Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Abstract— In this modern world Smartphones and Tablets are need for every group from Children, teens, Parents, Business executives, Professionals to old age people. With this techy gadgets, location based applications are widely used as... more
Abstract— In this modern world Smartphones and Tablets are need for every group from Children, teens, Parents, Business executives, Professionals to old age people. With this techy gadgets, location based applications are widely used as it makes life very easier, faster and keeps track of our near and dear ones as well as our business associates. The SMART Travel Alarm is designed to provide high tech services to users based on the information of their current geographic locations. Some of these services include “Reached to destination alarm”, Email someone on reaching the destination etc. In this paper we illustrates the development of SMART Travel Alarm - a iOS application based on Sencha 2.2 framework using Google Web Services to offer multiple services to the users on the move. The developed iOS app works perfectly fine on major smartphones and tablets running on popular operating systems like iOS, Android, Windows and Blackberry.
CPU Scheduling is a vital discipline which helps us gain deep insight into the complex set of policies and mechanisms used to govern the order in which tasks are executed by the processor. This article proposes an Dynamic time quantum... more
CPU Scheduling is a vital discipline which helps us gain deep insight into the complex set of policies and mechanisms used to govern the order in which tasks are executed by the processor. This article proposes an Dynamic time quantum Shortest Job Round Robin CPU Scheduling algorithm having better average waiting time (AWT) and average turnaround time (ATT) as compared to other CPU Scheduling techniques. The primary objective of this algorithm is to optimize system performance according to the criteria deemed most important by system designers.
Corporate sector plays an important role in economic sphere in India. Good governance of companies will ensure healthy growth of corporate sector for economic growth of our nation. After globalization corporate governance has been... more
Corporate sector plays an important role in economic sphere in India. Good governance of companies will ensure healthy growth of corporate sector for economic growth of our nation.    After globalization corporate governance has been talked about in all circles. There has been lot of debate how Indian business enterprises are operating to balance the interest of different stakeholders. Basically corporate governance is the set of processes, customs, policies, laws, and regulations governing the way a corporation (i.e. business organisation) should be directed, administered and controlled to optimize productivity and the resulting gains for all stakeholders. Stakeholders include shareholders /promoters, board of directors, management, financers, employees, customers, vendors, society, community, government, etc. Therefore, a major part of corporate governance also involves exchanging information and managing relationship amongst these stakeholders in order to meet or satisfy their needs and interests.
As companies are artificial corporate citizens, board of directors is the real brain of a company. Now, companies are not only disclosing mandatory guidelines under clause 49 of listing agreement but also disclosing much information voluntarily. Now many companies are pursuing corporate governance rating from CRISIL, ICRA etc. Companies like Infosys are following even international guidelines such as UN Global compact policy 2000 on human rights, labour standards and environment issues, OCED principles etc. This paper attempts to study practises related to board of directors in selected Indian corporations.
In order to improve return loss, compactness and efficiency of antenna defected ground structure has been used. The performance of antenna is characterized by the shape, dimension and location of defected structure at specific position of... more
In order to improve return loss, compactness and efficiency of antenna defected ground structure has been used. The performance of antenna is characterized by the shape, dimension and location of defected structure at specific position of ground. This paper presents defected ground structure (DGS) implemented with rectangular strip in the ground plane. The design with DGS has been analyzed taking different dimensions of rectangular Slot and achieve optimized dimensions with the help of HFSS(High Frequency structural simulator).
Cryptography, Steganography, Watermarking and many other techniques have evolved over a period of time, at the same time attacks on them have also increased as the data is in nuclear form (even though encoded), in these techniques. In... more
Cryptography, Steganography, Watermarking and many other techniques have evolved over a period of time, at the same time attacks on them have also increased as the data is in nuclear form (even though encoded), in these techniques. In last decade Visual Cryptography has evolved as an entity which divides the data into different shares and then embedding is done.
The proposed work has been an effort to ensure more secure and less time consuming and it increases the security levels of data communicated and the results obtained also prove that the communication and retrieved images are of very much similar quality.
Security is an important issue in network communication. A wormhole attack is one of the hardest problems in mobile ad-hoc network. In wormhole attack a malicious node captures packets from one location in the network, and tunnels them to... more
Security is an important issue in network communication. A wormhole attack is one of the hardest problems in mobile ad-hoc network. In wormhole attack a malicious node captures packets from one location in the network, and tunnels them to another malicious node at a distant point, which replays them locally. There are many techniques to detect and prevent them. In this survey paper we find some detection techniques and classify the proposed solution in which prevent the routing protocol against the wormhole attack. In this paper we present a security enhancement to dynamic source routing (DSR) protocol against wormhole attacks for ad hoc networks.
Research Interests:
The study of the dynamics of a real system requires the modeling of the system. Models of the systems are simplified, abstracted constructs used to predict their behavior. Using the language of bond graph, one may construct models of all... more
The study of the dynamics of a real system requires the modeling of the system. Models of the systems are simplified, abstracted constructs used to predict their behavior. Using the language of bond graph, one may construct models of all type of physical systems. The models will be mathematical models represented by uniform graphical notation and a small set of ideal elements.
In this paper the dynamic behavior of electromechanical linear actuators is being discussed with the motive is to develop a universal model by using unified approach of bond graph that gives the opportunity to simulate both existing and new systems without having to remodel the entire system each time. The work refers to analyze the functional parameters of electromechanical linear actuators by  modeling of different components of EMLA using bond graph. Given a bond graph model, causality can be assigned and algebraic-differential equations can then be obtained in an algorithmic way.
Research Interests:
Nowadays the crude oil and Petroleum products consumption are increasing rapidly. Recent concerns are the environment; increasing fuel prices and the scarcity of its supply have promoted interest in the development of alternative sources... more
Nowadays the crude oil and Petroleum products consumption are increasing rapidly. Recent concerns are the environment; increasing fuel prices and the scarcity of its supply have promoted interest in the development of alternative sources of petroleum fuels. In this research, castor oil methyl ester was prepared by transesterification using potassium hydroxide (KOH) as a catalyst and tested in a four-stroke, single-cylinder compression ignition engine. The test was carried out at a constant speed of 3000 rpm and 210 bar at different loads. The emission results of the comparative test indicated that CO and smoke density emissions are found to be lower as compared to diesel, while carbon dioxide (CO2) and nitrogen oxide (NOx) are found to increase marginally. Brake thermal efficiency and the brake Specific fuel consumption decreases and Increase respectively in Biodiesel different blends with comparison of diesel.
Research Interests:
This paper aims to extend the knowledge about the performance enhancement of cascaded multilevel inverter by using heuristic optimization methods. For improving efficiency of multilevel inverter, harmonics has to be eliminated. To... more
This paper aims to extend the knowledge about the performance enhancement of cascaded multilevel inverter by using heuristic optimization methods. For improving efficiency of multilevel inverter, harmonics has to be eliminated. To eliminate the harmonics, Selective Harmonics Elimination Pulse Width Modulation technique is used for a better power quality output. This technique eliminates the pre-selected lower order harmonics which are more dominant into the nature while satisfying the fundamental component of output voltage, but the major issue is to solve the set of nonlinear harmonic equations derived from Fourier analysis of the output waveform of multilevel inverter. Using Conventional approach to solve those equations does not guaranteed the optimal solution and may stuck in the local minima. Hence, Evolutionary optimization algorithms are used for solving those equation. Evolutionary algorithm consist a subset of evolutionary computation and the results are obtained. Among of all a comparison is done between simulated annealing, Genetic Algorithm and multi objective genetic algorithm. Whereas, Evolutionary optimization algorithm are inspired by the biological process of evolution. Using those algorithm the main concern is to find the notches angles for giving the gate pulse to the individual switches of multilevel inverter. Using all of the three algorithms data sets are collected for different modulation indexes and output are verified by results. Results also shows the comparison between genetic algorithm and multiobjective genetic algorithm for getting the optimum results.
