port to the final point of selling to the customer. A complete study was done on various challenges and solutions were given with detail description. The problems were grouped in two categories: at operational level and at product integrity level. At operational level, time study was carried out to determine the standard time for the suitable utilization of human resources. The loss of volatile chemical compounds due to evaporation was another major issue. This issue was analysed by developing a stepwise backward regression model which could give information about the loss of chemicals in percentage. At product integrity level, the customer complaints were studied and then Pareto analysis, followed by Root cause analysis was conducted
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Fault Diagnostics and Health Monitoring of Machines Using Wireless Condition Monitoring Systems[Full-Text ]
Prateek Saxena, Naresh TandonThe focus in recent years is shifting from scheduled maintenance to predictive maintenance by observing and predicting the machine condition in advance. The motors used in the machine are being monitored using vibration, current, and temperature sensors which either provide warning signals or shut down the system before any catastrophic failure occurs. Traditional condition based monitoring system is a wired system formed by communication cables and different sensors. This involves high installation cost and difficulty in maintenance especially when the equipment is placed at different location than machine. To overcome these restrictions, the structures can be monitored remotely with the help of wireless transmission media. Wireless sensor network is a control network that integrates sensor, wireless communication and distributed intelligent processing technology. This paper discusses the recent advancement in structural health monitoring of machines using wireless technology
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Low Complexity MMSE MIMO Detector for 3GPP LTE Downlink[Full-Text ]
Shobana S, Joseph Gladwin SIn this paper a low complexity Minimum-Mean Squared Error (MMSE) detector for Multiple-Input-Multiple-Output Orthogonal Frequency Division Multiplexing (MIMO-OFDM) system is addressed. MIMO-OFDM is a promising technique for modern wireless communication that demand high data rate for applications such as Third Generation Partnership Project Long Term Evolution (3GPP LTE). OFDM divides a wideband frequency selective wireless fading channel into narrowband flat fading sub-channels and is the most popular multicarrier scheme because it can be implemented by efficient Fast Fourier Transform (FFT)/Inverse Fast Fourier Transform (IFFT) techniques. Basically in OFDM systems, interpolation concepts are included to reconstruct the channel response so that the performance of channel estimation gets improved. The proposed detector uses division-free matrix inversion algorithm for the computation of MMSE matrix on pilot subcarriers which reduces the overall complexity by combining computations of channel estimation and MIMO detection. Modifying the banachiewicz matrix inversion formulae in the algorithm greatly results in the reduction of computational complexity of the system. The LTE system is built using MathWorks MATLAB and the Bit Error Rate (BER) performances are analyzed
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Super Resolution of Medical images using Example-Based Method for Denoising[Full-Text ]
K.E.Arulmozhi,N.SasirekhaIn super resolution technique, from many low resolution images an high resolution image is constructed. Super resolution method is used in many applications like in medical, electronics, aeronautic fields etc. In this paper the Iterative Back Projection (IBP) algorithm is used in which the Advanced Non local Mean filter (ANLM) is incorporated. The reconstruction error is minimized by using the IBP method. The ANLM with IBP method , the missing pixels are constructed using the Gaussian Kernels and the main advantage of this method is that it considers both the neighbourhood similarity and the path distance for the reconstruction process. The analysis is carried out using the Magnetic Resonance (MR) images. The experimental results shows that in the proposed method there is 7 percent increase in the PSNR values while considering the existing method
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Trust Based Anonymous Authenticated Secure Routing for MANETs[Full-Text ]
M.Narmatha Priyaa, G. Ravi Secure communication is important in mobile ad hoc networks. The mobile ad hoc network is a continuously self-configuring network. It is also an infrastructure-less network. The main need in the network is to provide secure communication. There are some nodes in the network which reveal the secret information. These nodes are termed as the untrusted nodes. There are some particular nodes which do not reveal the secret message to the other malicious nodes. These nodes are termed as the trusted nodes. These trusted nodes are used for routing. There are many protocols in the network which are used for secure routing. But these protocols are not successful in providing the security of the network. In this paper, the proposal of a new routing protocol named as trust based routing protocol is employed which provides security in the network
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
WEB PAGE RETRIEVAL USING SEMANTIC BASED SEARCH ENGINE[Full-Text ]
D.Magdalin Diviya, D.Praveena, C.RanjaniSearch engines have become one of the most powerful tools for retrieving useful information from the Internet. However, the machine on the current Web cares about the location and display of information rather than caring about the semantics of the information. Because of this shortfall of the current Web, the search results given by the most popular search engines cannot produce accurate results. In current web, the relevant information for the user’s query cannot be provided by the search engines completely. Content structure in the web and methodologies followed by the web search engines are significant reasons behind this. Keyword searching is the technique used in traditional search engines. Semantics of user’s query are not considered by these traditional search engines. The goal of the proposed work is to highlight the usage of semantic web and to overcome the cons of conventional search engines using semantic web concept. In this work, we present the design, development and implementation of a search engine which uses semantic web. Here searching is not just based on keyword search but also on the semantics of the keyword. In semantic web layered architecture, Ontology is used to provide more relevant search to fulfill the user’s requirements. Semantic web search examine the user’s query semantically to provide better search results.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Demographic Population Segmentation for Predicting Employability Characteristics of Women[Full-Text ]
R.Priyatharshini, Sai Prashanthi. S, Shanmathi. A, Sankkavai Lumumba. N.K, Dr.S.ChitrakalaIn this paper an approach for employability characteristics prediction has been proposed. Demographic segmentation is the process of segmenting the population according to age, race, religion, gender, family size, ethnicity, income, and education. With this demographic segmentation method we segment the population based on their demographic characteristics. Data Mining is an analytic process designed to explore data in large databases and in search of consistent patterns and/or systematic relationships between variables, and then to validate the findings by applying the detected patterns to new subsets of data. The ultimate goal of data mining is prediction - and predictive data mining is the most common type of data mining. Big data is a term for massive data sets having large, more varied and complex structure with the difficulties of storing, analyzing and visualizing for further processes or results. In our paper we propose to predict the employability characteristics of women using decision tree algorithm. Here we use the data from the United Nations Statistics Division‘s datasets. We analyze the statistics of employed and unemployed women and propose a solution to improve the employability.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
PERFORMANCE IMPROVEMENT IN POWERLINE CHANNEL USING TURBO CODE[Full-Text ]
GEETHU S.S, S. NarayananPower Line Communication (PLC) operates by impressing a modulated carrier over the wiring system conventionally used for delivering electricity. PLC eliminates the need for installing a dedicated cable for data transmission. Wide range of PLC techniques are available for different applications ranging from home automation to broadband communication.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
SSR Improvement in OFDMA Femtocell Networks[Full-Text ]
Sandhya Y. A.To enhance indoor coverage and capacity of fourth generation cellular networks femtocells are introduced. These are the small cellular base station installed in a home or buildings. Femtocells are deployed in the existing macrocell networks. Both uses same frequency band. Since both femtocell and macrocell uses same frequency band there is a problem of interference between the femtocell and macrocell, which reduces the performance of these networks. Therefore it is necessary to allocate resources to them in such a way that interference is mitigated. In order to improve the performance a distributed Resource allocation using link state propagation algorithm is proposed. Which allocate OFDMA resources to all femtocell in the network. This method gives better Spectral Spatial Reuse (SSR) than the existing methods..
