Welcome to International Journal of Emerging Technologies in Engineering Research (IJETER)
Volume 4, Issue 4, April (2016)
S.No | Title & Authors | Full Text |
---|---|---|
1 | Wireless Based Visual Prosthesis System Using Artificial Silicon Retina Kavitha.S, Arjunan.K, Karthik.D Abstract – According to a recent survey done on the number of visually impaired people in the world, it is found that about 285 million people in the world are blind of which 246 million have low vision and 39 million people in the world are completely blind due to the diseases such as macular degeneration, retinitis pigmentosa and glaucoma. Medical treatments are available to slow down the process of these diseases but there is no complete cure for regaining the lost vision. This paper is about visual prosthesis system where the blind is enabled to see the world virtually. |
Download |
2 | Datasync Smartdrive Application Using Cloud V.Ashika, K.Koushika, D.Kowsalya, S.Vinoth Kumar, K. Rajakumari Abstract – Smartphone’s are becoming popular because of their capabilities and functionalities. Their small size and light weight make them very easy to carry, and they provide useful services as they run PC-like applications. The Multimedia applications such as image, video playing are very much resource intensive in terms of processing and data rates. Consequently they consume much energy and drain Smartphone battery very quickly .These limitations can be eased off in the era of cloud computing by uploading all our important activities to the cloud. Everyone using cloud storage offer by many cloud providers but users can only upload the things which we stored in internal or external storage. It’s a drawback in this fastest lifestyle. Enhancement for drawback we created an android application which connected with cloud, this is the one application which contains various option to deal with all multimedia activities. In proposed system we can upload our activities to cloud server directly and we use cloud storage and Cloud-Centric Media Network communication systems from mobile to cloud. Offline actions are uploaded automatically when turning online. The data is stored in a secured way and it is protected from other users, authorized user can retrieve and view data at anytime from anywhere. The energy cost of multimedia applications on Smartphone that are connected to the Multimedia cloud Computing is evaluated. We are proposed a new ideology where the memory consumption problem has been very +much addressed. |
Download |
3 | Usage of Access Control Mechanism for blocking Application in Android Mobile Phones Divya S, Vanitha S, Dakshana V M, Sharmila N Abstract – Mobile Android applications often have access to sensitive data and resources on the user device. Misuse of data by malicious applications may result in privacy breaches and sensitive data leakage. In order to overcome such privacy problems an access control mechanism is proposed. Application requires installation and the admin registration takes place. The location for blocking is saved with the package name of the application installed in the user’s device. Employee is added for user login, once added the abstract is shown in the admin device. If the admin enables the blocker immediately the user’s application is blocked. This may avoid privacy data breaches. |
Download |
4 | Secure Data Transfer in Ambient Audio Shanmugavel.D, Poovarasi.V, Revathi.K, Vidhya Lakshmi.S Abstract – Data transferring plays a significant role in mobile application. This is largely affected by eavesdropping during the transmission, when the data is not encrypted. In this paper, we propose a secure communication channel among devices based on similar audio patterns. Features of ambient audio are used to generate small information between the devices. We explore a common audio-fingerprinting approach and account the noise in the derived fingerprints by applying error correcting codes. In secure data transfer in ambient audio, the sender device will send audio signals via its speaker and the receiver device uses microphone to receive the signals and decode the data from the sound wave. Phase key shifting scheme is used for data encryption and decryption. PSK is a digital modulation scheme that conveys data by changing, or modulating, the phase of a reference signal. Android based mobile system is used as a sender and receiver to demonstrate the concept. This kind of work can be used for short range communication without using a network like wifi, Bluetooth, etc. These schemes are useful in mobile applications like private information sharing, payment authentication, Near Field communication (NFC), etc. |
Download |
5 | On The Positive Pell Equation M.A.Gopalan, S.Vidhyalakshmi, E.Premalatha, A.Nivetha Abstract – The binary quadratic equation represented by the positive pellian y2=120x2+4 is analyzed for its distinct integer solutions. A few interesting relations among the solutions are also given. Further, employing the solutions of the above hyperbola, we have obtained solutions of other choices of hyperbolas, parabolas and special Pythagorean triangle. |
Download |
6 | Brain Computer Interface Techniques for Physically Challenged People M. Lavanya, Dr.M.Newlin Rajkumar Abstract – Blind and deaf people can communicate in the real time world. Vibrating bracelet and neurosky mindwave is used for the physically challenged people. By using vibrating signal blind can able to identify the sensation. And also by using electroencephalogram we can identify the waveform of deaf. |
Download |
7 | Utilization of Light Weight Expanded Clay Aggregate in Waste Water Treatment –A Review Dharani.R, Sivalingam.A, Thirumarimurugan.M Abstract – LECA stands for light weight expanded clay aggregate. LECA is manufactured in rotary kiln at 1200˚C. Its dark brown in color with interior black color in round shape. LECA is a versatile material. It is almost used in concrete fillings, construction sites, hydroponics, aquaponics , geo fillings[1] . It was first developed in the year of 1917. LECA can be used effectively in waste water treatment. This paper scrutinizes the use of LECA and modified LECA for the treatment of waste water. |
Download |
8 | RF Based Reservoir Heat Logging and Monitoring Using Matlab and Microcontroller Gowri.V, Deepika.T, Santhoshkumar. S.P, Arulmurugan.S Abstract – This research was developed to produce a prototype product of a RF based temperature monitoring system that allows that user to continuously monitor the temperature condition of a room. The enhancement from the existing system on the temperature monitoring that is proto type system allowed the data to be monitored anytime and anywhere from the internet .using an address based monitoring and control and it also logger the output.it can easy to see the output in graphical representation using MAT lab. |
