Welcome to International Journal of Emerging Technologies in Engineering Research (IJETER)

Volume 4, Issue 9, September (2016)

S.No Title & Authors Full Text
1 Skyline Query Processing for Clustering the Multidimensional Data
Stalin David D, Dr.A.Jayachandran
Abstract – Data mining is the process of analyzing data from different perspectives and organizing it into useful information - information that can be used to increase turnover and also decrease costs. It is the process of finding correlations or patterns among dozens of fields in large relational databases. Recommender system is a information filtering system that seek to predict the 'rating' or 'preference' that user would give it to an item. Recommender systems are used in applications which need help for users in a decision-making process to choose an item amongst a potentially overwhelming set of alternative products or services. A recommender system estimate the user’s profile to some reference characteristics and suggests a personalized recommendation. These recommendation may be from the information item (the content- based approach) or the user’s social environment (the collaborative filtering approach) or a combination of both (Hybrid-filtering approach). But the recommender system suffer from the long tail problem, in which the unpopular data that have low number of positive ratings belong to the tail of the item distribution, these types of items should not be discarded or ignored but gainfully utilized in recom-mendation methods. Hence to overcome the limitation of the existing system, a skyline query processing approach which is known to take into account the multi-dimensional data that has very little popularity will be proposed. Using skylines the users can be recommended with new or unpopular recommendations which solve the long tail problem.
2 On the Ternary Quadratic Diophantine Equation 𝑧2=7𝑥2+𝑦2
S.Devibala, M.A.Gopalan
Abstract – This paper concerns with the problem of obtaining a general solution of the equation 𝒛𝟐=𝟕𝒙𝟐+𝒚𝟐 based on its given initial solution.
3 Performance Testing of Shock Absorber on Single DOF Spring-Mass-Damper System Using MATLAB
Borude Abhijeet Balasaheb, Kokare A. P.
Abstract – Shock absorber is very important term in automotive suspensions as used for the driving comfort and driving safety. The paper presents performance of the shock absorbers under real conditions and dynamic behaviors are studied by computer simulation and experimental testing. The road disturbance is generated in the model by giving speed brakes fixed on drum which is rotated by using motor. In this paper study and analysis of single DOF spring-mass-damper system (Hero Splendor Rear Shock Absorber) and plotted its dynamic characteristics curve for different spring stiffness values to various speed condition.
4 Cycle Related Analytic Mean Cordial Graph
Dr. A. Nellai Murugan, S. Frieda Mary Robina
Abstract – Let G= (V,E) be a graph with p vertices and q edges. A Analytic Mean Cordial Labeling of a Graph G with vertex set V is a bijection from V to {-1,1} such that edge uv is assigned the label |𝒇(𝒖)− 𝒇(𝒗)|𝟐⁄ with the condition that the number of vertices labeled with -1 and the number of vertices labeled with 1 differby atmost 1 and the number of edges labeled with 1 anad the number of edges labeled with 0 differ atmost 1.The graph that admits a Analytic Mean Cordial Labelling is called Analytic Mean Cordial Graph. In this paper, we proved that cycle related graphs Globe-Gl (n),Flower-𝒇𝒍(𝒏),(𝑪𝟑×𝑪𝟑)n , 𝑪𝟑⊙𝑲𝟏,𝒏, Double Triangular Snake - 𝑪𝟐(𝑷𝒏), Quadrilateral Snake - 𝑸𝒏are Analytic Mean Cordial Graphs.