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Managing PRI Devices and Call Rates for Information Security Department[Full-Text ]
Abdul Wahid, Dr. W.Aisha BanuNow a day’s usage of PRI Devices (Primary rate Interface Devices) are more in commercial organizations. The PRI is a telecommunications interface standard used on an Integrated Services Digital Network (ISDN) for carrying multiple data transmissions services between the net-work and a user. PRI Devices enables traditional phone lines to carry voice, data and video traffic, among others. With the help of these devices many organization manage their customers by tracking their call and other call details like caller ID, Incoming and outgoing call rates etc., In this paper the system is developed for monitoring their customer’s numbers which are already registered in their server by the time of their customer’s registration with their organization and are managed periodically. With this they can estimate their statistics of the customer’s retail growth, duration of the call and generated revised bill amount. Processing and managing these details for large set of customers is not efficient and reliable. Proposed system plays a major role with the PRI Device and call rates are managed automatically which improves the commercial growth of the organization by reduced cost.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Seven Level inverter with Reduced Switch for Various PWM Strategies[Full-Text ]
K.Meenakshi, C.R.Balamurugan, S.P.Natarajan, T.S.AnandhiThis paper presents a three-phase seven-level inverter with RL (Resistive and Inductive) load for various Bipolar Pulse Width Modulation (BPWM) strategies are like Phase Disposition (PD), Phase Opposition and Disposition (POD) PWM, Alternative Phase Opposition and Disposition (APOD) PWM, Carrier Overlapping (CO) PWM and Variable Frequency (VF) PWM sinusoidal reference and trapezoidal reference. The independent work of this paper is equivalence of Total Harmonic Distortion (THD), VRMS and VPEAK for sinusoidal and trapezoidal references. The simulation performance is done through MATLAB /SIMULINK software. COPWM strategy is to perform better as of it provides relatively higher fundamental RMS output voltage.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Bio-inspired computation for task scheduling in hybrid cloud[Full-Text ]
M.Anuradha, Dr.S.SelvakumarIaaS(Infrastructure as a Service) is a type of cloud computing in which a third party provider hosts virtualized computing resources over the internet. IaaS achieves economy of scale by providing services to multiple clients at one time called multiplexing. Number of scheduling approaches have proposed in the recent years but requires standardization and agreement hence creates difficulties for the cloud users. The proposed system addresses the issue by sending task to other providers and utilizes the unused resources by analyzing it through Ant Colony Optimization(ACO). The intelligent scheduler in the proposed approach schedules task in an optimized manner in the way how ants search food from its ant hill.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Interference cancellation in MC-CDMA by adopting Blind Equalization for wireless communication systems[Full-Text ]
Fazeela.P.Muhammed, Dr.Jayanthi.KThe increasing demand for wireless services has created the need for cost effective transmission techniques that can exploit scarce spectral resources efficiently .In order to achieve the high bit rates needed to meet the quality of service requirements of future multimedia applications, MC-CDMA has been considered as good air-interface candidate. However, the user capacity of MC-CDMA system is essentially limited by interference. This interference can be mitigated by employing precoding techniques; Blind Equalization based receivers and efficient interference suppression techniques. In the proposed system, combined Iterative IA precoding at the transmitter with Blind Equalization based processing at the receiver is suggested for MC-CDMA systems. Conventional equalizations minimizing mean square error generally require a training sequence accompanying the data sequence. Considering the fact that blind equalizers do not require pilot signals to recover the transmitted data.The constant modulus algorithm (CMA) is one widely used algorithm for blind equalization of QAM signals.Our scheme achieves the maximum degree of freedom provided by the IA precoding,with performance close to matched filter bound (MFB).
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Assessment of Energy Saving Potential in a BPO Building through Energy Audit[Full-Text ]
Sangeetha.N, Dr.S.PadmaEnergy plays an important role in the economic activities along with production sector, utilities etc. In developing countries like India, increase in energy needs results in energy shortage due to lack of resources and generating units. So it is necessary to conserve energy through various measures like auditing, efficient utilization of energy through proper investments. Energy audit acts as important methodology to balance energy inputs along with actual utilization. Based on suggestions provided by audits, utilization of energy and efficient use of resources can be improved. The scope of this paper is to conduct an energy audit program in a commercial building and reduce energy consumption based on conserving measures suggested through auditing
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Community detection and identifying leaders and followers in online social networks[Full-Text ]
Jeba Emilyn J, Keerthana RThe social networks have become a vital need in this modern era. These networks exhibit modular structure that supports their evolution into highly complex systems. The detection of this modular structure within the social network is known as community detection. It helps to identify closely related nodes and it provides a way to understand the organization of complex systems. There are several algorithms and approaches available to detect communities. A detailed study of those approaches has been made in this review. Leaders are the users having larger influence than others in the network called followers. Identifying leaders and followers in those detected communities found to have wide variety of applications.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A New Intrusion Detection System for AODV (IDAODV)[Full-Text ]
Prasanna Lakshmi G S, Dr.Shanta Kumar B Patil, Mamatha C.M, John.J.P, Dr.Prema Jyoti PatilMobile Ad hoc Networks (MANET) is one of the most vital and exclusive applications. On the contrary to traditional network architecture, MANET does not need a stable network infrastructure; the self-configuring ability of nodes in MANET made it popular among critical mission application like military use or emergency retrieval. AODV is an important on demand routing protocol. Security is a central requirement for mobile Ad Hoc networks. Intrusion Detection System aimed at securing the AODV protocol has been studied by Stamouli et al [1] using specification based technique. In this paper, the work of Stamouli et al [1] has been extended and the proposed protocol is called IDAODV (Intrusion Detection AODV).In our work, we make use of Knowledge-based intrusion detection. Our Intrusion Detection and Response Protocol for MANETs have been demonstrated to perform better than that proposed in [1] in terms of false positives and percentage of packets delivered. IDAODV performs real time detection of attacks in MANETs running AODV routing protocol.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Intelligent Closed Loop Power Control For Reverse Link CDMA System Using Fuzzy Logic System[Full-Text ]
K.Sanmugapriyaa, P.PadmaloshaniIn wireless communication systems, multiple-access techniques introduce multiple access interference and which is one of the major factor that limit the system capacity. For CDMA/WCDMA systems, power is the main resource that is shared by multiple access schemes and thus the performance relies greatly on fast and accurate adaptive power control for both mobile and base stations. This work presents the intelligent closed loop power control for reverse link CDMA using fuzzy logic system.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Study on Effect of Failure Modes in Hydrogen Embrittlement of Austenitic Stainless Steel[Full-Text ]
K.R.Surendran, M.Balamurugan, B.SenthilkumarAustenitic stainless steel is a good choice of material when needed in harsh environment. Even though the alloy content of material makes it suitable for harsh environment, some premature in-service failures have been recorded. The reason behind this type of failures is due to the degradation of mechanical properties. This study investigates the effect plastic deformation, solution concentration and current on the hydrogen embrittlement of pre-strained as well as unstrained specimen. The specimen is subjected to electrochemical charging of hydrogen continuously for 8hrs. After hydrogen charging the specimen is subjected to tensile test and corresponding change in mechanical properties of the specimens were recorded. The hydrogen charging decreased the yield and percentage elongation of the specimens.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Effect of Flux Cored Arc Welding Process Parameters on Weld Bead Geometry[Full-Text ]
Rajavelu.S, Senthilkumar.B, T.KannanFlux Cored Arc (FCA) welding process parameters are the most important factors which affecting the properties of the weld bead. This paper models the influence of welding parameters like welding voltage, welding speed, wire feed rate, standoff distance on bead geometry. The filler material used in this work was super duplex stainless steel of grade 2507. Set of experiments based on Taguchi technique has been used to acquire the data. An Orthogonal array and Taguchi signal to noise ratio (S-N Ratio) was employed to investigate the welding characteristics of super duplex stainless steel material and optimize the welding parameters. The success of FCA welding process in terms of providing weld ability good quality and high strength depends on the process conditions used in the setup. This research aims to identifying the main factors that have significant effect on weld bead geometry.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Security Enhanced Weighted Double Cluster Head based Routing Scheme for Efficient Routing in MANETs[Full-Text ]
S. Aruna, Dr. A. SubramaniThe primary objective of ad hoc network routing protocols is to construct an efficient route between source and destination nodes, with the intention that the messages may be delivered on time without any delay. Therefore, route construction must be done with less routing overhead and bandwidth consumption. One way to reduce routing control traffic is to divide the network into clusters. In most MANET clustering protocols, the leader node (cluster head) acquire on a special role in managing routing information. Due to highly mobility, the cluster head may move often, that leads to frequent re-clustering. This in turn, agitates the stability of the whole network. To enhance the network stability and bandwidth consumption, we introduce a new cluster-head election scheme to reform the cluster. This scheme is based on providing an alternative clusterhead (SCH) for each primary clusterhead (PCH). This SCH is an ordinary member node, which is identified and elected by its PCH to be the future leader of the cluster. When the PCH is no longer being a cluster head, the SCH will be triggered to be the PCH, by the former PCH. Since the SCH is known by all member nodes, the cluster leadership is transferred efficiently without affecting the performance of the network. Also, our proposed protocol (SD-CBRP) aims at improving quality of service with security. The performance of the proposed scheme is evaluated with NS2 simulator and shows better performance in terms of the packet delivery ratio, throughput and delay when compared to a weighted cluster based protocol (CBPMD).
