IJETER | International Journal of Emerging Technologies in Engineering Research (IJETER)

Welcome to International Journal of Emerging Technologies in Engineering Research (IJETER)


Volume 3, Issue 1, October (2015)

S.No Tile & Authors Full Text
1 An Efficient Neural Networks based Genetic Algorithm Model for Soil Temperature Prediction
Jasmeen Gill, Shaminder Singh
Abstract – Suitable soil temperature predictions can help the farmers and producers in providing valuable information for deciding the right time for crop cultivation and harvesting. Due to non-linearity in climatic physics, neural networks are suitable to predict these meteorological processes. Back Propagation is the most important algorithm to train a neural network. It is a systematic gradient descent method that suffers from local minima problem, scaling problem, long training times, etc. In this article, an efficient soil temperature prediction model is proposed using neural network based genetic algorithm technique to solve these problems. The results are very encouraging.
Download
2 Extended Mean Cordial Graphs of Snakes
Dr. A. Nellai Murugan, J. Shiny Priyanka
Abstract – Let G = (V,E) be a graph with p vertices and q edges. A Extended Mean Cordial Labeling of a Graph G with vertex set V is a bijection from V to {0, 1,2} such that each edge uv is assigned the label ( [f(u)+f(v))]/2 where ⌈ x ⌉ is the least integer greater than or equal to x with the condition that the number of vertices labeled with 0 and the number of vertices labeled with 1 differ by at most 1 and the number of edges labeled with 0 and the number of edges labeled with 1 differ by at most 1. The graph that admits a Extended Mean Cordial Labeling is called Extended Mean Cordial Graph. In this paper, we proved that Path related graphs Tn, Q(n), DQ(n), TQ(n) are Extended Mean Cordial Graphs.
Download
3 Special Class of Relaxed Cordial Graphs
Dr. A. Nellai Murugan, R. Megala
Abstract – Let G = (V,E) be a graph with p vertices and q edges. A Relaxed Cordial Labeling of a Graph G with vertex set V is a bijection from V to {-1 , 0, 1} such that each edge uv is assigned the label 1if |f (u) + f (v) | = 1or 0 if | f (u) + f (v) | = 0 with the condition that the number of edges labeled with 0 and the number of edges labeled with 1 differ by atmost 1. The graph that admits a Relaxed Cordial Labeling (RCL) is called Relaxed Cordial Graph (RCG). In this paper, we proved that Pn ʘ C3, subdivided star K1,1,n are special Class of Relaxed Cordial Graphs.
Download
4 Enhancing the Quality of E-learning through Mobile Technology: A Socio-Cultural and Innovation Viewpoint towards Quality E-learning Applications
Dr. Rezwanul Alam, Md. Saddam Khan, Arnob Zahid
Abstract – This paper plans to present piece of the work of a progressing examination extend that is taking a gander at socio‐ cultural and mechanical advancements from a portable innovation meeting perspective; to demonstrate how socially mindful joining improvements in versatile innovation can be received and utilized for the advancement of society. The paper indicates how interface outline can absolutely improve the quality characterizing attributes of learning in an E‐learning situation. Methods for accomplishing these attributes of learning through powerful E‐learning are accounted for. This paper is finished by tending to necessities for quality‐learning through successful interface‐design contemplations, towards meeting the general quality prerequisites of discovering that ought to be natural for an all-encompassing E‐learning environment.
Download
5 Privacy Preservation in Data Mining: A Stat-of-Art
Neha Patel, Prof. Shrikant Lade
Abstract – There is a rapid enhancement in the development of data mining. Data mining refer as a technique for extraction of data from huge database. It becomes a crucial topic in research community is Privacy preserving data mining (PPDM). It is necessary to keep the ratio in between privacy protection and knowledge discovery. The motive is to conceal sensitive item sets in order to prevent them from any intentional changes made by hackers in the database. For solving such issues some of algorithms shown through various authors worldwide. The motive of this survey paper is to become familiar with the existing privacy preserving data mining techniques and to get the efficiency.
Download
6 Bandwidth Enhancement in Circularly Polarized Patch Antenna using S-shaped Slot
Khalid Ali Khan, Amit Prakash, Tarun Nautiyal
Abstract – In this paper, a dual band circularly polarized S-slot micro strip patch antenna for wireless application has been designed and developed. The proposed antenna operates at 2G/3G/4G/Bluetooth/WIMAX frequency band, which shows the wideband nature of the antenna. The proposed antenna is designed on Roggers 5880 with dielectric constant of 2.2.To fed the antenna, coaxial feeding technique with 50 ohm characteristic impedance has been adopted. All antenna parameters are simulated by Sonnet lite software.
Download
7 A Survey on Energy Efficient Protocol for Multicasting in Mobile Ad Hoc Network
Prof. Chandrashekhar Goswami, Prof. Swapnil Deshmukh
