Welcome to International Journal of Emerging Technologies in Engineering Research (IJETER)

Volume 5, Issue 12, December (2017)

S.No Title & Authors Full Text
1 Study of Measurements and Attenuation in Vegetation at Microwave Frequencies
Mahmoud Elshayeb, Dr Silvello Betti
Abstract - This paper presents the First report of an ongoing to study the effects of trees on radio signals at microwave frequencies. Measurements have been made to determine the extent of attenuation when propagated through vegetation and also have been carried to be conducted on selected vegetation with various degree of foliation to determine the dependence of losses on vegetation. also, path geometry and tree geometry are among other parameters under consideration. The results from these experiments compared with standard ITUR-P empirical models and to reflect the dependence of vegetation attenuation on the input parameters under observation.
2 Numerical Modelling for Investigations of Lip Shock Relating to Fluid Flow over a Backward Facing Rounded Step by Using Hybrid RANS-LES
Dr. Nirmal Kumar Kund
Abstract - A 2D numerical model is established to study the supersonic turbulent fluid flow over the backward facing rounded step by introducing the hybrid RANS-LES turbulence model, also otherwise termed as the Spalart-Allmaras turbulence model, which includes a viscosity-like working variable. In addition, the model comprises more significant challenges like production, diffusion and destruction terms apart from the very usual issues pertaining to the current investigations. The numerical simulations are conducted with the stated turbulence model with the inflow free stream Mach number of 2.5 accompanied by the free stream pressure and velocity of 15350 N/m2 and 651.9 m/s2, respectively. The simulation predictions with the hybrid RANS-LES model provides reasonably superior and accurate results all over the whole flow region including the wall vicinity region as well, therefore, the said model is used throughout the entire studies. The simulation predictions reveal that the gradual expansion takes place over the rounded step which leads to the delay in viscous layer separation. Certainly, it causes the formation of relatively shorter shear layer along with the fairly shorter recirculation region, approaching towards the dead air region of the bottom wall. In addition, it is quite apparent from the present research that the non-appearance of lip shock over the rounded step. In other words, it is realized that there is termination of lip shock owing to the use of rounded step in place of sharp edge step.
3 Experimental Investigation on Concrete Using Copper Slag as Fine Aggregate with Bacterial Admixture
R.Deby Linsha, P.Kaviyarasi, M.Anbalagan
Abstract - "With increasing scarcity of river sand and natural aggregates across the country, construction sector is under tremendous pressure to explore alternative to these basic construction material to meeting growing demand of infrastructure demands,"In states like Kerala, Maharashtra and Gujarat, sand mining in rivers has already been banned owing to its disastrous impact on ecology. Therefore, slag has a big potential of being developed as a suitable alternative material to these resources. At present, across the world around 33 ton of slag is generated while in India three copper producers, Birla Copper and Hindustan Copper produce around 6-6.5 tones of slag at different sites.During the smelting operation, iron is removed as iron silicate, which is known commonly known as copper slag (Ferro sand).As per scientific estimate, for every ton of copper metal produced, around 1.8-2.2 tones of slag is generated. In this project tests on concrete is carried out by varying proportions of copper slag and bacteria. The test results show desirable properties such as increase in strength of concrete.
4 Experimental Investigation of Pervious Concrete for Rigid Pavement
K. S. Binitha, M. Priyadharshini, M. Ragul
Abstract - The project aims at making and studying the different properties of pervious concrete using locally available admixtures in Chennai. Pervious concrete (or) no fineness concrete is a combination of cement and aggregate where the usage of sand is neglected. This type of concrete costs much less than normal concrete. Pervious concrete can be used in Parking areas, Side Pavements, Pedestrian path etc., where load distribution is generally low. Pervious concrete is very much important for future application on pavements for development of water conservation and to reduce water logging. An admixture known as Nano silica is used in our project to increase the strength of the concrete. This pervious concrete allows water to percolate and also this protects streams and lakes and allows local vegetation to thrive. Pervious concrete can be used as pavements or pathway in high rise apartments to increase the ground water and also it can be used in the sides of highway pavements to save run-off water. It gives high strength and permeability when no fines are used. The grade chosen for the investigation is M25.This paper attempt is made to develop the mix design for pervious concrete. The specimen results comparison for conventional concrete and pervious concrete. The graphs are plotted and it shows the variation of results.