5 Star Related Analytic Mean Square-Cordial Graphs
Dr. A. Nellai Murugan, N. Roselin
Abstract – Let 𝑮=(𝑽,𝑬) be a graph with p vertices and q edges. An Analytic Mean Square-Cordial Labeling of a Graph G with vertex set V is a bijection from V to {𝟎,𝟏} such that each edge 𝒖𝒗 is assigned the label 𝒇(𝒖𝒗)=|⌈𝒇(𝒖)𝟐− 𝒇(𝒗)𝟐𝟐⁄⌉| with the condition that the number of vertices labeled with 0 and the number of vertices labeled with 1 differby atmost 1 and the number of edges labeled with 0 and the number of edges labeled with 1 differby atmost 1. The graph that admits an Analytic Mean Square-Cordial Labeling is called Analytic Mean Square-Cordial Graph. In this paper, we proved that Star related graphs Star𝑲𝟏,𝒏, Subdivided Star<𝑲𝟏,𝒏:𝒏>, Tree 𝑻𝒓(𝒏) are Analytic Mean Square-Cordial Graphs.
6 Mitigating Various Attacks in OLSR Using 3D Framework
L.M.Mary Jelba, S.Gomathi
Abstract – Mobile Ad-hoc networks (MANET) are more defenseless against security violations in many circumstances. This is undesirable due to their communication channel being wireless and the co-operative nature of the nodes forming a network. Attacks can be classified into many types based on the process and behavior. But the attacks generally fall under one of the following categories: Black hole attack, node isolation attack, Flooding attack, Wormhole attack, Spoofing attack, grayhole attack, Detour attack, Falsified route error generation attack and Rushing attack. Optimized Link State Routing (OLSR) protocol is designed based on optimization of link state protocol and performs effectively for large and dense ad- hoc network. Different solutions have been proposed for different types of attacks, but, these solutions often compromise routing efficiency or network overload and generated many false alarms. There are several attacks are unhandled in OLSR protocol. So this paper handles different types of attacks in OLSR with novel techniques. In this paper we handled 3 types of attacks in OLSR named as grayhole, wormhole and black hole along with the DOS attack. The proposed system generates an effective framework with virtual nodes called as Virtual Interaction Framework to detect, defend and dispense (3D-OLSR).
7 ICT Application- Transpose of Matrix using ‘C’ Language Tool
P.R. Kolhe, P P Kolhe, S D Desai, A Bowalekar
Abstract – In mathematics to solve matrix problems, manually it is very difficult task to get the required output need to perform. Matrix transpose means, write the columns of A as the rows of A T or write the columns of A as the rows of AT. In the era of Information Communication Technology (ICT) .The ICT programming technique, it is easier task. One of the very popular programs in C programming is Matrix Transpose. Transposes mean change row to column. This paper discusses Matrix Transpose in C language, source code and methods with outputs. The source codes of program for Matrix Transpose in C programming are to be compiled. Running them on Turbo C or available version and other platforms might require a few modifications to the code. You probably know how to multiply two matrices.
8 Analysis and Significance Study of Clustering Techniques
S.Saradha, Dr. P. Sujatha
Abstract – Clustering is a division of data into groups of similar objects. Each group is called as a cluster. Data in the same cluster are similar and to the other are dissimilar the aim of this paper is intended to study and compare different clustering algorithms and to find out the appropriate one. The algorithms under investigation are K-Means, Farthest First, and DBSCAN. Merits and Demerits of above algorithms are also discussed here.
9 Analysis of Segmentation Methods for Locating Microcalcification in Mammogram Image
J. Jebathangam, S. Purushothaman
Abstract – Image segmentation is the process of partitioning the digital image into sets of pixels. Image segmentation changes the image more meaningful and easier to analyze. The medical images processed by Computer Aided Diagnosis tool (CAD) to detect the abnormalities will be highly successful in identifying the microcalcification. Segmentation is one of the techniques in CAD to process the image. Each segmented image gives some information to the user. Segmentation technique varies for different images depending upon the problem. This paper analyses about the segmentation technique in mammogram images using CAD tool which helps the radiologist to identify the microcalcification and to know the impact of the disease in patients.