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Prevention Of Heart Attack And Blood Oxygen Monitoring System[Full-Text ]
S. Ambrose, Gayathri Haridas, V. VanatheThis project deals with the disorders of human body such as heart attack and gives us the solution ,to identify,regulate and act as a first aid kit under critical situations.this system comprises of the heartbeat sensor which helps us to monitor and compare PH,blood oxygen and pressure levels such as systolic and diastolic pressures of the human body which are developed in the heart valves during its normal and abnormal conditions.if any deviations in the pulse rates are identified by the system then the deviation is coded on to the microcontroller and an alarm sound along with the location information is being sent to the nearby hospital or to the medical control sector with the help of GSM and GPS systems.Along with this a small acceptable vibration is also triggered with the help of vibrator,on the person under crisis as a first aid to protect the person from dangerous situation and to resolve the issue temporarily,until the person of interest is shifted for proper medication.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Detection of malicious activities on tracking to ensure security and transparency in cloud[Full-Text ]
Ashwini.S, Moorthi.K, Sakthi VelMechanism of tracking data flow in cloud computing is to provide transparency and increase security. The flow of data’s along with its activities is monitored on tracking with a logging mechanism in order to increase trust and security. Event logging mechanism are involved which captures analysis and visualize data events in the cloud from the data point of view. Critical data-related cloud security problems such as malicious actions, attackers, and data leakages, data policy violations can be detected by analyzing the data provenance. Various data leakage threats and attacks are analyzed and alerted to data administrators and owners; thereby increasing the needs of trust and security for customers’ data, with various provenance algorithms. Event logger Records file centric access and transfer information from within the kernel spaces of both virtual machines (VMs) and physical machines (PMs) in the Cloud, giving full transparency of the entire data landscape. Using the techniques such collecting system call from the kernel, maintaining and capturing provenance, and by maintain log details of the system ,both file centric and system centric tracking is done.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Advanced Communication and Surveillance using Ionosphere[Full-Text ]
S.Srikiran rao, R.Dinesh, K.Goutham, V.Guru karthikeyanIn order to develop the communication and surveillance with help of ionosphere we use cross dipole antenna which reduces the cost of setting up communication or surveillance facilities. In this antenna the signal is focused in particular area of ionosphere turning that par-ticular region into an ionosphere mirror .The inosphere reflects the signals sent by the cross dipole antenna.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
SECURED AND ENERGY EFFICIENT BUFFER AND QUEUE LENGTH CONTROL FOR MOBILE ACCESS WITH INCREASED QoS PARAMETERS[Full-Text ]
J.Arul Keerthi Dhaya, S.Raja MohamedThe main focus of the recent years in Networks is Security. The development of fully secure schemes for these networks has not been entirely achieved till now. The two of the most important security problems in Networks are Authentication and Cooperation. To provide the strong Authentication in the network we proposed the Rational Intrusion detection with Fusion method. This method is helpful to overcome the active and the passive attacks which are created by the external environment. Several authentication methods are present to increase the security in the network. But still many Active and passive attacks are present in the network to reduce the privacy of the network. Passive attacks such as eavesdropping, Traffic analysis, and active attacks such as interfering, Masquerading, relay, message modification and denial of service attacks. Passive attack means, that the attacker does not send any message. The attacker just listen the channel therefore, it is almost impossible to detect this attack. In contrast, the active attack modifies, deletes the packets, inject packets to invalid destination. Active attack can be detected. On the one hand, a summary of the current state of the art in the authentication protocols will take us to the conclusion that the topic is still open. We propose the intrusion detection and fusion methods to overcome the active and the passive attacks in the network.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Efficient Mobile Ad Hoc Routing Protocol for Overhead Reduction[Full-Text ]
C. Arun Kumar, R.S.D.Wahidabanu, S.K.Deepa, K.PradeepMANET’s have high mobility of nodes due to which there exists a frequent link breakage leading to path failures and route discoveries. The overhead of route discovery cannot be neglected. Broadcasting is the primary and effective data dissemi-nation in route discovery, where a mobile node blindly re transmits the first received route request packets except it has a route to the destination, and therefore it cause the broadcast storm problem. In this paper, there is a new neighbor coverage-based probabilistic rebroadcast protocol for reducing the routing overhead in MANETs. To organize this, effectively exploit the neighbor exposure information, a novel rebroadcast delay to determine the rebroadcast order. The more accurate additional coverage ratio is obtained by sensing neighbor coverage knowledge has been proposed in this paper. A connectivity factor to provide the node density adaptation has also been defined. By combining the additional coverage ratio and connectivity factor, a reasonable rebroadcast probability can obtain. We introduce E-Endaira protocol to calculate the rebroadcast delay and exploit the neighbor coverage information. This work combines the advantages of the neighbor coverage knowledge and the probabilistic mechanism, which can drastically decrease the number of rebroadcasting so as to reduce the routing overhead and in turn, can also improve the routing performance. This in addition also enhances the existing method of having efficient broadcast with added security.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
An innovative Desalination process by application of alternate techniques[Full-Text ]
Gayathri.T.N, Anshula.S, Akshaya.GDesalination involves large amount of energy consumption because which the process is found to be uneconomical and is not being widely used in practice. In this paper a different technique of using natural resources is suggested. Using this process, the desalination process will be effective and energy conserving.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Optimization of inventory level at Oilfield services: Case Study[Full-Text ]
Harshad Salunke, Dr Priyanka VermaThis work is done at ABC in Supply Chain domain. ABC is the world’s leading product and service provider to customers working in the oil and gas industry worldwide. The objective of this project is to ensure that optimal level of inventory is held, balancing the needs of maintaining high service levels needed to support operations, versus the working capital and costs associated with carrying the inventory. This was done by analysing the historical inventory data of past two year and figuring out the trends. The information obtained helped in establishing minimum, maximum and target levels for the ordering of all reoccurring stocked inventory. The scope of project is restricted to Inventory Management of ABC-Well Services.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Two Way Authentication using USB Flash Drive[Full-Text ]
A. Marcellus Brindha, S.Satheesh KumarUSB Flash Drive is used for transferring data’s, audios, videos etc with in a fraction of second, it can be used for taking backup of the entire computer data’s. It can also used for locking and unlocking the computer. The main aim of this project is to secure the confidential data’s from unauthorized access by using the powerful and timeless Authentication process. This Authentication is made as a user-friendly option and timeless. In this project software is build to use the USB Flash Drive authentication process. In existing software there is no effective alert system and not more user friendly option. In this project there is an effective alert system i.e. when the user uses wrong USB Flash Drives or Password after the limited wrong attempts it sends the alert message to the higher authority or send alert message to the mobile phones .User can select the options they needed. It can also lock the desktop till the user specified time after the time limit it shutdowns or any other options selected by the user.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Intelligent Predictive Traffic Light Information for improving Fuel Economy and Reduction of CO2 Reduction[Full-Text ]
Poornimarani.R, Mr.R.KarthikRecent survey shows, one of the top CO2 emitters all over the world is transporters. Especially in the major cities, transports play the key role in CO2 emission in the traffic signal intersections. Vehicle engine emits more CO2 during idling period, frequent stops and accelerations which consume more fuel in the vehicles. It’s been observed, the vehicles maintain the average speed and minimum waiting time reduces fuel consumption and 60% of CO2 reduction. A system is necessary in all the vehicles to display the required average speed which reduces the CO2 emission and less fuel consumption. The system Intelligent Predictive Traffic Light Information displays the recommended average speed and special instructions for a vehicle in the traffic signal intersection, helps the driver for smooth driving. The data exchange takes place when the vehicle enters into the communication range. The vehicle On-Board Unit (OBU) receives the signal status from the Traffic signal control. Based on the received information, the driver is suggested with recommended speed to pass the signal intersection. The recommended speed is calculated based on the signal count down, distance and front vehicle speed. The existing system based on Branch and Bound (BB) algorithm was used to determine the recommended speed of the vehicle. The BB algorithm does not consider the front vehicles and their speed. In order to overcome this drawback, Maximize Throughput Model (MaxTM) is proposed for smoothing vehicle travels.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Food Image Recognition Using Svm Classifier for Measuring Calorie and Nutrition Values[Full-Text ]