Download |
9 | Rheological Characterization of Blood Flow Sanjay Singh Bhadoria, Kaushalendra Kumar Dubey, Rita Singh Majumdar Abstract – The red blood cells are described as deformable closed shell with a membrane characterized by bending rigidity and stretching elasticity. To numerically investigate blood flow and blood associated processes in complex geometries, a highly efficient simulation technique is essential. In this paper we focused on the various modeling techniques of blood flow, the behavior of single and several cells in shear and micro capillary flows, the shear thinning behavior of blood and its relation to the blood cell structure. |
Download |
10 | LASER Li-Fi Based SMS Communication Vibhu Bindal Abstract – Now-a-days many people are using internet to accomplish their task through wired or wireless network. As no. of users get increased in wireless network speed decreases proportionally. Though Wi-Fi gives us speed up to 150 Mbps as per IEEE 802.11n, it is still insufficient to accommodate no. of desired users. To remedy this limitation of Wi-Fi, we are introducing concept of Li-Fi. As per Germen physicist Harald Haas “data through illumination” – taking the fibber out of fiber optic by sending data through an LED light bulb that varies in intensity faster than the human eye can follow. Haas says his invention, which he calls D-LIGHT, can produce data rates faster than 10 Mbps, which is speedier than your average broadband connection. The LASER Li-Fi is the advanced version of Li-Fi where we use LASER at the place of LED. The on-off activity of LASER is fast in comparison of LED. Data transfer speed of LASER Li-Fi is upto 10Gbps while LED Li-Fi data transfer speed is only 1Gbps. LASER is used for better performance and high data transfer speed. |
Download |
11 | Detection of Micro Calcification in Breast using Morphological operators V.Parameshwari Abstract – Nowadays, Micro calcification in digital mammogram is an important early sign of breast cancer and their early detection is very important to improve its diagnosis. Early detection of cancer is the best method to increase the chances of survival. In early stage, cancer can be detected using mammography, fine needle aspirate, and surgical biopsy. Computer- based detection system can assist the radiologist to improve the diagnostic accuracy. Digital Mammogram is the low cost and effective for early detection of masses or abnormalities which related to the high risk factor of breast cancer. In this paper, various techniques for detection of micro calcification have been studied. Further, brief discussion has been done on breast cancer detection which is included with feature extraction methods based on texture. At the end of this paper, comparative study between various morphological operations for detecting micro calcification has been done. |
Download |
12 | Rising Trends of Cyber Crime: Targeting Women Bindia Abstract – Information technology has widened itself over the last two decades and has become the axis of today’s global and technical development. With the advancement of internet, the crime using internet has also widened its roots in all directions. Women are the soft targets of this new form of crime. Cyber-crime is emerging as a challenge for national and economic security. Various issues that are discussed in this paper are: Cyber Stalking, Harassment via Email, Cyber Defamation, Morphing, and Email Spoofing against women. The problem would be solved only when the victimized woman then and there report back or even warn the abuser about taking strong actions. |
Download |
13 | Classification of Clustered Microcalcifications in Mammograms Using Graph Method V. Sathya Priya, Karthika P, Kiruthika S, Manimegalai R Abstract – Novel method for the classification of micro calcification clusters in mammograms is proposed Methods. The topology/connectivity of individual Morphology of micro calcification clusters, such as cluster area, cluster perimeter, cluster diameter, cluster circularity, cluster eccentricity, and cluster elongation. The radius of the structuring element is equal to 6 pixels (i.e., scale=6). The boundaries of dilated micro calcifications are displayed using different colors and each individual micro calcification is labeled with a sequential number which is ordered according to the spatial location of the corresponding micro calcification in the image patch. A set of micro calcification graphs were constructed to describe the topological structure of micro calcification clusters at multiple scales. In a micro calcification graph, each node represents an individual micro calcification, and an edge between two nodes is created if the two corresponding micro calcifications are connected or overlap in the 2-D image plane. Artificial Neural Network (ANN)-based classifiers are used for classifying micro calcification clusters into malignant and benign. |
Download |
14 | Labour Risk Management in Construction Areas R.Ranjani, K.Tamilselvan, Dr.P.Thangaraj Abstract – The construction industry plays a major role in the economic development of the country. There are several risks allied with the construction industry. Managing risks in construction projects has been recognized as a very important management process in order to achieve the project objectives in terms of time, cost, quality, safety and environmental sustainability. This study is related to labour who directly take part in the construction process, and the surveys have been conducted with various Engineer/contractor, site engineer and labour in TamilNadu. The opinion at various levels of management through the standard questionnaires has been collected and the results are analyzed. From this study, suggestion and recommendation has been formulated to overcome those risk mitigations. BEL (Builders Engineers Labour) welfare team checklist has been developed based on the result to reduce the labour shortage. The check list has been accounted by feedbacks and approval from the construction engineers. |
Download |
