The International journal of Engineering development and research(IJEDR) aims to explore advances in research pertaining to applied, theoretical and experimental Technological studies. The goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in and around the world. Phone: +91 - 7048 421102
—The present drinking water supply control system is facing many problems related to testing of w... more —The present drinking water supply control system is facing many problems related to testing of water, purification, pumpi ng of water, storage and distri buti on of water. The major problems in water suppl y system are leakage or wastage of water and the majority public is using suction motors to suck water from main supply connecti on. The problems an automated system has been proposed which enhances the water purification, storage, distri buti on and reduces wastage of water as well as identify the theft of water. The GS M Modem for wireless communicati on so that the information can be passed to particular responsi ble officer's cell phone for immediate acti on. The water supply system is a continuity of the water distributi on, water quality control and the monitoring.
The Multiple-Input Multiple-Output based wireless system is a promising high data rate interface ... more The Multiple-Input Multiple-Output based wireless system is a promising high data rate interface technology. A method based on Space-Time Block Coding (STBC) with Multiple-Input Multiple-Output (MIMO) set-up for use in wireless channels. In the special version of STBC called Alamouti code is used for exploiting the performance of MIMO in Adaptive modulation. The higher speed of communication without compromising in the accuracy is the prime focus of research work in wireless communication. The space time coding is one of the techniques which enable the higher speed with maintaining the error rate. In this paper, the analysis and study of the ber performance and capacity analysis is given. The OFDM system which is space time coding. The simulation has been performed with different modulation scheme. The comparative result has been given in this paper.
Image re-ranking is one of the most effective technique to improve the results of we... more Image re-ranking is one of the most effective technique to improve the results of web-based image search. This technique is adopted by current commercial search engines such as Bing & Google. In this paper we propose a novel image re-ranking framework with two stages , offline and online stage. In the offline stage, different semantic spaces for different query keywords are automatically learned and the visual features of images are projected into their related semantic spaces to get semantic signatures. At the online stage, images are re-ranked by comparing their semantic signatures obtained from the semantic space specified by the query keyword. The proposed system significantly improves both the accuracy and efficiency of image re-ranking by making use of query-specific semantic signatures.
Biometric systems are vulnerable to spoofing attack. A reliable and efficient countermeasure is n... more Biometric systems are vulnerable to spoofing attack. A reliable and efficient countermeasure is needed in order to combat the epidemic growth in identity theft. To ensure biometric system security, liveness assessment can be applied in order to guard against such harmful spoofing attacks. In this paper, we present novel software based protection measure against fraudulent biometric system access attempt. Legitimate biometric sample comprises of efficient information that can be analyzed to discriminate it from self-manufactured, synthetic or reconstructed fake biometric trait used in fraudulent system access. This novel software based method computes more than 25 Reference and No-Reference image quality features of biometric sample to verify its legitimacy. These extracted features are efficient to judge between legitimate and imposter sample. Proposed approach makes biometric system more users friendly, fast, less complex than the hardware based system and more suitable for real time applications.
As we know that now a days there is a huge advancement in wireless communication and its applicat... more As we know that now a days there is a huge advancement in wireless communication and its applications, efficient use of spectrum has been a great issue for researchers. Due to such issue, development in cognitive radio (the intelligent network) has been in demand which will analyze the spectrum to increase its efficiency by utilizing it properly. This paper focuses on sensing the spectrum in order to find out the licensed underutilized spectrum, to accommodate it to the secondary user without interfering the primary user. Two spectrum sensing methods, i.e. Energy Detection (ED) method and Cyclostationary feature detection (CFD) method are carried out over three fading channels (AWGN, Rayleigh, and Rician) at different SNR values were prior knowledge of the signal is not required. Similarly graph of such simulation has been resulted and compared in this paper. This simulation proves that at low SNR, CFD is used.
This project describes the controlling the robot using wireless Bluetooth technology via android ... more This project describes the controlling the robot using wireless Bluetooth technology via android application. The application robot control interaction display. We fix the camera to the robot for monitor the robot through android mobile. The prototype of the mobile robot is based on the wireless technology. This kind of robot can be helpful for spying in war fields.
An institutional repository is an online resource for the storing in digital form of academic mat... more An institutional repository is an online resource for the storing in digital form of academic materials, such as thesis, dissertations and research articles, on behalf of a university or other institution. This paper focuses on the requirements, functions and use of digital preservation in an institutional repository context. The paper highlights on various feature and importance of both Institutional Digital Repository and Open Source Digital Library Software that is DSpace. The Central Library IIT, Kharagpur uses open sources digital library software namely DSpace. The IDR of Indian Institute of Technology Kharagpur (IITKGP) collects preserves and makes available in digital format of the scholarly output of IIT Kharagpur community. Its interface provides for an easy self-archiving by faculty, and organizes the documents in logical, easily retrieved fashion.
The ceramic heat exchanger is studied to find the performance of heat transfer and pressure drop ... more The ceramic heat exchanger is studied to find the performance of heat transfer and pressure drop by numerical computation. The numerical computation was performed throughout the domain including fluid region in exhaust gas side rectangular ducts, ceramic core and fluid region in air side rectangular duct with the air and exhaust in cross flow direction. The main aim is to reduce the hot side temperature from 1100oc to 600oc and later it passes through the metallic heat exchanger temperature ranges less than 600oc. By increasing the Reynolds number on the cold air side this increase the velocity of the cold fluid Increase the heat transfer rate also increase the velocity by using nuzzling effect on cold air slot. The main purpose using the ceramic is to withstand with high temperature than metal.
In this paper, the Seismic behavior of in-filled Reinforced concrete frame having re- entrant cor... more In this paper, the Seismic behavior of in-filled Reinforced concrete frame having re- entrant corner is evaluated. Plan configuration of these space frames contain reentrant corner, where both projections of the structure beyond a reentrant corner is 33 percent of the plan dimension of the structure in the given direction. Bare and Infilled frames are considered. It is found that infill had beneficial effect in R.C. frame having reentrant corner.
In this paper the experimental study of the thermal behaviour of the single phase flow through a ... more In this paper the experimental study of the thermal behaviour of the single phase flow through a automobile radiator. The radiator is an important accessory of vehicle engine. Normally, it is used as a cooling system of the engine and generally water is the heat transfer medium. For this liquid-cooled system, the waste heat is removed via the circulating coolant surrounding the devices or entering the cooling channels in devices. Nanofluids have attracted attention as a new generation of heat transfer fluids in building in automotive cooling applications, because of their excellent thermal performance. This study attempts to investigate the heat transfer characteristics of an automobile radiator using water combination based CuO nanofluids as coolants. Thermal performance of an automobile radiator operated with nanofluids is compared with a radiator using conventional coolants
A Langmuir probe is being developed for measurement of electron densities, ion densities, and ele... more A Langmuir probe is being developed for measurement of electron densities, ion densities, and electron temperatures in the MARS ionosphere. This article describes how a Langmuir Probe can be used to study ionosphere irregularities. It begins with the basic principle of the Langmuir Probe, the ionospheric regions where it can be used, various sizes and shapes of the Langmuir Probe sensor. Here In this paper, we present the design and how implementation of Langmuir Probe instrument. I have prepared a block diagram of Langmuir Probe (see figure 2). The Langmuir probe experiment consists of a cylindrical sensor. A conducting sensor called probe is exposed to the medium under study and the current collected by the probe is measured to study various plasma parameters. The probe can be kept ambient plasma potential or given a negative voltage (to collect ion current) or a positive voltage (To collect electron current).After the current and voltage charatertics we analyzed plasma parameters. The operational amplifier will be connected with the sensor. A floating sweep voltage supply will also be applied to the sensor for collect current. Here after than collected current is goes to differential amplifier. The differential amplifier is amplifying the difference between both signals. Later we will use low pass filter for remove the un-wanted frequency of signal. Here the analog to digital convertor for generating a digital signal for processing. The signal output will be displayed on LCD display screen by using microcontroller.
In the rapidly changing time and especially in India where service sector is witnessing exponenti... more In the rapidly changing time and especially in India where service sector is witnessing exponential growth; the online marketing sector is all set to witness bright future ahead. The increased use of internet in India provides greater prospects for online shopping. Despite of this increased use of internet, there are several factors affecting Indian consumer’s online buying behaviour. And if the online retailers make aware themselves about these factors they can further develop their prospects and converts potential customers into active ones. In this research paper an effort has been made to find out the perceived risks of Indian customers with reference to online shopping. The risk in online shopping is mainly concerned with the misuse of credit cards, leakage of personnel information, product risk and risk of convenience.
This paper presents preemptive scheduling approach to focus on providing a solution for online sc... more This paper presents preemptive scheduling approach to focus on providing a solution for online scheduling problem of real-time tasks, we present a system that uses virtualization technology to allocate resources for the tasks that are reaching its deadline. The primary objective of real time preemptive scheduling is to increase throughput and minimize average response time instead of meeting deadlines. Earlier real-time tasks are scheduled non-preemptively with the objective to maximize the total utility, but the task with higher priority needs to wait until the currently running task gets completed. Hence if the waiting task reaches its deadline gets aborted. That before a task is aborted, it consumes system resources including network bandwidth, storage space and processing power. This leads to affect the overall system performance and response time of a task. Preemptive algorithm is proposed where the task with higher priority are executed first, and the tasks which are reaching its deadline are spoon to virtual machine, this this increases the total system performance.
The ubiquity of smartphones together with their ever-growing computing, networking, and sensing p... more The ubiquity of smartphones together with their ever-growing computing, networking, and sensing powers have been changing the landscape of people’s daily life. The goal of our application ‘GAPS’ is to manage the user activities of the smartphone with respect to locations. Various features of GAPS are Automated Profile Management with auto-response, Location Based Reminders and Log Maintainer. GAPS make use of GPS service for tracking user’s current location and Google map to fetch the information about location detected. The information from Google map is used diversely within the application for various modules. Automated Profile Management is one of the feature which recognizes the type of location and configures the audio profiles. An auto generated message is sent as response to the caller when the user is unable to receive the call. Location based Reminder is a unique feature of the application which reminds the user not only with respect to time but also location. Log Maintainer will keep track of the user visited locations along with the timestamps.
This paper deals with automatically collecting the Water consumption by a customer and also detec... more This paper deals with automatically collecting the Water consumption by a customer and also detecting the leakages in the water distribution system. Water leakage is an important component of water losses. In addition to raising consumer awareness of their water use, metering is also an important way to identify and localize water leakage. A leak detection program can be highly proactive, helping water utilities automate water systems, detecting problem areas earlier, giving customers tools to monitor water use, providing more accurate rates and reducing demand. The objective is to overcome the disadvantages of using current meter technology and make the billing and troubleshooting process faster along with reducing the wastage of water. GSM and ZigBee technology automatically collects consumption, diagnoses, and collects status data from energy meter and transferring that data to a central database for billing, troubleshooting, and analyzing. This advancement saves utility providers the expense of periodic trips to each physical location to read a meter. Another advantage is billing can be based on near real time consumption rather than on estimates based on previous or predicted consumption. This timely information coupled with analysis, can help both utility providers and customers better control to the use and production of water consumption.
Big Data is a collection of data that is large or complex to process using on-hand database manag... more Big Data is a collection of data that is large or complex to process using on-hand database management tools or data processing applications. It is becoming very difficult for companies to store, retrieve and process the ever-increasing data. In other words we can say, Big Data is term given to humungous amount of data which is difficult to store and process. The issue lies in using the traditional system is, how to store and analyze Big Data. Risk prediction involves integration of clinical factors with socio-demographic factors like health conditions, disease parameters, hospital care quality parameters, and a variety of variables specific to each health care provider making the task increasingly complex. Unsurprisingly, many of such factors need to be extracted independently from different sources, and integrated back to improve the quality of predictive modeling. Such sources are typically voluminous, diverse, and vary significantly over the time. This project takes Apache Hadoop, an intrinsic part for storing, retrieving, evaluating and processing huge volumes of data for processing effectively. In this work, we study big data driven solutions to predict the 30-day risk of readmission for congestive heart failure (CHF) incidents. We will predict this process by using Logistic Regression and Naive Bayes classification on the basis of data collected from patients. The results are remarkable after the comparison between the two techniques and presented through confusion matrix.
Biometric time and attendance system is one of the most successful applications of biometric tech... more Biometric time and attendance system is one of the most successful applications of biometric technology, serves an alternate for traditional manual signing process. We designed and implemented a reliable, scalable and cost effective Biometric Attendance System over GSM technology by which we can avoid human interaction to update the data. In the proposed system the primary part is enrolling the user fingerprints into the memory. At the time of verification if the user is already an enrolled person then the proposed system will provide the attendance to the user or else it will give the result as invalid user. The results however show that fingerprint biometric identifier was found suitable for the employee attendance management system of the organization.
File security is a field which is less secure than what is needed for the current technological e... more File security is a field which is less secure than what is needed for the current technological environment. The existing systems use normal encryption techniques using passwords, which can easily be bypassed. Even though the password is unknown, the security can be bypassed by using techniques like phishing and brute force. They can be protected by simple algorithms, but still, if the password is known by any third person, the security can still be breached. Our system encourages the concept of security for a file which belongs to, and can be accessed by only authenticated people . The system also proposes a higher security level ring that compliments the security of password protected encryption. It also acts as a monitoring system in addition to the security system.
In power system to discriminate faults from switching transients a new method is proposed in this... more In power system to discriminate faults from switching transients a new method is proposed in this paper. In this method before the occurrence of first peak of the fault current, fast fault detection and fast fault clearing are essentially required for stable power system. An Example of this system is in an industrial system where bulk power is desired but there high short-circuit currents cannot be measured. Here we are proposing the method of Phase-Locked Loop (PLL) to perform the task of discrimination of Faults and transients. The power system model is developed and simulated for fault performance analysis. MATALB simulations have been performed and the output of the PLL is found completely different for a fault, as compared to a Switching Transient. This difference is being used in this work for discrimination between a fault and a Switching Transient. This capability of discrimination is useful for the safety and stability of the power system.