5 Ultrasonic Pulse Velocity and Rebound Hammer Studies on Concrete with Micro-Reinforcements
Dr. R. Rajeshguna, M. Hari Sathish Kumar, M. Anbalagan
Abstract - This paper presents the results of an experimental study conducted to examine the effect of fibre reinforcement on M60 Grade of concrete using ultrasonic pulse velocity and rebound hammer techniques. In this study a total of 32 cubes of size 150x150x150mm were cast and tested using ultrasonic pulse velocity and rebound hammer. The study parameter was the total fibre volume fraction. Variation of pulse velocity and rebound numbers were studied for fibre contents varying from 0% to 1.5%. The fibres had an aspect ratio of 60. It has been found that the compressive strength of concrete increases by about 15-20% for a fibre content of 1%. The UPV measurement and compressive strength tests were carried out at the concrete age of 7, 14 and 28 days. It has been found that the compressive strength of SFRC increases up to 15.31% when compared with the virgin specimen. This increased strength leads to a more ductile concrete.
6 Computational Fluid Dynamic Analysis of Boiler Feed Pump by Varying Blade Numbers
Kanjarla Shyam Kumar, Ashok Govindu
Abstract - Feed pumps are an essential subsystem of boilers used in industrial process plants and called as boiler feed pump (BFP). Normally, BFP is high pressure unit that takes suction from condensate return system and can be of the centrifugal type pump. In centrifugal pump, water enters axially through the impeller eyes and exits radially. Generally, electric motor is used as prime mover to run the feed pump. To force water into boiler, the pump must generate sufficient pressure to overcome steam pressure developed by boiler. In the present study, design and analysis of boiler feed pump having a flow of 50kg/s, rotational velocity of 2000Rpm and operating at 70 deg C has been taken up. The various pump parameters are obtained from design and pump model is developed using modeling software solid works to evaluate the results at given operating conditions, CFD analysis is carried out using Solid works flow simulations module. Blade number has great influence on the pump performance. Therefore, CFD analyses are carried out for the pump with 6, 7 and 8 blades. Based on performance of every pump model, the best feed pump design is selected. A steady state CFD analysis is carried out using the K-e turbulence model to solve for the Navier-Stroke's equation. Three different geometry of 6,7,8 no's of impeller blade is modelled in solid works 2016 software, Computational fluid dynamic analysis is performed in solid works 2016 module.
7 Investigating and Reproducing EM-Based Nanonetworks in Wellbeing Observing Framework in the NS-3
Anupam Mishra, Dr. Rajeev Paulus, Er.Aditi Agarwal
Abstract - The advance of nanotechnology is making arranged to the making thought of remote nanosensor organize. Undoubtedly, it is presently possible to make facilitated machines at the nano scale, which work together on supportive commence using remote correspondences. The investigation in this field is still in an embryonal stage and the arrangement of the WNSN tradition suite addresses a fundamental issue to address. In this paper, we basically upgraded our past work in a couple of headings. In any case, we have widened the device by working up another coordinating calculation and a more gainful MAC tradition. Furthermore, focusing the thought on a WNSN working in a prosperity screening circumstance, we have investigated how the thickness of centers, the transmission extent of nanomachines, and the determination of specific blends of steering and MAC frameworks may impact the framework lead. Finally, an examination on Nano-Sim computational necessities has been in like manner done, thusly displaying how the made module guarantees unbelievable achievements to the extent flexibility.