15 | An Efficient Pervasive Road Traffic Management System Dr. Nlerum Promise A., Dr. Friday Onuodu E. Abstract – Congestion of vehicular traffic within urban areas is a problem experienced worldwide. It has adverse effects on people quality of life due to delays, accidents and environmental pollution. One way of eliminating the problem is to increase the capacity of existing roadways by addition of lanes. However, this is greatly hampered by lack of space, resources or due to environmental issues and sometimes politics. This leaves the relevant authorities with one major option, that of enhancing the utilization of existing infrastructure by employing better traffic management and operations strategies. For effective traffic management and control, we have deployed a pervasive computing infrastructure in conjunction with a microscopic traffic model to monitor road traffic situation with a view to proffering solutions to the ever challenging problem of congestion and vehicular traffic on our roads. In this paper, we have applied Microsoft Visual Basic and Mathematica software for modeling and simulation of the case study. This combination presents a powerful interactive visual modeling and simulation tool and is principally employed for creating animated and dynamic models. For compatibility reasons, we employed Microsoft Database Access for the backend data. This way, efficient road-traffic-users’ database can be captured for proper identification and capturing. |
Download |
16 | Benefits and Challenges Faced By the Cooperative Banks Preety, Dr. D.K. Maheshwari, Dr. Prabhat Kumar, Dr. Pushpendra Kr. Verma Abstract – “A Co-operative bank, as its name indicates is an institution consisting of a number of individuals who join together to pool their surplus savings for the purpose of eliminating the profits of the bankers or money lenders with a view to distributing the same amongst the depositors and borrowers.” The government of India started the cooperative movement of India in 1904. Then the government therefore decided to develop the cooperatives as the institutional agency to tackle the problem of usury and rural indebtedness, which has become a curse for population. In such a situation cooperative banks operate as a balancing Centre. At present there are several cooperative banks which are performing multipurpose functions of financial, administrative, supervisory and development in nature of expansion and development of cooperative credit system. In brief, the cooperative banks have to act as a friend, philosopher and guide to entire cooperative structure. The paper is based on some successful co-op banks in Uttar Pradesh (India). The paper of the bank’s performance along with the lending practices provided to the customers is herewith undertaken. The customer has taken more than one type of loan from the banks. Moreover they suggested that the bank should adopt the latest technology of the banking like ATMs, internet / online banking, credit cards etc. so as to bring the bank at par with the private sector banks. |
Download |
17 | MSN and Its Applications Manjit Sandhu, Sukhdeep Kaur, Jaipreet Kaur Abstract – The multimedia sensor network (MSN) is gaining its fame due to the availability of low-cost hardware i.e., networks of resource- constrained wireless devices that can retrieve multimedia content such as video and audio streams, still images, and scalar sensor data from the environment Recent years have witnessed tremendous advances in the design and applications of wirelessly networked and embedded sensors. They leverage the concept of wireless sensor networks (WSNs), in which a large (possibly huge) number of collaborative sensor nodes could be deployed. As an outcome of the convergence of micro-electro-mechanical systems (MEMS) technology, wireless communications, and digital electronics, MSNs represent a significant improvement over traditional sensors. The integration of telemedicine with medical micro sensor technology (Mobile Sensor Networks for Telemedicine applications - MSNT) provides a promising approach to improve the quality of people's lives. This type of network & can truly implement the goal of providing health-care services anytime and anywhere. |
Download |
18 | Analysis of Mechanical Behaviour of Banana Fiber Reinforced Composite Materials S.Ganapathy, S.Karthick, A.Sreenivasan, J.Jinish John, N.Thirumoorthi Abstract – In this work, Banana fibers (Musa acuminata) have been characterized for their physical, chemical, and tensile properties. Banana fibers have good length, strength, uniformity, fineness, and excellent moisture absorption. In this study the feasibility of applying banana (Musa acuminata) fibers, namely bark fibers as an alternative raw material for fiber-reinforced composite (FRC) is investigated. The chemical analysis of the bark fibers indicates that their main components are cellulose 76.69%, hemicelluloses 18.94%, lignin 1.87% and pectin 2.5% respectively. The bark fibers are long, with a thin wall relative to their diameter, and are therefore lightweight. The mechanical properties of the Banana fibers are: tensile strength 381 MPa, strain at break 2.27%. In general, Banana fibers have enough potential for replacing other fibrous raw materials as reinforcing agent. |
Download |
19 | Energy Aware Web Browser for Smartphones with New Optimized Power Consumption Technique R.Sivanantham, R.Rajavignesh Abstract – A smart phone is a mobile phone with an advanced mobile operating system which combines features of a personal computer operating system with other features useful for mobile or handheld use. Smartphone wastes its battery power for display and wireless interface. Smartphone web browser takes much more power for downloading the web pages, so it will drain the battery power completely for web browser. Here propose three techniques to solve the power consumption problem during web browsing that are, 1.changing of browser computation sequence, 2.Advanced Regression tree algorithm, 3.Less Energy Consumption Approach. Here proposed first algorithm is “changing of browser computation sequence”, it will rearrange the computation sequence of web browser, and first download the all object from server in DCH state, and DCH state consumes more battery power of the Smartphone. Now the radio interface is put into FACH state, the FACH state uses the half of the power of DCH state, here downlink or uplink takes place to perform remaining computation. Because remaining computation requires some upload and download process. Here propose second algorithm is “Advanced Regression Tree”, after downloading of all objects, average computation time was calculated by the ART, based on that time value only the smart phone still run in FACH state, if the computation takes more time, than Smartphone will be switched to idle state. Using these three algorithms we can reduce the power consumption of Smartphone by more than 30 percent during the web browsing. |
Download |