A cloud services require in big scale, for users to share a private data such as health records, ... more A cloud services require in big scale, for users to share a private data such as health records, transactional data for analysis of data or mining of that data which bringing privacy concerns. Recently, because of new social behavior, social transformation as well as vast spread of social system many cloud applications increase in accordance with the Big Data style, and make it a challenge for commonly used software tools to manage, capture and process the large-scale data within an elapsed time. In this paper, we are going to implement a scalable two-phase top-down specialization approach to anonymize large scale data sets of electronic health records using the MapReduce framework on cloud. In both phases of our project, we are going to design a group of inventive MapReduce jobs to concretely accomplish the specialization computation in a highly scalable way.
—The present drinking water supply control system is facing many problems related to testing of w... more —The present drinking water supply control system is facing many problems related to testing of water, purification, pumpi ng of water, storage and distri buti on of water. The major problems in water suppl y system are leakage or wastage of water and the majority public is using suction motors to suck water from main supply connecti on. The problems an automated system has been proposed which enhances the water purification, storage, distri buti on and reduces wastage of water as well as identify the theft of water. The GS M Modem for wireless communicati on so that the information can be passed to particular responsi ble officer's cell phone for immediate acti on. The water supply system is a continuity of the water distributi on, water quality control and the monitoring.
The Multiple-Input Multiple-Output based wireless system is a promising high data rate interface ... more The Multiple-Input Multiple-Output based wireless system is a promising high data rate interface technology. A method based on Space-Time Block Coding (STBC) with Multiple-Input Multiple-Output (MIMO) set-up for use in wireless channels. In the special version of STBC called Alamouti code is used for exploiting the performance of MIMO in Adaptive modulation. The higher speed of communication without compromising in the accuracy is the prime focus of research work in wireless communication. The space time coding is one of the techniques which enable the higher speed with maintaining the error rate. In this paper, the analysis and study of the ber performance and capacity analysis is given. The OFDM system which is space time coding. The simulation has been performed with different modulation scheme. The comparative result has been given in this paper.
Image re-ranking is one of the most effective technique to improve the results of we... more Image re-ranking is one of the most effective technique to improve the results of web-based image search. This technique is adopted by current commercial search engines such as Bing & Google. In this paper we propose a novel image re-ranking framework with two stages , offline and online stage. In the offline stage, different semantic spaces for different query keywords are automatically learned and the visual features of images are projected into their related semantic spaces to get semantic signatures. At the online stage, images are re-ranked by comparing their semantic signatures obtained from the semantic space specified by the query keyword. The proposed system significantly improves both the accuracy and efficiency of image re-ranking by making use of query-specific semantic signatures.
Biometric systems are vulnerable to spoofing attack. A reliable and efficient countermeasure is n... more Biometric systems are vulnerable to spoofing attack. A reliable and efficient countermeasure is needed in order to combat the epidemic growth in identity theft. To ensure biometric system security, liveness assessment can be applied in order to guard against such harmful spoofing attacks. In this paper, we present novel software based protection measure against fraudulent biometric system access attempt. Legitimate biometric sample comprises of efficient information that can be analyzed to discriminate it from self-manufactured, synthetic or reconstructed fake biometric trait used in fraudulent system access. This novel software based method computes more than 25 Reference and No-Reference image quality features of biometric sample to verify its legitimacy. These extracted features are efficient to judge between legitimate and imposter sample. Proposed approach makes biometric system more users friendly, fast, less complex than the hardware based system and more suitable for real time applications.
As we know that now a days there is a huge advancement in wireless communication and its applicat... more As we know that now a days there is a huge advancement in wireless communication and its applications, efficient use of spectrum has been a great issue for researchers. Due to such issue, development in cognitive radio (the intelligent network) has been in demand which will analyze the spectrum to increase its efficiency by utilizing it properly. This paper focuses on sensing the spectrum in order to find out the licensed underutilized spectrum, to accommodate it to the secondary user without interfering the primary user. Two spectrum sensing methods, i.e. Energy Detection (ED) method and Cyclostationary feature detection (CFD) method are carried out over three fading channels (AWGN, Rayleigh, and Rician) at different SNR values were prior knowledge of the signal is not required. Similarly graph of such simulation has been resulted and compared in this paper. This simulation proves that at low SNR, CFD is used.
This project describes the controlling the robot using wireless Bluetooth technology via android ... more This project describes the controlling the robot using wireless Bluetooth technology via android application. The application robot control interaction display. We fix the camera to the robot for monitor the robot through android mobile. The prototype of the mobile robot is based on the wireless technology. This kind of robot can be helpful for spying in war fields.
An institutional repository is an online resource for the storing in digital form of academic mat... more An institutional repository is an online resource for the storing in digital form of academic materials, such as thesis, dissertations and research articles, on behalf of a university or other institution. This paper focuses on the requirements, functions and use of digital preservation in an institutional repository context. The paper highlights on various feature and importance of both Institutional Digital Repository and Open Source Digital Library Software that is DSpace. The Central Library IIT, Kharagpur uses open sources digital library software namely DSpace. The IDR of Indian Institute of Technology Kharagpur (IITKGP) collects preserves and makes available in digital format of the scholarly output of IIT Kharagpur community. Its interface provides for an easy self-archiving by faculty, and organizes the documents in logical, easily retrieved fashion.
The ceramic heat exchanger is studied to find the performance of heat transfer and pressure drop ... more The ceramic heat exchanger is studied to find the performance of heat transfer and pressure drop by numerical computation. The numerical computation was performed throughout the domain including fluid region in exhaust gas side rectangular ducts, ceramic core and fluid region in air side rectangular duct with the air and exhaust in cross flow direction. The main aim is to reduce the hot side temperature from 1100oc to 600oc and later it passes through the metallic heat exchanger temperature ranges less than 600oc. By increasing the Reynolds number on the cold air side this increase the velocity of the cold fluid Increase the heat transfer rate also increase the velocity by using nuzzling effect on cold air slot. The main purpose using the ceramic is to withstand with high temperature than metal.
In this paper, the Seismic behavior of in-filled Reinforced concrete frame having re- entrant cor... more In this paper, the Seismic behavior of in-filled Reinforced concrete frame having re- entrant corner is evaluated. Plan configuration of these space frames contain reentrant corner, where both projections of the structure beyond a reentrant corner is 33 percent of the plan dimension of the structure in the given direction. Bare and Infilled frames are considered. It is found that infill had beneficial effect in R.C. frame having reentrant corner.
In this paper the experimental study of the thermal behaviour of the single phase flow through a ... more In this paper the experimental study of the thermal behaviour of the single phase flow through a automobile radiator. The radiator is an important accessory of vehicle engine. Normally, it is used as a cooling system of the engine and generally water is the heat transfer medium. For this liquid-cooled system, the waste heat is removed via the circulating coolant surrounding the devices or entering the cooling channels in devices. Nanofluids have attracted attention as a new generation of heat transfer fluids in building in automotive cooling applications, because of their excellent thermal performance. This study attempts to investigate the heat transfer characteristics of an automobile radiator using water combination based CuO nanofluids as coolants. Thermal performance of an automobile radiator operated with nanofluids is compared with a radiator using conventional coolants
A Langmuir probe is being developed for measurement of electron densities, ion densities, and ele... more A Langmuir probe is being developed for measurement of electron densities, ion densities, and electron temperatures in the MARS ionosphere. This article describes how a Langmuir Probe can be used to study ionosphere irregularities. It begins with the basic principle of the Langmuir Probe, the ionospheric regions where it can be used, various sizes and shapes of the Langmuir Probe sensor. Here In this paper, we present the design and how implementation of Langmuir Probe instrument. I have prepared a block diagram of Langmuir Probe (see figure 2). The Langmuir probe experiment consists of a cylindrical sensor. A conducting sensor called probe is exposed to the medium under study and the current collected by the probe is measured to study various plasma parameters. The probe can be kept ambient plasma potential or given a negative voltage (to collect ion current) or a positive voltage (To collect electron current).After the current and voltage charatertics we analyzed plasma parameters. The operational amplifier will be connected with the sensor. A floating sweep voltage supply will also be applied to the sensor for collect current. Here after than collected current is goes to differential amplifier. The differential amplifier is amplifying the difference between both signals. Later we will use low pass filter for remove the un-wanted frequency of signal. Here the analog to digital convertor for generating a digital signal for processing. The signal output will be displayed on LCD display screen by using microcontroller.
In the rapidly changing time and especially in India where service sector is witnessing exponenti... more In the rapidly changing time and especially in India where service sector is witnessing exponential growth; the online marketing sector is all set to witness bright future ahead. The increased use of internet in India provides greater prospects for online shopping. Despite of this increased use of internet, there are several factors affecting Indian consumer’s online buying behaviour. And if the online retailers make aware themselves about these factors they can further develop their prospects and converts potential customers into active ones. In this research paper an effort has been made to find out the perceived risks of Indian customers with reference to online shopping. The risk in online shopping is mainly concerned with the misuse of credit cards, leakage of personnel information, product risk and risk of convenience.
This paper presents preemptive scheduling approach to focus on providing a solution for online sc... more This paper presents preemptive scheduling approach to focus on providing a solution for online scheduling problem of real-time tasks, we present a system that uses virtualization technology to allocate resources for the tasks that are reaching its deadline. The primary objective of real time preemptive scheduling is to increase throughput and minimize average response time instead of meeting deadlines. Earlier real-time tasks are scheduled non-preemptively with the objective to maximize the total utility, but the task with higher priority needs to wait until the currently running task gets completed. Hence if the waiting task reaches its deadline gets aborted. That before a task is aborted, it consumes system resources including network bandwidth, storage space and processing power. This leads to affect the overall system performance and response time of a task. Preemptive algorithm is proposed where the task with higher priority are executed first, and the tasks which are reaching its deadline are spoon to virtual machine, this this increases the total system performance.
The ubiquity of smartphones together with their ever-growing computing, networking, and sensing p... more The ubiquity of smartphones together with their ever-growing computing, networking, and sensing powers have been changing the landscape of people’s daily life. The goal of our application ‘GAPS’ is to manage the user activities of the smartphone with respect to locations. Various features of GAPS are Automated Profile Management with auto-response, Location Based Reminders and Log Maintainer. GAPS make use of GPS service for tracking user’s current location and Google map to fetch the information about location detected. The information from Google map is used diversely within the application for various modules. Automated Profile Management is one of the feature which recognizes the type of location and configures the audio profiles. An auto generated message is sent as response to the caller when the user is unable to receive the call. Location based Reminder is a unique feature of the application which reminds the user not only with respect to time but also location. Log Maintainer will keep track of the user visited locations along with the timestamps.
This paper deals with automatically collecting the Water consumption by a customer and also detec... more This paper deals with automatically collecting the Water consumption by a customer and also detecting the leakages in the water distribution system. Water leakage is an important component of water losses. In addition to raising consumer awareness of their water use, metering is also an important way to identify and localize water leakage. A leak detection program can be highly proactive, helping water utilities automate water systems, detecting problem areas earlier, giving customers tools to monitor water use, providing more accurate rates and reducing demand. The objective is to overcome the disadvantages of using current meter technology and make the billing and troubleshooting process faster along with reducing the wastage of water. GSM and ZigBee technology automatically collects consumption, diagnoses, and collects status data from energy meter and transferring that data to a central database for billing, troubleshooting, and analyzing. This advancement saves utility providers the expense of periodic trips to each physical location to read a meter. Another advantage is billing can be based on near real time consumption rather than on estimates based on previous or predicted consumption. This timely information coupled with analysis, can help both utility providers and customers better control to the use and production of water consumption.
Big Data is a collection of data that is large or complex to process using on-hand database manag... more Big Data is a collection of data that is large or complex to process using on-hand database management tools or data processing applications. It is becoming very difficult for companies to store, retrieve and process the ever-increasing data. In other words we can say, Big Data is term given to humungous amount of data which is difficult to store and process. The issue lies in using the traditional system is, how to store and analyze Big Data. Risk prediction involves integration of clinical factors with socio-demographic factors like health conditions, disease parameters, hospital care quality parameters, and a variety of variables specific to each health care provider making the task increasingly complex. Unsurprisingly, many of such factors need to be extracted independently from different sources, and integrated back to improve the quality of predictive modeling. Such sources are typically voluminous, diverse, and vary significantly over the time. This project takes Apache Hadoop, an intrinsic part for storing, retrieving, evaluating and processing huge volumes of data for processing effectively. In this work, we study big data driven solutions to predict the 30-day risk of readmission for congestive heart failure (CHF) incidents. We will predict this process by using Logistic Regression and Naive Bayes classification on the basis of data collected from patients. The results are remarkable after the comparison between the two techniques and presented through confusion matrix.
Biometric time and attendance system is one of the most successful applications of biometric tech... more Biometric time and attendance system is one of the most successful applications of biometric technology, serves an alternate for traditional manual signing process. We designed and implemented a reliable, scalable and cost effective Biometric Attendance System over GSM technology by which we can avoid human interaction to update the data. In the proposed system the primary part is enrolling the user fingerprints into the memory. At the time of verification if the user is already an enrolled person then the proposed system will provide the attendance to the user or else it will give the result as invalid user. The results however show that fingerprint biometric identifier was found suitable for the employee attendance management system of the organization.
File security is a field which is less secure than what is needed for the current technological e... more File security is a field which is less secure than what is needed for the current technological environment. The existing systems use normal encryption techniques using passwords, which can easily be bypassed. Even though the password is unknown, the security can be bypassed by using techniques like phishing and brute force. They can be protected by simple algorithms, but still, if the password is known by any third person, the security can still be breached. Our system encourages the concept of security for a file which belongs to, and can be accessed by only authenticated people . The system also proposes a higher security level ring that compliments the security of password protected encryption. It also acts as a monitoring system in addition to the security system.
In power system to discriminate faults from switching transients a new method is proposed in this... more In power system to discriminate faults from switching transients a new method is proposed in this paper. In this method before the occurrence of first peak of the fault current, fast fault detection and fast fault clearing are essentially required for stable power system. An Example of this system is in an industrial system where bulk power is desired but there high short-circuit currents cannot be measured. Here we are proposing the method of Phase-Locked Loop (PLL) to perform the task of discrimination of Faults and transients. The power system model is developed and simulated for fault performance analysis. MATALB simulations have been performed and the output of the PLL is found completely different for a fault, as compared to a Switching Transient. This difference is being used in this work for discrimination between a fault and a Switching Transient. This capability of discrimination is useful for the safety and stability of the power system.