10 An Experimental Study on the Strength of Concrete by Partial Replacement of Cement with Silica Fume and Coarse Aggregate with Steel Slag
M.Vindhya, Dr.T.Suresh Babu
Abstract – This study presents an evaluation of steel slag aggregate concrete with and without adding silica fume in comparison with the conventional natural aggregate concrete. Hardened concrete consist of more than 70% aggregate due to the high demand in building construction and the increase of the amount of disposing waste material, suppliers and researchers are exploring the use of alternative materials which could preserve natural sources and save the environment. Steel slag was used as an aggregate replacement in conventional concrete mixes. Steel slag which is mainly consists of calcium carbonate is produced as a by-product during the oxidation process in the steel industry. Steel slag was selected due to its characteristics, which are almost similar to conventional aggregates and the fact that it is easily obtainable as a by-product of the steel industry. As a result, utilization of steel slag will save natural resources and clean environment. Particle packing analysis is made to optimize the gradation of coarse aggregate which would decrease the cement requirement and increase the density of packing which would result in its improved performance in terms of strength and other parameters. Silica fume is a by-product of producing silicon metal or ferrosilicon alloys. One of the most beneficial uses for silica fume is in concrete. Because of its chemical and physical properties, it is a very reactive Pozzolanic. Concrete containing silica fume can have very high strength and can be very durable. Silica fume is non-metallic and non-hazardous waste industries. It is suitable for concrete mix and improves the properties of concrete i.e. compressive strength etc.
11 A Closure Set Based Approach for Identifying Data Dependency in Relation Database
Varade Sagar Balu, Vijay Kumar Verma
Abstract – In DBMS data store in tables and each row represents an object with relationship in the real world. Storing data into tables is not enough. To represent the data accurately we need integrity constraints. These constraints ensure that the data stored in the database reflects accurately the real-world restrictions. The most important integrity constraints are also called data dependencies. Data dependencies are conditions stating that for any value of a set of attributes there is at most one value for a set of target attributes. Data dependency traditionally plays an important role in the design of relational databases. The discovery of FDs from databases has recently become a significant research problem. Several algorithms have been developed in the recent year to solve the problem of data dependency. In this paper we proposed an efficient approach for identify the data dependency in the rational database. In proposed approach we used closure set which help to generate meaningful candidates.
12 FCM-SEP (Fuzzy C-Means Based Stable Election Protocol) for Energy Efficiency in Wireless Sensor Networks
Sandeep Kaur, Manpreet Kaur
Abstract – Sensor networks are widely used networks in the recent times. These networks are generally known as WSN (Wireless Sensor Networks). These became popular because of the advancements in the micro-electro mechanical systems and their wide application areas. These work in hard-to-reach locations. These have limited batteries as well as limited computational capabilities available with them. So battery conservation is very necessary in these networks so that their lifetime can be enhanced. There are various routing protocols used for energy efficiency of the network. Homogeneous and Heterogeneous are two network schemes in WSN. Out of these two, heterogeneous protocols are more energy efficient than the homogeneous protocols. SEP (Stable Election Protocol) is one of the heterogeneous protocols in WSN. It increases the stability period of the network. In the proposed work, Fuzzy C-Means Clustering is used in SEP Protocol in order to make the network more energy efficient. Simulation result shows that FCM-SEP (Fuzzy C- Means based Stable Election Protocol) shows better performance than SEP Protocol.
13 Efficiency Improvement of Induction Motor Drives used in Pumping Applications
Babli Dewangan, P. K. Choudhary
Abstract – Induction motors more used in industries because of its power/mass relation, robustness, efficiency, low cost and nearly maintenance free in operation from its life cycle. However, motors with higher losses, waste a lot of energy that will increase its operational cost. The high energy uses and the huge number of operating units, even a small improvement in efficiency gives the greater effect for entire energy consumptions and operational cost. This thesis uses key features of loss model control (LMC) for estimation and reproduction current optimal Ids. At first, loss model of induction motor is used for loss-minimization expression considering core saturation and loss expression is used to derive an optimal Ids expression and estimated for various load profiles and finally tabulated, a look-up table in MATLAB is designed for 100 HP, 575 Volt, and 60 Hz induction motor. These lookup tables reproduce optimal Ids value, according to the run-time load profile, in feed-forward manner, and this eliminates run-time loss model complex computation. Two different loss model control approaches are compared with conventional rated flux operation in variable load conditions, their Loss Minimization Factor (LMF) and consequently optimal value of flux component of current (Ids) are evaluated and corresponding efficiency rise are compared together as well as with constant flux mode of operation.