Research Interests:
In this paper, a bandwidth enhancing technique is presented using a modified ground plane with H slot cut in ground plane for designing of compact antenna a new type of band-notched novel shaped slot antenna is proposed for UWB... more
In this paper, a bandwidth enhancing technique is presented using a modified ground plane with H slot cut in ground plane for designing of compact antenna a new type of band-notched novel shaped slot antenna is proposed for UWB applications. By cutting novel H shaped slot on the ground plane, desired notched frequency band is achieved. By properly adjusting the parameters of proposed antenna is analyzed by the Ansoft -HFSS software, which is possible to find desired band width and centre frequency of notched band.
The proposed antenna is designed on a substrate Rogers RT/duroid 5880  with thickness of 0.762 mm (30mils) and relative permittivity (∈_r) of 2.2, and loss tangent 0.0004 to operate in UWB frequency band. To reject the frequency band of 5.17– 5.69 GHz, which is limited by IEEE 802.11a, a novel shaped H slot. The size of our proposed antenna is 30×30 mm2, which results in desirable radiation characteristics. Effects of varying the parameters of novel shaped H slot on performance of proposed antenna have been studied. The antenna with optimal parameters obtained from parametric study is fabricated and measured. It is observed that the simulation and experimental results have good agreements with each other. The proposed Antenna achieved given parameter like Bandwidth (2.8-13.1GHz), Frequency Spectrum (10.3GHz), Fraction Bandwidth (129.55%), Positive Gain, Low Cost, Good Impedance matching, with omni-directional Radiation Pattern which is extremely good.
Research Interests:
Some devices convert electricity into motion but do not generate usable mechanical power as primary objective and so are not generally referred to as electric motors. Most electric motors operate through the interaction of magnetic... more
Some devices convert electricity into motion but do not generate usable mechanical power as  primary objective and so are not generally referred to as electric motors. Most electric motors operate through the interaction of magnetic fields and current-carrying conductors to generate force. The reverse process, producing electrical energy from mechanical energy, is done by generators such as an alternator or a dynamo; some electric motors can also be used as generators, for example, a traction motor on a vehicle may perform both tasks. Electric motors and generators are commonly referred to as electric machines.
Electric motors are found in applications as diverse as industrial fans, blowers and pumps, machine tools, household appliances, power tools, and disk drives. They may be powered by direct current, e.g., a battery powered portable device or motor vehicle, or by alternating current from a central electrical distribution grid or inverter. The smallest motors may be found in electric wristwatches. Medium-size motors of highly standardized dimensions and characteristics provide convenient mechanical power for industrial uses. The very largest electric motors are used for propulsion of ships, pipeline compressors, and water pumps with ratings in the millions of watts. Electric motors may be classified by the source of electric power, by their internal construction, by their application, or by the type of motion they give.
The physical principle of production of mechanical force by the interactions of an electric current and a magnetic field was known as early as 1821. Electric motors of increasing efficiency were constructed throughout the 19th century, but commercial exploitation of electric motors on a large scale required efficient electrical generators and electrical distribution networks.
The speed of a DC motor can be varied by controlling the field flux, the armature resistance or the terminal voltage applied to the armature circuit. The three most common speed control methods are field resistance control, armature voltage control, and armature resistance control. In this section, modeling procedure of these three methods and feedback control method for DC motor drives for dynamic analysis are presented.
Research Interests:
The purpose of this paper is to design a rectangular patch microstrip antenna using tapered line Transfer coupled feed with complete mathematical calculations and the results are simulated using IE3D software with an operating frequency... more
The purpose of this paper is to design a rectangular patch microstrip antenna using tapered line Transfer coupled feed with  complete mathematical calculations and  the results are simulated using IE3D software with an operating frequency of 5 GHz. It is a low profile patch antenna for wireless application. If we design the same antenna using Transfer coupled without tapering the line then return losses is very high and after tapering of line the return losses of the antenna has been decreases. Microstrip patch antennas are widely used because they are compact in size, light in weight and easy to integrate on any device. The performance measures of antenna return loss, voltage standing wave ratio, radiation pattern is calculated which shows that the antenna performance was good and results  were optimum.
Research Interests:
Cutting fluids have seen extensive use and have commonly been viewed as a required addition to high productivity and high quality machining operations. All machining processes cause high cutting temperature, tool wear and impairing... more
Cutting fluids have seen extensive use and have
commonly been viewed as a required addition to high
productivity and high quality machining operations. All
machining processes cause high cutting temperature, tool wear
and impairing product quality as the effect of friction. Cutting
fluids help to overcome adverse effect of temperature. Cutting
fluids also provide cooling, lubrication, and chip flushing in
machining processes.
This article is a summary of basic cutting fluid characteristics
and discusses how it plays a great role in manufacturing
industries. The aim of present study to select the optimum
cutting fluid that minimize the environmental impact, cost and
maximize the quality.
Research Interests:
In recent years, due to dramatic growth in use of Internet services and networked computer resources, rates of attack have increases rapidly. An intrusion or attack is defined as any set of actions that compromise the integrity,... more
In recent years, due to dramatic growth in use of
Internet services and networked computer resources, rates of
attack have increases rapidly. An intrusion or attack is defined
as any set of actions that compromise the integrity,
confidentiality or availability of a resource. Therefore a network
system must use one or more security tools such as firewall,
antivirus, IDS and Honey Pot to prevent important data from
criminal enterprises. This paper presents the current exhaustive
investigation on numerous intrusion detection techniques with
their merits & shortcomings, which can be used for further
enhancement of existing security system or develop a new
efficient and more reliable algorithm for most of the applications
of networks.
Research Interests:
In this world with internet it is hard to hide confidential data from attackers. Generally we use digital certificate for data confidentiality but all the time when we are connected with digital world it is hard to maintain security as... more
In this world with internet it is hard to hide
confidential data from attackers. Generally we use digital
certificate for data confidentiality but all the time when
we are connected with digital world it is hard to maintain
security as digital signature does not expires till the
certain time limit may be in years or months. Suppose we
open our bank id on public network and forget to sign out
it, id will not sign out automatically till 10 min and
someone else immediately use that computer it may
misuse it. So our proposal is for mobile and e-mail
verification on the same time so that we can save our
confidential data.
Research Interests:
In this paper we proposed a new design of Borosilicate Honeycomb photonic crystal fiber for highly Negative chromatic dispersion. Finite Difference Time Domain (FDTD ) method and transparent boundary condition (TBC ) is used to analyze... more
In this paper we proposed a new design of
Borosilicate Honeycomb photonic crystal fiber for highly
Negative chromatic dispersion. Finite Difference Time Domain
(FDTD
) method and transparent boundary condition
(TBC
) is
used to analyze the dispersion property in a high-index core
PCF. This method produced highly negative dispersion in result
at wavelength range 0.5 µm to 1.8µm. in this proposed HPCF
diameter of air holes is 0.66 µm & this PCF is made by using
borosilicate glass material.
Research Interests:
The increasing level of solid waste is now a days, a serious problem in the urban areas of the world. In general all Indian cities face similar problems with their solid waste management. Amount and content of generated solid waste may... more
The increasing level of solid waste is now a days, a
serious problem in the urban areas of the world. In general all
Indian cities face similar problems with their solid waste
management. Amount and content of generated solid waste may
differ among different cities but problems related to collection,
transport and disposal are about the same. A mathematical
model is presented for the best utilization of resources to
minimize the cost involve in it. In this paper a municipal solid
waste management system, including one SOM plant for
treatment of organic material, one RDF plant for production of
refuse derive fuel, one recycling plant, one landfill, and two
incinerators with energy recovery. Here first incinerator work
at low humidity and moderate temperature, while second
incinerator work at very high temperature. The objective
function in the model describes total investment and
maintenance costs, transportation cost. The benefits from refuse
derive fuel; energy generation, compost, and recycling are also
incorporated in the objective function. The models can be used
an important tool for planners, in municipal solid waste
management in urban environment
Research Interests:
— A mathematical model for thermal conductivity of metal oxides nanofluids was developed incorporating the following: considering the effectsof temperature, volume fraction and size of the nanoparticle is developed and presented. For... more
— A mathematical model for thermal conductivity of
metal oxides nanofluids was developed incorporating the
following: considering the effectsof temperature, volume
fraction and size of the nanoparticle is developed and presented.