8 Stepped Multicarrier SPWM Techniques for Seven - Level Cascaded Inverter
M.Meenakshi, R.Nagarajan, R. Banupriya, M.Dharani Devi
Abstract - In this paper, novel multicarrier pulse width modulation technique which uses stepped carrier waveform is proposed for seven-level cascaded inverter. In each carrier waveform different techniques such as phase disposition (PD), inverted phase disposition (IPD), phase opposition disposition (POD) and alternative phase opposition disposition (APOD) are implemented. The fundamental output voltage and harmonics obtained in each method are compared with the output waveform obtained with the triangular carrier waveform. The proposed switching technique enhances the fundamental component of the output voltage and improves total harmonic distortion. The different PWM methodologies adopting the constant switching frequency multicarrier with different modulation indexes are simulated for a 1kW, 3f inverter using MATLAB/SIMULINK. The effect of switching frequency on the fundamental output voltage and harmonics are also analyzed.
9 Make sure Appropriate Responsibility for Data Sharing and Data Integrity in the Cloud
Rahul D. Kuwar, B. Pannalal, Dr. Shaik Abdul Nabi
Abstract - Distributed computing is the utilization of assets like equipment and programming that are conveyed as an administration over the system/web. In today numerous associations, government, people utilized distributed computing. With the utilization distributed computing you to get to your data from anyplace whenever. While a typical PC setup expects you to be in an indistinguishable area from your information stockpiling gadget, the cloud takes away that procedure. The distributed computing expels the requirement for you to be in an indistinguishable area from the equipment which is stores your information. A noteworthy element of the cloud administrations is that client's information is normally prepared remotely in obscure machines that clients don't possess or work. Information dealing with in the cloud experiences an unpredictable and dynamic various levelled benefit chain which does not exist in current situations. Information taking care of in the cloud experiences a mind boggling and dynamic various levelled benefit chain which does not exist in existing situations. This can recognize by in particular Cloud Information Accountability (CIA) system. In this each and each entrance to the information are effectively and consequently logged. Log records ought to be sent back to their information proprietors or administrator intermittently to educate them of the present use of their information. All the more significantly, client log documents ought to be retrievable whenever by their information proprietors when required in any case the area where the records are put away. The end client is permitted to get to the information according to their client/get to rights which they indicate while enrolling to get to the information in the cloud and verification is given by administrator and information client will be checked. To reinforce client's control access of information in the distributed computing administration, a novel approach, to be specific cloud data responsibility (CIA) system is proposed which secure information amid transmission and capacity. Trial comes about are accounted for to exhibit the proficiency and adequacy of the proposed approach.
10 Optimization of CGI during Milling using Tungsten Carbide Tool
Subhash Pokhriyal, K.C. Rai, S. S. Dhami
Abstract - CGI has many desirable mechanical properties but its machining is a challenge. In present work the milling of CGI was carried out using uncoated tungsten carbide tool. Major input parameters were optimize for achieving minimum tool wear, tool vibration, surface roughness and cutting forces. Design of experiments based on Box Behnken Design of Response Surface methodology was used. An empirical model was developed and equation made between experimental and model result was obtained.
11 Robot Position Optimization for a Pick and Place Operation
Varinder Singh, Sukhdeep S. Dhami
Abstract - In this paper, the robot position for pick and place operation has been optimized for three degree of freedom robot for minimum torque requirement. Robots mainly used for repetitive task and most common application is pick and place operation. For a given pick and place locations, robot manipulator may be fixed at different positions which directly affects the torque requirement at each joint and as a whole. Therefore, selection of optimum place for installation of robot for a given pick and place point is very important. Automated Dynamic Analysis of Mechanical Systems(ADAMS) was used for solving Inverse kinematics and dynamic simulation of robot. Forward kinematic equations are derived using Denavit-Hartenberg parameters. Iterative method is used for inverse kinematic solution in ADAMS software.