20 | Face Recognition Using Hull Point Analysis with Qualcomm SDK Sanpdragon Processor D.Rajapriya, Sandhya, Pradeepa, Subadurga Abstract – Relational over the last two decades, the advances in computer vision and pattern recognition power have opened the door to new opportunity of automatic facial expression recognition system. Face recognition is challenging due to wide variety of faces and complexity of noises and image backgrounds. Facial recognition is done through Hull Point Analysis for accuracy. Hull Point Analysis is a method of plotting six points in shape of hexagon with center point, then the points are connected with lines and the measurements are stored in database at the back end .When a stored user comes infront of the camera the analysis is done based on the measurements and validated with the existing line measurements that are stored in the database. The comparison is made and checked whether the image matches or not. |
Download |
21 | Survey on PUE Attack Detection and Prevention Techniques Ekta Gupta, Poonam, Chander Kumar Nagpal Abstract – As the demand of wireless applications is increasing day by day therefore demand of the spectrum is also increasing. As nearly whole spectrum is allocated already the most promising solution for this is Cognitive Radio Network (CRN). In CRN unlicensed users sense the spectrum for availability to use without interfering the communication of primary users. As sensing the spectrum is very sensitive task it is feasible to many vulnerabilities. One of these vulnerabilities is Primary User Emulation Attack (PUEA). In this attack a malicious user pretends like a primary user. There are many techniques that are proposed to detect the PUE attack and prevent it but still there are many open issues regarding the security of network during sensing of spectrum. In this paper we discuss all these techniques and analyze the open issues which are still there in the cognitive radio network. |
Download |
22 | Enhancement in Engineering Properties of Soil Reinforced with Jute Fiber Azhar Zaidi, Mohd kashif khan, Zishan Raza Khan, S.M Ashraf Husain Abstract – In this paper we focus on the improvement of engineering properties of soil by using jute fiber treating with the chemical phenol. Jute fiber is treated with the chemical phenol to enhance the engineering properties in case of pavement and earthen slopes. The aim of the present investigation is to determine the jute geo textile as soil reinforcement. The soil mixed with at varying % of processed jute to study the effects of geo textile as an arrests migrating of soil particles and allows water to permeate across it (to check permeability and direct shear tests). In this paper jute is mixed in soil with 0%, 1%, 1.5%, 2.0%, 2.5%, and 3.0% and the jute fiber cuts into different sizes. And the specific gravity of jute is 1.15. Having different diameters, such as: 2mm, 4mm, 6mm and 8mm, length having 0.5 to 2.0mm. Aspect ratio of jute fiber is 16.52. The soil has been taken from the river ganga which is sandy soil and the specific gravity of sandy soil is 2.656. The fineness modulus is 2.865. OMC 10% maximum dry density of soil is 1.704 gram/cc and bulk density is 1.36 gram/cc. The natural fibers reinforcement causes significant improvement in shear strength, tensile strength and other engineering properties of the soil i.e, permeability and direct shear. Over a year many research and development studies has been carried out in national and international projects using jute fibers. The overall objective of this paper is to improve the engineering properties of soil. Jute fibers have been widely used because it is biodegradable and plenty of nature. To increase the durability of the jute fibers it will mixed with phenol or other chemical like acetylene, bitumen e.t.c. Tests results indicate that by the using of jute fiber in soil the permeability is less in every different percentage of jute mixed in soil. And in direct shear the cohesion values should be increasing by different percentage of jute fiber and ᶲ values should be decreasing accordingly by the treatment of soil with jute fiber. |
Download |
23 | A Review on XBEE Technology Vaibhav Khedekar, Sonal Mahajan, Ankush Karangale Abstract – From the past few years there are rapid development in the wireless technologies. The wireless networks has more application than that of wire technology, which has more complex city than wireless networking which has the more installation cost and maintenance cost also it required more man power for handling it. The more wireless network has used now days for the wireless monitoring control application of industry and domestic environment which has longer in life which has lower data rate and less complex city than the older network. There are wireless network like Wi-Fi and Bluetooth used for the data transmission. For such application the Zigbee alliances invented network by using the Zigbee. Zigbee has IEEE standard 802.15.4 and it has band of 2.4 Ghz ISM. This paper include application , advantages and about the Zigbee data module |
Download |
24 | Side Lobe Suppression of OFDM Based Cognitive Radio by Using Genetic Algorithm Ved Prakash Singh, Saurabh Mitra Abstract – The spectrum allocation policies of the Federal Communications Commission (FCC) [1] only allow spectrum access to primary users, it has been proven by various spectrum measurement campaigns that, the current spectrum usage across time and frequency is inefficient. Therefore, in order for the secondary users to access the unused portions of the licensed spectrum, the concept of “spectrum pooling” has been proposed. Efficient pooling of the radio-frequency spectrum is achieved by employing a cognitive radio (CR). A CR could be a multi-band, spectrally agile radio that employs versatile communication techniques. An outstanding candidate for CR which provides us several reasons to use is orthogonal frequency division multiplexing (OFDM) which is a combination of modulation and multiplexing.. The large side lobes resulting from the utilization of OFDM leads to high out-of-band (OOB) radiation that causes interference to the neighbor used frequency spectrum. We are proposing this adaptive optimum suppression technique for side lobe power reduction of CR signals based on a previously proposed method AST, employing a genetic algorithm (GA) approach for optimization purpose. Also we have draw BER vs. SNR after simulation. |
Download |
25 | A Novel Variable Speed Wind Energy Using Dc Generator and Three Phase To Three Phase Converter Ashvini R. Admane, Vinay S. Agade, Jagdish K. Dhande Abstract – We know the electrical power is generated by using wind energy to drive a wind turbine .due to their tremendous applications and advantages. For example low volume, low weight, and elimination of gearbox. In this paper , a new wind energy conversion system(WECSs) with DC generator, MPPT, and a new six switch AC/DC/AC converter using power electronic devices and network is proposed. The main aim of this paper to offers sinusoidal outputs at the output side i.e. load and manufacturing cost. Finally, delivering the power to the grid. This configuration uses only six switches and diode among three phases to three phase AC/AC converter. |