For development of thermal conductivity model first we have to
analyze the brownian motion of nanoparticle .The particles
suspended in the liquid are very small, Brownian movement of
the particles is quite possible. Using nonlinear regression
analysis and solving this in MATLAB for find out the unknown
parameter ,an empirical correlation is developed topredict the
thermal conductivity of TiO2 , ZnO& Al2O3nanofluids.
The expression developed was successfully validated against
experimental data obtained from the literature. The models was
able to comprehensively explain the enhanced thermal
conductivity of nanofluids. Following the validation with
experimental data and existing models. It was found that in this
study that the contribution of Brownian motion of nanoparticles
to the overall thermal conductivity of nanofluids was found to be
very important parameter.
Research Interests:
Digital watermarking is a process of embedding watermark signal with its host image to prove its authenticity. In this paper, Embedding and extraction process are applied on the higher frequency domain of Discrete Wavelet Transform... more
Digital watermarking is a process of embedding
watermark signal with its host image to prove its authenticity. In
this paper, Embedding and extraction process are applied on the
higher frequency domain of Discrete Wavelet Transform

(DWT). Using DWT prior to the Discrete Cosine Transform

(DCT) provides improved imperceptibility and higher
robustness against Signal processing attacks. Arnold
transformation is used to scramble the watermarking object for
security purpose. This approach improves the similarity ratio
and PSNR over previous schemas so provides efficient
authentication.
Research Interests:
An indirect forced convection solar dryer is designed and fabricated to investigate its performance under the hot and dry climatic condition of Jaipur, India. The system consists of flat plate collector and drying chamber with two shelves... more
An indirect forced convection solar dryer is designed
and fabricated to investigate its performance under the hot and
dry climatic condition of Jaipur, India. The system consists of
flat plate collector and drying chamber with two shelves and a
chimney. Dimensions of collector and drying chamber are 1.21
m x 0.87 m and 0.5 x 0.5 x 0.5 m respectively. There are four
baffles of dimension 40cmx3cmx7cm fitted between absorber
and back plate. The distance between back plate and absorber
plate is 8cm. The experiments were performed on green chilies.
The drying time is 10 hours. Collector is inclined at 45° with
horizontal and oriented in the South - North direction. During
experimentation 11 temperatures, relative humidity, air velocity
and solar intensity were measured hourly in the month of May
and July, 2010 for drying of green chilies and potato chips.
Solar intensity varied between 550-890 W/m
2
and maximum
temperature rise was 20.6
o
C. Hot air at 61
o
C from the collector
is supplied through 3.5 cm diameter PVC pipe at the bottom of
the drying cabinet. The moisture content and weight of chilies
was reduced from 90% to 13% and 2 kg to 0.232 kg in three
days respectively. Result of the present study shows that the
drying time is reduced and quality of the final products are
superior.
Research Interests:
Visual cryptography is an encryption technique which is used to hide information of an image in multiple secret shares. These shares make the secrecy levels. For n level region incrementing visual cryptography scheme, image is divided in... more
Visual cryptography is an encryption technique which is used to hide information of an image in multiple secret shares. These shares make the secrecy levels. For n level region incrementing visual cryptography scheme, image is divided in n regions. Each region consists of one level information. For implementing visual cryptography in n levels we need to encode(n+1) shares in such a way so that any single share is not able to show the information and by combining any two shares, first level information would be visible. Similarly by superimposing any three shares, information upto second level could be seen. In
similar way, for revealing whole information all the (n+1) shares
are superimposed. In this paper, we are comparing many visual
cryptography algorithms. Traditional visual cryptography
Algorithms were based on permutation whereas modern
approach are based on random column selection. In Proposed
algorithm, problem of pixel expansion and poor contrast has
been removed and further it is modified to generate the levels
automatically which is named as automatic region incrementing
visual cryptography.
Recent advancements in nanotechnology have originated the new emerging heat transfer fluids. Nanofluids are potential heat transfer fluids with enhanced thermophysical properties and heat transfer performance. These fluids are... more
Recent  advancements  in  nanotechnology  have originated  the  new  emerging  heat  transfer fluids.  Nanofluids are potential heat transfer fluids with enhanced thermophysical properties and heat transfer performance. These fluids are obtained by suspending nanoparticles having sizes between 1 and 100 nm in regular fluids. In this paper, study of the applications and challenges of nanofluids have been compiled and reviewed. Substitution of conventional coolants by nanofluids appears promising. It can be applied in many devices for better performances  (i.e. energy, heat transfer and other performances). At last challenges of nanofluids is discussed.
Power quality is a very important issue. Non-linear loads and semi-conductor devices connected to AC electric mains generate unwanted signals (harmonics) in the dynamics of current which are responsible for additional power losses in... more
Power quality is a very important issue. Non-linear loads and semi-conductor devices connected to AC electric mains generate unwanted signals  (harmonics) in the dynamics of current which are responsible for additional power losses in heat loss and the risk of equipment damage or malfunctioning.
In the simulink model of shunt active filter fuzzy logic
controller and hysteresis current controller for reducing the
harmonic distortion. Powergui tool of mat lab provides the
function of FFT analysis which is very important to calculate
total harmonic distortion in source current. By taking various
firing angles the total harmonic distortion is calculated by FFT
analysis.
Various process parameters such as Die temperature, Billet temperature, Flash thickness and Flash width affect the forging process differently, thus the optimization design of process parameters is necessary to obtain a good product. In... more
Various process parameters such as Die temperature, Billet temperature, Flash thickness and Flash width  affect the forging process differently, thus the optimization design of process parameters is necessary to obtain a good product. In this paper an optimization method for the connecting rod closed die forging is proposed based on the finite element method
(FEM) and Taguchi method with multi-objective design. Preform design in forging processes is an important aspect for improving the forging quality and decreasing the production cost. Utilization of designing & simulation tool can reduce iterative & time consuming approaches. The objective of this paper is to obtain an optimapreform shape in the consideration of the influence of the metaflow deformation in closed die forging process. The goal of the simulation and optimization process is to minimize the forging load and produce defect-free forgings. The optimal shape of the billet that gives minimum forging load with complete die filling was obtained after several optimization iterations. Optimization of die temperature, billet temperature, flash thickness & flash width will be performed by DEFORM-3D. Die filling & less wear in the dies will be the required achievements. MINITAB15 software is used for the calculation of S/N ratio & graphs for optimization.
A basic problem that often arises in the study of communication system is that of detecting a pulse transmitted over a channel that is corrupted by channel noise. The information signal which has been sent from transmitted end is... more
A basic problem that often arises in the study of communication system is that of detecting a pulse transmitted
over a channel that is corrupted by channel noise. The
information signal which has been sent from transmitted end is
almost distorted at the receiving end. That’s why a filter known
as “MATCHED FILTER” or “NORTH FILTER” is introduced
to reduce these errors in transmission of signal A matched filter
is a used in communication to “match” a particular transit
waveform. It passes all the signal frequency components while
suppressing any frequency components where there is only noise and allows to pass the maximum amount of signal power. The purpose of the matched filter is to provide maximum
signal-to-noise power ratio & to minimize the probability of
undetected errors received from a signal. Here in this paper we
are going to conclude performance of a dual channel matched
filter or performance under noisy environment. For better
performance of dual channel matched Filter system with
minimum data input ,low cost & lower SINR under the
assumptions of uncorrelated inputs &known Correlated
matrices that the dual channel matched filter Is equivalent to a
single channel matched filter designed to  process both input
signals.
A Hydro power plant is established for the production of electricity as well as flood control in the areas lying along the course of the river on which dam is constructed. So the water level control in the reservoir and generation of... more
A Hydro power plant is established for the production of electricity as well as flood control in the areas lying along the course of the river on which dam is constructed. So the water level control in the reservoir and generation of required amount of power are equally important. In this paper a
fuzzy logic has been developed using power generation
requirement from power plant to control level of reservoir and
thus maintaining required water level for power generation and
to avoid over flowing as well as flood conditions. The Fuzzy
controller is developed using Mamdani-type and Sugeno-type
models. The paper outlines the basic difference between
Mamdani-type FIS and Sugeno type FIS. The results
demonstrated the performance comparison of the two systems
and the advantages of using Sugeno- type over Mamdani-type
for this case.