12 Effect of Nano Cutting Fluid & Process Parameters on Material Removal Rate and Surface Finish of SS304 Alloy on Turning Operation
Javvadi Eswara Manikanta, B Srinivas, D Santha Rao
Abstract - Turning is the one of the machining process used to reduce the diameter of cylindrical work piece. The quality of machining operation depends on output parameters like surface finish (S.F) and material removal rate (MRR). Further Material removal rate and surface finish of machined components mainly depends on different process variables like speed, feed, depth of cut and type of cutting fluid. The present work is focused on machining of Austenitic Stainless Steel Alloy: SS304. It has an excellent corrosion resistance and forming characteristics and is most widely used in chemical, petro-chemical, fertilizer industries, food processing, Dairy equipment, pharmaceutical industries, hospitals, cryogenic vessels and heat exchangers in Refrigeration & Air conditioning. An attempt was made by using Vegetable cutting fluids mixed with 0, 2, 4 and 6 Wt. % Nano Titanium Di-boride particles during turning of stainless steel 304 with varying process parameters: speed, feed and depth of cut. The output machining characteristics like surface finish and material removal rate are evaluated. The process parameters are optimized using Taguchi Design of Experiments. The best parameters are predicted and % contribution of process parameters is analyzed by using ANOVA analysis. Based on the results, it can be concluded that MRR is influenced predominantly by depth of cut and wt. % of Nano cutting fluid and surface finish is influenced by wt. % of Nano cutting fluid and cutting speed.
13 A Secure Anti-Complicity Dynamic Group Data Sharing Scheme in Cloud
Swapnil Dattu Ahire, B. Pannalal, Dr. Abdul Nabi Shaik
Abstract - Data sharing among pack people inside cloud with the characters of low upkeep and humble organization cost. Then, we tend to offer security guarantees for the sharing information archives since they're outsourced. To owing the relentless modification of the enlistment, sharing information however giving insurance sparing continues being a troublesome issue, particularly for an un-trusted cloud inferable from the course of action ambush. Also, to exist plots, the prosperity of key dispersal is predicated on the sheltered channel, in any case, to claim such channel may be a tough assumption and is troublesome for apply. We tend to propose secure information sharing subject for dynamic people. Regardless, we tend to propose an ensured route for key scattering with none secure correspondence channels, and in this way the customers will determinedly get their non-open keys from cluster overseer. Other than we can do fine-grained get to association, any client inside the social occasion will utilize the supply inside the cloud and revoked clients can't get to the cloud yet again once they're denied. Third, we can shield the subject from approach assault, which suggests that repudiated clients can't get the fundamental record anyway they think up with the un-place stock in cloud. In our approach, by contributing polynomial perform; we can finish a protected customer denial point. Finally, we can give, non-open key for security where customer needn't to invigorate, in this way no prerequisite for a substitution of customer joins inside the pack or a customer is denied from the gathering.
14 Analysis of Lower Body Exoskeleton using MSC ADAMS
Juttiga Suresh, K.Saahith Brahmanya, U.V.V.Vinod Kumar, Ishwary Singh Beghel
Abstract - In this paper, an assistive lower-body exoskeleton for paraplegic persons is designed in MSC ADAMS with 4 DOF and simulated with relevant data inputs like reference angle and limb length. Position analysis is done by using DH parameters. Finally, the behavior is plotted with respect to each phase of the gait cycle. The individual phase cycles are plotted and the behavior is studied. The simulation helps in finding out the exact components which suit the current design. Here the hip and knee motor torques are deduced using the generated graphs. The maximum torque can be used to select the kind of motor to be used to create walking motion using exoskeleton.