R.Surya, S.Saru PriyaObesity is the major cause of overweight this leads to the type II diabetes, heart disease and cancer. Measuring the food is very important for a successful healthy diet. Measuring calorie and nutrition in daily food is one of the challenge methods. Smartphone plays a vital role in today’s technological world using this technique will enhance the issue in intake of dietary consumption .In this project an food image recognition system for measuring the calorie and nutrition values was developed .the user has to take the picture of the food image this system will classify the image to detect the type of food and portion size and the recognition information will estimate the number of calories in the food. In this system the food area, size and volume will be used to calculate the calorie and nutrition in accurate way.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Reduction of Leakage Current and Leakage Power during Write Operation Using Sleep Transistor in 6T, 8T, 10T SRAM[Full-Text ]
Siva Kumar.P, Jenyfal Sampson,Shabitha.S, Shenbaga Nivetha.K, Sindhu Bala.PThe aim of this paper is to reduce the maximum leakage current and power consumption using sleep transistors. In total power dissipation, the major dissipated portion is due to leakage power .When compared to stack approach in SRAM cell sleep transistor gives more advantages. This is used for research purpose and to do the operations of 6T, 8T, 10T with sleep transistor and our enhanced work is to implement a 16*8 matrix with sleep transistor in 6T SRAM cell design. The SRAM cell with 16*8 sleep transistor shows better leakage reduction for real time applications. In this paper Analog environment virtuoso (Tanner) simulator is used for analysis of the power associated with CMOS SRAM cell.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Location Impact Identification Over Unanimous Users[Full-Text ]
J.S. Kanchana, V.J. Prasanna, S. Prabavathy, Dr. S.SujathaSocial networks provide a framework for connecting users, often by allowing one to find people with common interest in their location. However, users would ideally like the option of finding others who share many of their interests, thus allowing one to find highly-similar, like-minded individuals. This paper describes a way on analysing the impact of location over the like-minded users with the rating and location factor. A user-sign is constructed by establishing set representing resource tag and its rating with the Location based Rating algorithm. Location factor is generated as a text string specifying the category id, location id and its rating average. Further the impact of location of a product in a particular location can be justified by applying a parameter based location influence algorithm.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
FPGA IMPLEMENTATION OF DIGITIZED PHASE-LOCKED LOOP WITH TOLERANCE TO PVT VARIATIONS[Full-Text ]
D.Sridharan, Mrs.P.Meenakshi vidyaA spread-spectrum clock generator (SSCG) is realized by an under-damping all-digital phase-locked loop (PLL). In this SSCG, the spread spectrum clocking is achieved by switching the divider without a delta-sigma modulator. By using a digital self-calibration technique, the frequency of this SSCG has a triangular modulation and relaxes the process variations. This SSCG is fabricated in a 0.18m CMOS process. The measured electro-magnetic interference reduction is 14.32dB. The measured rms and peak-to-peak jitters are 1.43ps and 13.31ps in a PLL mode, respectively. The measured rms and peak-to-peakjitters are 2.65psand19.86psinaspreadspectrummodulation, respectively.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Analysis of Skin Lesions in Multispectral Images using Texture Based Coin Segmentation and Artificial Neural Network[Full-Text ]
L.Roja, K.G.SathiyaSkin cancer is due to the development of abnormal cells that have the ability to spread to other parts of the body. It is common among non- Hispanic white males and females. Due to costs for dermatologists to screen every patient is high, images captured from digital camera is used. To detect melanoma at early stages, an automated system using images captured from multispectral camera is proposed. This multispectral camera has advantage of capturing images at high resolution. Multispectral image contains biological structures beneath the outermost layer of skin. This can be implemented using Texture Based Coin Segmentation (TBCS) algorithm. There are two main stages, first stage comprises of segmenting damaged skin from normal skin. Steps involved in this process are preprocessing, which is performed using Gaussian filtering and coin segmentation. Second stage involves scanning process, which is done by using k- means clustering. Main contributions in second stage are sobel edge detection and spatial transformation. The scanned output is given as input to the Artificial Neural Network, which consists of input layer, hidden layer and output layer. It is useful in classifying cancer from non-cancerous, which is helpful in providing handheld devices for detecting cancer.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
An Experimental Investigation into the Dust Explosion of Bulk Solids[Full-Text ]
HARPREET SINGHBulk solids/ air mixture have been studied in a vertical experimental combustion chamber of dimensions 10×10×50 cm. The minimum ignition concentration and maximum ignition concentration required for burning of bulk solids is a main safety parameter when dealing with combustible bulk solids in industries. Two different kind of bulk solids (dust) wheat husk and wood dust of size less than 300 µm were tested in order to determine their maximum and minimum concentration required for burning. The experimental results shows that the minimum and maximum concentration required for wheat husk is 63 g/m3 and 3610 g/m3 and for wood dust it is 70g/m3 and 3160 g/m3 respectively under the ambient temperature of 293 ±7 K. Further it was also found that at concentration of 1232 g/m3 and 1088 g/m3, wheat husk and wood dust respectively is more hazardous. The conclusions striate from the experimental results are of ample significance for the safe application of combustible bulk solid.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Video And Data Encryption Using AES Encryption For Secure Transmission[Full-Text ]
K.Kavuthami, N.Thulasi, Dr.K.Thirunadana SikamaniIn This paper, video and data is encrypted using AES algorithm for secure transmission. Steganography is used for embedding messages into video or image to transfer a large amount of secret message. Huffman coding is a technique for lossless data compression and reduction of file size. Huffman coding is used to encode images in a video file. Then the encoded embedded file is encrypted using AES encryption. The process is repeated until the search is done all over the frame. It is decrypted only when the user knows the key. The experimental result shows that the degradation of visual quality is less. The performance of the process is measured by calculating Peak signal to noise ratio, Mean square error rate and Bit error rate.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
STUDY AND COMPARISION OF VARIOUS TYPES OF THERMAL SLOTS IN ALUMINIUM PISTON[Full-Text ]
Chitthaarth.M.R, Dr. K.ManivannanIn this study the aluminium piston is taken into consideration and analysed with the values of peak working condition, in aluminium piston at higher temperature higher expansion rate is achieved. It is also been analysed using different types of thermal slots, by introducing the thermal slots we can reduce the thermal expansion in aluminium piston and also material reduction can achieved in this process. The thermal analysis is been carried out using the Ansys package.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Novel Scheme for Harvesting Energy from Partially Shaded SPV System[Full-Text ]
T.Brindha, Dr.V.RajiniIn recent years, solar energy is the most promising and abundantly available renewable energy which could be absorbed easily with PV systems .So, we are at the verge of trapping the solar energy with high efficiency, reduced cost and improved energy capture. Shading effect is the major problem, since most of the power is lost. Conventionally, bypass diodes were used to avoid hotspot, which bypasses the shaded panel. So, the power available in that panel is unused. In order to capture that power also, a recovery scheme is proposed in this paper which bypasses the bypass diode and makes the maximum power available in the output. Also, a Maximum Power Point Tracking (MPPT) technique is used to draw peak power from the solar array in order to maximize the produced energy. Simulation has been done in Simulink/MATLAB and Embedded MATLAB function is used for embedding the code.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
CFD Simulation of the Fluid Flow, Pressure Drop and Turbulence Parameters in a Standard Cyclone Separators[Full-Text ]