A cloud services require in big scale, for users to share a private data such as health records, ... more A cloud services require in big scale, for users to share a private data such as health records, transactional data for analysis of data or mining of that data which bringing privacy concerns. Recently, because of new social behavior, social transformation as well as vast spread of social system many cloud applications increase in accordance with the Big Data style, and make it a challenge for commonly used software tools to manage, capture and process the large-scale data within an elapsed time. In this paper, we are going to implement a scalable two-phase top-down specialization approach to anonymize large scale data sets of electronic health records using the MapReduce framework on cloud. In both phases of our project, we are going to design a group of inventive MapReduce jobs to concretely accomplish the specialization computation in a highly scalable way.
Network based technology and Cloud Computing is becoming popular day by day as many enterprise ap... more Network based technology and Cloud Computing is becoming popular day by day as many enterprise applications and data are moving into cloud or Network based platforms. Because of the distributed and easy accessible nature, these services are provided over the Internet using known networking protocols, Protocol standards and Protocol formats under the supervision of different management’s tools and programming language. Existing bugs and vulnerabilities in underlying technologies and legacy protocols tend to open doors for intrusion so many Attacks like Denial of Service (DDOS), Buffer overflows, Sniffer attacks and Application-Layer attacks have become a common issue today. Recent security incidents and analysis Have manual response to such attacks and resolve that attacks are no longer feasible. In Internet and Network system application or platform facing various types of attacks in every day. Intrusion Prevention and the IDS tools that are employed to detect these attacks and discuss some open source tools to prevent and detection of intrusion and how can we use Open Source tools in our system. Snort is an open source Network Intrusion Detection System (NIDS) which is available free of cost. NIDS is the type of Intrusion Detection System (IDS) that is used for scanning data flowing on the network. There is also host-based intrusion detection systems, which are installed on a particular host and detect attacks targeted to that host only. Although all intrusion detection methods are still new, Snort is ranked among the top quality systems available today.
we are living in a world where it is very critical for a physician to predict the disease a perso... more we are living in a world where it is very critical for a physician to predict the disease a person is suffering from and to suggest medicine based on the diagnosis. Evidence based medicine (EBM) is the accurate use of evidence available in making decisions to improve the care given for individual patients. Every year, a significant number of researches (potentially serving as evidence) are reported. With the help of this burgeoning amount of health records from tens and thousands of patients, researchers and medics are not just challenged to leverage the full potential of EBM but also to use it to treat their patients for the best results. We develop a system which would analyse the patient’s health with the help of a series of questions and determine the disease based on the evidences gathered previously. We also aim to provide the user with the best known medicine for that particular disease (Also based on EBM
Mobile Ad hoc Networks are designed of roaming mobile nodes using temporary network operated by b... more Mobile Ad hoc Networks are designed of roaming mobile nodes using temporary network operated by battery power. This paper proposes a set of performance metrics in evaluating energy efficiency in MANETs, and studies the energy consumption of MANET from a variety of aspects: at different MAC layers including network layer, at different operation mode including idle, transmit and receive, with AODV routing protocols. Also I am changing Value of parameter like Beacon Interval Length, Beacon Window, Multihop Transmission indication Map, Mobility Speed, Node Density. Extensive simulations were run in the C compiler for various scenarios. The results and analysis reveal some important findings. A substantial amount of energy is consumed at MAC layer, especially at idle mode. IEEE 802.11 achieves completely different pattern in terms of its energy efficient when combined with AODV routing protocols. And I am changing value in P-Manet Protocol and also using synchronization & NAV with comparison between different value of BI, BW, MTIM window, Node Density and Mobility speed.
Recently, the major problems of major companies how to mine effective data from their data source... more Recently, the major problems of major companies how to mine effective data from their data sources, and they also want fast retrieval of datasets, therefore it is big area for researcher to researching new technique. so many researchers are try to find and develop new methods or new techniques for finding fast retrieval item sets or generate new datasets. In data mining there are many techniques for mine effective data from data sources, the techniques like classification, association, generalization, regression, clustering, etc. Among them I am try to focusing on cyclic association rule mining, which cyclic association rule is classified as a category of the temporal association rules, and temporal association rule classified as a category of association rule. Cyclic association rule have been introduced in order to discover rules from items that characterized by their regular variation over time or cyclic in nature. There are lots of algorithms for generating rules that the algorithm can yield significant performance benefits when compared to other algorithms and also provide predication that benefit to take decisions on bases of predication. So in this survey paper I am representing the comparison of different algorithms which are introduced by various authors during some past years.
Characteristic and prediction of the events are essential in many applications, such as forecasti... more Characteristic and prediction of the events are essential in many applications, such as forecasting economic growth, financial decision making etc. This can be done by processing the temporal patterns which are observed event data sequence often closely related to certain time-ordered structures. Among several existing method reconstructed phase space work well but only for univariate data sequence. So we propose a multivariate reconstructed phase space which is uses supervised clustering for characteristic and prediction of event from these dynamic data sequence. An optimization method is applied finally to estimate the parameters of the classifier that defines an optimal decision boundary in the Multivariate RPS.
Websites provides a lot of information to the Users. Websites is a collection of Web Pages which ... more Websites provides a lot of information to the Users. Websites is a collection of Web Pages which contains a bunch of information. In these information to find or retrieve particular page or information is difficult task. So to make this task easy there are different web page classification methods. Using this method we can identify web pages. Based on web page information we have to classify the web page. Web page classification is area of web mining. Web mining is the integration of information gathered by traditional data mining methodologies and techniques with information gathered over the WWW. Web page Classification retrieves WebPages based on different features/parameters of web pages. Web Page Classification can be done in many ways such as using the content of the web page, using the structure of web page, using clustering methods etc. This paper is focuses on the Web Page Classification using the inverse document frequency.
The scenario of the present era shows that the environmental impact was high on water resources. ... more The scenario of the present era shows that the environmental impact was high on water resources. Water is the eternal source for living with nature. The contamination of groundwater resources is hike at many areas. In this paper an attempt has been taken to analyze the physical and chemical parameters groundwater in the city of Tiruppur. The city of Tiruppur is famous for textiles. There is an high water scarcity in the city due to its various demands but the water is highly polluted. Due to increase in industries the water has higher effluent contamination. The four samples were collected and analyzed for pH, Temperature, Turbidity, electrical conductivity, TH, Calcium hardness, Magnesium Hardness, PH, Sulphates, Chlorides, BOD, COD, DO, TS, TVS, TFS. The results were taken and compared with IS 10500:2012 standards. The results showed that sulphates, Biochemical Oxygen Demand (BOD) were found to be higher than the permissible limits. The groundwater should be treated for drinking purposes.
Image segmentation is a process of grouping image pixels into image regions i.e. regions correspo... more Image segmentation is a process of grouping image pixels into image regions i.e. regions corresponding to particular characteristics. There are many methods developed for image segmentation. This paper presents one of the graph based method of image segmentation to partition an image depending on global criterion. Proposed paper implements normalized cut algorithm and compares it with graph based image segmentation.
Reinforced concrete structures may be required to be upgraded for various reasons like structural... more Reinforced concrete structures may be required to be upgraded for various reasons like structural inadequacy of materials (concrete and steel), deterioration of materials, initial deficiencies in design or construction, poor and improper maintenance, unexpected loads not considered in design initially and revisions in design codes and practices . The use of FRP to repair and rehabilitate damaged steel and concrete structures has become increasingly attractive due to the well-known good mechanical properties of this material. Strength, stiffness and ductility of few elements or whole building can be altered by retrofitting. Ferrocement jacketing is a technique of retrofitting which can be useful as it is economical, easy to apply from view point of less skill labour requirement, lightweight and high tensile strength. In this study for shear lacking RC beam- column joints, deflections and loads of specimens were noted down after stressing the specimens to ultimate load and load levels lesser then ultimate loads. Then retrofitting was done with ferrocement jacket and and specimens were tested again. Resultant Strength and other parameters were compared to control specimens. Increase in load carrying capacity was observed as a result of retrofitting. Yield load was also observed to increase.
To develop a robotic vehicle with wireless camera using brain robot interface for monitoring purp... more To develop a robotic vehicle with wireless camera using brain robot interface for monitoring purpose. The robot along with camera can wirelessly transmit real time video with night vision capabilities. This is a kind of robot can be helpful for spying purpose in war fields. A major challenge in two-class Brain Computer Interface (BCI) systems is the low bandwidth of the communication channel, especially while communicating and controlling assistive devices, which requires multiple motion command options in the form of forward, left, right, backward, and start/stop. BCIs are systems that can bypass conventional channels of communication (i.e., muscles and thoughts) to provide direct communication and control between the human brain and physical devices by translating different patterns of brain activity into commands in real time. With these commands a mobile robot can be controlled. A wireless camera is mounted on the robot body for spying purpose even in complete darkness by using infrared lighting.
In this paper presents that the LwIP stack has better performance, comparable with the TCP/IP sta... more In this paper presents that the LwIP stack has better performance, comparable with the TCP/IP stack implementation in various operating systems .The Internet of Things (IoT) allows for the interconnection between the virtual world of computers and the physical world of our everyday lives. Recent advances in the field of sensor networks and the standardization of Internet protocols for constrained environment allow for the seamless integration of low-power sensor nodes into the Internet with Web-based Services. One of the information model SensorML standard to describe the sensors processes. The Proposed design implementation the LwIP Ethernet stack protocol designed hardware platform of two nodes such as a ARM Cortex M3&A8. Transmission of sensor data through Ethernet medium to the host device which is based on SensorML with Apache Tom Cat server to represent the client subscribed application data.
Due to the increasing availability of digital data, text document continue to grow as well hence ... more Due to the increasing availability of digital data, text document continue to grow as well hence the need of text mining. These digital documents comprise of the normal body text as well as side information. The side information will be in different formats for example hyperlinks and may contain useful information for mining. It is of utmost importance that the value of the side information be ascertained before consideration in the data selected for the text mining process as it may give an adverse impact on the quality of text mined. A principled way to perform the mining process is therefore required so as to maximize on the benefits of side information. In this paper, we use the Naive Bayes model to create an effective text mining approach.
This research was studied to check the workability and strength properties of an pervious concret... more This research was studied to check the workability and strength properties of an pervious concrete along various percentage mix of rice hush ash with cement. The RHA was added partially to the cement to increase the strength of pervious concrete. In general RHA is an agricultural waste considering that 20% of the grain is husk and those 20% is combusted and made in RHA and it can be utilized in the partial mixing with cement. RHA has contain silica. Silica is a good chemical admixture to increase the strength of concrete. By using this RHA we can reduce the environmental impact and also eco friendly and free of cost. since india is the largest producer of rice we can obtain in plenty. In this study components used for pervious concrete is opc M53 grade cement RHA, 12.5mm and 20mm coarse aggregate & water. Since pervious concrete don’t have proper mix ratio so we have obtained mix ratio by trial and error method. So we considered different mix proportion such as 1:1, 1:2, 1:3, 1:4, 1:5, 1:6, 1:7& 1:8 among this mix we have got better strength in 1:4 mix ratio of cement and coarse aggregate and 0.3 water cement ratio. in this study we are going to compare the strength of pervious concrete by different mix % of 20%, 25%, 30% of RHA with various size of 12.5mm & 20mm coarse aggregate.the pervious concrete was casted in cubes of 150 x 150 x 150mm moulds and beam of 170 x 150 x 150mm to find compressive and flexural strength of concrete. When the RHA content is increased beyond 30% the compressive & flexural strength of concrete reduced comparing to the conventional pervious concrete.
Public private partnerships (PPPs) play an important role in bringing private sector competition ... more Public private partnerships (PPPs) play an important role in bringing private sector competition to public monopolies in infrastructure development and service provision and in merging the resources of both public and private sectors to serve the public needs in better way. The development of PPP contracts, the structure includes a vital influence on the economic and policy success of privately financed roads throughout their lifecycle. Following fundamentals of PPP and the public policy differentiation between public interest and public objectives, many approaches for establishing the key contract method of concession length and risk mitigation are explored. The patterns of PPP contract strategies which correspond to common policy objectives achieving managing congestion, identified through evaluation of five national highway project agreements. This paper proposes decision making tools resulting from this work are illustrated through application to current PPP concession agreements (1) Process of PPP (2) Frame work of PPP contracts (BOT) (3) Comparisons (4) Recommendations & Suggestions, which concludes with thoughts on the appropriate role of PPPs in infrastructure delivery.
- In wireless communication, multipath propagation results in several fading effect. To equalize ... more - In wireless communication, multipath propagation results in several fading effect. To equalize such long fading channel traditional single carrier time domain equalization becomes infeasible due to its large computational complexity. Single-carrier frequency-domain equalization (SCFDE) offers low complexity, minimum peak to average power ratio as well as less sensitive to carrier frequency offset compared with orthogonal frequency division multiplexing (OFDM). In this paper we proposed SCFDE combining with space time block coding (Alamouti like scheme) for linear zero forcing equalizer achieves significant diversity gain at low computational complexity over frequency selective fading channel also we show that diversity depends not only on antenna configuration and channel memory but also on data block length and data transmission rate.
Gaming involves heavy concentration, presence of mind, quicker responses from the gamers. Many us... more Gaming involves heavy concentration, presence of mind, quicker responses from the gamers. Many users use conventional input devices like keyboard, mouse,for interacting with the gaming application.These conventional devices reduce the physical work and increase the chances of obesity, mental tiredness, etc., and are considered unhealthy practices. These devices can be replaced by using HCI technology which provides functionalities to computer that can recognize hand gestures and body motions of the user. Human Computer Interaction (HCI) techniques like hand gesture recognition, voice identification etc., can increase the physical work and can make the user more interactive thus reducing health related risks.
The aim of this work is to implement RTnet in industrial distributed control system environment. ... more The aim of this work is to implement RTnet in industrial distributed control system environment. RTnet it is one of the hard real-time network protocol stack introduces a hardware independent and flexible communication in real time environment. Now-a-day’s real time communication is one of the key feature in Distributed Control Systems. In this work, we proposed a prototype system for the real time data acquisition and monitoring with real time compliant data transfer both qualitatively and quantitatively in industries. In this system it consist of One Master node and two slave nodes in which all are working under Xenomai (real time operating system) and on top of this RTnet protocol stack is built .The slave nodes are connected to field elements for data acquisition via RS485 and communicate with master node via RTnet. Low latencies and jitter and gives deterministic behavior in industrial distributed control systems.