15 Control of Two Accessories Concentrated For Administrations Based on the Web of Computing in the Cloud
Valavoju Mounika, V. Sridhar Reddy, Dr. Shaik Abdul Nabi
Abstract - In this paper, we present another fine-grained two-factor verification (2FA) get to control framework for electronic distributed computing administrations. In particular, in our proposed 2FA access control framework, a characteristic based access control instrument is actualized with the need of both a client mystery key and a lightweight security. As a client can't get to the framework on the off chance that they don't hold both, the instrument can improve the security of the framework, particularly in those situations where numerous clients share a similar record for electronic cloud administrations. Moreover, characteristic based control in the framework additionally empowers the cloud server to limit the entrance to those clients with a similar arrangement of properties while protecting client security, i.e., the cloud server just realizes that the client satisfies the required predicate, yet has no clue on the correct personality of the client. At long last, we additionally do a reenactment to exhibit the practicability of our proposed 2FA framework.
16 Multiple Information Protection Frameworks by Utilizing Binary Technique
Arigela Jyothi, V. Sridhar Reddy, Dr. Shaik Abdul Nabi
Abstract - Nowadays, insistence is the spine. Unmistakable clients utilize contrasting methodologies for affirmation with others. Generally utilized procedures for trades are the sends, visit, and trade, download and so on. In every last one of these sorts of assurance information's security is uncovered. Any product architect can try to see the motivations behind interest and accurately tends to hurt the information besides. The present situation administers giving security by utilizing advances, for example, Cryptography or Steganography to shield the information from a product build. These movements have their own specific points of interest and de-merits. Next to Cryptography and Steganography, CRC is utilized to perceive harms or modifications in information amidst transmissions. All the above are self - adequate advancement each guaranteeing to be superior to the accompanying. Structure proposes to execute a shielded framework that shields information from different sorts of programming engineers when transmitted on the system. The application relies upon the information from being clear to untouchable or programming engineers. Other than it teaches the beneficiary of any change done to the information amidst transmissions.
17 A Survey of Security Issues and Attacks in Cloud and their Possible Defenses
Aaqib Iqbal Wani, Zubair Ahmad Lone
Abstract - Cloud computing has emerged as one of the most popular and powerful technologies over the last decade. It has laid the basis for conceptual and infrastructural computing of the future. Organizations are moving their business to the cloud and taking advantage of the power of cloud-based computing, however, security remains of core interest and because of which many organizations are avoiding migration to the cloud. With the introduction of numerous cloud services and geographically diverse service providers, sensitive information is stored at different physical locations, elevating the threat of being compromised. If the security issues are not a concern, cloud computing can become an even huger success. Continuous research is being done to make the cloud computing paradigm a safe and secure environment and expand the services to a greater number of users. In this paper, we discuss the various security and privacy concerns related to the cloud computing environment and provide the related solutions for each problem.
18 Modelling and Optimizing the Laser Parameters to Attain the Minimum Wear Rate in Nickel Based (Inconel- 625) Hardfaced Surfaces
A.Umesh Bala, Dr.R.Varahamoorthi
Abstract - In this Investigation, an attempt has been made to optimize the Laser process parameters of hardfaced surfaces such as Laser Power (P), Travel Speed (T), Defocusing Distance (D) and Powder feed rate (F) to minimize the wear rate of nickel based Inconel-625 produced on AISI 304 stainless steel. The influence of the Laser hardfacing process parameters on the Wear Rate is discussed for optimized condition. The experiments were conducted based on a four factor and five level central composite rotatable designs. The empirical relationship was developed using Response Surface Methodology (RSM) technique to predict the Wear Rate of hardfaced surfaces at 95% confidence level. The interaction effects of input process parameters of laser hardfaced surface on Wear Rate are discussed. The optimized process parameter and the influenced parameter are identified. From this investigation it is found that the minimum wear rate of 0.271578 (mg/N-km) is could be achieved by the laser power of 2507(W), travel speed of 1034(mm/min), defocusing distance of 30 (mm) and powder feed rate of 40.5(g/min).