The aim of this paper is investigate the performance of various path loss models in different environments for determination of the signal strength with respect to various frequency ranges and distance for wireless network.... more
The aim of this paper is investigate the performance of various  path  loss  models  in  different environments  for determination  of  the  signal  strength  with respect  to  various frequency ranges and distance  for  wireless network. There are five path loss models, namely Free Space, Log-distance, Log-normal, Okumura/Hata, IEEE802.16d models. These models have been reviewed with different receiver antenna heights in urban, suburban and rural environments. Free space path loss model is used as reference value for produced the estimated results value. Then compare all estimated results of reviewed models with the reference model values. Hata model demonstrated good performance in terms of received signal strength or indirectly, reduction in path-loss. Log-normal model based on the shadowing effect while calculating the values of path-loss. IEEE802.16d model and log-normal model are similar. And it is a standard model used for the measurements of path-loss in sub-urban area. However, Hata model could be preferred due to better performance in terms of less path loss as compared with the results of reference model at lower receiver antenna heights for urban and open area environments.
The study investigated the impact of the nanoparticle size which has been suggested to be an important factor the results were found to be in concord with the experimental observations. The values of the thermal conductivity for different... more
The study investigated the impact of the nanoparticle size which has been suggested to be an important factor the results were found to be in concord with the experimental observations. The values of the thermal conductivity for different nanofluid combinations were calculated using the expression developed in this study and they agreed with published experimental data. From the study, it was observed that Brownian motion is significant only when the volume fraction is less than 1 % in case of TiO2&ZnO and 4 % in case of Al2O3. The combination of the base fluid and nanoparticles to from nanoclusters is expected provide better heat transfer solution than the conventional fluids , Hence it is concluded that adding nanosized materials to base fluids enhances thermal properties and makes them more suitable to heat exchanger applications as well as for many industrial applications also .
Mobile Ad hoc Network is an autonomous system of mobile nodes that utilize multi-hop radio relaying and are capable of operating with any support from fixed centralized infrastructure. Since nodes in such networks can leave or enter any... more
Mobile Ad hoc Network is an autonomous system of mobile nodes that utilize multi-hop radio relaying and are capable of operating with any support from fixed centralized infrastructure.  Since nodes in such networks can leave or enter
any time development of a routing protocol that can respond
quickly to underlying dynamic topology and utilizing the
available bandwidth efficiently is a research challenge. There
have been many research works comparing the performance of
routing protocols under varying conditions and constraints. The
majority of the research is focused towards coping up with the
node mobility, network density, energy reduction, routing and
control overhead minimization and increasing the throughput.
Most of them are unaware of MAC Protocols, which affect the
relative performance of routing protocols considered in different network scenarios. As routing and MAC protocol runs in coordination, the choice of MAC is an important criterion. This paper investigates effect of MAC protocols on the relative
performance of AdHoc routing under various scenarios. Two
routing protocols are simulated in NS2 with two different MAC
protocol and the results show that the performance of routing
protocols of ad hoc networks will suffer when run over different
MAC Layer protocols.
shoppers printed with watermarked pictures will mix along to notice the watermark from the printed image. Detector will compare the photographs to urge the common watermarked pixels from the image. a replacement theme is planned that uses... more
shoppers printed with watermarked pictures will mix along to notice the watermark from the printed image. Detector will compare the photographs to urge the common watermarked pixels from the image. a replacement theme is planned that uses the options of separate circular function remodel Discrete Cosine Transform  (DCT) for the entering of the watermark coefficients and uses a pseudo-random sequence for choice of the DCT coefficients to embed the watermark. These coefficients are dissimilar in numerous watermarked pictures thus there's no probability of collusion of the watermarked pictures to notice the watermark illegitimately. The theme is healthier than the other watermarking algorithms like LSB based mostly watermarking. it's conjointly higher than
the DCT mid-band theme wherever the coefficients to enter the
watermark are perpetually fastened, and also the watermark is
embedded by merely exchanging the coefficients in keeping with the watermark bits. Having all the properties of DCT
watermarking this algorithmic rule enhances the strength of the
watermark by involving the constant averaging construct. The
prospect of a successful attack on the watermark by associate
assaulter is extremely less attributable to use of this averaging
technique.The main advantage of the theme is that the image is
disorganized before embedding of the watermark and
descrambled once embedding. This ends up in spreading of the
watermarking data throughout the watermarked image and it's
terribly tough to notice it. The correlation results show that the
watermark is extremely strong. Since no presence of watermark
are often detected.
In the present days, due to increasing the demand of flexible manufacturing we study more on the incremental forming process. The incremental forming process is mostly use in all manufacturing plant to reduce the cost and improve the... more
In the present days, due to increasing the demand of flexible manufacturing we study more on the incremental forming process. The incremental forming process is mostly use in all manufacturing plant to reduce the cost and improve the quality of the product by making of different prototype. In this work we find the main parameter which influences the train rate in square cup shape. This parameter find by applying different combination between parameters. These results will be
as same as experimental result.
This research has been conducted in Aceh Jaya district, which aims to reveal the recognition of the positive law in the Republic of Indonesia towards Panglima Laôt as stakeholders in Aceh's local wisdom in the field of fisheries, and... more
This research has been conducted in Aceh Jaya district, which aims to reveal the recognition of the positive law in the Republic of Indonesia towards Panglima Laôt as stakeholders in Aceh's local wisdom in the field of fisheries, and reveals the role of local wisdom in creating fisheries development sustained in Aceh Jaya district. The method used is a survey and study of literature by using a questionnaire and analyzed using content analysis. The results show that institutional Panglima Laôt recognition of the positive law of the Republic of Indonesia. To realize the sustainable development of fisheries, Panglima Laôt has a role to maintain and oversee the provisions of customary law and customs, coordinating every fishing effort, resolve disputes among fishermen, decide and organize ceremonies rite laôt, maintain or supervise trees in water front, and Panglima Laôt also acts as a liaison between stakeholders and between fishermen and government and Panglima Laôt also have a role in increasing the adoption of technology in the utilization of fish resources based on local wisdom in Aceh Jaya district.
Many new start-ups have been possible in IT industry due to cloud computing’s concept of pay-per-use. This has led to outsourcing of many business-critical functions to cloud, termed as Delegation of Computation. But usefulness of this... more
Many new start-ups have been possible in IT industry due to cloud computing’s concept of pay-per-use. This has led to outsourcing of many business-critical functions to cloud, termed as Delegation of Computation. But usefulness of
this concept depends on whether the results of computation can be verified. Verifiability of computation has been achieved
previously through interactive proof systems, having high
communication cost. Methods based on cryptography have high computation cost making them unsuitable for mobile clients. This paper proposes a verifiable delegation protocol based on cryptographic primitives. It has reduced communication cost making it suitable for light-weight devices. The proof-generating function is incorporated into the delegated function to make it fool-proof.
A simple sensitive, precise method of HPLC was developed and validated for the quantitative, and semiquantative Phytochemical analysis of Acacia Decurrens leaf biomass. The ethanolic extract of the plant is used for the analysis is used... more
A simple sensitive, precise method of HPLC was developed and validated for the quantitative, and semiquantative Phytochemical analysis of Acacia Decurrens leaf biomass. The ethanolic extract of the plant is used for the analysis is used for the identification of active constituents. Thus HPLC analysis showed the presence of Gallic acid and theophylline at the prominent peak with a RT value of 4.532 and
5.558 respectively.
The leaf of Acacia Decurrens (mimosaceae) was reported to be an ornamental plant. The aim of the current study was to characterize the bioactive constituents present in ethanolic leaf extracts of Acacia Decurrens which will be useful for... more
The leaf of Acacia Decurrens (mimosaceae) was reported to be an ornamental plant. The aim of the current study was to characterize the bioactive constituents present in ethanolic leaf extracts of Acacia Decurrens which will be useful for its proper identification. FTIR (Fourier transform infrared spectroscopy Model-8400S spec.) is used to identify the important functional groups that are responsible for their activity. Infrared techniques provide non-destructive, fast, and low-cost analysis, and have shown promising results. Thus the study showed the presence of Alkenes and carboxylic acids.