An EtherCAT based data acquisition system is acquired data from the field sensors through the man... more An EtherCAT based data acquisition system is acquired data from the field sensors through the many slaves. It consists of a master with many slaves. The personal computer on which the controller runs is the EtherCAT Master (SOEM), while the devices that make data of connected I/O devices available for the master are called slaves. The Ethernet network has become the most popular network in data acquisition system to reduce media cost and achieve the higher performance. This paper presents that development of a standard network data acquisition system that is based on the communication protocol called EtherCAT. In particular, we focus on the times necessary to transfer quantity of data among slave stations.
Biodiesel, consisting of the alkyl esters of fatty acids from vegetable oils or animal fats, is a... more Biodiesel, consisting of the alkyl esters of fatty acids from vegetable oils or animal fats, is a promising alternative to petroleum diesel fuel. Biodiesel, when produced from vegetable oils is considered a carbon-neutral fuel based on the fact that the atmospheric carbon dioxide (CO2) is consumed during plant growth. Research has shown that biodiesel-fueled engines produce less carbon monoxide (CO), unburned hydrocarbon (HC), and particulate matter (PM) emissions compared to using petroleum diesel fuel. However, there is a major problem associated with biodiesel; it has worse cold flow property compared to petroleum diesel, which prohibits its use in cold atmospheric conditions. The study in this work will investigate the effect of a biodiesel additive (Wintron XC 30) on the cold flow property and examines the performance and emissions of a direct injection (DI) diesel engine. Wintron XC 30 is added from 0.25 to 2.0 vol.% in different diesel-biodiesel blends. Low percentage of biodiesel (5%) in the blend with additives shows a little better cold flow property than diesel. Brake specific fuel consumption (bsfc) and brake thermal efficiency (ηth) are measured as the engine performance parameters, and CO, HC, NO, NO2, NOx, CO2 and O2 are measured in emissions. B5 and B10 with lower amount of additives show comparable engine performance and emissions that of diesel.
Power transformers represent the largest portion of capital investment in transmission and distri... more Power transformers represent the largest portion of capital investment in transmission and distribution substations. In addition, power transformer outages have a considerable economic impact on the operation of an electrical network. One of the most important parameters governing a transformer’s life expectancy is the hot-spot temperature value. The classical approach has been to consider the hot-spot temperature as the sum of the ambient temperature, the top-oil temperature rise in tank, and the hot-spot-to-top-oil (in tank) temperature gradient. When fibre optic probes were taken into use, winding hottest spot temperatures higher than those predicted by the loading guides during transient states after the load current increases, before the corresponding steady states have been reached. This paper presents new and more accurate temperature calculation method taking into account for findings hot spot temperature using IEEE standard using computer programming.
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
In recent years, advances in hardware technology have led to an increase in the capability to sto... more In recent years, advances in hardware technology have led to an increase in the capability to store and record personal data about consumers and individuals. This has led to concerns that the personal data may be misused for a variety of purposes.Privacy-preserving is an important issue in the areas of data mining and security. The aim of privacy preserving data mining is to develop algorithms to modify the original dataset so that the privacy of confidential information remains preserved and as such, no confidential information could be revealed as a result of applying data mining tasks. the data set complementation approach expands the sample storage size (in the worst case, the storage size equals (2|TU-1|*|TS|) ; perturbation will improve some storage size using like c5.0 algorithm.we will optimize the processing time when generating a decision tree from those samples and funtional dependencies.This paper work on optimize processing time,improve storage size,reduce processing time and functional dependencies.
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
Delay Tolerant Networks (DTNs) are supports data transfer in challenging environments where a ful... more Delay Tolerant Networks (DTNs) are supports data transfer in challenging environments where a fully connected end to end path may never exist between a source and destination. These networks deal with large transmission delays, frequently disconnected paths, high link & path error and limited resources .examples of this kind of networks are satellite communication, ad-hoc & sensor, vehicular networks. DTN routing protocols utilize the mobility of the nodes and buffering of messages, this makes is possible for a node to carry a message and in that way bridge partition in the network. It is also known as store-carry-forward. In this paper, we proposed reliable routing protocol in DTNs based on network coding-Multi Generation Mixing policy, that increase the reliability, while increasing data transmission delay as compared to the protocols with the best performance. Simulation of a network coding-based information delivery method in wireless networks which improves the network performance and reliability. Network coding is a paradigm to efficiently broadcast the data in wireless networks in which data flows coming from multiple sources are combined to reduce delay, and enhance robustness against node failures. Simulation results show that the proposed routing protocol Multi Generation Mixing Epidemic Routing Protocol (Epidemic_MGM) increase the Delivery Probability compare to the Traditional epidemic routing protocol.
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
By implementing feature-based CAM software from Delcam and investing in CNC mills, the industries... more By implementing feature-based CAM software from Delcam and investing in CNC mills, the industries can be able to reduce machining time and part programming time. Determined to be competitive not only in quality but also in manufacturing methods, the manufacturing companies are upgrading their capability with the help of Delcam software to take models of their components from 3D modeling software’s to production quickly. Typical machining tolerances in the specified range can be consistently achieved. In this thesis, the time taken to manufacture the main housing used in weighing machine is estimated. Main Housing is drawn in 3D Modeling and feature based software Pro/Engineer. The time taken for modeling, part programming and machining time using software’s Pro/Engineer and Delcam is compared and analyzed in this thesis. Models of the casing will be drawn in 3D Modeling and feature based software Pro/Engineer. The models are e imported in to the feature based CAM software Delcam. The time reduction using the software’s for modeling, part programming and machining time is analyzed in this thesis.
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
The objective of this paper was to predict the failure load of carbon/epoxy composite test specim... more The objective of this paper was to predict the failure load of carbon/epoxy composite test specimens using an online acoustic emission (AE) monitoring and artificial neural networks (ANN). The test specimens were Carbon/epoxy rings made of carbon T700 fibers and Epoxy resins these rings were tested in BISS 300KN Servo-hydraulic (UTM) Universal Testing Machine with the help of split disk test fixtures to ensure uniform distribution of loads on the ring and fixing AE sensors on the specimen at discrete locations. A series of 24 carbon/epoxy rings were monitored with an acoustic emission (AE) system, while loading them up to failure. AE signals emitted due to different failure modes in tensile specimens were recorded. Amplitude, duration, energy, counts, etc., were the effective parameters to classify the different failure modes in composites, viz., matrix crazing, fiber cut, and delamination, with several subcategories such as matrix splitting, fiber/matrix debonding, fiber pullout, etc. A Multi-layer Back propagation neural network was generated to predict the failure load of tensile specimens. The network was trained with the amplitude distribution data of AE collected up to 50%, 60%, and 70% of failure loads, respectively along with their slope of cumulative amplitude distribution plot. 10 specimens were in the training set with their corresponding failure loads. The trained network was able to predict failure loads of remaining 14 specimens within the acceptable error tolerance. The results were compared, and we found that the network trained with 60% data having better prediction performance.
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
Cable supported structures have distinctive dynamic behaviour. Extradosed bridge, which is interm... more Cable supported structures have distinctive dynamic behaviour. Extradosed bridge, which is intermediate to Girder Bridge and cable stayed bridge, owing to its shallow cables, the structure behaviour of Extradosed Bridge differs from that of cable stayed bridge. Forced vibration of structure for given Earthquake time history is governed by peak acceleration. For cable stayed structures such as Extradosed cable stayed bridge it is difficult to predict dynamic response using usual methods of dynamic analysis as applied to some other bridge structures like response spectrum analysis, accurate analysis like time history analysis is time consuming and has time and cost effects. Nonlinearities can only be considered in time history analysis. The proposed method correlates the peak ground acceleration (PGA) and earthquake deformation ratio (EDR) which can be used for simplified dynamic analysis and can prove handy tool for structural engineers to know earthquake related serviceability without much complicated analysis at initial stages. This ratio can be used to present seismic damage indices. The method is proposed considers Extradosed bridge for example.
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
Now a day’s speech recognition is used widely in many applications. In computer science and elec... more Now a day’s speech recognition is used widely in many applications. In computer science and electrical engineering, speech recognition (SR) is the translation of spoken words into text. It is also known as "automatic speech recognition" (ASR), "computer speech recognition", or just "speech to text" (STT). A hidden Markov model (HMM) is a statistical Markov model in which the system being modelled is assumed to be a Markov process with unobserved (hidden) states. An HMM can be presented as the simplest dynamic Bayesian network. Dynamic time warping (DTW) is a well-known technique to find an optimal alignment between two given (time-dependent) sequences under certain restrictions intuitively; the sequences are warped in a nonlinear fashion to match each other. ANN is non-linear data driven self-adaptive approach. It can identify and learn co-related patterns between input dataset and corresponding target values. After training ANN can be used to predict the outcome of new independent input data.
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
A Vehicle is a Structural Assembly which consists of many components coupled together to make the... more A Vehicle is a Structural Assembly which consists of many components coupled together to make the vehicle to run on initial conditions as well as under various load conditions. Vehicles are designed to carry loads like trucks, buses and cars. Different types of vehicles with wide variety of its applications are present in the market which capacity varies from 1Tonne to 40Tonnes and more. The present scenario in automotive industry is an increase in demand of trucks not only on the cost and weight aspects but also on improved complete vehicle features and overall work performance. The chassis plays an important role in the design of any truck. The chassis design in general is a complex methodology and to arrive at a solution which yields a good performance is a tedious task. Since the chassis has a complex geometry and loading patterns, there is no well-defined analytical procedure to analyze the chassis. So the numerical method of analysis is adopted, in which Finite Element Technique is most widely used method. Vehicle chassis is an important part which supports the major load of the vehicle assembly. As vehicle chassis plays a vital role, its design has to be subjected to Structural Analysis to validate against all the possible cases of load applications and failures to strengthen the design.
A Truck’s chassis Frame forms the structural backbone of a commercial vehicle. The main function of the truck chassis frame is to support the components and payload placed upon it. When the truck travels along the road, the chassis is subjected to vibration induced by road roughness and excitation by vibrating components mounted on it. This paper presents the study of the vibration characteristics of the truck chassis that include the natural frequencies and mode shapes. The responses of the truck chassis which include the stress distribution and displacement under various loading condition are also observed. The method used in the numerical analysis is finite element technique. The results show that the road excitation is the main disturbance to the truck chassis as the chassis natural frequencies lie within the road excitation frequency range. The mode shape results determine the suitable mounting locations of components like engine and suspension system. Some modifications are also suggested to reduce the vibration and to improve the Strength of the truck chassis.
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
In this paper a robust system for enabling robots to detect and identify humans in domestic envir... more In this paper a robust system for enabling robots to detect and identify humans in domestic environments is proposed. Here presented a sample model on a live human detection and tracking system based on a microcontroller. In recent days the high speed wireless technologies are improving day by day in the field of automation applications. Using these advanced technologies a fast, accurate, new robotic controlling device based on advanced control algorithms are developed .The critical part of the system is the microcontroller unit interfaced to the robotic circuitry; the mechanical movements are monitored and controlled by the micro controller in control circuitry. To detect the live person we are using PIR sensor called as passive infrared sensor which is used to detect the persons whether they are alive or not. The remote uses certain range of Radio frequencies which is used to transfer the commands from the remote to the robot. By using this we can change the directions of the robot. The CPU of the robot is a microcontroller (AT89C52). The power is derived from a set of three 9V batteries. Locomotion is with the help of two geared motors attached to the chassis.
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
We have been introduced to the passwords since long back. It has been one of the best and widely ... more We have been introduced to the passwords since long back. It has been one of the best and widely adopted scale of security in various applications. There are many aspects of giving and receiving passwords, which include Text, audio, picture, problem solving etc, but one of the widely used is the text mode authentication. But here we are facing a serious drawback in the Password text mode .It has the vulnerability to be traced .This is what we need to improve and where my research is intended to.
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
Cluster analysis is the one in which uses to divide the data into groups. It mainly developed for... more Cluster analysis is the one in which uses to divide the data into groups. It mainly developed for the propose of summarization and improved understanding. The example for cluster analysis has been given below. Let we takes the group which related to document for browsing. That are in order to find the genes and proteins which has similar functionality, or as a means of data compression. The term clustering has a long history and a large no of clustering techniques which have been developed in statistics and pattern recognition. This provide a short introduction to cluster analysis, and then find the focus on challenge of clustering high dimensional data. Hereby i present a brief overview of several recent techniques , including a more detailed description of recent work of our own which uses a concept based clustering approach.
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
Cognitive radio is widely expected to be the next Big Bang in wireless communications. Spectrum s... more Cognitive radio is widely expected to be the next Big Bang in wireless communications. Spectrum sensing, that is, detecting the presence of the primary users in a licensed spectrum, is a fundamental problem for cognitive radio. In this paper spectrum sensing techniques are reviewed.
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
In today’s world where the technologies are emerging at high speed and also new regulations and s... more In today’s world where the technologies are emerging at high speed and also new regulations and standards for noise emission increasing in the automotive firms and hence there is need to think over the current working system for the noise reduction or to make some improvements about decreasing the engine noise. Nowadays, the perforated reactive mufflers which have an effective damping capability are specifically used for this purpose. In this work new designs should be analyzed with respect to both acoustics and back pressure. In this study, a reactive perforated muffler is investigated numerically, experimentally and by the analysis. For an acoustical analysis, the transmission loss which is independent of sound source of the present cross flow, the perforated muffler was analyzed. To be able to validate the numerical results, transmission loss was measured experimentally. Back pressure was obtained based on the flow field analysis and was also compared with experimental results. Numerical results have an approximate error of 20% compared to experimental results.
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
Instrumentation transformers act as eyes and ears of a power system. Many measurement and protect... more Instrumentation transformers act as eyes and ears of a power system. Many measurement and protection related activities depend on current transformers (CTs) as primary sensing unit. Hence, it is of utmost important that the output of a CT should be absolutely trust-worthy. However, CTs show a tendency of getting saturated. This leads to an erroneous secondary waveform, which can lead to malfunctioning of systems which are dependent on CT. This paper proposes a technique to enhance ANN based reconstruction of erroneous secondary current waveform. The proposed technique uses artificial neural network to forecast ideal waveform. The network uses two inputs: 1. Erroneous secondary waveform. 2. Exponentially smoothed secondary waveform, which acts as an assisting input. The smoothing factor is determined using genetic algorithm. Extensive simulations indicate that the proposed technique efficiently generates reconstructed CT secondary waveform.