Abstract – Mobile ad-hoc networks (MANETs) allow portable mobile devices to establish communication path without having any central infrastructure. Since there is no central infrastructure and the mobile devices are moving randomly, they may give rise to various kinds of problems, such as energy efficient and multicast congestion control. In this paper the problem of multicast congestion control is considered. Energy Efficient is one of the key issues in MANETs because of highly dynamic and distributed nature of nodes. Especially energy efficient is most important because all the nodes are battery powered. Failure of one node may affect the entire network. If a node runs out of energy the probability of network partitioning will be increased. Since every mobile node has limited power supply, energy depletion has become one of the main threats to the lifetime of the mobile ad-hoc network. So energy efficient in MANETs should be in such a way that, it uses the remaining battery power in an efficient way to increase the life time of the network. This paper work presents an energy efficient and reliable congestion control (EERCC) protocol for multicasting in MANETs. The proposed scheme overcomes the disadvantages of existing multicast congestion control protocols (AODV) which depend on individual receivers to detect congestion and adjust their receiving rates. The energy efficient and reliable congestion control protocol for multicasting in MANETs is implemented in three phases: In the first phase of EERCC protocol, a multicast tree routed at the source is built by including the nodes with higher residual energy towards the receivers. In the second phase an admission control scheme is proposed in which a multicast flow is admitted or rejected depending upon on the output queue size. In the third phase a scheme which adjusts the multicast traffic rate at each bottleneck of a multicast tree is proposed. Because of the on-the-spot information collection and rate control, this scheme has very limited control traffic overhead and delay. Moreover, the proposed scheme does not impose any significant changes on the queuing, scheduling or forwarding policies of existing networks. Simulation results shows that the proposed EERCC protocol has better delivery ratio and throughput with less delay and energy consumption when compared with existing protocol.
Download
8 A Work Study on Minimize the Defect in Aluminium Casting
Er. Satish Kumar, Er. Amit Tiwari
Abstract – In the present world with the increasing use of Aluminium alloy wheels in automotive industry the Aluminium foundry industry had to focus on the quality of the products. The quality of a foundry industry can be increased by minimizing the casting defects during production. Aim of the current study is to study the production line of an aluminium alloy wheel manufacturing industry and to improve the quality of production using quality control tools. This study shows the systematic approach to find the root cause of major defects in aluminium castings using defect diagnostic approach as well as cause and effect diagram. Casting defect analysis is carried out using techniques like historical data analysis, cause-effect diagrams, design of experiments and root cause analysis. Data from X-ray inspection (Radiographic Inspection) have been collected along with the production parameter data. Using check sheets data has been collected and all the defects have been studied. Using Pareto chart major defects in the aluminium castings were noted. The major defects for the rejections during production were identified as shrinkages, inclusions, porosity/gas holes and cracks. Each defect is studied thoroughly and the possible causes for the defects are shown in Fishbone Diagrams (Cause Effect Diagrams). As the shrinkages mainly occur due to lack of feedability during the fluid flow the stalk changing frequency is noted along with the shrinkages defects and a relation is drawn between them. As hydrogen forms gas holes and porosity in the aluminium castings the amount of hydrogen present in the molten metal is studied by finding specific gravity of the samples collected. The molten metal temperature effects the amount of the hydrogen absorbed by it. .So the effect of molten metal temperature on the specific gravity of the sample collected have been shown in a graph and the optimum value for molten metal temperature was found out.
Download
9 The Tracking Data Acquired By the Mobile Radar System Shall Be Transferred To SHAR Using the VSAT Link
Y.Srilakshmi, B. Mysura Reddy
Abstract – MOTR (Multi Object Tracking Radar) is designed to track different stages of the launch vehicle during nominal and non-nominal missions and also to provide data regarding close approach of space debris in LEO. The Mobile MOTR is located at required positions away from the launch vehicle. The Tracking data required to be transferred to remote terminal at SDSC-SHAR. Hence to provide voice and data transfer between different mobile terminals and a fixed terminal at SDSC-SHAR VSAT terminal is to be designed. In this project VSAT terminal is being designed in a cost effective, efficient way and the overall link and system performance is being analyzed.
Download
10 Securing Mobile Voting Process by Integrating Location Services with Encryption Algorithm
Bhavana Sinha, Reetika Singh
Abstract – As the advanced age keeps on growing, just time will tell until pretty much every human-took care of methodology gets to be mechanized. Versatile correspondence of later has taken the world by storm. Because of the various focal points they offer, various government and private business techniques are being completed under this stage. Voting is a formal evidence of a decision between two or more competitors or strategies, communicated regularly through hand-tallied paper ballots or by show of hands. Like all different parts of popular government, voting obliges straightforwardness, support and responsibility. In this manner, the effectiveness, unwavering quality and security of the strategies utilized are very discriminating. Business around the globe has generally, of later, been directed utilizing electronic means. Enlarging the current voting frameworks with portable voting will upgrade the voting process by expanding voter participation. The proposed work intends to expand security in order to diminish the possibilities of fake voting and build adaptability.
Download






Publication Process

Accepted papers will be published online immediately,upon receiving the final version from the authors.

Paper Submission

There is no deadline for paper submission. Authors are requested to send their unpublished manuscripts to: ijetereditor@gmail.com

Copyright

COPYRIGHT © EverScience Publications