Kalaiarasan R, Vivekanandan M, Gokul Prasath B, Muthupandy P, Karthikeyan NThe CFD simulation of the fluid flow pressure drop and Turbulence is presented by CFD techniques to characterize the performance of the three types of standard cyclones the three types of cyclones named 1D3D, 2D2D and 1D2D. The length of cylindrical part of the body is equal to 1, 2 and 1 times of the body diameter, respectively; and the length of the conical part is 3, 2 and 2 times of the body diameter. Transient numerical simulation is applied for varying inlet velocities from 5, 10, 15 and 20 m/s. This article quantifies the inlet velocities at which maximum collection efficiencies are obtained for 1D3D, 2D2D and 1D3D cyclones and the marginal pressure drop associated with reaching these collection efficiencies. Turbulence parameters are also studied for these cyclones. From inference of the three numerical simulation models of standard cyclone, it was observed that cyclone of geometry 1D3D is optimal for fluid flow, pressure drop and turbulence parameters.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Novel Ontology based Framework for Trend Detection from Research Paper Titles[Full-Text ]
Swaraj K P , Dr. Manjula D, Adhithyan V, Hemnath K B, Manish Kumar LClassification of research papers based on topics like Data Mining, Software Engineering, and Networks etc. is generally done manually. Nowadays Researchers are particularly interested in knowing trending subtopics and keywords under their area of interest and the relevant research articles published in those areas. In this article, a fast novel approach is proposed to find trending topics and subtopics from large cluster of research paper titles for the past n years. Also, an effective method is presented to retrieve paper titles based on a topic or subtopic from trending topics. Finally a ranking algorithm is suggested based on which the resultant paper titles are ranked before being displayed. In this study, titles of papers for last 3 years from DBLP computer science dataset were extracted and stored in a database. Even though, articles from only last 3 years were considered, this system can be easily scaled to accommodate any size and time period. Experiment studies revealed that the proposed trend detection framework is accurate, efficient and scalable.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Mechanical Properties of Hybrid Glass Fibre/ Epoxy Reinforced TiO2 Nanocomposites[Full-Text ]
A. Thiagarajan, S. Arun Prakash, A. Gilbert, A. GovindarajThis paper presents the influence of TiO2 nano particles on the epoxy/hybrid glass fibre, in combination with woven roving and chopped strand mat reinforced composite. Hand lay-up technique was employed to prepare the hybrid fiber laminates with varied (0, 1, 2, 3, 4 and 5) weight percentage of TiO2 nano particles. The interlayer separation of TiO2 nanoparticles in the epoxy resin was studied using X-ray diffraction. Mechanical property of the prepared nanocomposites was investigated taking Tensile Test and the fractured part was analyzed using scanning electron microscope.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A HIGH EFFICIENT INDUCTION HEATING USING ULTRA SPARSE MATRIX CONVERTER[Full-Text ]
Haseena Banu H, Gandhi RPresenting an Ultra Sparse Matrix Converter (USMC) to achieve efficient three phase induction heating with only 9 switches without any energy storage elements and Zero DC link current commutation scheme resulting in lower modulation complexity and very high reliability. The proposed topology reduces significantly the number of devices and complexity, achieves the necessary output and maximizes the life time of the device which is leading to an efficient, versatile and cost effective solution. The analytical and simulation results have been verified by means of a prototype applied to a novel total-active-surface induction heating appliance.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
CFD Analysis and Evaluation of Flow Resistance Coefficient of a Quick Closing Non Return Valve(QCNRV)[Full-Text ]
Gokul Prasath B, Kalaiarasan R, Vivekanadan M, Joseph Manickam AQuick Closing Non-Return Valve (QCNRV) is basically a Non return valve, equipped with a power cylinder to close the valve quickly. This non return valve allows the fluid to flow in one direction only. These valves are used mainly in typical power plant application. The valve is installed in turbine extraction lines wherein the back flow of wet steam to turbine is not allowed. In case of boiler trips, steam to turbine will be disconnected, at same instant the QCNR Valve is actuated by power cylinder and it closes the flap in 0.5seconds, thus preventing the reverse flow of wet steam to turbine which is detrimental to the turbine casing and rotor. The pressure drop offered by the valve is important as the steam is taken for some other process. The pressure drop is based on the Flow resistance coefficient (ZETA) of the valve. To evaluate the value of zeta, Test Rigs are set up and tests are conducted according to International Test standards. Based on test results, Zeta is evaluated.But testing needs costly test set up, takes more time for design and erection, calibration of various instruments and needy of transportation of the valve to test center. All these makes the testing procedure a tedious job. So as an endeavor Computational Fluid Dynamics (CFD) technique is employed to evaluate zeta so that most of the practical difficulties in actual testing can be avoided. This paper also deals with study the flow pattern of the fluid inside the Valve .The control volume is modeled in Pro/E 2001 and the flow is analysed in CFX 5.5.1 software. The pressure drop across the valve, velocity data are taken from the CFX results and the flow resistance coefficient is calculated. The result is compared with the experimental result data obtained from the standard valve test rigs. Comparison with the field data showed that the CFD program (CFX5.5.1) could reproduce the real conditions quite well. The deviation from the field data was much smaller that makes the CFD as a efficient tool to simulate the real life situation.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Comparative Study of Al 6061 Alloy with Al 6061 – Magnesium Oxide (MgO) Composite[Full-Text ]
P. Balaji, R. Arun, D. JegathPriyan, I. Madhan Ram, E. ManikandanAluminium matrix composites with MgO reinforcements give superior mechanical & physical properties. Their applications in several demanding fields like automobile, aerospace, defense, sports, electronics, bio-medical and other industrial purposes are becoming essential for the last several decades because of their improved physical and mechanical properties such as light weight, high strength, good corrosion resistance, malleability, etc., This paper reviews the comparative mechanical properties of Al 6061 Aluminium Alloy with Al 6061 - Magnesium Oxide (MgO) Composite of different wt. %. Al 6061 aluminium alloy is reinforced with 1.0, 1.5, 2.0, 2.5 weight percentage of Magnesium Oxide (MgO) particles through powder metallurgy method with optimum sintering temperature. The composites were then characterized by scanning electron microscopy (SEM)). The tribological behavior is investigated using pin-on-disc equipment and mechanical properties (Micro hardness, Compressive strength) were analyzed at varying weight percentage ratios. Introduction of MgO particles to the Al matrix caused increasing of wear resistance, mechanical strength and it doubles the hardness. The results reveal that the Metal Matrix Composite (MMC)’s containing 2.0 Wt. % reinforcement particle has improved mechanical properties compared to others.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Hyperspectral image denoising via contourlet transform based image fusion[Full-Text ]
P.Rajalakshmi,D.Vishnu,J.Vengat Raman,R.SarathIn remote sensing and geoscience applications hyperspectral images play a major role. But the hyperspectral image may contain noises, these noises can be removed by hyperspectral image denoising methods in order to get sharpened images. Hyperspectral image has better spectral correlation and panchromatic image has better spatial correlation. In this paper we propose an effective and efficient method to remove noise in hyperspectral image and also improving the spectral and spatial correlation of the hyperspectral image by using the image fusion of hyperspectral and panchromatic images by employing contourlet transform which is better than wavelet transform. The resultant image obtained by our proposed method is better for machine and human intervention. The Color distortion problem in the hyperspectral image is also reduced by proposed method based on local spectral and spatial correlation (SSC).The results of proposed method is better than the existing methods.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks[Full-Text ]
Dr.T.Lalitha, S.JayaprabaWe consider a scenario where a sophisticated jammer jams an area in a single-channel wireless sensor network. The jammer controls the probability of jamming and transmission range to cause maximal damage to the network in terms of corrupted communication links. The jammer action ceases when it is detected by a monitoring node in the network, and a notification message is transferred out of the jamming region. The jammer is detected at a monitor node by employing an optimal detection test based on the percentage of incurred collisions. On the other hand, the network computes channel access probability in an effort to minimize the jamming detection plus notification time. In order for the jammer to optimize its benefit, it needs to know the network channel access probability and number of neighbors of the monitor node. Accordingly, the network needs to know the jamming probability of the jammer.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Solid Waste Management in Some Municipalities of Tirunelveli District and Its Impact on Ground Water Quality in and Around Their Dumpsities[Full-Text ]
S.Sidhardhan, Dr.S.Adish Kumar, S.Jansi Sheela In this paper solid waste management of three municipalities in Tirunelveli district which have open dumpsites of age more than 20 years were studied. Physico chemical analysis was carried out on ground water samples in the area around the three selected dumpsites. The aim of the study was to know the solid waste management practices in these municipalities and determine the impact of the dumpsites of urban solid waste on the quality of ground water. Twelve water samples were collected from the wells with in immediate vicinity and further away from the dumpsites for analysis. The samples were analyzed for pH, acidity, alkalinity, conductivity, total dissolved solids, hardness, chlorides and sulphates. This study concluded that the leachate from dumpsite had intruded in ground water in particular direction making it not potable.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