Fast depletion of fossil fuels is urgently demanding a carry out work for research to find out the viable alternative fuels for meeting sustainable energy demand with minimum environmental impact. In the future, our energy systems will... more
Fast depletion of fossil fuels is urgently demanding a carry out  work for research to find out the viable alternative fuels for meeting sustainable energy demand with minimum environmental impact. In the future, our energy systems will need to be renewable and sustainable, efficient and cost-effective, convenient and safe. Hydrogen is expected to be
one of the most important fuels in the near future to meet the
stringent emission norms. The use of the hydrogen as fuel in the internal combustion engine represents an alternative use to
replace the hydrocarbons fuels, which produce polluting gases
such as carbon monoxide (CO), hydro carbon (HC) during
combustion. In this seminar report contemporary research on
the hydrogen-fuelled internal combustion engine can be given.
First hydrogen-engine fundamentals were described by
examining the engine-specific properties of hydrogen and then
existing literature were surveyed.
The revaluation of Internet in current century has brought many advances to the humanity. It has changed their life to better and it has also altered their way to communicate with each other. The most frequent mean not only people but... more
The revaluation of Internet in current century has brought many advances to the humanity. It has changed their life to better and it has also altered their way to communicate with each other. The most frequent mean not only people but
also organization prefer to communicate is e-mail. People utilize email for their social purposes such as keeping touch with their friends or family. Moreover, most organizations currently choose e-mail as formal way to communicate with their employees or customers. In addition, since the e-mail has become attractive tool to communicate, companies and individuals has benefited from this advantage to promote their products or services (Magee, 2003).
Aspect-Oriented Software Engineering (AOSE) has emerged a latest and very attractive software development model that is intended to complement and improve a wide variety of modern development areas. In addition, aspect oriented software... more
Aspect-Oriented Software Engineering (AOSE) has emerged a latest and very attractive software development model that is intended to complement and improve a wide variety of modern development areas. In addition, aspect oriented software engineering offers a wide variety of advanced and unique program development and modularization mechanisms. The research has shown that the development of software applications through aspect oriented software engineering mechanisms improves the implementation structure of a software application which has significant influence on a number of important software attributes for instance reduced
complexity and enhanced reusability. Hence, these software
attributes improves the quality of software development
lifecycle as well as results in better software development
(Brichau and D’Hondt; Garcia, Kulesza and Sant'Anna). This
paper presents a detailed analysis of some of the important
aspects associated with aspect oriented software engineering.
This paper will outline some of the fundamental areas of aspect
orientation approach which are required in contemporary
software development. This paper will also discuss the role of
aspect oriented software engineering in improving the
performance of current software development lifecycles.
Actually in appropriated computing in view of extended system and exponentially increasing data has realized movement towards cloud development displaying. Cloud computing is advancement where the customers' can use first class advantages... more
Actually in appropriated computing in view of extended system and exponentially increasing data has realized movement towards cloud development displaying. Cloud computing is advancement where the customers' can use first class advantages as a piece of kind of programming that live on
assorted servers and access data from all over the place all
through the world. Cloud stockpiling engages customers to get
to and store their data wherever. It similarly ensures perfect
utilization of the available resources. With an ensuring
advancement like this, it absolutely leaves customers' security,
putting new security dangers towards the certitude of data in
cloud. The security dangers, for instance, upkeep of data
genuineness, data hiding and data wellbeing govern our stresses when the issue of cloud security comes up. The voluminous data and time concentrated encryption checks related to applying any encryption framework have been exhibited as an impediment in this field. In this investigation paper, I have considered a framework for cloud structural arranging which ensures secured advancement of data at client and server end. I have used the non weakness of Elliptic twist cryptography for data encryption and Diffie Hellman Key Exchange framework for affiliation establishment. The proposed encryption framework uses the blend of immediate and bended cryptography schedules. It has three security checkpoints: approval, key time and encryption of data.
Injection molding is a complex process regulated by many factors (injection speed, injection pressure, melt temperature, mold temperature, and others). Despite, process control and parameter optimization, it is often difficult to... more
Injection molding is a complex process regulated
by many factors (injection speed, injection pressure, melt
temperature, mold temperature, and others). Despite, process
control and parameter optimization, it is often difficult to replicate thermoplastic components with adequate dimensional
accuracy, especially in the case of geometries with high aspect
ratios. For these reason, there is a need for  study of fill time on
other parameters . In this paper simulate the fill the effect with
the help of the simulation work and with DOE approach. Data
analysis evidenced the greater quality of work pieces obtained
by mould flow adviser.
An earthquake (also known as a tremor or temblor) is the result of a sudden release of energy in the Earth's crust that creates seismic waves. Earthquakes are recorded with a seismometer, also known as a seismograph. The moment magnitude... more
An earthquake (also known as a tremor or temblor) is the result of a sudden release of energy in the Earth's crust that creates seismic waves. Earthquakes are recorded with a seismometer, also known as a seismograph. The moment magnitude of an earthquake is conventionally reported, or the related and mostly obsolete Richter magnitude, with magnitude 3 or lower earthquakes being mostly imperceptible and magnitude 7 causing serious damage over large areas. Intensity of shaking is measured on the modified Mercalli scale. Here we are presenting Microcontroller based An Earthquake Detection
using Sensing Element to reduce its destructive losses.
Fast depletion of fossil fuels is urgently demanding a carry out work for research to find out the viable alternative fuels for meeting sustainable energy demand with minimum environmental impact. In the future, our energy systems will... more
Fast depletion of fossil fuels is urgently demanding a carry out work for research to find out the viable alternative fuels for meeting sustainable energy demand with minimum environmental impact. In the future, our energy
systems will need to be renewable and sustainable, efficient and cost-effective, convenient and safe. Hydrogen is expected to be one of the most important fuels in the near future to meet the stringent emission norms. The use of the hydrogen as fuel in the internal combustion engine represents an alternative use to replace the hydrocarbons fuels, which produce polluting gases such as carbon monoxide (CO), hydro carbon (HC) during
combustion. In this seminar report contemporary research on
the hydrogen-fuelled internal combustion engine can be given.
First hydrogen-engine fundamentals were described by
examining the engine-specific properties of hydrogen and then
existing literature were surveyed.
In the present paper performance of refrigerant R134a is discussed throughout an ejector for low temperature heat source for refrigeration and air–conditioning applications. The proposed system performance has been compared with Carnot... more
In the present paper performance of refrigerant R134a is discussed throughout an ejector for low temperature heat source for refrigeration and air–conditioning applications. The proposed system performance has been compared with Carnot cycle working at same operating conditions with influence of condenser, generator, and evaporator temperature on performance of Vapour Jet Refrigeration (VJR) system.
Furthermore, the effect of ejector efficiency also discussed at
constant operating conditions. The design conditions were
evaporator temperature (5-15˚C), condenser temperature(30-45˚C) and generator temperature (75-80˚).  For calculation purpose mathematical equations are developed and simulation results are obtained with EES  (Engineering Equation Solver). The present results depicts that the performance of the ejector highly depend on operating conditions on the performance of ejector system.
With the continuous trend of reducing feature size, and employing continuously smaller components on integrated circuits, new challenges arises on the way of silicon CMOS circuits and devices. Emerging “nanodevices”... more
With the continuous trend of reducing feature size, and employing  continuously  smaller  components  on
integrated circuits,  new  challenges  arises  on the  way  of
silicon  CMOS circuits and devices. Emerging “nanodevices”
promise the possibility of increased integration density and
reduced power consumption. The emerging devices, partially
due to their extremely small dimensions, show large variations
in their behavior. The variation shown by these devices affects
their reliability and the performance of circuits made from
them. After aggressive scaling, the bulk Complementary Metal
Oxide Semiconductor  (CMOS)  technology  is  facing  numerous
challenges which have motivated the researchers to concentrate for  other  promising  devices.  Carbon  Nanotubes  with their superior properties, high thermal conductivities and high current drivability has emerged out as a potential alternative device to the bulk CMOS technology. Initially we have analyzed the key performance of a Carbon Nanotube Field Effect Transistor (CNFET) based inverter and NAND Gate  and compared it with the CMOS for 32nm technology  node.  Both the inverters  and NAND Gate are simulated in HSPICE platform and the results show improved performance of CNFET inverter and NAND gate in terms of power in comparison to CMOS inverter and NAND Gate.