Download |
26 | Nature of Wind Turbine Generator for Wind Power Plant Vinay S. Agade, Ashvini R. Admane, Ashvini B. Nagdewate Abstract – This paper presents a over-all review of the most needed nature of wind turbine generator activated on current wind power plant. Many types of wind turbine generators construction depend upon analysis beyond machine groups and speed limitation potentiality, stay consult on along its functional nature, voltages, reactive power or power factor limitation potentiality, voltage drive-over nature action at the time short circuit and reactive power potentiality. |
Download |
27 | Treatment of Domestic Waste Water by Filtration Operation Using Low-Cost Natural Adsorbents Islamuddin, Imran Ahmad Abstract – In India, the most common method of disposal of waste water is by land spreading this treatment method has numerous problems namely high labor requirements and the potential for eutrophication of surface and groundwater. The reuse of domestic waste water for non-potable water application is a potential solution for water deprived region worldwide since water is such a vital resource for survival of both plants and animals it is our responsibility to manage this resource not only as a social Industrial and commercial good but also for the sustainable benefits of all present and future living matter increasing pressure to meet more stringent discharge standards or not being allowed to discharge treated effluent has led to implementation of a variety of advanced biological treatment process. This paper reviews the application of filtration process using low cost natural adsorbent for domestic waste water treatment. Treatment of wastewater using a simple, decentralized, environment friendly method using minimum energy which is applicable to rural as well as urban areas at a low cost is need of the present. The main advantage of filtration process is that they maintain high concentration of microorganism resulting in high removal rate. Filtration technology is a low-cost treatment technology based on physical process to treat wastewater contaminants likecolour, odour, hardness, BOD, COD and suspended solid etc. for a wide range of application in domestic as well as industrial application research on alternate filtration media has expanded the options available for improving excellent quality. The low cost filter is a household point-of-use water treatment system, and has been identified as a sustainable and suitable water treatment technology in rural remote areas in developing countries. It is a modified intermittently operated sand filter capable of filtering pathogens, suspended solids and decreasing turbidity levels through physical, physio-chemical and biological processes. This paper intense to provide an overall vision of multimedia filter technology an alternative method for treating waste water.Treated water use for Irrigation, toilet flushing, car washing, gardening, fire fighting, etc. |
Download |
28 | Removal of Iron Content from Ground Water by Herbal Techniques Rahul Tripathi, Imran Ahmad Abstract – Over the last three decades, the concern about the environment protection has increased tremendously. Presently, several attempts were carried out for the conversion of byproducts of natural materials, especially agricultural wastes into a biosorbent material. Rice husk is one of the low-value agricultural by-products which have been used as absorbent material especially to absorb heavy metals. Previous studies have found that rice husk were capable to absorb heavy metals such as lead, cadmium, selenium, copper, zinc and mercury in the wastewater. Under this experimental job it has been decided to remove the iron content from the ground water by the help of Rice Husk, Neem leaf, and by Tulsi leaf powder. |
Download |
29 | Implementation of Methodologies to Facilitate School Administration and Coalesce Distinct School Counterparts via Web Portal Siddhesh Bagade, Shekhar Bhadange, Aditya Devlalikar, Nilesh Swami Abstract – Web 2.0 technologies have brought new ways of connecting people in social networks for collaboration in various on-line communities. Social network analysis deals with the interactions between individuals by considering them as nodes of a network (graph) whereas their relations are mapped as network edges. So we contemplated about employing the atavism of Socialism at school level. We have come with a prevailing concept of engendering online social platform for schools’ administration which we term as “i-SCHOOL”. i-School is comprised of multifarious actions imbibed with Social Networking where actors like Admins, Teachers, Parents and Students are linked with academic relations within an online social network. i-School prospect actually simplifies what’s considered the most tedious task of administrating the academic activities and interacting with parents by allaying undesirable efforts. The i-School platform maintains information of student attendance, student results and feedback reports of staff. The above aim can be established by furnishing layout structure model i.e. admin, tutor, parent. Here the paper work is drastically curtailed as actors can share records, reports, assessments over network and get analyzed which is the economical dictation of project. This schoolism is exclusively optimized for actors’ convenience by deliberately inheriting standard SDLC. |
Download |
30 | Design of Variable Latency Han-Carlson Adder and Its Applications Sasireka.S, Dr.Marimuthu C.N Abstract – In modern VLSI technology, the occurrence of all kinds oferrors has become inevitable. A Variable latency adder employs speculation: the exact arithmetic function is replaced with an approximated one that is faster and gives the correct result most of the time,but not always.The approximated adder is augmented with an error detection network that asserts an error signal when speculation fails. This paper proposes a novel variable latency speculative adder based on Han-Carlson parallel- prefix topology that resulted more effective than variable latency Kogge-Stone topology. The paper describes the stages in which variable latency speculative prefix adders can be subdivided and presents a novel error detection network that reduces error probability compared to previous approaches. Several variable latency speculative adders, for various operand lengths, using both Han-Carlson and Kogge-Stone topology, have been synthesized using the UMC 65 nm library. Obtained results show that proposed variable latency Han-Carlson adder outperforms both previously proposed speculative Kogge-Stone architectures and non-speculative adders, when high-speed is required. |
Removed |