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
cloud is an extreme data center for outsourced data. The quality of video service gets poor when ... more cloud is an extreme data center for outsourced data. The quality of video service gets poor when there occurs the long buffering and sporadic disturbance. While requirement of video traffic across mobile networks has become difficult, the wireless link ability cannot put up with the traffic demand. The Cloud is a well-known tool because of its functional architectural tools. Sharing the data is another common functional property for the cloud users. These data sharing include video data in social networks, this was done frequently through mobile devices like smart phones, tablets, laptops etc. video traffic demand across mobile networks has become a difficult task, and the quality of service get reduced as there is a gap between the traffic demand and link ability. Mobile network has limited bandwidth and long buffering time. To solve these issues adaptive mobile video streaming and efficient public video sharing has been proposed. AMoV and ESoV build a private agent to give video streaming services for each mobile user. These two approaches show scalable results in social network environment. With this framework, the overloading buffering time and interference can be avoided.
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
Web usage mining is the application of web mining, which implements various techniques of data mi... more Web usage mining is the application of web mining, which implements various techniques of data mining for discovery and analysis of patterns in click stream and associated data collected or generated as a result of user interactions with web resources on one or more web sites. It consists of three phases which are data Preprocessing, pattern discovery and pattern analysis. In the pattern analysis phase interesting knowledge is extracted from frequent patterns and these results are used for website modification. In the proposed paper, a hybrid approach is used to fetch HTML as well as XML contents from a web page. In this approach combined effort of FP-Growth algorithm and Decision Tree is applied for pattern discovery. This approach helps in finding effective usage patterns. FP-Growth algorithm is used to remove the unimportant information from the contents and Decision tree is used to fetch the contents from a web page.
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
Mobile Ad-Hoc Network (MANET) is a multi-hop, dynamic and autonomous network composed of number o... more Mobile Ad-Hoc Network (MANET) is a multi-hop, dynamic and autonomous network composed of number of wireless mobile nodes. Based on the one commonly known tree-based multicast routing protocol, MAODV- Multicast Ad-hoc on Demand Distance Vector Protocol, the paper proposes a way to improve the performance of protocol in terms of the throughput and reduction in the number of mobile nodes participating in multicast routing, which will significantly reduce the overall routing-related control overhead. Based on the TTL value used by the route discovery process- ring search approach is modified and performance of modified algorithm is evaluated.
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
Advancement in technology is affecting almost all the fields and automotive doesn’t remain untouc... more Advancement in technology is affecting almost all the fields and automotive doesn’t remain untouched. Every automobile manufacturer spends millions in development of cutting edge technologies to employ their vehicles with latest technology innovations to keep drivers safe, accident free and give them a better driving experience. These technologies are known in the industry as Advanced Driver Assistance Systems and these are controlled by real-time embedded systems. This paper will present a new method for Driver Assistance System.
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
This paper propose a novel control strategy for grid connected VSC with LCL filters by using Fuel... more This paper propose a novel control strategy for grid connected VSC with LCL filters by using Fuel cell and PV cell . The proposed control strategy is inherently capable of attenuating the resonance phenomenon of such systems. This is an advantage over the existing methods which require additional damping techniques. Moreover the proposed vector control strategy is able to fully decouple the direct (d) and quadrature (q) components of the current in a rotating reference frame. The design procedure comprises a constrained optimization-based loop shaping. It utilizes the multi-input multi-output (MIMO) nonparametric model of the system along with a high-order linearly parameterized MIMO controller to form an open-loop transfer function matrix. Minimizing the second norm of the error between the open-loop transfer function matrix and a desired one the coefficients of the controller are optimally determined. Conducting several reference tracking scenarios the performance of the proposed vector controller is evaluated both by means of time domain simulation studies in MATLAB/Simulink and experimental results.
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
Technologies like Voice, video, ftp, etc. have made Mobile Ad hoc Networks (MANET) important in o... more Technologies like Voice, video, ftp, etc. have made Mobile Ad hoc Networks (MANET) important in our Real life. MANET is a distinctive type of ad-hoc network that has stations changing their locations frequently, and automatically configuring themselves. Nodes can move freely in MANET while transmitting and receiving the data traffic by using wireless radio waves. Consequently, routing has become a vital factor and a key challenge for finding the best route in many MANET environments. The main focus of this paper is to analyze the impact of real time traffic (voice, video conference) and non-real time traffic (HTTP, FTP, Email) on the four routing protocols, Optimized Link State Routing (OLSR), Dynamic Source Routing (DSR), Ad-hoc On-demand Distance Vector (AODV), and Geographical Routing Protocol (GRP) over MANETs and also investigate their performance based on the average end-to-end delay and throughput. It is shown with extensive simulation results that OLSR protocol produces the highest throughput and the lowest delay compared to other protocols for non-real time and real time video traffic. It is also shown that OLSR protocol produces the lowest delay and acceptable throughput for real time voice traffic.
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
Cloud computing is a computing paradigm shift where computing is moved away from personal compute... more Cloud computing is a computing paradigm shift where computing is moved away from personal computers or an individual application server to a “cloud” of computers. Users of the cloud only need to be concerned with the computing service being asked for, as the underlying details of how it is achieved are hidden. This method of distributed computing is done through pooling all computer resources together and being managed by software rather than a human. The services being requested of a cloud are not limited to using web applications, but can also be IT management tasks such as requesting of systems, a software stack or a specific web appliance.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939) www.ijedr.org
Air pollution issues remain as the ongoing area of concern for posing considerable danger to heal... more Air pollution issues remain as the ongoing area of concern for posing considerable danger to health throughout the world (WHO, 2005). For this reason, air pollution related issues and prevention approaches is an essential area of study more than ever in developing countries like Malaysia. Experimental air pollution potential forecasting study in Klang Valley-Malaysia during January to December 2009 is described and analysed. In this study, the effect of wind speed, rainfall, temperature and stability factor of the lower level of atmosphere on potential of air pollution are evaluated in which Joukoff and Malet (1982) model is used as an initial model. The above meteorological factors first are used to calculate meteorological air pollution potential (MPI). After that, MPIs vs meteorological factors are evaluated utilizing time analysis and linear regression. The results discourage the use of foresaid meteorological factor except for temperature for forecasting of air pollution potential in Malaysia and regions with the same climate characteristics. Finally, a model for forecasting air pollution potential considering temperature as the most effective factor for the application in Malaysia is developed.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939) www.ijedr.org
Data mining is the most fast growing area today which is used to extract important knowledge from... more Data mining is the most fast growing area today which is used to extract important knowledge from large data collections but often these collections are divided among several parties. This paper addresses secure mining of association rules over horizontally partitioned data. This method incorporates a protocol is that of Kantarcioglu and Clifton well known as K&C protocol. This protocol is based on an unsecured distributed version of the Apriori algorithm named as Fast Distributed Mining (FDM) algorithm of Cheung et al. The main ingredients in our protocol are two novel secure multi-party algorithms one that computes the union of private subsets that each of the interacting players hold and another that tests the whether an element held by one player is included in a subset held by another. This protocol offers enhanced privacy with respect to the earlier protocols. In addition, it is not complicated and is importantly more effectual in terms of communication cost, communication rounds and computational cost. We present a two multiparty algorithm for efficiently discovering frequent item sets with minimum support levels without either player (site) revealing it to all players.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939) www.ijedr.org
Physical impairment can limit the physical function or fine/gross motor ability of limbs of an in... more Physical impairment can limit the physical function or fine/gross motor ability of limbs of an individual. Such individual then can be called as a handicap. In cases of individuals with loss of limbs and next to nothing residual capacity, it is very difficult for them to associate with daily activities as well as employment, education, independent living, etc. This paper will depict the information relating the substitution of the upper limb of an amputee by Myoelectric Prosthetic Arm. Prosthesis is a part of Rehabilitation Engineering which means, the reintegration of an individual with impairments into society. The primary purpose of an arm prosthesis is to mimic the appearance and replace the function of a missing limb. It requires effective usage of assistive systems to restore the motor functions of an amputee and also it should be cosmetically appealing. These requirements and advances in science and technology have led to development of externally powered prosthesis that interface directly with the neuromuscular system and recreate some of a normal hand’s sophisticated proprioceptive control. This concept of extended physiologic proprioception (EPP) is introduced for the control of gross arm movement whereby the central nervous system is retrained through residual proprioception to coordinate gross actions applying to the geometry of the new extended limb. This device known as Myoelectric Arm is based on biological electronic sensors, is battery operated, controlled by microprocessor and driven by motors. Once it is attached, the prosthetic uses electronic sensors to detect minute muscle, nerve, and EMG activity. It then translates this muscle activity as triggered by the user into information via microcontroller and filtering circuit, which its electric motors use to control the artificial limbs movements via motor driver IC. The end result is that the artificial limb moves much like a natural limb, according the mental stimulus of the user. The Myoelectric artificial limb does not require any unwieldy straps or harnesses to function. Instead, it is custom made to fit and attach to the remaining limb. Myoelectric hand/arm component perform better than conventional prosthesis in terms of function, weight, comfort and cosmetics.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939) www.ijedr.org
The demand for antenna in present scenario depends on its size and thus miniaturization has becom... more The demand for antenna in present scenario depends on its size and thus miniaturization has become the need. Microstrip patch antennas meet this requirement and are versatile in terms of realization and easy to fabricate. This paper presents a circular shaped microstrip patch antenna at 1.5 GHz using Computer Simulation Technology (CST) Microwave Studio. We mainly focused on optimizing the size, efficiency, return loss and other parameters of circular shaped patch antenna by varying its feed length. Alongside, these parameters were manually computed and in the end we have compared the various results obtained for different feed lengths of circular shaped microstrip patch antenna.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939) www.ijedr.org
Emerging paradigm of pay-per-use through cloud computing has led to outsourcing of many business-... more Emerging paradigm of pay-per-use through cloud computing has led to outsourcing of many business-critical functions to cloud service providers. Delegation of Computation is useful concept, only until the results of computation can be verified. Such verifiability has been achieved through interactive proof systems, leading to high communication cost. Other methods involve cryptographic primitives which impose high computation cost, rendering it unsuitable for mobile clients. We propose here a protocol with reduced communication cost for light-weight devices, utilizing cryptographic primitives to generate proofs. The proof-generating function is incorporated into the delegated function to make it fool-proof.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939) www.ijedr.org
In this paper we are presenting the design of a single feed, compact size, single layer, Rectangu... more In this paper we are presenting the design of a single feed, compact size, single layer, Rectangular, square and Circular micro strip patch antennas for WLAN and WiMAX applications. Comparative study has been done to compare various parameters of these patch antennas with and without slots, For the design and simulation of it we have used the method of EM Simulation software I3ED. The antennas are designed on a “Roger ultralum” substrate with 2.5 dielectric constant, Comparison have been done on the factors like bandwidth, return loss and gain.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939) www.ijedr.org
"Cloud computing" is the next natural step in the evolution of on-demand information technology s... more "Cloud computing" is the next natural step in the evolution of on-demand information technology services and product.It is expected to provide quick, agile, stable, reliable services. Even though cloud has simplified cloudnetwork architecture, there is some complexity. Some of them are portability and interoperability between different Cloud Computing Services Providers. These problems handicap the widely deployment and quick development of cloudComputing. As a solution to these problems we put forward an inevitable approach "Open Cloud Computing Federation "for the wide use of cloud computing and to realize the value of it. In this paper we propose the MABOCCF mechanism. It will combinethe advantages ofMobile Agents andCloud Computing.ThusMABOCCFcan span over multiple heterogeneous Cloud Computing Platforms and realizes portability and interloper ability.In this paper we also present how cloud schedules user jobs and motivation for the combination of Mobile Agents and Cloud Computing.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939) www.ijedr.org
Security in Mobile Ad-Hoc Network (MANET) is the most important concern for the basic functionali... more Security in Mobile Ad-Hoc Network (MANET) is the most important concern for the basic functionality of network. Availability of network services, confidentiality and integrity of the data can be achieved by assuring that security issues have been met. MANET often suffer from security attacks because of its features like open medium, changing its topology dynamically, lack of central monitoring and management, cooperative algorithms and no clear defense mechanism. These factors have changed the battle field situation for the MANET against the security threats.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939) www.ijedr.org
Network based technology and Cloud Computing is becoming popular day by day as many enterprise ap... more Network based technology and Cloud Computing is becoming popular day by day as many enterprise applications and data are moving into cloud or Network based platforms. Because of the distributed and easy accessible nature, these services are provided over the Internet using known networking protocols, Protocol standards and Protocol formats under the supervision of different management’s tools and programming language. Existing bugs and vulnerabilities in underlying technologies and legacy protocols tend to open doors for intrusion so many Attacks like Denial of Service (DDOS), Buffer overflows, Sniffer attacks and Application-Layer attacks have become a common issue today. Recent security incidents and analysis Have manual response to such attacks and resolve that attacks are no longer feasible. In Internet and Network system application or platform facing various types of attacks in every day. Firewalls security and spam filters are in place but they have simple rules such as to allow or deny protocols, ports or IP addresses. Some DoS and other attacks are too complex for today’s firewalls, so firewalls cannot prevent that all attacks. In this paper we define and discuss various types and techniques of Intrusion Detection, Intrusion Prevention and the IDS tools that are employed to detect these attacks and discuss some open source tools to prevent and detection of intrusion and how can we use Open Source tools in our system.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939) www.ijedr.org
Renewable energy and energy efficiency are sometimes said to be the “twin pillars” of sustainable... more Renewable energy and energy efficiency are sometimes said to be the “twin pillars” of sustainable energy policy. Both resources must be developed in order to stabilize and reduce carbon dioxide emissions. Efficiency slows down energy demand growth so that rising clean energy supplies can make deep cuts in fossil fuel use, using computer-based remote control and automation. They offer many benefits to utilities and consumer mostly seen in big improvements in energy efficiency on the electricity grid and in the energy users’ homes and offices. Although solar wind and Biomass energy are three of the most viable renewable energy sources, little research has been done on operating both energy sources alongside one another in order to take advantage of their complementary characters. It is fact that solar thermal power plant (STPP) and Wind Plant cannot operate stably and continuously due to variability of solar irradiation. We propose an optimal operating mode of hybrid STPP power plant with biomass for continuous electricity generation. In this we develop an optimal design for a hybrid solar wind- Biomass energy plant, where the variables that are optimized and the goal is to minimize costs. At first we make a stand alone system and then if production is more than consumption, it will fed back to the grid. Simulation studies and sensitivity analysis reveal that the hybrid plant is able to exploit the complementary nature of the three energy sources, and deliver energy reliably throughout the year along with a regular Power Supply Grid and synchronizing with it Provides an Excellent backup of Power and enhances sustainable energy production and reduces harmful effects like Global Warming etc.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939) www.ijedr.org