Due to continuous advances in technology scaling, modern integrated circuits consist of billions of transistors. Interconnects between the gates in these transistors were considered as ideal conductors that propagated signals... more
Due to continuous advances in technology scaling, modern integrated circuits consist of billions of transistors. Interconnects between the gates in these transistors were
considered as ideal conductors that propagated signals
instantaneously. While device sizes were shrinking with each
technology generation, multilevel metal structures rose higher
and higher above the surface of the silicon and soon began to
dominate the landscape of the integrated circuit. In the sub
100nm scaling regime, interconnect behavior limits the
performance and correctness of VLSI systems. The wiring in
today’s integrated circuits forms a complex geometry that
introduces capacitive, resistive, and inductive parasitics. They
can cause an increase in propagation delay, impact on energy
dissipation and the power distribution and introduce extra noise sources, which affects the reliability of the circuit. As the device size scales down the impact of interconnect in the VLSI circuits became even more significant. The performance of copper interconnects tend to get reduced in the sub 100nm range and hence we need to examine for other interconnect via options. Single Wall Carbon Nanotubes exhibit better performance in sub 100nm processing technology due to their very large current carrying capacity and large electron mean free paths. Initially we have analyzed the performances of a copper based CMOS inverter for 32nm technology node. SPICE simulations were carried out to validate the results and the results show improved performance of CNT interconnects in terms of power and delay time in comparison to traditional copper based interconnects. This work suggests using Single Wall Carbon Nanotubes (SWCNT) as interconnects for global interconnects in VLSI design as they consume less energy and gives more throughput and bandwidth when compared with traditional Copper wires.
In this paper, a battery-supercapacitor (SC) hybrid Energy Storage System (ESS) is employed in a standalone photovoltaic (PV) system to maintain continuity in the supply. The battery ESS is characterized by high energy density, low... more
In this paper, a battery-supercapacitor (SC) hybrid Energy Storage System (ESS) is employed in a standalone photovoltaic
(PV) system to maintain continuity in the supply. The battery ESS is characterized by high energy density, low power density, degradation due to frequent and partial charge/discharge cycles. By incorporating SC ESS which has high charge/discharge rates, a system having both high energy and power capabilities can be designed. In the presented control scheme, high frequency current reference along with
battery error current is utilized as the reference for the SC ESS
resulting in an improved voltage profile as compared to that of
the conventional methods. Also, an improvement in the life span, reduction in size and cost of the battery and better
generation-demand power balance can be obtained. The control scheme is validated using Matlab/Simulink models under varying conditions of irradiation and load.
Transient Elastohydrodynamic Lubrication(EHL) analysis using Magneto rheological (MR) fluids is carried out in the present paper. A time varying entrainment velocity is taken into account and its effect on pressure distribution and film... more
Transient Elastohydrodynamic Lubrication(EHL) analysis using Magneto rheological (MR) fluids is carried out in the present paper. A time varying entrainment velocity is taken into account and its effect on pressure distribution and film thickness are considered. MR fluid is defined by the Bingham Model and the Reynolds Equation is also modified to consider the effect of MR fluids. Effect of variation in oscillating frequency, amplitude and yield stress have been considered and it is found that film thickness is affected by these variations. Increase in yield stress increases the film thickness thus increasing the load carrying capacity of the fluid film. Also, the effect of speed variation is incorporated and it is seen that on increasing the velocity the film thickness also increases.
Elastohydrodynamic lubrication (EHL) analysis of line contact lubricated with smart fluids has been carried out in present work. The aim is to observe the effect of smart fluids on EHL performance. The simulation is based upon modified... more
Elastohydrodynamic lubrication (EHL) analysis of line contact lubricated with smart fluids has been carried out in present work. The aim is to observe the effect of smart fluids on EHL performance. The simulation is based upon modified
Bingham model which is used to describe the smart fluids.
Perturbation scheme is used to modify classical Reynolds
equation to incorporate the effect of smart lubricants. It is
observed that film thickness increases with increase in yield
stress of smart fluid due to which load carrying capacity of
lubricant film is improved.
Importance measure analysis is used to identify the critical components in the system which have the greatest impact on the system performance. Various importance measures are already proposed such as Birnbaum, Fussell Vesely, reliability... more
Importance measure analysis is used to identify the critical components in the system which have the greatest impact on the system performance. Various importance measures are already proposed such as Birnbaum, Fussell Vesely, reliability achievement worth etc. which facilitates prioritization of system components for making maintenance strategy and reliability improvement. Only few existing importance measures have paid attention to the costs incurred by maintaining system components within a given time period. This paper proposes a new component cost important measure and approach is applied on wind turbine system. Component having highest importance measure value is considered to be most critical component in the system.
Wireless Sensor Networks (WSNs) generally are deployed in hostile and remote areas. The major challenge in such ill-disposed areas is to find a tradeoff between desired and contrary requirements for the lifetime, coverage and cost with... more
Wireless Sensor Networks (WSNs) generally are deployed in hostile and remote areas. The major challenge in such ill-disposed areas is to find a tradeoff between desired and contrary requirements for the lifetime, coverage and cost with
limited available resources. In this paper, we present the study
of various sensor network deployment techniques and their
classifications. We mainly classified deployment techniques on
the basis of Region of Interest (ROI) characteristics and
mathematical approach used by them. On the basis of ROI
characteristics, there are three types of deployment approaches like deterministic, random and self-deployment. We further categorize deployment techniques on the basis of four mathematical approaches used to solve the deployment problem like Genetic Algorithms (GA), Computational Geometry,
Artificial Potential Field (APF), and Particle Swarm Optimization
(PSO). In the last an extensive comparison of deployment techniques on the basis of discussed metrics is presented with their strength and limitations.
Nowadays everything is moving from manual to automatic so it is necessary to develop door locking device involving some electronic component and mechanical mechanism.The wireless locking system works on single slider crank mechanism and... more
Nowadays everything is moving from manual to automatic so it is necessary to develop door locking device involving some electronic component and mechanical mechanism.The wireless locking system works on single slider crank mechanism and performs the operation locking of door, vaults, etc. This system can be remotely controlled by RF module  (Radio Frequency) and DTMF (Dual Tone Multi Frequency). The whole prototype in controlled by ATMEGA-8 microcontroller for controlling the opening or closing of the door. This mechanism (single slider crank mechanism) is highly efficient and economical as it uses only one motor and crank slider mechanism is made up of wood which is not so costly. The  main objective of the project is to reduce human effort to remotely control the opening and closing of a simple gate.
Many essential daily chores might be a difficult task for those who are visually impaired. Automatic clothing pattern recognition can bring the much needed independence in their lives. But, this is also a challenging research problem due... more
Many essential daily chores might be a difficult task for those who are visually impaired. Automatic clothing pattern recognition can bring the much needed independence in their
lives. But, this is also a challenging research problem due to
rotation, scaling, illumination, and especially large intra-class
pattern variations. We have developed a camera-based
prototype system that recognizes clothing patterns in four main
categories (plaid, striped, pattern-less, and irregular) and
identifies 16 clothing colors. The system integrates a camera, a
microphone, a computer, and a pair of ear-phones for audio
description of clothing patterns and colors. Pattern recognition
is based on edge-detection and color recognition is developed
using threshold technique on RGB color scheme. To evaluate
the effectiveness of the proposed approach, we used the CCNY
Clothing Pattern dataset.
The term risk is synonymous with uncertainty and it is present in every business. The construction industry in India also bares no exception to this fact. There are numerous problems which arise on a daily basis in the construction... more
The term risk is synonymous with uncertainty and it is present in every business. The construction industry in India also bares no exception to this fact. There are numerous problems which arise on a daily basis in the construction sector.
These problems are attributed to risks. The focus of this paper is to identify and prioritize the major risks and risk factors that
influence the three classes of the Indian construction companies which undertake the majority of the projects in the South Indian cities of Cochin and Udupi using Analytic Hierarchy Process , a multi-attribute decision making method which acts as a tool for risk analysis. The priority value of each risk factor and sub- risk factor were found out and compared and a rank was allotted to each risk factor based on this output. The output helps the management of construction companies in identifying which type of risk is most likely to occur in a particular class of company, so that it can be mitigated in the future.