31 | Hybrid Type CAM Design for Both Power and Performance Master Slave Match Line Loganathan.K, Prem Kumar.P Abstract – Content-addressable memory (CAM) is used to compare the search data with all the stored data in parallel. Due to the parallel comparison feature where a large amount of transistors are active on each lookup, however, the power consumption of CAM is usually considerable. There are two conventional CAM designs, i.e., NOR-type and NAND-type CAMs. The NOR-type CAM provides the best search performance, but its cost is a large amount of power consumption. In contrast, the NAND-type CAM trades the search performance for a low-power feature. In Master – Slave match line design, we used NOR type CAM cell. So that the power consumption is quite high. So, in this work presents a hybrid-type CAM design which aims to combine the performance advantage of the NOR-type CAM with the power efficiency of the NAND-type CAM. In our design, a CAM word is divided into two segments, and then all the CAM cells are decoupled from the match line. By minimizing both the match line capacitances and switching activities, our design can largely reduce the power consumption of CAM. Because the hybrid type CAM provides a fast pull-down path to speed up the light weight match line discharge. |
Download |
32 | Design of Low Power Dual Mode MLMAP Decoder Using Radix 4 Approach S.Divya, Dr.P.Maniraj Kumar Abstract – In order to have reliable communication, channel coding is often employed. Turbo code as a powerful coding technique has been widely studied and used in communication systems.The most significant achievement in coding theory are the turbo codes which are forward error correction codes.Due to the limitation of the battery life of wireless devices, transmitted power should remain as low as possible, which makes the system more susceptible to noise and interference. Error control coding is thus used to increase the noise immunity of the communication systems. The heart of the iterative decoding procedure is the use in each component decoder, of an algorithm that computes the a posteriori probability (APP) of the information symbols or more generally, a reliability value for each information symbol. Turbo decoder suffer from high decoding latency due to the iterative decoding process, the forward–backward recursion in the maximum a posteriori (MAP) decoding algorithm and the interleaving/de- interleaving between iterations . Computational complexity is estimated for the most popular Turbo decoding algorithms: MAP, Log-MAP, Max-Log-MAP and SOVA. Complexity studies showed that Max-Log-MAP is the best compromise between performance and complexity. Therefore, our implementation will be based on the Max-Log-MAP algorithm. ML MAP (Max Log Map) Architecture is proposed with SB & DB mode to achieve higher throughput and less power consumption. A Highly scalable LLR unit is proposed to increase the speed of the computation. The architecture is implemented using spartan3E family in Xilinx 12.1i. |
Download |
33 | Synchronisation In Grid-connected PV Generation Inverter Control System Monika Gulhane, Trupti Gadwar, Dhiraj gahukar Abstract – In this paper explain the operational principal and structure of the grid-connected photovoltaic system and reducing cost of project without using battery with the use of inverter control method and describe the control strategy based on a maximum power point tracking (MPPT) control using P & O method on the basis of inverter control method, we will present an improved PWM inverter control system that can be applied in grid-connected PV generation and uses MATLAB/SIMULINK software to simulate and analyze. the result of simulation shoes that the improved inverter control system can effectively control the grid current waveform which tends to sine wave, means while it can achieve the maximum power point tracking, besides it is able to put the arbitrary power out to the load or to the grid , while the control system has a good stability. |
Download |
34 | A Control Strategy for a Variable Speed Wind Turbine with a Permanent-Magnet Synchronous Generator Digreshwar D. Barbuddhe, Rahul M. Didpaye, Ashvini B. Nagdewate Abstract – We know the electrical power is generated by using wind energy to drive a wind turbine. Due to their tremendous applications and advantages. This paper presents a novel control strategy for the operation of a direct-drive permanent-magnet synchronous generator- based stand-alone variable-speed wind turbine. The control strategy for the generator-side converter with maximum power extraction is presented. The stand-alone control is featured with output voltage and frequency controller that is capable of handling variable load. The potential excess of power is dissipated in the dump-load resistor with the chopper control, and the dc-link voltage is maintained. Dynamic representation of dc bus and small-signal analysis is presented. The controller shows very good dynamic and steady-state performance. The controllers can extract maximum power and regulate the voltage and frequency under varying wind and load conditions. |
Download |
35 | Anti-Forensics of Photo Response Non-Uniformity of Digital Images Sowmiya N, Sadish Kumar S.T Abstract – The digital image processing is to be used in Anti-forensics of photo response non-uniformity of digital images. Fingerprints are one of those irregular twists of nature. The fingerprints are used for authentication and identification processes in forensic tasks such as detection of digital forgeries. Forensic tasks can to be performed in device identification problem, device linking problem, fingerprint matching problem. For random projections the compression technique is to be required with no information loss and to be measured by PRNU values. Fingerprint matching is still a challenging problem for reliable person authentication because of the complex distortions involved in two impressions of the same finger. |
Download |
36 | Treatment of Domestic Wastewater by Natural Adsorbents Using Multimedia Filter Technology Islamuddin, Imran Ahmad, Nusrat Ali, Yusuf Jamal Abstract – This paper intense to provide an overall vision of multimedia filter technology an alternative method for treating waste water. Treated water use for Irrigation, toilet flushing, car washing, gardening, firefighting, etc. Filtration technology is the simplest and low cost treatment technology based on the principle of attached growth process. Multimedia Filters represent a significant improvement over single media filters. A multimedia filter model was developed by G.I. sheet for treatment of domestic wastewater. Different packing media are used such as Activated carbon, sugarcane bagasse, sand and grass mulch. |
Download |