The successor of Digital Video Broadcasting for Satellite systems (DVB-S) is the broadcast standa... more The successor of Digital Video Broadcasting for Satellite systems (DVB-S) is the broadcast standard for television, the Second Generation- DVB-S2. The available encapsulation options are MPE and ULE for first generation as well as second generation. The model provides support to fixed size TS packets. The compatibility to BaseBand Frames(BBFs) is provided by GSE for DVB-S2 links and this native method(GSE) declines the double overhead of BBF Encapsulation. Transmission of fickle-length network layer (IP) packets over satellite links with fixed frame lengths requires IP encapsulation. This survey paper presents these three encapsulation protocols for DVB-S2 and the paralleling of MPE, ULE and GSE, representing their manually calculated efficiencies to refer to theoretical efficiency simulations.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939) www.ijedr.org
This abstract is based on the discussion about the easy technique of seven rules of Strassen’s Ma... more This abstract is based on the discussion about the easy technique of seven rules of Strassen’s Matrix algorithm.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939) www.ijedr.org
This study intends to provide a better understanding of the Last Planner System (LPS) which is a ... more This study intends to provide a better understanding of the Last Planner System (LPS) which is a Lean Construction concept by analyzing the various schedule systems involved in the concept. The Last Planner System (LPS) is a production control system for managing projects. It supplements or replaces a typical management system based on activities and a defined schedule produced by a project manager. The LPS produces predictable workflow and rapid learning. This produces maximum value to the owner by eliminating waste caused by unpredictable workflow. Its use has enabled contractors to reduce the delivery time of a project and at the same time allowed specialty contractors to improve utilization of their resources. This paper focuses on implementing Last Planner System in residential construction by comparing the present scheduling techniques used in the industry. The data is collected through questionnaire survey. A total of 25 respondents are interviewed and the results are analyzed using the software Statistical Package for Social Sciences (SPSS). The results indicated that the respondents are not familiar with the LPS concept. The residential contractors are presently following the Master Schedule method to track their projects. Previous usages of LPS in construction projects proved that the system helps to improve the schedule performance and to avert the possible mistakes. It was concluded that with effective training in the concepts of LPS, the builders can overcome schedule delay and can improve the standards of the projects.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939) www.ijedr.org
Cognitive radio networks have been proposed to solve the problems in wireless networks caused by ... more Cognitive radio networks have been proposed to solve the problems in wireless networks caused by the limited available spectrum and spectrum inefficiency. However, they impose unique challenges because of the high fluctuation in the available spectrum as well as diverse quality of service requirements of various applications. In this paper, a method for spectrum decision is introduced to determine a set of spectrum bands by considering the channel dynamics in the cognitive radio network as well as the application requirements. First, a novel spectrum capacity model is defined that considers unique features in cognitive radio networks. Based on this capacity model, a minimum variance-based spectrum decision is developed for real-time applications, which minimizes the capacity variance of the decided spectrum bands subject to the capacity constraints. For best effort applications, a maximum capacity-based spectrum decision is proposed where spectrum bands are decided to maximize the total network capacity. Simulation results show the performance of cognitive radio network for real time applications and best-effort applications.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939) www.ijedr.org
An assimilated approach to precision agriculture system is used for prediction of soil productivi... more An assimilated approach to precision agriculture system is used for prediction of soil productivity and soil fertility using expert knowledge as one of its components for achieving sustainability. This prediction system is implemented with the help of fuzzy logic theory. Methodolgy consist of selection of dependent and independent soil parameter, fuzzification, fuzzy inference rule,memebership function and defuzzification process. This work shows that fuzzy inference system is an efficient method to demonstrate defuzzification of expert knowledge using fuzzy inference process. The paper developed a fuzzy logic model using mamdani fuzzy inference system The inference rules are framed using expert knowledge in the form of IF...THEN structures. FIS tool in Matlab is used for building a prediction model. Fuzzy model is used for the prediction of soil productivity using essential soil parameter in percentage.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939) www.ijedr.org
Project planning plays a crucial role in software project implementation and to minimize the cost... more Project planning plays a crucial role in software project implementation and to minimize the cost. The existing models suffer from a large search space and lack of flexibility in human resource allocation to simplify the model. In the proposed model, the tasks identification and scheduling is implemented using Event-Based Scheduler (EBS) and efficiency of employees and allocation of tasks is done through Ant Colony Optimization (ACO). Through EBS, beginning and ending of the tasks can be considered as events and it enables optimized resource utilization. The Task Precedence Graph obtained through ACO is used to find shortest path which reflects most suitable employee for the given task. Combining EBS and ACO techniques together will minimize the search space for employee allocation and hence the cost of the given project. The experimental results show that the proposed method is efficient and effective.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939) www.ijedr.org
This paper is all about the importance of human assets of the organizations & its proposed positi... more This paper is all about the importance of human assets of the organizations & its proposed position in the Balance sheet. It is often felt that human, the most important part of every organization is not getting its real worth & under valued at most of the places. Since human is the most valuable assets which operates all other assets of an organization whether it is government, public sector, private sector or NGO but human assets are not getting its proper & suitable position. The value of an organization is normally measured by traditional balance sheet which is viewed as a sufficient reflection of an organization’s current & fixed assets. This traditional valuation has been called into question due to the recognition that human assets are very important part of an organization's total value in the current scenario. This has led to three important questions.1) How to assess the value of human assets effectively & accurately? 2) Where to show human assets in the balance sheet? and 3) What should be the Human asset to total asset ratio? In this paper included appropriate answer of questions.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939) www.ijedr.org
A large amount of short, single-shot videos are created by personal camcorder every day, such as ... more A large amount of short, single-shot videos are created by personal camcorder every day, such as the small video clips in family albums. Thus, a solution for presenting and managing these video clips is highly desired. From the perspective of professionalism and artistry, long-take/shot video, also termed one shot video, is able to present events, persons or scenic spots in an informative manner. In this project a novel video composition system “Video Puzzle” is proposed which generates aesthetically enhanced long-shot videos from short video clips. Automatic composition of several related single shots into a virtual long-take video is done. A novel framework is designed to compose descriptive long-take video with content-consistent shots retrieved from a video pool . For each video, frame-by-frame search is performed over the entire pool to find start-end content correspondences through a coarse-to-fine partial matching process. The content correspondence here is general and can refer to the matched regions or objects, such as human body and face. The content consistency of these correspondences enables us to design several shot transition schemes to seamlessly stitch one shot to another in a spatially and temporally consistent manner. The entire long-take video thus comprises several single shots with consistent contents and fluent transitions. Meanwhile, with the generated matching graph of videos, the proposed system can also provide an efficient video browsing mode.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939) www.ijedr.org
In the current era of digital world, user and investigator are more dependent on digital data. Di... more In the current era of digital world, user and investigator are more dependent on digital data. Digital data are very vast in size and also stored in various formats. So, the major problem is identification of upcoming data as true or false by the user or investigator. To overcome this problem different methods and techniques are adapted. Forensic method is used for validation of data. A computer forensic method can be used for detecting the different types of forgeries and computer crime. Forgeries and computer crime are the most major concern of the digital world. Lots of techniques and methods have been used to find a proper solution to overcome these forgery problems. Occurrences of digital crimes or forgeries are investigated using a method or technique called forensics. Initially a general survey was carried out to understand the different methods used in computer forensics to track the evidences which could be useful for detecting the computer crime and forgery. Forensic tools can be used for making any changes to data or tampering of data. Different rule sets or methods are defined to detect the various errors regarding the changes and the tampering of the data in different windows file systems. The data is tampered or modified in either of the two ways i.e., offline or online. In this research, offline data is of upmost concern. Digital evidence which stores information in digital form can be used to detect forgery and computer crime. In this paper, a computer forensic method for detecting timestamp forgery in the Windows NTFS file system is presented. The accuracy of timestamp forgery can be further improved by using attributes of files like size, time. The tool can be used for all types of files.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939) www.ijedr.org
Security of digital products (audio, video, image, and text) on the internet is very essential th... more Security of digital products (audio, video, image, and text) on the internet is very essential these days, for these digital watermarking techniques are used. Digital watermarking is the process of embedding data into digital multimedia content. This is used to validate the reliability of the content or to recognize the identity of the digital content's owner. Sophisticated watermarking techniques have recently been developed, and they can be used to embed in printed text, graphics, or images as well as in digital images, graphics, audio, or video. This present survey is on DWT (Discrete Wavelet Transform) technique used in watermark. DWT transform more computationally efficient than other transform methods, because of its outstanding localization properties which offer the compatibility with the Human Visual System (HVS).
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), Mar 2014
Resolution enhancement (RE), a process of improving the quality of an image. Resolution enhanceme... more Resolution enhancement (RE), a process of improving the quality of an image. Resolution enhancement is basically obtained by regaining high frequency contents of image. Without which the output will be a blurred image. In this paper a new approach in wavelet domain using dual-tree complex wavelet transform (DT-CWT) and nonlocal means (NLM) filter for RE of the images is implemented. An input image is decomposed by DT-CWT to obtain high-frequency sub bands. The high-frequency sub bands and the low-resolution (LR) input image will be interpolated using the bicubic interpolation in proposed work. The high frequency sub bands are passed through an NLM filter to reduce the artifacts generated by DT-CWT. The filtered high-frequency sub bands and the LR part of input image are added using inverse DTCWT for obtaining resolution-enhanced image. DT-CWT provides superior resolution and greater performance ratio because of its nearly shift invariant and directional selective properties. The results are compared in terms of PSNR, MSE for existing techniques.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), Mar 2014
Transmission and routing of video data over wireless network is a challenging task because of wir... more Transmission and routing of video data over wireless network is a challenging task because of wireless interferences. To improve the performance of video on demand transmission over wireless networks multipath algorithms are used. IPD/S (Iterative path discovery/selection) PPD/S (Parallel Path discovery/selection) are two algorithms which is used for discovering maximum number of edge disjoint paths from source to destination, for each VoD request by considering the effects of wireless interferences. In this paper performance evaluation of these multipath discovery algorithms for VoD (Video on demand) streaming in wireless mesh network is presented. These algorithms are evaluated on the bases of Number of Path discovers, Packet drop ratio and delay. Simulation result shows that PPD/S works batter as compared to IPD/S because it’s able to discover more paths than IPD/S under same circumstances.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), Mar 2014
Image Fusion is a data fusion technique which combines information of the two images which has va... more Image Fusion is a data fusion technique which combines information of the two images which has varied information to form a new single image. The objective is to fuse an MR image and CT image of the same organ to obtain a single image containing as much information as possible. In this paper Wavelet Transform and Fast Curvelet Transform are highlighted to perform the image fusion of MR image and CT images. Wavelet Transform has good time-frequency characteristics in one-dimension, but this can’t be extended to two-dimensions or multi-dimensions as wavelet has very poor directivity. Since medical images have several more objects and curved shapes, it is expected that the Fast Curvelet Transform will do better in their fusion. In this project image fusion based on Wavelet Transforn and Fast Curvelet Transform was implemented. The experiment results show the superiority of Fast Curvelet Transform to the Wavelet Transform in the fusion of MR and CT images from both the visual quality and peak signal to noise ratio(PSNR) points of view.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), Mar 2014
Reed-Solomon codes are very useful and effective in burst error in noisy environment. In decoding... more Reed-Solomon codes are very useful and effective in burst error in noisy environment. In decoding process for 1 error or 2 errors create easily with using procedure of Peterson-Gorenstein –Zierler algorithm. If decoding process for 3 or more errors, these errors can be solved with key equation of a new algorithm named Berlekamp-massey algorithm. In this paper, wide discussion of procedures of Peterson-Gorenstein –Zierler algorithm and Berlekamp-Massey algorithm and show the advantages of modified version of Berlekam-Massey algorithm with its steps.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), Mar 2014
The objective of this work is to compare ligament system with the composite fibre-resin lamina wh... more The objective of this work is to compare ligament system with the composite fibre-resin lamina which is not exactly but matches nearer to the ligament structure. The skeletal ligaments are short bands of tough fibrous connective tissue which are same as composite material. This paper presents 3D finite element analysis performed for a composite Fibre-Resin lamina and compare this result with the orthotropic stress -strain relationship formulation for validation of the result. Nonlinear static analysis performed for composite material to evaluate stress-strain relationship for a composite material.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), Mar 2014
This paper introduce useful concept for transient response analysis for pendulum system using gra... more This paper introduce useful concept for transient response analysis for pendulum system using graphical programming language - LabVIEW. Transient response analysis is the most general method for computing forced dynamic response. The purpose of transient response analysis is to compute the behavior of a structure subjected to time varying excitation. Once the virtual state space model of pendulum system is obtained it is very easy to analyze and identify the parameters of transient response of pendulum system.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), Mar 2014
The model is developed for reducing the wastage of electricity due to careless and improper switc... more The model is developed for reducing the wastage of electricity due to careless and improper switching in households, schools, colleges and offices etc. It saves energy by maximizing the use of daylight. This is an automatic system which employs solar energy through PV. The system is capable of controlling lights, fans and air conditioners in a room depending upon various parameters such as LUX level, room temperature and motion. All these parameters are measured through various sensors and the controlling is done by microcontroller. PIR sensor detects the occupancy in the room. The microcontroller reads the LUX level of the room from the ambient light sensor. If the daylight value is below the preset threshold value, then the lights are turned on and vice versa. LM 35 sensor reads the room temperature and is compared with preset value and accordingly the ON and OFF of the fan is controlled. The model has been developed and tested in Department of Energy, MANIT Bhopal. This model itself consumes very low power and helps in saving a significant amount of energy. The model can be applied to government offices, private firms, residential buildings, schools, colleges etc. so as to avoid the wastage of electricity and maximum use of day lighting, also reduces our dependence on conventional energy and will help in conserving energy.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), Mar 2014