User mobility throughout the global Internet has launched a successful wireless LAN market and created the need for new Internet architecture. A number of Mobility protocols like MIP, hierarchical MIP, and cellular IP, HAWAII have been... more
User mobility throughout the global Internet has launched a successful wireless LAN market and created the need for new Internet architecture. A number of Mobility protocols like MIP, hierarchical MIP, and cellular IP, HAWAII have been proposed for these communications featuring different type of mobility properties. Advance TIMIP protocol is proposed with enhancements over with the base protocol TIMIP. The missing paging and routing cache features have been implemented to the idle terminal support. Security features are provided by embedding the HMAC-MD5 message digest algorithm. A set of features from various earlier protocols have been combined to form this protocol, which provides better efficiency and better
transparency than other alternative solutions, by adding
featuring seamless handovers and optimal routing. In addition,
various multimedia support, paging and security features are
provided. Simulation comparing ATIMIP with the other micro
mobility protocols were performed. In these simulations, the
average results from continuous measurements were presented; featuring varying MN speeds, multiple metrics
(loss ratio, throughput and delay), intra and inter-domain UDP traffic sources and the stationary results showed that ATIMIP has the best resource optimization performance for intra-domain. HAWAII would also be able to share such good performance with intra-domain traffic, but suffers from long routing paths due to its incremental handover operations. It was deduced that CIP and HMIP have the worst behavior, as all packets are forced to pass through the GW. The protocol has also been tested for the various traffic types as video traffic, VoIP traffic, and CBR sources and found to be capable of handling various multimedia applications with user specified requirements. The former solution is formally specified with state machines. Advance TIMIP will be evaluated and compared to alternative solutions via simulation studies in the NS2 simulator.
Changing scenario of cryptography has led to a change in paradigm of from certificate based public keys and keyrings to user-dependent keys which are based on identities of users or their attributes. This is termed as identity based... more
Changing scenario of cryptography has led to a change in paradigm of from certificate based public keys and keyrings to user-dependent keys which are based on identities of users or their attributes. This is termed as identity based cryptography or attribute based cryptography. Such encryption schemes are much relevant in current scenario of cloud computing and mobile computing where participation of user in transactions is partial, or user-based access control over an encrypted database is required. This paper presents a survey of
identity based and attribute based cryptographic primitives.
The project deals with the study on what type of shopping do consumers prefer, is it online shopping or traditional shopping and why? What type of products do they prefer buying online or through traditional means and why? How satisfied... more
The project deals with the study on what type of shopping do consumers prefer, is it online shopping or traditional shopping and why? What type of products do they prefer buying online or through traditional means and why? How satisfied are they by the shopping experience. Few suggestions like extended customization options and gaming options are also provided that could help in improving online sales.
In this paper we use K-means classification data mining algorithm for classifying students based on their Library usage data and the marks obtained in their respective courses. We have used a specific mining tool for making the... more
In this paper we use K-means classification data mining algorithm  for classifying students based on their Library usage data and the  marks obtained in their respective courses. We have  used a specific mining tool for making the configuration and execution of data mining techniques easier for instructors. We have used real data from institutions and courses with University students. We have also applied pre-processing techniques on the original numerical data in order to verify if better classifier models are obtained. Finally, we claim that a classifier model appropriate for educational use has to be both accurate and comprehensible for instructor and management  in order to be of use for decision making.
Incessant increase of greenhouse gasses boost the global warming and it threatened to the environment and human health. Identify the human activities related to greenhouse gas emissions and address the society accordingly is a... more
Incessant increase of greenhouse gasses boost the global warming and it threatened to the environment and human health. Identify the human activities related to greenhouse gas emissions and address the society accordingly is a requirement. The importance of the initial measurement of GHG emissions is highlighted by the UNEP which states that, “companies will need to be able to measure their impacts if they are to manage them”. The main focus of this study is to develop a Carbon emission measuring frame work to facilitate tea estates.
It will play a significant role in establishing the baseline Carbon
Dioxide  (CO2) emissions for an estate in order to allow
meaningful emission reductions to be made. The basis of this was to identify all carbon emission activities of an estate define the calculating formulas and make a model with them to calculate the total CO2 emissions. The developed model has been implemented in one real tea estate to determine its effectiveness and ability to establish a CO2 footprint for an estate. Here some of emission sources are yet to be included, such as the emissions embedded in chemicals, fertilizers and waste. In addition, its need calculate the sequestration of Carbon dioxide from the surrounding trees. Anyway the designed model provides a good way for find out the CO2 footprint for tea estates.
Most valuable employee in the plantation sector is the pucker. But it is evident the number of female workers become less and rapidly declining year by year mainly due to dissatisfaction about their job. The objective of this study is to... more
Most valuable employee in the plantation sector is the pucker. But it is evident the number of female workers become less and rapidly declining year by year mainly due to dissatisfaction about their job. The objective of this study is to assess the future impact to the Tea Plantations in relation to shortage of female Workforce. Today, plantations have skilled female workforce but within few years’ time this will declining
due to some reasons and management have to face many
challenges including a massive problem of carry out day to day
operation. By this study researcher going to highlight the
importance of matching the management strategies with the
worker perceptions to motivate them to retain with the estates
works. This will enable the plantations to make good teas and
gain the maximum profits, while following the best agricultural
practices in the long ter. The study’s findings enables to identify
the main reasons for the future shortage of female workers in
estates, how important the human resources  functions are, ways and means to follow the human resources practices and arrest such problems and the best adoption of recommendations
The problems of uncertainty, imprecision and vagueness have been discussed for many years. These problems have been major topics in philosophical arenas with series of debate, in particular, about the nature of vagueness and the ability... more
The problems of uncertainty, imprecision and vagueness have been discussed for many years. These problems have been major topics in philosophical arenas with series of debate, in particular, about the nature of vagueness and the ability of traditional Boolean logic to cope with concepts and perceptions that are imprecise or vague. These sometimes make experts to rely on common sense when they solve problems. Interestingly, a lot of experts such as scientists, philosophers, psychologists, great mathematicians and others, researched vehemently on fuzzy logic, putting each other under constant scrutiny in response to their individual propositions coupled with fuzzy logic not until Zadeh Lotfi, eventually conceived fuzzy logic in 1971. Fuzzy logic is not logic that is fuzzy, but logic that is used to describe fuzziness. Fuzzy logic is the theory of fuzzy sets, sets that calibrate vagueness. Fuzzy logic is based on the idea that all things admit of degrees. Temperature, height, speed, distance, beauty, handsome, ugly, walk, stand all comes on a sliding scale. My car is running really hot. Elvis is a very
tall guy. Fuzzy logic reflects how people think. It attempts to
model our sense of words, our decision making and our common sense. As a result, it is leading to new, more human, intelligent systems.
Cloud computing is a new emerging trend in computer technology that has influenced every other entity in the entire industry, whether it is in the public sector or private sector with the advance feature of the cloud there are new... more
Cloud computing is a new emerging trend in computer technology that has influenced every other entity in the entire industry, whether it is in the public sector or private sector with the advance feature of the cloud there are new possibility opening up how application can be built and how different services can be offered to the end user through Virtualization, on the internet. Considering the growing importance of cloud finding new way to improve cloud services is an area of concern and research focus. In available VirtuaMachine Load Balancing policies limitation of cloud is that they don’t save the state of the previous allocation of virtual machine to a request from the user and the VM Load Balancing algorithm require execution each time a new request for VM allocation received from user. This problem can be resolve by developing an efficient VM load balancing algorithm for using Round Robin approach.
The goal of this work is to point out some important facts in the establishment of wireless connection, where network infrastructure is less complex than wired media. Security needs to be enabled on wireless devices during their... more
The goal of this work is to point out some important facts in the establishment of wireless connection, where network infrastructure is less complex than wired media. Security needs to be enabled on wireless devices during their installation in enterprise environments. In wireless security, encryption is used to secure the network.