37 | Distribution Transformer Monitoring System Based On Zigbee Technology Akshay N.Kinholkar, Ninad D. Dhamele, Akshay G. Waghmare Abstract – Transformer is the valuable link of the transmission of electricity all over the world. If any fault causes in transformer it will reduce the life of it, this will causes to need of continuous monitoring of various transformer. Distribution transformer remotely monitoring system (DTRMS) based Zigbee technology is developed for motoring parameter such as oil level and temperature of oil. This system has using the microcontroller for handling various value of the sensors and that are given to the Zigbee for transmitting the data of the sensor value to receiver for the remotely monitoring parameter of distribution transformer. Zigbee has less power consuming and higher data transmitting rate than other devices such as Bluetooth and Wi-Fi. It has widely range from 10m to 1km with the data rate of 250 kbps. |
Download |
38 | Library Automation Using Android Ghorpade Pradip P, Patange Sharad V, Sonawane Rahul A, Sangale Akshay. A. Abstract – The previous experiences in library, the issuer issue a book and goes to the librarian. The librarian enters the issuer's & book’s details into the database and issues the book. While the librarian is diligent with this work then issuer have to wait for issuing the book. The goal of this project, library automation is to automatically issue books and to come back it. In simple words Library Automation can be defined as the utilization of astute phone to perform fundamental jobs of library like issue of books, ingression of issuers & books details into the library database. Here we have opted to utilize NDEF for communication, In future NFC tags and NFC enabled astute phone. With implementation of such a latest technology, an organization will not only be utilizing the library efficiently but will withal be efficacious in time. |
Download |
39 | Energy Consumption Framework Using Wireless Sensor Networks L.Murthy, S.T.SadishKumar Abstract – The increasing spread of computing technology in different areas of life brings with it new possibilities but also challenges for scientists in various disciplines of computer science. With the help of connected devices we can create smart environments that assist the user in many ways. The miniaturization of sensors and actuators that are integrated into everyday devices enable a gradual paradigm shift in the direction of "ubiquitous computing". To make wireless nodes easily reconfigurable, a plug and play mechanism is applied to enable the clustering of any number of transducers. Furthermore, an algorithm is proposed to dynamically detect added and removed transducers from a node. An XML based protocol is devised to allow nodes to communicate a description of their layout, measured data and control information. To verify the proposed framework, multiple reconfigurable wireless nodes are used to monitor the dynamic condition of a multiple home scenarios. |
Download |
40 | Analysis of High-Rise Reinforced Concrete Building Er. Maaz Allah Khan Abstract – In the last few decades structure optimisation has become a main task in a civil engineering pro-ject. As a matter of fact, due to the complexity and particularity of every structure, the great amount of variables and design criteria to considerate and many other factors, a general optimisa-tion’s method is not simple to formulate. As a result, this paper focuses on how to provide a suc-cessful optimisation method for a particular building type, high-rise reinforced concrete buildings. The optimization method is based on decomposition of the main structure into substructures: floor system, vertical load resisting system, lateral load resisting system and foundation system; then each of the subsystems using the design criteria established at the building codes is improved. Due to the effect of the superstructure optimisation on the foundation system, vertical and lateral load resisting system is the last to be considered after the improvement of floor. Finally, as a case example, using the method explained in the paper, a 30-story-high high-rise residential building complex is analysed and optimised, achieving good results in terms of structural behaviour and diminishing the overall cost of the structure. |
Download |
41 | Replacement of Reinforcement in Slabs Using Steel Fibres K. Deepak, B. Jose Ravindra Raj Abstract – To determine the compression, split tensile, & flexure strength of conventional concrete (M25) & steel FRC. To find the behaviour of RCC slab, SFRC slab, Mattock plastic hinge length (50mm at centre) slab and Priestley and Park plastic hinge length (100mm at centre) slab under one point loading test Strength characteristics are compared. Twelve numbers of cubes, cylinders and beams of size (0.15x0.15 m), (0.3 m length & 0.15 m ᶲ) and (0.5x0.1x0.1 m) respectively were casted to carry out load test. Eight slabs of span .810X.400m and the depth of slab as 0.60 m (according to IS 456:2000 cl.23.2.1) were casted to conduct point loading. The compressive strength, tensile strength, & flexural strength of concrete can be determined. The better performance of slabs with minimum reinforcement and various combinations of steel fibers under point loading can be arrived. The steel fiber will reduce the usage of steel rods in concrete slab. ii. Steel fibers are used for reduction of cost when compare to the usage of steel rods in the slab. iii. When steel fiber as reinforcement used, is easy to precast instead of steel rods as reinforcement. |
Download |
42 | Side Stand Retrieval System Using Trigger Mechanism Naveen Kumar, Sukumar Reddy Abstract – The objective of our project is to prevent accidents occurring due to two-wheeler side stand. We devised to employ recent advances in fabrication to create a new hardware of extremely small and low cost. This project “Side Stand Retrieval System” will explain the mechanism to lift the stand as soon as the vehicle starts moving. Inspired by simplicity and success of trigger mechanism, we have designed [1] a new hardware to lift the stand. The procedure involves three main components, the clutch, stand and trigger device. The stand activates the trigger and clutch acts as trigger, to lift the stand. When clutch is applied to shift the gear, the stand retrieves back to its own position. We evaluated and refined to final design, compressing the spring, which is most effective method. This study will conclude that project is in development and improvements, in terms of cutting edge design, raw materials and fabrication can be achieved through some advanced machining processes. |
Download |