Laminated composite material have found extensive application in the mechanical, aerospace, marin... more Laminated composite material have found extensive application in the mechanical, aerospace, marine, automotive industry due to their high fatigue life and high strength to weight ratio. Predication of the failure of composite laminate structure, mathematical modelling, finite element analysis of composite laminate and load that can laminate take have become an important topic of research and has drawn close attention in recent year. Accurate prediction of failure of composite laminate structure has become more challenging to design due to non-isotropic and non linear material property. This paper presents literature review on modelling and finite element analysis of composite laminate plate. The literature review is devoted to the different finite element method based on the various laminated plate theories.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), Mar 2014
Self defence and self protection are an important priority for women or Men. Some women find them... more Self defence and self protection are an important priority for women or Men. Some women find themselves at a greater risk for becoming the victim of either serious assault or murder, but it is more about a feeling of dominance from one person over another. Even though women are targeted, the overall point is that their needless victimization could have been prevented. Even women who perform the necessary steps to stay alive—such as getting a restraining order, hiding, and filing criminal charges—still end up dead. Therefore, avoiding any violent attack is better that attempting to survive one. Self defence and alert system for individuals is avoid these crimes in alone or being in badly lit areas also. By using this system Whenever there is a threat to the person then he/she has to press the switch of the equipment to alert all the modules i.e. voice alert, self defence device, GPS, GPRS, a web camera is attached to the equipment and capturers the image and sent MMS to the particular registered mobile number and using further evidence about the crime, a voice alert helps whenever a person switch ON the equipment to alert the surrounding persons where there is a crime, Global Positioning Service gives the location of wherever there is a threat as Latitude and Longitude and sent SMS of Latitude and Latitude to particular registered number using GPRS technology .General packet Radio Service sent MMS of the captured image to particular registered number using GPRS technology or using further evidence about the crime and Self Defence Device is used for whenever there is a threat to the person then he/she has to press the switch of the equipment then the spray bottle which contains chloroform automatically spreads over the area where the crime takes place, and the criminal gets unconscious.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), Mar 2014
In this paper, a new domino circuit is proposed, which has a lower leakage and higher noise immun... more In this paper, a new domino circuit is proposed, which has a lower leakage and higher noise immunity without dramatic speed degradation for wide fan-in gates. The technique which is utilized in this paper is based on comparison of mirrored current of the pull-up network with its worst case leakage current. The proposed circuit technique decreases the parasitic capacitance on the dynamic node, yielding a smaller keeper for wide fan-in gates to implement fast and robust circuits. Thus, the contention current and consequently power consumption and delay are reduced. The leakage current is also decreased by exploiting the footer transistor in diode configuration, which results in increased noise immunity. Simulation results of wide fan-in gates designed using a 16-nm high-performance predictive technology model demonstrate 51% power reduction and at least 2.41× noise-immunity improvement at the same delay compared to the standard domino circuits for 64-bit OR gates
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), Mar 2014
Frequently, high-power pulsed ion cyclotron range of frequency experiments are limited by breakdo... more Frequently, high-power pulsed ion cyclotron range of frequency experiments are limited by breakdown at the vacuum feedthrough. This paper describes the development and testing of vacuum feedthroughs to increase both reliability and capability. The ultimate goal of this review paper is to develop a continuous-wave feedthrough for the next generation of fusion experiments. The feedthrough in the interface, which isolates the ADITYA Tokamak vacuum from that of the interface, becomes most critical and vulnerable to RF voltage breakdown and arcing. The use of dielectric material between inner and outer conductor introduces threat of surface discharge in vacuum condition. The feed through are very crucial, as its failure not only affects RF system but also the tokamak vacuum gets affected.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), Mar 2014
Eichhornia crassipes is a noxious weed which clogs water bodies, interferes with navigation, recr... more Eichhornia crassipes is a noxious weed which clogs water bodies, interferes with navigation, recreation and power generation due to its fast spread and congested growth. Composting is a bio-oxidative process which converts water hyacinth into useful product. Therefore, the aim of the present study was the comparative investigation of biological and physical characteristics through pile composting of water hyacinth taken from two different sources but of same composition i.e. from Agricultural site and Disposal/Landfill site. The composting material of pile of disposal site reached thermophilic stage within three days indicating high rate of microbial decomposition. Water hyacinth obtained from disposal site contains more organic matter than that from agricultural site. The compost obtained from pile of disposal site was more stable than that from agricultural site as evaluated by the stability parameters i.e. oxygen uptake rate and CO2 evolution rate.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), Mar 2014
Automation is the use of control system (such as numerical control, programmable logic control, a... more Automation is the use of control system (such as numerical control, programmable logic control, and other industrial control systems), in contact with other applications of information technology to control industrial machinery and processes, reducing the need for human intervention. Whereas mechanization provides human operators with machinery to assist them with the physical requirements of work, automation greatly reduces the need for human sensory and mental requirements as well. Processes and system can also be automated. Automation is a discipline that has been into existence for the past ten to fifteen years. And this is the field that has been continuously explored by the experts for the betterment and ease of engineering industry. The title of our Research is “Separation and Packaging of Acidic and Basic Solution”. This is the Research that we are doing under our esteemed faculty Mr. Dipesh shah. They were the source of guiding factor behind this Research. The automation of this Research is done using a PLC and the representation of the graphic user interface (GUI) might be done using SCADA
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), Mar 2014
Carry Select Adder (CSLA) is one of the fastest adders used in many data-processing processors to... more Carry Select Adder (CSLA) is one of the fastest adders used in many data-processing processors to perform fast arithmetic functions. From the structure of the CSLA, it is clear that there is scope for reducing the area and power consumption in the CSLA. This work uses a simple and efficient gate-level modification to significantly reduce the area and power of the CSLA. The proposed design has reduced area and power as compared with the regular SQRT CSLA with only a slight increase in the delay. This work evaluates the performance of the proposed design in terms of area, power. The results analysis shows that the proposed CSLA structure is better than the regular SQRT CSLA.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), Mar 2014
In multiuser systems the system recourses must be divided into multiple users. This paper discuss... more In multiuser systems the system recourses must be divided into multiple users. This paper discusses these various techniques to allocate resources to multiple users, as well as drawbacks of multiuser system. Also we will discuss multiuser channel capacity for both uplink and downlink system.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), Mar 2014
The advancement in data mining techniques plays an important role in many applications. In contex... more The advancement in data mining techniques plays an important role in many applications. In context of privacy and security issues, the problems caused by association rule mining technique are investigated by many research scholars. It is proved that the misuse of this technique may reveal the database owner’s sensitive and private information to others. Many researchers have put their effort to preserve privacy in Association Rule Mining. In this paper, we have presented the survey about the techniques and algorithms used for preserving privacy in association rule mining with horizontally partitioned database.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), Mar 2014
over the last few decades there has been a considerable development in the field of composites an... more over the last few decades there has been a considerable development in the field of composites and has been extensively used in various applications. Because of the fact that composite materials possess high stiffness, high strength and less weight. In the past few years natural fibers are being used in the field of composites. The reason is that natural fibers are environment eco friendly, low cost of raw materials. In this present experiment, composite materials prepared using Cashew nut shell liquid (CNSL) resin as matrix and Teak Wood Saw Dust as reinforcing agents were tested for their tensile strength.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), Mar 2014
This paper is a review of an image inpainting method by which we can reconstruct a damaged or mis... more This paper is a review of an image inpainting method by which we can reconstruct a damaged or missing portion of an image. A fast image inpainting algorithm based on TV (Total variational) model is proposed on the basis of analysis of local characteristics,which shows the more information around damaged pixelsappears, the faster the information diffuses. The algorithm firststratifies and filters the pixels around damaged region accordingto priority, and then iteratively inpaint the damaged pixels fromoutside to inside on the grounds of priority again. By using this algorithm inpainting speed of the algorithm is faster andgreater impact.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), Mar 2014
Smart Energy is an approach to the cleverly, effectively use of energy and providing this feature... more Smart Energy is an approach to the cleverly, effectively use of energy and providing this feature by the use of Zigbee is called Zigbee SEP. In this literature review we provides an overview of Zigbee base different SEP profile like SEP-1.0,SEP-1.x and SEP-2.0 also show comparison of different wireless technologies standards, Zigbee base SEP Architecture – how it will be implemented on existence technology and SEP feature offer by Zigbee SEP.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), Mar 2014
This paper presents the stability enhancement of four parallel-operated offshore Wind Turbine Gen... more This paper presents the stability enhancement of four parallel-operated offshore Wind Turbine Generators (WTGs) is connected to an onshore power system using a Static Synchronous Compensator (STATCOM). The operating characteristics of each of the four WTGs are simulated by wind permanent magnet synchronous generator while the onshore power system is simulated by a Synchronous Generator (SG) fed to an infinite bus through two parallel transmission lines. A fuzzy controller for the proposed STATCOM is designed by using an adequate damping to the dominant modes of the SG. A frequency domain approach based on a linearized system model using Eigen value analysis is performed while a time domain scheme based on a linear system model subject to disturbances is also carried out. These papers present the voltage enhancement of the offshore wind turbine by using the fuzzy controller and maintain the voltage of 1p.u.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), 2013
Distributed arithmetic (DA) is performed to design bit-level architectures for vector–vector mult... more Distributed arithmetic (DA) is performed to design bit-level architectures for vector–vector multiplication with a direct application for the implementation of convolution, which is necessary for digital filters. In this brief, A novel DA-based implementation scheme is proposed for adaptive finite-impulse response filter. To propose adaptive filter where filter coefficients are frequently updated in order to minimize the error out. Least-mean-square adaptation is performed to update the coefficients and minimize the mean square error between the estimated and desired output It involves a reduction in LUT(Look-up Table) size to one-fourth of the conventional LUT based on Anti-symmetric Product Coding(APC) and modified Odd Multiple Storage(OMS).
Keywords - Distributed arithmetic (DA), Anti-symmetric Product Coding(APC) and modified Odd Multiple Storage(OMS), Least-mean-square(LMS).
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), 2013
Due to the rapid evolution in internet technology and high speed networks the use of digital data... more Due to the rapid evolution in internet technology and high speed networks the use of digital data has been increased. Digital data such as audio, video and images are easily created, copied, processed, stored and distributed among the users. To ensure security and protection of digital data new technology has been developed called as a digital watermarking. Digital watermarking is a technology which embeds additional information in the host image to ensure security and protection of the digital data without effecting original data. The purpose of digital watermarking is not to restrict use of digital data but it can be provide copyright protection and authentication against unauthorized uses. In this paper detail study of watermarking definition, concept and the main contribution of watermarking process in which watermarking should be used, features, techniques, Application, challenges and performance metrics of watermarking and comparative analysis of watermarking techniques are included.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), 2013
Static and Dynamic analysis of the biomedical implants and fixators has been tested using the f... more Static and Dynamic analysis of the biomedical implants and fixators has been tested using the fatigue -corrosion machine . Millions of patients all over the world undergo surgery for implants and orthopedic fixator’s .These implants and fixators undergo fatigue [1] and corrosion in human body due to body fluids .Corrosion reduces the strength of the implants and the debris gets dissolved in the blood leading to further medical complications like kidney failure on patients. fatigue occurs on the implants and fixators due to repeated loading and unloading .when corrosion is combined with fatigue the strength of the material reduces to 10% [5]of its actual strength and also may lead to catastrophic failure of the implants and Fixators .Due to this several tones of 316L Stainless Steel implant metals are wasted ,even though Stainless Steel is reproducible , it will have adverse effect on the environment , with the depletion of natural resources ,this will lead to scarcity of material for the future population .A fatigue corrosion machine was designed and fabricated ,the results showed fatigue corrosion taking place in the implants ,this paper recommends the possibilities of new implant metals like 304SS[12] and fabrication technologies such as surface modifications , which has sustainability and less effect on environment.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), 2013
Our main objective is to implement a monitoring system which monitors the heart pulse of a patien... more Our main objective is to implement a monitoring system which monitors the heart pulse of a patient. This work presents a novel easy-to-use system intended for the fast and non invasive monitoring of the Lead I electrocardiogram (ECG) signal by using a wireless steering wheel. The steering wheel used here is a prototype model. A novel heart rate detection algorithm based on the continuous wavelet transform has been implemented, which is specially designed to be robust against the most common sources of noise and interference present when acquiring the ECG in the hands. Skin Electrodes were used to record the nerve voltages for monitoring the heart pulse. The voltages recorded will be sent to an instrumentation amplifier which amplifies the signal, and then to a filter which filters the noise. Thus, analog signal is given to Analog-to-Digital Convertor (ADC) of Arduino. There, analog voltages are been converted to digital and that digital values will be stored in the EEPROM of Arduino. The values stored in EEPROM will be sent to PC via XBEE (IEEE 802.15.4) wirelessly and a serial port will be opened in the MATLAB by using a serial object. GUI is programmed to make the user interface interactive and simple. Using the real time plot, I’ve plotted the values received by XBEE module and making a running waveform which displays when the MATLAB sent a query to Arduino.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), 2013
Multi-tenancy has shown promising results in achieving high operational cost efficiency by sharin... more Multi-tenancy has shown promising results in achieving high operational cost efficiency by sharing hardware and software resources among multiple customer organizations, called tenants. In the context of cloud computing, this paradigm enables cloud providers to reduce operational costs by dividing resources and to simplify application management and maintenance. These benefits come with associated challenges of isolation, dynamic scaling and elasticity. This paper explores these issues in the context of multi-tenant Database-as-a-Service. In addition, we propose a solution “virtual tenants” to solve the problem of elasticity and isolation in multitenant database applications.
Index Terms – multitenancy, Cloud computing, database as a service, elasticity.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), 2013
- In many wireless systems where multiuser detection techniques may be applied, The known linear ... more - In many wireless systems where multiuser detection techniques may be applied, The known linear multiuser detectors are designed for communication systems with additive white Gaussian noise(AWGN) assumption. In this regard, the question about the possibility and efficiency of their use in systems with non-Gaussian noise remains an open question. In the case of an external noise, there are no serious reasons for accurately determining its probability distributions. In this paper the performance analysis of many multiuser detectors in the presence of multiple-access interference, Gaussian, and non Gaussian noise in code-division multiple-access(CDMA) communication systems have been investigated. Simulation results show that the linear multiuser detector provide poor performance in the presence of non Gaussian noise than in AWGN.