In this work the author will discuss:
• Existing mode of wireless LAN products
• Existing solution to security using identifiers &
authentication
• Encryption methods for secure connection
• Possibility of secure media access
This Paper basically consists of the GIS Automatic Meter Reading system where we including the web services along with some embedded systems. We using plc power line carrier here for having the connection between server and the HUB where... more
This Paper basically consists of the GIS Automatic Meter Reading system where we including the web services along with some embedded systems. We using plc power line carrier here for having the connection between server and the HUB where in AMR we inbuilt the embedded systems where we going to use for the operation of the embedded systems.Based
on this project here it may involve in transmitting, receiving a
request/ file to and fro from GIS and hub through LAN and the
mobile device and then to the system a new approach is
introduced to reduce the operational and maintenance costs
when dealing with real time or large amount of data. The system is operated by the embedded systems mostly. Receiving data / transmitting data of the meter reading of power companies.
It’s all about Bitcoin…..Why it’s all about Bitcoin? What is the use of Bitcoin? Is it secure? Can Bitcoin be hacked? Even I did not know the answers of all these questions before joining Unocoin. On 20 November 2014,I got a call from my... more
It’s all about Bitcoin…..Why it’s all about Bitcoin? What is the use of Bitcoin? Is it secure? Can Bitcoin be hacked? Even I did not know the answers of all these questions before joining Unocoin.
On 20 November 2014,I got a call from my friend. He just told
me “You have an interview tomorrow. Be prepared, and go
through the Bitcoin concepts’’. I just said yes and started
preparing. I started reading about Bitcoin on Wikipedia. I
cracked the interview and joined Unocoin. Unocoin is India’s largest bitcoin trading platform through which you can BUY STORE and SELL Bitcoin. It is simple, secure and seamless. You simply register, enter your bank account information, and convert the local currency into Bitcoin.My learning curve about Bitcoin began this way.
The study was assigned to evaluate albinism in avifauna of the Thar Desert of Rajasthan, India. The study area was selected around Jodhpur district. Study was based on the wildlife methodology to find out occurrence of albinism in Peacock... more
The study was assigned to evaluate albinism in avifauna of the Thar Desert of Rajasthan, India. The study area was selected around Jodhpur district. Study was based on the wildlife methodology to find out occurrence of albinism in Peacock at the study site. The Indian Peacock  (Pavo cristatus) was one of the species which was described by Linnaeus. The Indian Peacock is listed in Red List of International Union for
Conservation of Nature. In this Paper, we were reporting the
occurrence of albinism in Indian peacock in this particular the
Thar Desert region  (Ootamber Village of Jodhpur). This area is located at west part of the Jodhpur district. The eco-behavior of this animal was noted similar to the normal Indian Peacock. This finding concerned to albinism in avifauna of particular
peacock species of the Thar Desert region which having
peculiarities of topography.
Now a days cryptanalyst’s are increasing day by day so in order to maintain privacy or secrecy for information, a security encryption algorithm is required in order to send the data confidentially, AES (Advanced Encryption Standard) is... more
Now a days cryptanalyst’s are increasing day by day so in order to maintain privacy or secrecy for information, a security encryption algorithm is required in order to send the data confidentially, AES  (Advanced Encryption Standard) is an algorithm that which replaced DES and 3DES because of their
smaller block size, AES  is having the larger block size, good
security and efficiency so in our paper we are going to generate a structure with  s-boxes, expanded key, encryption and
decryption arrays of AES using Mat lab software
Domestic Violence, as it sounds, is not an individual issue but a collective responsibility. This, as a matter of fact, boils down to the globe and thereby making it a universal canker. This is perceived as a departure from the societal... more
Domestic Violence, as it sounds, is not an individual issue but a collective responsibility. This, as a matter of fact, boils down to the globe and thereby making it a universal canker. This is perceived as a departure from the societal norms since it is an unhealthy act where every society frowns upon it. But it is just a pity to realize that, this uncouth behavior is more rampant in Sierra Leone and ought to be eschewed so as for peace and tranquility to climb the platform of the day.
Sierra Leone’s transition has witnessed a number of
landmark procedural and legal innovations which have had
widespread implications for international gender justice. The
11-year conflict had shattered the country, leaving more than a
million people displaced and thousands of women coping with
the aftermath of sexual cum domestic violence.
Domestic violence became pervasive with high negative impact
on the social, physical, emotional and psychological wellbeing of women and girls in Sierra Leone. The high rate of this societal malaise is as a result of weak existing laws, the high placed patriarchal setting cum the unwillingness to report such cases due to the stigma associated and the lack of confidence in the law enforcement agencies.
Information security is the basic requirement of today digital communication. Everything is going digital, so the protection of information is much more important. The information security can be classified in to Steganography,... more
Information security is the basic requirement of today digital communication. Everything is going digital, so the protection of information is much more important. The information security can be classified in to Steganography, Watermarking and Cryptography. steganography is the art and science of hiding secret information  into digital media, so that
no one can identified the presence inside the media. There are different types of carriers (ie. Image , video etc)  for cover media. Steganalysis is type of attack against the steganography
technique.  To make security in communication system, new
steganography method based on Discrete wavelet Transform is
proposed. The proposed method hides secret message bits inside the intensity matrix of secret image. Then the Inverse Discrete Wavelet Transformation  (IDWT) is applied to obtain the stegoimage. The performance of proposed design is investigated by comparing cover and stego image in terms of Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE).
The Thar desert is very rich in biodiversity with arid climatic condition of the faunal and floral region suitable for adaptation of different species in the region. In the Thar desert faunal diversity in ecological institution in... more
The Thar desert is very rich in biodiversity with arid climatic condition of the faunal and floral region suitable for adaptation of different species in the region. In the Thar desert faunal diversity in ecological institution in different villages are represent different ecosystems in it and are excellent
repositories of diversity, they are represented by Orans lands,
Gauchers, Sand desert, Parat  (Wastland or Banjar), River bed
and others. These different villages ecological institution
governed by the community and local Panchayat. These sites
represent excellent Floral and Faunal communities which
constitute complex ecosystem in the Thar desert ecoregion. Thar desert region of India, which extends in more than 2.0 lakh sq. km area, experiences variable rainfall from 100 mm to 450 mm in a year. Frequent drought, which occurs once in 2 or 3 years in the region, cause extreme stress to fauna in Thar desert is subjected to extreme diurnal and seasonal variation in
temperatures, more demand for water and will be significant
driver of biodiversity with changing life cycles, migration and
invasion of new habitat in Thar desert region. Faunal diversity
in includes 50 mammalian species, 41 reptiles species, 180 birds species, 80 fish species and floral diversity in 175 plant species recorded in from in and around these common property resources. The floral and faunal diversity richness and
abundance which contribute more to regional biodiversity and
support a large section of the society. No doubt that the faunal
diversity along with some exotic plant species has increased in
the Thar desert in recent past, but some of the native desert
dwelling floral and faunal species are stirring hard.
The behavior of some actor or set of actors, such as an official, a governmental agency, or a legislature, in an area of activity such as public transportation or consumer protection is referred to as policy in general perspective. Public... more
The behavior of some actor or set of actors, such as an official, a governmental agency, or a legislature, in an area of activity such as public transportation or consumer protection is referred to as policy in general perspective. Public policy may
also be viewed as whatever governments choose to do or not to. Such definitions may be adequate for ordinary discourse, but because of the nature of this article, just two leaves are coined from the whole tree of public policy and focused on. Henceforth, the bone of contention in so far as this article is concerned is universal perspectives and policy making as an academic discipline. These two leaves are being tackled in a concisely manner so as to pave way for even a layman to assimilate with ease.
As the population is increasing, the vehicles are also increasing and so the parking problem arises. There is a chance that a car may bump into other car while parking. Although the rear view mirror gives a rough estimate of the distance... more
As the population is increasing, the vehicles are also increasing and so the parking problem arises. There is a chance that a car may bump into other car while parking. Although the rear view mirror gives a rough estimate of the distance with the obstacle behind, there is still a chance of collision. There is need to alert the driver when the car is about to collide with a nearby obstacle so that necessary precautions can be taken to avoid any damage. Our system constitutes of a sensor which senses the distance of the nearby obstacle. This sensor when installed on the car alerts the driver when he is moving close to nearby obstacle and there is a chance of collision. The system can hence help avoid collision, damage and thereby help save money