19 An Efficient Data Clustering Technique Using Flexible and Accurate Motif Detector Algorithm
S. Vasanthakumar, N. Siva Kumar
Abstract - The this paper we present a new Flexible and Accurate Motif Detector algorithm (FLAME), this algorithm is a most flexible one to build the tree generation of probability suffix order, find similarity and merging the sequence data. The usage of FLAME, it is currently possible to find the mine datasets that would have been most highly used to find the sequence pattern which is difficult with already existing tools. To reduce the size of the datasets is to use the sequences of character store in a particular memory with the same character in the tree based approaches to reduce the memory size in the existing tools. The experiment result shows that FLAME algorithm has good performance when compared with other methods.
20 Analysis of Image Enhancement Process in Digital Image Processing using MATLAB
Sourabh Pathak
Abstract - There are many kind of images required for inspection and information according to the sources now a days. An image enhancement process is transformation of to an input image to make the output image better than the input image and provide the better result and transform an input image for future image enhancement process. There are many images like images of satellite and medical images, even real life photographs. This paper is based on to remove the noise and enhances the contrast and picture standard. The process of image enhancement provides the better picture quality and contrast of images by suppressing the noise. An enhancement technique is application oriented; there is necessary thing for the enhancement process that is to find the simple operations for the image enhanced. The main source for receiving the information from the real world is image. Images are taken or captured in many positions and situations in the real world. Due to this there is need of image preprocessing method at the captured image to remove the noise, making sharp, remove unwanted background according to the application. An image enhancement method is the first preprocessing step in which authors propose the image with more clarity. There are many algorithms proposed for image enhancement for solving the image learning optimization process.
21 Application of Analytical Hierarchy Process for Domestic Refrigerator Selection
Soupayan Mitra, Sougata Kundu
Abstract - Selection of most suitable product, process, strategy, or service option under several alternatives having varying degree of choices or, preferences with a number of sub-criteria is often a tedious, time consuming and sometimes even a confusing task. In this present investigation, a multi-criteria decision making (MCDM) system tool, namely Analytic Hierarchy Process (AHP), is adopted to ascertain the best possible selection of a domestic refrigerator from a number of alternatives having varying degree of sub-criteria covering all technical, economic, capacity requirement and personal choices aspects. The results obtained are also validated by consistency checking.
22 A Survey of Image Processing Technique for Wheat Disease Detection
Varinderjit Kaur, Dr.Ashish Oberoi
Abstract - There are many types of diseases which are present in plants. To detect these diseases pattern are required to recognize them. There are many types of pattern recognition algorithm which gives detection of disease with accuracy. In the existing work back propagation and principal component analysis are used to detect plant diseases. These algorithms are learned from training supervision in neural network. There is an issue of accuracy in these algorithms. These algorithms are able to detect diseases in plant but in accurate way. So to increase the accuracy for plant detection a new method will be proposed.
23 A Survey of Clustering Technique for Brain Tumor Detection in MR Images
Gurkarandesh kaur, Dr. AshishOberoi
Abstract - Accurate cell detection is often an essential prerequisite for subsequent cellular Analysis. The major challenge of robust brain tumor nuclei/cell detection is to handle significant variations in cell appearance and to split touching cells. Based on literature view we conclude that engineering and research community is doing lot of work on brain tumor detection. This paper presents a survey on method that use clustering technique to test and evaluate proposed technique both qualitatively and quantitatively in terms of various parameters like false positive rate, false negative rate, execution time, accuracy and fault detection rate.