An Analysis of Key Labour Productivity Factors in the Construction Industry[Full-Text ]
Divya T.M., Er. Sanna. RATNAVEL, Dr. G.ChitraThe construction industry is critical for enhancing the productive capacity of the overall Indian economy. Being Labour intensive, Labour Productivity becomes an extremely vital performance measurement tool within the industry. But the present landscape is that of an un-organized sector which becomes evident to be synonymous with the kaleidoscope of unregulated, poorly skilled and low-paid workers. An essential ingredient to counteract this issue is the successful application of science, recognized as the systems approach which can be made to attack civil-systems’ problem. This paper focuses on the key factors affecting labour productivity in the field. Their analysis is performed using Interpretive Structural Modeling (ISM), a system approach, which yields the inter-relations and the inter dependencies among the factors. A digraph is sketched to diagrammatically represent the same. Further, the rationale behind the key elements of the system is discussed.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Analysing the Sources of Uncertainties along the Construction Supply Chain[Full-Text ]
Nisha V., Dr. G. ChitraConstruction industry is well known for cost overrun and time overrun in its projects. Supply chain management is essential in Indian construction industry due to its competitive nature. Construction supply chain faces lot of challenges due to uncertainty that arise in almost every project. Thus, it is essential to analyze the uncertainties that may arise in the supply chain of the project. Supply chain in construction industry is project specific and has various uncertainties. This paper analyses possible uncertainties that are bound to occur in a construction supply chain. The uncertainties along a construction supply chain are grouped under four criterias namely control, supply process and demand, based on the uncertainty circle. They were analyzed through questionnaire survey, to determine the major factors and the most impacting criteria in the supply chain.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Recognition of vehicle based on hybrid features[Full-Text ]
C. Mythili,N.Bathlin Nelmin and I.JayagayathriContent Based Image Retrieval (CBIR) is a technique used for recognition of similar vehicle images from a large database. Content Based means search analysis based on the contents of an image. Content refers to the color, texture and shape or any other information. The feature descriptors of the content can be obtained from the image itself. All CBIR systems perform search and retrieval operations in image database using image features like color, texture and shape. In this paper, vehicle image recognition is performed by extracting information related to color, texture and shape features. Color features include the color moments, Texture features are derived from the gray level co-occurrence matrix and the shape features are derived from the canny edge operator. These features are examined in order to search and recognize similar images from image database. This was mainly due to semantic gap between the low level visual features (color, texture, and shape) and the high level human perception. In order to reduce the gap, the interactive Relevance Feedback (RF) is introduced in CBIR.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
PEER TO PEER FILE TRANSFER USING BEST ROUTING PATH[Full-Text ]
R.Naga Priyadarsini, Ms.S.Suma, Dr.V.DhanakotiPeer-to-peer (P2P) computing or networking is a distributed application architecture. The tasks and workload are partitioned between multiple peers. Peers are equally privileged, equipotent participants in the application. P2P file sharing is the distribution and sharing of files using P2P networking technology. The peers of such networks are end-user computer systems that are interconnected via the internet. In this paper we develop a systematic methodology to identify P2P nodes, perform suitable cluster operation to transmit files between various peers. In-case of any fault nodes identified in the transmission path suitable alternate path must be identified so that the file can reach the destination safely.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Analysis of automotive structural support to resist intrusion due to rollover impact[Full-Text ]
Venkateswaran M, Dr. Shibu GCar safety became an issue almost immediately after the invention of the Automobile. To protect occupants from direct impact, the passenger compartment and structure should be safe at crash. Rollover crash is one of the most fatal crash scenarios that lead to death of people across the globe. Vehicle damage often includes deformation of the roof and its supporting structures. Head and neck injuries are common, and associated with roof deformation. Every year about 33,000 people lose their life. National Highway Traffic Safety Agency (NHTSA) formed a regulation to improve vehicle support structure to meet the safety of the car at rollover roof crush. This project is aimed to improve the automotive structural support to resist the intrusion due to rollover impact in order to meet the Federal Motor Vehicle Safety standards 216 (FMVSS 216).In this work, intrusion of structural support is evaluated as per FMVSS 216 standard load conditions. The structural support design will be improved through iterations to meet the upgraded regulations.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Smart Socket: A Novel Approach in Regulating Non-Linear Load Using Power Factor Measurement[Full-Text ]
R.Nirmalraj, K.V.PoovizhiPower generation and transmission might turn completely smart within a decade owing to the evolution of smart grid. Even the metering and billing are done smartly and we are being charged for our non-linear load usage, since these meters started measuring the reactive powers and the corresponding losses we make. We might end up in a shock on looking the new electrical tariff, though we are going to be billed for the actual power usage. As consumers we must make ourselves up to their smartness to be economical and more importantly being environmental friendly. This project presents a review on cheap digital socket modules which measures the power factor and monitors the non-linearity characteristics of all equipment which we plug-in to the socket.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Humanizing Privacy and Security Based Data Retrieval for DDTN networks[Full-Text ]
G.Jayahari Prabhu, S.ManikandanDisruption-tolerant network (DTN) technologies are becoming flourishing solutions that allow wireless devices carried by soldiers to com-municate with each other and access the secret information or command dependably by exploit external storage nodes. In this paper, propose a secure data retrieval scheme using CP-ABE for decentralized DTNs where multiple key authorities manage their attributes independently. Here demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the disruption-tolerant military network.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
General framework for detection of botnet using Random forest in real time[Full-Text ]
Nandhini Selvam , Dr. V.Vanitha , Ms. V.P.SumathiBotnet is a distributed malware which spreads widely without the knowledge of the end user. The effect of botnet increases very fast today. Researches on detection of botnet in real time are less. It is necessary to detect the presence of botnet instantly to avoid the affects of botnet. Storm is a real time, distributed fault tolerant system and supports online machine learning techniques. Random Forest classifier can be used to produce higher accuracy rate for massive data. This paper presents a new framework for detecting the presence of botnet in real time using the Storm tool. The framework consists of three main components. First, preprocessing the data and extracting features for classification. Second, Training and testing the dataset in the classification algorithm and finally, predicting the presence of botnet in Storm. Experimental results show that the presence of botnet can be predicted with higher accuracy rate.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
DETECTION OF BOTNET USING FUZZY C-MEANS CLUSTERING BY ANALYSING THE NETWORK TRAFFIC[Full-Text ]
Sindhu Arumugam, Dr. V. Vanitha, Ms. V.P. SumathiBotnets are networks formed by malware-compromised machines which become a serious threat to the Internet. Detection of Botnet can be done in two ways either by using signature based or anomaly based techniques. signature based techniques detect the presence of the known bots accurately but it is not possible for this approach to detect evolving new types of bots whereas anomaly based detection techniques are popular as its capability to detect the bot variants, even unknown bots. Botnet detection is a challenging task, since the creators of botnets continue to adopt innovative means in creating botnets. This paper presents the detection of bot variants by implementing the Fuzzy C-Means clustering algorithm in storm tool.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Fast compressive Tracking of robust object with Kalman filter[Full-Text ]