43 | An Insight Look Into Pig and Its Implementation Surajit Mohanty, Sameer Kumar Das, Himanshu Suman, Piyush Maharana, Raman Ratnakar Abstract – Big Data is the term used now a days for referring to the data sets that are large and complex. The applications used for processing traditional data are inadequate. Now Apache Hadoop is a platform that is used for processing of big data. Hadoop has several tools that facilitate the processing of complex data like hive, mahout, zookeeper, pig and others. Each of these tools cover the different challenges faced by the users. We focused on Pig which is a scripting language for exploring large data sets. It has the ability to process terabytes of data for a few lines of code. All parts of processing path are customizable by the user, storing, filtering, grouping and joining. We discuss about Pig in brief its features and entities. Then we take up a sample problem using a dataset and generate the results. So that we can create a contrast between Pig and Traditional data processing applications. We explain about how we load and store complex information (dataset) and processing different kind of queries and running scripts in Pig. |
Download |
44 | Study of Cooling Load for Student Activity Centre, Greater Noida using CLTD/CLF Method Anurag Kumar Singh, Akanksha Mishra, K. K. Dubey Abstract – Nowadays air conditioning is longer a luxury but it has become absolutely necessary part of our life. So, right selection of air conditioning equipment is extremely important. If the air conditioning equipment is oversized then it will lead to high operational cost and if the air conditioning equipment is undersized then it will lead to breakdown. For the right selection of air conditioning equipment there is need to understand all the factors which are contributing heat inside the room. In this paper load calculation is done for Student Activity Centre which is having four floors. Each floor is used for different purposes, having different floor area and different number of doors and windows. So, different floors need different cooling load. For the determination of heat gain Cooling Load Temperature Difference / Cooling Load Factor (CLTD/CLF) method is used which is based on ISHRAE (Indian Society of Heating, Refrigerating, and Air-Conditioning Engineers) handbook is used. |
Download |
45 | Implementation of Reflow Soldering Oven Tirmare Aarti, Mali Priyadarshani, Pawar Kuldeep P Abstract – Soldering is an important and difficult task for custom printed circuit board design especially for integrated circuits that come as chip packages that are impossible to solder by hand. This is particularly true for ball grid arrays (BGA) and small-pitch quad flat packs. If one chooses to design a custom printed circuit board around these chips, then the designer may wish to also purchase a stencil of the designed board that would allow him to squeegee solder paste precisely on the SMD pads. The designer would then carefully place the components on the board, and heat the solder paste with a heat gun or a reflow soldering oven. The problem with reflow soldering ovens is that they are expensive and cost thousands of dollars. So this paper focuses on implementation of reflow soldering oven using normal toaster oven by controlling temperature working of this oven will be same as reflow solder oven so it results in to lower cost model. |
Download |
46 | Mitigation of Power Quality Issues in Distribution System by Using D-Statcom Priya R. Sonone, Pratiksha A. Shende, Ashish A. Sirsath Abstract – Power Quality issues occur in the power system due to the non-standard voltage, current and frequency. In developing countries like India, where the variation of power frequency and many such other determinants of power quality are themselves a serious question, it is very vital to take positive steps in this direction. The goal of this project is to show how the enhancement of voltage sags, harmonic distortion and low power factor by using D-STATCOM (Distribution static compensator) in distribution system with LCL passive filter. The model is based on the Voltage Source Converter (VSC) principle. A modified instantaneous power control scheme of D-STATCOM (Distribution static compensator) is used for reduction of reactive power, power factor correction and harmonic compensation. The D-STATCOM injects a current into the system to mitigate the voltage sags. LCL Passive Filter was then added to D-STATCOM to improve harmonic distortion and low power factor. The simulations were performed using MATLAB SIMULINK version R2010b. |
Download |
47 | A Review on Intrusion Detection System on KDDCUPS’99 Dataset with the Help of Different Techniques Preeti Yadav, Jaspreet Kaur Abstract – Intrusion Detection System (IDS) becomes a crucial part of each laptop or network system. Intrusion detection (ID) may be a mechanism that has security for each computers and networks. Feature choice and have reduction is very important space of analysis in intrusion detection system. The dimensions and attribute of intrusion file are terribly massive. Within the analysis work intrusion detection totally different issues are two-faced. A hybrid model for feature choice and intrusion detection is very important issue in intrusion detection. The choice of feature in attack attribute and traditional traffic attribute is difficult task. There are choice of better-known and unknown attack is additionally two-faced a tangle of classification. There's multiclass downside throughout the classification of knowledge. Intrusion detection may be a downside of transportation infrastructure protection attributable to the actual fact that laptop networks are at the core of the operational management of a lot of of the nation’s transportation. During this work intrusion detection is enforced on KDDCups’99 Dataset. |
Download |
48 | A Novel Approach to Increase the Growth Level of Papaya Plants Using MME Method K. Ravikodi, K.Ramkumar, V.Vanitha Abstract – This paper presents the MME method process that is the effect of Electric as well as Magnetic field separately on the young papaya plant growing before Monochromatic light (Sodium vapour lamp). Growing between with and without electric and magnetic field is presented. This research is focused on the height of stems. The changing of papaya sprouts are observed every day last for 7 days. The growth during the exposure is determined and graphed. Experimental results indicate that the papaya sprout in electric and magnetic field has a better growth while compare to that of without electric and magnetic field that is no field based on statistical analysis. |
Download |
Publication Process
Accepted papers will be published online immediately,upon receiving the final version from the authors.
Paper Submission
There is no deadline for paper submission. Authors are requested to send their unpublished manuscripts to: ijetereditor@gmail.com
Copyright
COPYRIGHT © EverScience Publications