14 Night Vision for HVAC Duct Monitoring Bot
C.Keerthana, C.B.Vasantha Laxmi
Abstract – Safety and Security of life are the two most booming words in the world now. The world has emerged from being a just simple form of day to day life to being aeon of mean and daring machine. Thus the safety and comfort of the people is more important. This paper mainly deals with enhancement of our project “3G Based HVAC (Heating and Ventilating Air conditioning) Duct Monitors Robot “.This paper continuously monitors the faults in ventilation ducts by sending the video output to mobile phones. Inadequate illumination was the only factor which disturbed the video output. To overcome this difficulty we have adapted Night Vision Techniques to Our Bot. This greatly enhance the vision of the bot to a distance of 10meters.The use of visible light with the camera is not preferred because of the short distance covered by light. Many leading car manufactures have diverted their full R&D towards developing night vision technology in cars rather than going for higher torque production mainly due to the safety concerns of the humans.
15 Performance Analysis of WRP,BELLMAN & AODV Routing protocols for MANET
Avinash Gaurav, Aradhana singh
Abstract – A Mobile Ad-Hoc Network (MANET) is formed by a cluster of mobile nodes (hosts) and can be quickly deployed without any predetermined infrastructure. The developments in wireless technology in the present age have created networks with low cost and low power consumption. One of such networks which subsist is called as Mobile Ad-hoc network which is characterized by wirelessly connected nodes with frequent change in network topology. As the nodes are connected wirelessly a routing mechanism (routing protocols) is required for successful transmission of packets. Sometimes two or more nodes sending the information simultaneously results in collisions. Hence medium access controls (MAC protocols) are required for efficient transmission and avoiding collision. In this research work performance of various attributes like throughput, packet delivery ratio and end-to-end delay for three Routing protocols (WRP, BELLMAN and AODV) is analyzed by increasing the mobility of node. The performance of these three routing protocols is completed on Glomosim Simulator and we concluded that AODV perform well in increasing mobility.
16 Multi-label Semantic Relation Classification Between Pair of Nominals
Kartik Dhiwar, Abhishek Kumar Dewangan
Abstract – Relation classification is a keynote in the field of Natural Language Processing (NLP) to mine information from text facing problems of over-reliance on the standard of handcrafted features. Features annotated by specialists and linguistic data derived from linguistic analysis modules is expensive and ends up with the difficulty of error propagation. Relation extraction plays a crucial role in extracting structured data from unstructured sources like raw text. One might want to seek out interactions between medicines to create medical information or extract relationships among people to create a simply searchable knowledgebase. We propose a deep Convolutional Neural Network model for the multi-label text relation classification task without hand crafted features. This model outperforms the best existing model as per our knowledge without depending much on manually engineered features with the small updates in the loss function applied.
17 Performance Evaluation of AODV, DSR and WRP over (TDMA) and (CSMA)
Akhilesh Kumar Misra, Aradhana Singh
Abstract – MANET [1] is a cluster of wireless mobile computer where node shift in self-directed manner in any way .The developments in wireless technology in the present age have created networks with low cost and low power consumption. MANET is a type of multi-hop system, communications less and the most significant self-organizing. Due to wireless and spread nature there is an immense challenge for system protection designers. One of such networks which subsist is called as Mobile Ad-hoc network which is characterized by wirelessly connected nodes with frequent change in network topology. As the nodes are connected wirelessly a routing mechanism (routing protocols) is required for successful transmission of packets. Sometimes two or more nodes sending the information simultaneously results in collisions. Hence medium access controls (MAC protocols) are required for efficient transmission and avoiding collision. In this survey paper we study about different Routing protocols (AODV,DSR and WRP)over TDMA and CSMA and we study about work performance of various attributes like throughput, packet delivery ratio and end-to-end delay for three Routing protocols (AODV,DSR and WRP) .The performance of these three routing protocols will perform on Glomosim Simulator[6].