Gopika Avinash Fattepurkar, Vishal Vitthal Bandgar, C.M. JadhavThe primary point of the undertaking is to plan "Quick Compressive Following of the hearty item with Kalman algorithm". It is an exceptionally extreme undertaking to create powerful and effective appearance models for strong article following because of the different variables, for example, light change, posture variety, movement smear, and impediment. Existing following algorithms are typically overhaul models with specimens removed from reconnaissance late edges. Despite the fact that algorithms are effective however there are a few issues stay to be tended to. In any case, while these adaptable appearance models are data needy, there does not exist sufficient measure of data for online computations to learn toward the starting. Second, internet following algorithms regularly encounters the buoy issues. As an issue of readied toward oneself learning, misaligned cases are at risk to be incorporated and corrupt the appearance models. In this paper, we propose an essential yet practical and capable after count with an appearance model concentrated around contrivances expelled from a multi-scale picture idiosyncrasy space with data self-sufficient reason. We pack example pictures of the front line target and the establishment using the same lacking estimation system. The accompanying task is arranged as an issue gathering through a pure Bayes classifier with online upgrade in the pressed territory. A coarse-to-fine interest strategy is grasped to further diminish the computational versatile quality in the distinguished method. Powerful visual after is essential to track different hindered things. Kalman channel and shade information taking after figurings are completed uninhibitedly in most of the rhythmic movement research. The proposed strategy merges enlarged Kalman channel with past and shade information for emulating distinctive inquiries under high hindrance. The proposed method is overwhelming to establishment exhibiting framework. Object distinguishing proof is completed using spatio-common Gaussian mixture model After embodies two steps: to some degree blocked thing after and significantly obstructed article emulating. Taking after partially hindered articles, created Kalman channel is ill-used with past information of thing, however for significantly blocked article emulating, color information and size attributes are used. The structure was attempted in certifiable application and successful results were gotten.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
CULTURAL ENCOUNTER IN KIRAN DESAI’S THE INHERITANCE OF LOSS[Full-Text ]
Ms. T. Ranjula Pushpa, Dr. J. SundarsinghAs a modern international expatriate Indian novelist, Kiran Desai experienced displacement, dislocation and cultural clash. In her novel, she writes about the cultural hybridity of the postcolonial migrant and the deplorable condition of the individuals. Her novel “The Inheritance of Loss” deals with her own situation of migrancy, expatriation and alienation from the mother country. Through the characters, she gives how her own dual Indian- American upbringing which results in despair. Living between East and West and the introduction of western elements in a country creates a cultural clash. The diasporic Indian writers have generally dealt with characters from their own displaced community but some of them have also taken a liking for Western characters and they have convinced in dealing with them. This paper tries to explore how the meeting of East and West culture brings complications in the life of individuals.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Cultural Poetics in The Shadow Lines[Full-Text ]
Dr. V.Anbarasi, B.BalasubashiniContrary to many older interpretive methods and schools that tend to see historical and literary texts as autonomous entities, Stephen Greenblatt’s New Historical approach Cultural Poetics seeks to reveal the relationship between texts and their socio historical contexts. Cultural Poetics assumes that texts not only document the social forces that inform and constitute history and society but also feature prominently in the social processes themselves which fashion both individual identity and the socio historical situation. Focusing upon New Historicism as an approach to analyze the novel The Shadow Lines by Amitav Ghosh, the paper examines how the author highlighted nostalgia through the suffering of the book characters. The way the author incorporated historical events in fictional writing is also explored. Ghosh has won many accolades for his fiction which is intertwined with history. His appeal for a borderless universe and his penchant for recovering lost histories come together in The Shadow Lines.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
INTELLIGENT HEALTH CARE SERVICES BASED ON IoT[Full-Text ]
R.Revathi, S.Vijani ,S.VijanuNow-a-days global ageing and the prevalence of chronic diseases have become a common concern. Many countries are undergoing hospital restructuring by reducing the number of hospital beds and increasing the proportion of home healthcare. A promising trend in healthcare is to move routine medical checks and other healthcare services from hospital (Hospital-Centric) to the home environment (Home-Centric). By doing so, firstly, the patients can get seamless healthcare at anytime in a comfortable home environment; secondly, society’s financial burden could be greatly reduced by remote treatment; thirdly, limited hospital resources can be released for people in need of emergency care.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
SINGLE ATM CARD FOR MULTIPLE ACCESS SUCH AS BANKING PURPOSE, LICENSE AND AADHAAR,VOTER ID CARD[Full-Text ]
JISHA P REJI ,LATHA SHREE S , MARTHA DIMPLE MOHAN, PROF. M ROJARAMANIThis project is designed in such a way that a single card is used for accessing the multiple accounts by using RFID technique to identify aadhaarcard, ration card, license, voter ID and banking purpose through PC. The system is user friendly and user convenient. Since biometric authentication is used in this system it makes the system highly secured. RFID reader is a circuit which generates 125KHZ magnetic signal. This magnetic signal is transmitted by the loop antenna connected along with this circuit which is used to read and write the information on the RFID card. Finger print sensor is the special type of biometric sensor which is used to identify the human finger print. Finger print sensor is interfaced with micro-controller through the ATMEGA processor. In this project we have used two modules namely admin module and user module. Admin module is responsible for entering the user details, user bank details, ATM card details.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
ASSISTIVE TECHNOLOGY FOR VOCALLY CHALLENGED PERSONS[Full-Text ]
ATHIRA BABU, JASEEKA MARY KURIAN, BABISHA P. P, K. PREETHI. The Embedded Technology is now in its prime and the wealth of Knowledge available is mind-blowing. Embedded System is a combination of hardware and software. Embedded technology plays a major role in integrating the various functions associated with it. This needs to tie up the various sources of the Department in a closed loop system. This proposal greatly reduces the manpower, saves time and operates efficiently without human interference.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
EMOTIONAL INTELLIGENCE AMONG FACULTY MEMBERS OF COLLEGES IN NAMAKKAL DISTRICT[Full-Text ]
Dr.S.Sumati, S.KrithikaOrganisation being dependent on the human resources it has to concentrate in fine-tuning the behavior of the individual towards the common goals. Each individual may have different emotions and different characteristics of their own but being part of the organization they should be trained to modify their behavior by controlling and managing their emotions.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
AUTOMATIC TEST PACKET GENERATION[Full-Text ]
M.P.Jegadeesan, Dr.G.Tholkappia ArasuIn this paper, We propose an automated and systematic approach for testing and debugging networks called“Automatic Test Packet Generation” (ATPG). ATPG reads router configurations and generates a device-independent model. The model is used to generate a minimum set of test packets to (mini-mally) exercise every link in the network or (maximally) exercise every rule in the network. Test packets are sent periodically, and detected failures trigger a separate mechanism to localize the fault. ATPG can detect both functional (e.g., incorrect firewall rule) and performance problems (e.g., congested queue). ATPG complements but goes beyond earlier work in static checking (which cannot detect liveness or performance faults) or fault localization (which only localize faults given liveness results). We describe our prototype ATPG implementation and results on two real-world data sets: Stanford University’s backbone network and Internet2. We find that a small number of test packets suffices to test all rules in these networks: For example, 4000 packets can cover all rules in Stanford backbone network, while 54 are enough to cover all links. Sending 4000 test packets 10 times per second consumes less than 1% of link capacity. ATPG code and the data sets are publicly available.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
QUEUING THEORY APPLIED IN OUR DAY TO DAY LIFE[Full-Text ]
S.Shanmugasundaram and P.UmaraniThere are many situations in daily life when a queue is formed. Queuing theory is the mathematical study of waiting lines and it is very useful for analyzing the procedure of queuing of daily life of human being. Queuing theory applies not only in day to day life but also in sequence of computer programming, networks, medical field, banking sectors etc. In this paper, we analyze the basic features of queuing theory and its applications.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
IMPROVE THE EFFECTIVENESS AND EFFICIENCY OF ONLINE IMAGE RE-RANKING[Full-Text ]