24 Antiquated Dispersing of Major Remodel along Third Party Auditor in Cloud Computing
G. Swathi, G.Dayakar,DR. shaik Abdul Nabi
Abstract - In this paper, we focus on the most ideal approach to make the key upgrades as clear as could be normal the situation being what it is for the client and propose another perspective called circulated capacity investigating with certain outsourcing of key updates. In this perspective key updates can be safely outsourced to some affirmed assembling and thusly the key-redesign inconvenience on the client will be kept irrelevant. Specifically, we impact the untouchable reviewer (TPA) in various current open analyzing diagram, let it expect the piece of endorsed assembling for our circumstance and make it responsible for both the limit inspecting and secure key updates for key-introduction protection. In this perspective, key upgrades can be safely outsourced to some endorsed assembling, and along these lines the key-update stack on the client will be kept irrelevant. Specifically, we impact the pariah evaluator (TPA) in various current open looking at plans, let it expect the piece of affirmed assembling for our circumstance, and make it responsible for both the limit assessing and the sheltered key overhauls for keyintroduction protection. As of late, enter introduction issue in the settings of distributed storage reviewing has been proposed and contemplated. Existing arrangements all require the customer to refresh his mystery enters in each day and age, which may definitely acquire new neighborhood, weights to the customer, particularly those with constrained calculation assets, for example, cell phones. In this Ideas , we concentrate on the most proficient method to make the key updates as straightforward as workable for the customer and propose another worldview called distributed storage evaluating with unquestionable outsourcing of key updates. In this worldview, key updates can be securely outsourced to some approved gathering, and consequently the key-refresh trouble on the customer will be kept minimalWe formalize the definition and the security model of this worldview. The security evidence and the execution reproduction demonstrate that our nitty gritty plan instantiations are secure and effective.
25 Parallel ICI Cancellation of MC-CDMA Systems under Typical Urban Channel
K. V . Murali Mohan, Dr D Krishna Reddy
Abstract - Multi carrier systems are robust to channel noise, however due to Doppler shift and carrier frequency offset there arises inter carrier interference which degrades the performance of the system. In this paper a parallel cancellation algorithm in spatial frequency domain is proposed to mitigate the effect of ICI, the performance of the approach is evaluated under typical urban channel environment. A clear analysis is performed to adapt the modulating frequency with a finite set of sub carriers.
26 PAPR Reduction in OFDM Systems Using A Piecewise Linear Companding Transform on Cyclic Shift PTS
T Suneel Kumar, G. Sreenivasulu
Abstract - Orthogonal frequency division multiplexing (OFDM) signals have high peak-to-Average power ratio (PAPR). PAPR is a major drawback in the application of OFDM communication. High PAPR, which causes distortion when OFDM signal passes through a nonlinear high power amplifier and reduce system efficiency. We have various methods for the reduction of PAPR, Among various methods Partial Transmit Sequence (PTS) is best method. A cyclic shifted sequences (CSS) scheme is evolved from the PTS scheme to improve the PAPR reduction performance. In the CSS scheme challenging one is the shift value (SV) set should be carefully selected because those are closely related to the PAPR reduction performance of the CSS scheme. However, as Companding transform is an extra operation after the modulation of OFDM signals, companding schemes reduce PAPR at the expense of increasing the Bit Error Rate (BER). In this paper , a new piecewise linear companding transform is proposed aiming at mitigating companding distortion. With the careful design of the companded peak amplitude and the linear transform scale, the proposed transform can achieve better reducing PAPR effectively.
27 Investigation of Different Feeding Techniques on Rectangular Microstrip Patch Array Antenna
P. Ram Prasad, K. Jogi Naidu
Abstract - Wireless communication system plays a prominent role in many applications like long distance communication, mobile applications, high performance aircraft, missile applications. For this purpose wireless communication systems requires antenna with compact, flexible, ease of installation, superior gain and directivity. Rectangular single element microstrip patch antenna used in several applications, but these are not suitable for satellite communications, space crafts, and high resolution Radars because they need enhanced gain and also directivity. In view of the above facts multiple designs have been deployed to enhance the gain and directivity and low beamwidth by increasing the number of patch elements with series, parallel and individual feed network at an operating frequency of 10GHz with dielectric constant 2.2. The 4 element and 8 element design has carried out in this work by comparing with two element. Some of the system operational characteristics depend on directional properties of antenna. HFSS software is a tool for this project design and implementation. Antenna primary parameters such as impedance bandwidth, directivity, gain, radiation pattern, beamwidth were compared among all three types of feed network.