18 A Model to Analyse Subjective Sentiment Information from Twitter Corpus Using Machine Learning Approach
Dolly Khandelwal, Dr. Megha Mishra
Abstract – Sentiment analysis is the process of extracting and analyzing the sentiments or opinions from the reviews expressed by the people towards the specific topics of interest using machine learning. In recent years, the Internet has become an important source of information, because of the increase in social network contacts, discussion forums and blogs. Twitter is the famous microblogging site to post their opinions on various topics. As opinions are important for efficient decision making, sentiment analysis is used to determine the information that is relevant for users. In this paper, an approach is used that classifies the opinions into categories as positive or negative or neutral. The classification is done on the three multidimensional fields that are politics, entertainment, and companies which gives the overview of what is going around the world. The dataset is created by using the Twitter API. The classifiers used in this paper are Naive Bayes, Maximum Entropy, and Baseline. Finally, unigram feature is used for feature extraction and the performance of different machine learning classifiers are compared.
19 Vein Sensing Technique for Hospital System Application
C.B.Vasantha Laxmi, M.Dhivyaa
Abstract – In order to exploit operationally vein sensing data for hospital applications efficient and automated methods are required towards the accurate detection of pulmonary vein isolation for atrial fibrillation. We hypothesized that pulmonary vein (PV) orientation effects tissue contact of the contact force (CF) sensing radiofrequency ablation catheter (CFC) and thus atrial fibrillation (AF) free survival after pulmonary vein isolation (PVI). The goal of this study was to regulate the association between PV orientations, sixty consecutive patients undergoing CFC PVI was included. ECG-triggered cardiac CT scans were found in all patients before PVI, and the PV orientation was measured at the insertion in the LA for all PVs in both the crosswise and forward plane. CF and AF free survival in patients undergoing CFC PVI. PVs were given to 1 of 4 location groups: ventral–caudal, dorsal–caudal, ventral–cranial and dorsal cranial.
20 Experimental Study on Mechanical Behavior of Engineered Cementitious Composites
Sharmila.S, Pradeep.T
Abstract – Engineered Cementitious Composite (ECC) is a ductile fiber reinforced cementitious mortar composite. Unlike conventional concrete, ECC has fiber, mineral admixture and chemical admixtures along with the basic constituents (i.e.) cement, fine aggregate and water. No coarse aggregate is used in ECC to avoid brittle failure. PVA fibers are known for their low modulus of elasticity, ductility, tensile strength and bonding strength, whereas, Steel fiber increases the flexural, impact and fatigue strength of composite. Hence a combination of these two fibers is used in this work. Fly ash is a material that was proved to be a good replacement for cement, from the previous studies. It occupies the void space in the matrix which would otherwise be occupied by water. GGBS consists of silicates and aluminates of calcium and hence is a good substitute material for cement and hence these two mineral admixtures are used for the experimental studies. In this project, a series of investigations has been carried out to employ hybrid ductile fibers (PVA and steel fibers) in ECC with high volume of mineral admixture (fly ash) replaced for cement. The amount of mineral admixtures is again replaced by 10%, 20%, 30% and 40% of GGBS and the performance of the resulting composite is studied.

Publication Process

Accepted papers will be published online immediately,upon receiving the final version from the authors.

Paper Submission

There is no deadline for paper submission. Authors are requested to send their unpublished manuscripts to: ijetereditor@gmail.com


COPYRIGHT © EverScience Publications