P. Raj Kumar, Dr.G.Tholkappia ArasuImage re-ranking, as an effective way to improve the results of web-based image search, has been adopted by current commercial search engines such as Bing and Google. Given a query keyword, a pool of images is first retrieved based on textual information. By asking the user to select a query image from the pool, the remaining images are re-ranked based on their visual similarities with the query image. A major challenge is that the similarities of visual features do not well correlate with images’ semantic meanings which interpret users’ search intention. Recently people proposed to match images in a semantic space which used attributes or reference classes closely related to the semantic meanings of images as basis. However, learning a universal visual semantic space to characterize highly diverse images from the web is difficult and inefficient. In this paper, I propose a novel image re-ranking framework, which automatically offline learns different semantic spaces for different query keywords. The visual features of images are projected into their related semantic spaces to get semantic signatures. At the online stage, images are re-ranked by comparing their semantic signatures obtained from the semantic space specified by the query keyword. The proposed query-specific semantic signatures significantly improve both the accuracy and efficiency of image re-ranking. The original visual features of thousands of dimensions can be projected to the semantic signatures as short as 25 dimensions. Experimental results show that 25-40 percent relative improvement has been achieved on re-ranking precisions compared with the state-of-the-art methods.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
NETWORK THREAT DIAGNOSIS AND COUNTERMEASURES IN CLOUD SYSTEM[Full-Text ]
S.P. MALARVIZHI, P.SUNDARAM, S.BHASKARIn a cloud computing the security issues day by day increased. To overcome this security issues we handle lot of research and development. In this paperCloud security is one of most important issues in cloud system. Attackers to search the possibility of attack in cloud system and to send the report to Distributed Denial-of-Service (DDoS).DDoS attacks involve multistep exploitation, low-frequency vulnerability scanning, and identified possibility attacks of virtual machines as zombies, In DDoS attacks through the compromised zombies. Within the cloud system, the Infrastructure-as-a-Service (IaaS) clouds, the detection of zombie the possibility of attacks is very high. Cloud users may install the vulnerable applications in virtual machines. To prevent vulnerable virtual machines in the cloud, we propose multiphase distributed vulnerability detection, measurement, and countermeasure selection mechanism called NICE, based on attack graph-based analytical models and reconfigurable virtual network-based countermeasures. In proposed system Open Flow network programming APIs to build a monitor and control plane over distributed programmable virtual switches and to improve attack detection and possibility of security is high. The system and security to improve the efficiency and effectiveness of the proposed solution.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
STRATEGIES OF FMCG INTO RURAL MARKETING IN INDIA[Full-Text ]
S.RAMESH, S.KALAIVANIAfter India had signed in LPG policy FMCG industry in Indian market had become a huge competitor among the world market. In recent past global investors consider Indian market is playing vital role among global market. The challenges that FMCG companies face is that India has various market segments. The majority segmentations are classified into Demography and Geography. Earlier the marketer’s concentrated more on the urban customers. keeping them in mind they produced products and the promotional activities are made. But I recent past there are as many middle income households in the rural areas as there are in the urban. Thus the rural marketing has been growing steadily over the years and is now bigger than the urban market for FMCGs. Now the challenge for the marketers is weather to manufacture the same products for all segments or to go with specialized product to each sectors. The challenge has extended in pricing and also in promotion activity. Marketers consider when they shift the segment they may lose the existing customer and the brand image. But keeping this in mind they cannot leave rural market because Over 70% of sales are made to middle class households today and over 50% of the middle class is in rural India. Also with a near saturation and cut throat competition in urban India, many producers of FMCGs are driven to chalk out bold new strategies for targeting the rural consumers in a big way. This paper covers the important of the FMCG marketers to go to rural, the challenges, the difference between the rural and the urban market and the suitable marketing strategy with the suitable example of companies and their experience in going rural.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
COMPETENCY FOR EQUITY BASED - COMPENSATION SYSTEM - AS A STRATEGIC HR TECHNIQUE[Full-Text ]
R.Dharmaseelan, Elango.S, A.Tharani, S.KalaiselvanCompetency management is an important strategic area of organizations and it will have an impact on employer’s ability to attract applicants, retain employees, and ensure optimal levels of performance from employees in meeting the organization’s strategic objectives. Organizations must reward employees because they are in turn looking for certain kinds of behaviour; they need competent employees who agree to work with high level of performance, loyalty and commitment. Individual employees expect in return for their contribution to the organization, rewards in the form of a good compensation which satisfies them. A good compensation system thus helps an organization to achieve its objectives and satisfy its employees and motivate to them to excel in their roles. The traditional compensation systems which are used over years are based on “Paying for the job”, which mainly focuses on the job or the grade or designation, but not based on the individual who performs the job. Thus this system fails to differentiate between different individuals whose performance levels may vary. It fails to recognize better performers and motivate them to retain their high performance standards. A good equity compensation system must be based on “Pay for the person”, which can be based on actual performance levels exhibited by the Employees. Competency based equity compensation can help the organizations to determine compensation on the basis of actual performance levels through the process measuring the actual competencies exhibited by the individuals while performing their jobs. This system can be used design the compensation on the basis of person’s capabilities and experience and by taking into account the market demand for unique skills and experience. This paper focuses on development of a competency based equity compensation system. The paper discusses how a competency based model can be developed in organization which can be used for designing a competency based equity compensation system. This paper is based on the author’s experience in developing a competency model with few organizations and its applications.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
SYNTHESIS OF PYRROLO OXINDOLE FROM 3-PHENACYLIDENE OXINDOLE AND METHYL ACETOACETATE[Full-Text ]
V.SUDHAThe conventional procedures in organic synthesis utilize stepwise formation of individual bonds and therefore require many synthetic steps. In contrast to such multistep processes, one-pot transformations based on multicomponent reactions (MCRs) have gained great importance in modern organic synthesis. The focal theme of this thesis is the exploration of new multicomponent reactions for the synthesis of biologically important heterocycles. In order to put things in perspective, a brief introduction to MCRs, their applications in organic synthesis and introduction on pyrroles are given in the following section.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Neuro-Fuzzy Logic Control of Three Phase to Single Phase Matrix Converter fed Induction Heating System[Full-Text ]
P. Umasankar, Dr. S. SenthilkumarAdvancement of power semiconductor devices paved way for development of direct AC-AC conversion topology which has wide application range than conventional AC-DC-AC converters as they restrict the usage of DC link components. In this manuscript modeling and simulation of a Neuro-Fuzzy Logic Controlled (NFLC) three phase (TPMC) to Single Phase Matrix Converter (SPMC) fed Induction Heating (IH) system is illustrated. The performance of the system for various operating frequencies of the Single Phase Matrix Converter in the MATLAB/Simulink environment is presented in this paper. Pulse Width Modulation (PWM) control strategy is employed for converter switching topology by Neuro-Fuzzy logic control over a constant voltage, constant frequency input supply of the converter. The simulation results exhibit the enhanced performance of the system over the conventional AC-DC-AC converter topologies yielding a low THD for various output frequencies of the converter.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
ENHANCED EFFICIENT INFORMATION SHARING IN CLOUD ENVIRONMENT USING EERA[Full-Text ]
S.Sajithabanu, Dr.S.R.BalasundaramNowadays, Information storage and access through cloud network is becoming an economical alternative for delivery of traditional content. Mostly the content delivery is based on the moderate-size content providers. In Hybrid cloud network the services are be a subjected to momentous popularity increase due to its strategies and its performance of resources access. For optimization problem in cloud storage we have designed an EERA (Enhanced Efficient Replication Algorithm) for our optimization problem. The proposed work focused on reducing the bandwidth usage, traffic, delay access and latency also the performance cost and access time for storing and content delivery. Based on content provider the performance and results evaluation is take place in cloud environment. We implemented an effective and robust approximation algorithm in the proposed work and evaluated the complexity of the algorithm. The performance of the work provides a light-weight process, less complexity for time and space as well as cost, better accuracy of access of data and finally efficient distributed access in hybrid cloud environment.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------