28 Design of a New Dual Dynamic Flip-flop with Low Power and Low Area
Boddeti Neelima Devi, Sheik Shabeena
Abstract - The fast growth of the power density in integrated circuits has made area and power dissipation as the vital design measures. To store data latches and flip-flops are the basic elements. Less power will be dissipated for a classic structured Dual Dynamic Flip-Flop (DDFF), as mentioned in an open literature. In this paper DDFF is designed which dissipates less power due to large pre-charge node capacitance. In this number of transistors required to design are reduced. From the results by comparing power analysis and performance, the proposed design is suitable for high performance digital designs where area and power dissipation are mainly considered. The proposed flip-flop reduces power dissipation up to 60-70% and area up to 40% compared to conventional flip-flops. By using proposed flip-flop, a Serial in serial out (SISO) Shift register is designed using TANNER Simulation Tool, with Schematic editor 250nm technology.
29 Analysis on Linear Planar Antenna in X-Band Range
Sheik Shabeena, Boddeti Neelima Devi
Abstract - Wireless communication technology has expanding its wings in recent past times. One cannot separate the advancement of wireless systems without antenna engineering. In this work, an antenna has been designed in X-band which extends between 8GHz to 12GHz. The outcome of this work has found its applications in the wireless communication systems, space wave communication, Radar and Sonar systems. The designed antenna is a linear and planar in nature with metallic conductors placed serially. Out of the four available feeding techniques, microstrip edge feed has been chosen and all the dimensions are calculated as per transmission line cavity model equations. Primary parameters of an antenna like gain, directivity, impedance matching axial ratio and standing wave ratio were observed and based on it; the performance of planar antenna has been stated. HFSS software is the platform to implement this work.
30 Analysis of Disease by Image Segmentation Using Retinal Blood Vessels Detection
Kodi Suma, B.T. Archana
Abstract - A retinal vessel occlusion is a blockage in the blood vessel of your eye that can result in sight loss. Eye ailments and sight loss are one of the significant health issues among the senior and old individuals .Retina is the most important internal components in eye .Retinal images play vital role in several applications such as disease diagnosis and human recognition. They also play a major role in early detection of diabetics by comparing the states of the retinal blood vessels. Retinal Image Analysis is a key element in detecting retinopathies in patients. Diabetic Retinopathy is one of the most common diabetic eye conditions which cause blindness induced by alterations in the blood vessels of the retina. In this work we detect the blood vessels effectively for the diagnosis of disease such as diabetes, glaucoma, and hemorrhage.
31 Secure and Efficient Third Party Auditing Scheme for Cloud Data Storage
Manibharathi R, Dr.K.Selva kumar, Dinesh R
Abstract - Cloud computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. However, the fact that users no longer have physical possession of the possibly large size of outsourced data makes the data integrity protection in Cloud computing a very challenging and potentially formidable task, especially for users with constrained computing resources and capabilities. Existing privacy-preserving public auditing protocols assume the end devices of users are powerful enough to compute all costly operations in real time when the data to be outsourced is given. In fact, the end devices may also be those with low computation capabilities. Thus the proposed system is used for two lightweight privacy-preserving public auditing protocols. 1) TPA should be able to efficiently audit the cloud data storage without demanding the local copy of data, and introduce no additional on-line burden to the cloud user; 2) The third party auditing process should bring in no new vulnerabilities towards user data privacy. The algorithm proposed here is online/offline algorithm. Thus the proposals support batch auditing and data dynamics.

Publication Process

Accepted papers will be published online immediately,upon receiving the final version from the authors.

Paper Submission

There is no deadline for paper submission. Authors are requested to send their unpublished manuscripts to: ijetereditor@gmail.com


COPYRIGHT EverScience Publications