Index Terms – multiuser detection, matched filter, decorrelating, MMSE, CDMA.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), 2013
Classification is a data mining technique used to predict Patterns’ membership. Pattern classific... more Classification is a data mining technique used to predict Patterns’ membership. Pattern classification involves building a function that maps the input feature space to an output space of two or more than two classes. Neural Networks (NN) are an effective tool in the field of pattern classification. The success of NN is highly dependent on the performance of the training process and hence the training algorithm. Many training algorithms have been proposed so far to improve the performance of neural networks. Usually a traditional backpropagation learning algorithm (BPLA), which minimizes the mean squared error (MSE – cost function) of the training data, be used in the process of training neural networks. However (MSE) based learning algorithm is not robust in presence of outliers that may pollute the training data. In our work we aim to present another cost functions which backpropagation learning algorithm based on in order to improve the robustness of neural network training by employing a family of robust statistics estimators, commonly known as M-estimators, and hence obtain robust NN classifiers. Comparative study between robust classifiers and non-robust (traditional) classifiers was established in paper using crab classification problem.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), 2013
The work presents a performance study of a dc micro-grid when it is used a voltage droop techniqu... more The work presents a performance study of a dc micro-grid when it is used a voltage droop technique to regulated the grid voltage and to control the load sharing between different sources like Photovoltaic cell , Fuel Cell, DG Set, Batteries, etc. A small model of a dc micro-grid comprising micro-sources and loads was implemented in the Matlab environment. Some aspects about centralized (master-slave) and decentralized (voltage droop) control strategies as well as the procedures to design the controllers, with droop control, are presented and discussed.
Index Terms—dc-dc converter, dc micro-grid, voltage droop control
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), 2013
This paper briefly discusses performance optimization challenges of Ad hoc networks and cross lay... more This paper briefly discusses performance optimization challenges of Ad hoc networks and cross layer congestion control in Ad hoc network. To improve the performance of wireless network, the MAC layer uses transmission data rate based on the channel signal strength information from physical layer and congestion information from network layer. Utilization of MAC layer is sent to DSDV as a congestion aware routing metric for optimal route discovery. The simulations show that rate adaptation in MAC layer improves the network performance in terms of throughput, delivery ratio and packet transfer delay; using congestion information from MAC layer in routing discovery improves the performance of the network benefited from overall network load balance.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), 2013
over the past few years, there has been increasing emphasis on extending the services available o... more over the past few years, there has been increasing emphasis on extending the services available on wired public telecommunications networks to mobile non wired telecommunications users. At present, for mobile network users only low-bit-rate of 100 to 150 kbps data services are available. However, demands for wireless broadband multimedia communication systems (WBMCS) are increasing. It is necessary to use high-bit-rate transmission of at least several MBPS for upcoming new technologies. If digital data is transmitted at the rate of several MBPS, the delay time of the delayed waves is greater than 1 symbol time. Using one of the probably solution for adaptive equalizing signal. There are practical difficulties in operating this equalization at several megabits per second with compact, low-cost hardware. To overcome such an issue and to Achieve WBMCS. Orthogonal frequency division Multiplexing (OFDM) Apply to parallel-data transmission scheme, which reduces the influence of multipath fading and makes complex equalizers unnecessary.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), 2013
Multiprocessor system on chip is emerging as a new trend for System on chip design but the wire a... more Multiprocessor system on chip is emerging as a new trend for System on chip design but the wire and power design constraints are forcing adoption of new design methodologies. Researchers pursued a scalable solution to this problem i.e. Network on Chip (NOC). Network on chip architecture better supports the integration of SOC consists of on chip packet switched network. Here we develop a Router is a packet based protocol. In this Router which taken functionality reference from actual Router the design is implemented on single chip using verilog code.
Router drives the incoming packet which comes from the input port to output ports based on the address contained in the packet. The router has a one input port from which the packet enters. It has three output ports where the packet is driven out. The router has an active low synchronous input resetn which resets the router. Thus the idea is borrowed from large scale multiprocessors and wide area network domain and envisions on chip routers based network. This helps to understand how router is controlling the signals from source to destination based on the header adders. It also tells when data have to be extracted for a particular port and also it gives idea about port is full or empty.
This method removes most of the problems cited above and improves the performance of router. The most familiar type of routers are home and small office routers that simply pass data, such as web pages and email, between the home computers and the owners’ cable or DSL modem, which connects to the internet (ISP). Routers may also be used to connect two or more logical groups of computer devices known as subnets, each with a different sub-network address.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), 2013
- Multicore hardware systems are proving to be more efficient each passing day and so are the sch... more - Multicore hardware systems are proving to be more efficient each passing day and so are the scheduling algorithms for these systems. The potential speedup of applications has motivated the widespread use of multiprocessors in recent years. Optimal multiprocessor scheduling algorithms remain a challenge to the researchers. Out of the number of algorithms proposed and analyzed we here compare and examine three of them: the classic global EDF, the optimal P-fair algorithm and a newer LLREF which has worked upon the strengths of P-fair. They are compared in terms of task migrations and required number of scheduler invocations and schedulability of a variety of tasks. Results are verified on the basis of a set of randomly generated tasks.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939)
In software industry a large number of projects continue to fail due to non technical issue such ... more In software industry a large number of projects continue to fail due to non technical issue such as communication gap, requirements and poor executive. The authors identify the reasons for which are available for software development life cycles fall short of dealing with them. They also proposed the system development for software development life cycle. In this paper, the concept of system development, SDLC is further explored and a number of concepts are discussed in this regard.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), 2013
Quality assurance makes sure the project will be completed based on the previously approved speci... more Quality assurance makes sure the project will be completed based on the previously approved specifications, standards and functionality. It is required without defects and possible problems. It monitors and tries to progress the development process from the start of the project. Software Quality Assurance (SQA) is the combination of the entire software development process, which includes software design, coding, source code control, code review, change management, configuration management and release management. In this paper we describe the solution for the key problems of software testing in quality assurance. The existing software practices have some problems such as testing practices, attitude of users and culture of organizations. All these tree problems have some combined problems such as shortcuts in testing, reduction in testing time, poor documentation etc. In this paper we are recommending strategies to provide solution of the said problems mentioned above.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), 2013
A simple Log Periodic Dipole Array (L.P.D.A) antenna for Very High Frequency (V.H.F) applications... more A simple Log Periodic Dipole Array (L.P.D.A) antenna for Very High Frequency (V.H.F) applications is discussed in this paper. The antenna is fed by line feeding technique. A printed LPD has several dipoles connected together by several non radiating transmission lines, each of which are placed at finite distance from each other. The dimension of the largest dipole depends upon the lowest frequency of operation. This paper presents the design and simulation of a Log Periodic Dipole Array antenna for 50 MHz using an electromagnetic simulator CADFEKO. Various antenna parameters like Return loss, VSWR, Input Impedance, Gain etc of the designed antenna are observed. The results show that the designed wideband antenna is well suited for very high frequency applications like Television and FM broadcasting.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), 2013
Cloud computing is a distributed computing network and has the ability to run a program or appli... more Cloud computing is a distributed computing network and has the ability to run a program or application on many connected computers at the same time. It is an efficient and scalable network, but maintaining the stability of processing so many applications is a very complex problem. Load balancing is the solution for this problem. Good load balancing makes cloud computing more efficient and improves performance. To improve the load balancing strategy this paper introduces an algorithm that applies game theory concepts for the cloud partitioning.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), 2013
The Aim of this paper to define detail study on public transport network of VTCOS city bus servic... more The Aim of this paper to define detail study on public transport network of VTCOS city bus service by vehicle occupancy survey for understanding of required improvement parameters in Gandhinagar City with five major routes. Gandhinagar is not only capital of Gujarat state, but is also loaded with all the accolades of being the most developed city of the state. Carrying forward its chain of developments, we try to develop the effective, economic, time consuming public transport network in the Gandhinagar city including the area which connect the major parts of the city like educational firms, government sectors , shopping mall, theatres etc. It will cover not only the city area but also cover the area which are under GUDA(Gandhinagar Urban Development Authority) and some parts of Ahmedabad city.
At present, bus operation through Public Private Partnership is given to the private operator “VTCOS” strictly on the contractual period of 5 (Five) years only. The capacity of the buses is not so good and effective transportation is not provided. It does not cover the major part of the city area and the routes are not effective.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), 2013
SOI means Silicon on Insulator. This type of transistors has Silicon-Insulator-Silicon substrate ... more SOI means Silicon on Insulator. This type of transistors has Silicon-Insulator-Silicon substrate which is different from conventional MOSFET structure where metal layer is used on the top of Insulator [1, 2]. Now a days, the width of the oxide of a MOSFET is reduced from 300nm to 1.2nm and even less with scaling in technology. If it is further reduced, the leakage problems (majorly Sub-threshold Leakage) come into play [3]. In order to solve this problem and let the technology to scale further, we use a small Silicon strip on the oxide leading to next generation SOI MOSFET’s. It provides an added advantage of reduction of parasitic capacitance which improves the performance and thereby increases the speed of operation by decreasing the delay values.
In this paper, we use the BSIMSOI Model to simulate the analog circuits using EDA tools like Cadence and thereby verify the modeling of SOI MOSFET’s.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), 2013
Watermarking is a technique to hide information inside digital media so that any unauthorized per... more Watermarking is a technique to hide information inside digital media so that any unauthorized person can’t access it. It is a very important field which helps to protect copywrite digital material. This is exponentially growing field in today’s world as information sharing has become much easier due to internet. Many researchers are studying and researching in this field. Using this technique, digital data that is watermarked can be accessed and modified by authorized person only. There are different techniques available so far for watermarking in digital image. This paper provides analytical survey on digital image watermarking based on their representation domain. Comparison has been made between frequency domain and spatial domain.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), 2013
A Wide Tuning Range Gm-C Continuous-Time Analog Filter is a CMOS operation nal transconductance a... more A Wide Tuning Range Gm-C Continuous-Time Analog Filter is a CMOS operation nal transconductance amplifier for low-power and wide tuning range filter application is proposed. The transconductor can work from the weak inversion region to the strong inversion region to maximize the transconductance tuning range. The trasconductance can be tuned by changing its bias current. A fifth-order Elliptic low-pass filter implemented with the transconductors is proposed to be implemented in SPICE using CMOS. The filter can operate with the cutoff frequency of 250Hz to 1MHz. The wide tuning range filter would be suitable for multi-mode applications, especially under the consideration of saving chip areas. The third-order inter-modulation of -40dB was measured over the tuning range with two tone input signals. The power consumption is 0.8mW at 1MHz cutoff frequency and 1.8-V supply. Cost and power consumption are two most important factors for these products. For the power consumption, digital circuits can benefit from the supply voltage reduction, but analog circuits can not necessarily decrease the power consumption with the decrease of supply voltage. To meet different specifications for low power consumption, new basic analog building blocks should be re-designed. Many of the previously published papers made efforts on improving the speed, linearity, or dynamic range of transconductor circuits.
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH (IJEDR) (ISSN:2321-9939), 2013
Wire EDM (WEDM) is a versatile non-traditional machining process used to cut materials of high ha... more Wire EDM (WEDM) is a versatile non-traditional machining process used to cut materials of high hardness and to produce very complex and intricate shapes on the wide variety of materials. Hardness of the material is not a constraint for WEDM. This advantage makes the WEDM to cut very hardened materials with ease. Parameters that affect the Material Removal Rate(MRR) and surface roughness mainly consists of pulse on time, pulse off time, discharge current, servo voltage, tension of wire, flushing pressure etc. so, it is very essential to set the parameters that control the outputs in an optimized condition so as get the maximum output. Work has been carried out to find the optimal parameter settings for maximum MRR and minimum kerf (width of cut) for a nickel based alloy, HastelloyC276, a very high temperature, corrosion resistant alloy, using both Taguchi methods and Grey Relational Analysis (GRA).
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
This help’s a visually challenged person to live like any other normal person on this planet with... more This help’s a visually challenged person to live like any other normal person on this planet without any personal guide. This device does not require any implant or surgery to enable vision, rather this is a piece of device that can be carried. Our nature has the answer for everything. This makes use the concept of echolocation used by bats.
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
People these days are technically advanced and computers are widely available. People are more pr... more People these days are technically advanced and computers are widely available. People are more prone to diseases due to changing environment. Expert consultation is not timely available. All the diseases have an associated set of some symptoms. A system can be developed using neural networks. The patients can input the symptoms observed and the system can recognize disease depending on the set of symptoms without the need of a medical expert. The patients gives set of symptoms which the patient observes. Depending on the set of symptoms selected the system selects a disease. We give the input as the set of symptoms and the output is a disease. The system can be further enhanced by using a layer of medicines for the diseases. On recognizing the disease, the system can then further select a medicine. The system can be used in emergency situations where medical consultation is not easily available.
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
The paper presents Car license plate detection (CLPD) system using Vertical Edge Detection Algori... more The paper presents Car license plate detection (CLPD) system using Vertical Edge Detection Algorithm(VEDA) and Structured component algorithm are used for accurate identification. First the recognition system starts with character identification based on number plate extraction, Splitting characters and Text matching. The system model uses already captured images for this recognition process. The system uses different images of plates for identifying the characters from input image. After character recognition, an identified group of characters will be compared with database number plates for authentication and grant of access.
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
This study focuses on an advanced mobile security system to provide rapid and highly secure human... more This study focuses on an advanced mobile security system to provide rapid and highly secure human friendly M-commerce transaction. M-commerce transaction works in multistep process. The process involves User authentication, Merchant authentication, Message authentication, secure payment details transaction authentication. M-commerce provides availability, reliability and security in transaction phases. The M –commerce phases involves multiple steps like Offering goods (O) , searching for available goods (B) , ordering the goods(O) , paying (P),delivering (D) and distributing(D). The proposed work improves security in user authentication by Wireless Application Protocol (WAP) gateway, which in turn provides end to end security using Double encryption model. In double encryption model, transfer the authentication data and product ordered using Transportation layer security (TLS) Protocol instead of Wireless Transport Layer Security (WTLS) protocol due to requiring end-to-end security with all IP based technology in order to overcome the WAP gateway security breaches. SSL/TLS protocol is used to transfer data and product between Mobile terminal and WAP gateway and also in WAP gate way and server. WTLS and SSL/TLS protocols use a message authentication code (MAC) technique to provide the data integrity. In our proposed work is use a RC4 algorithm for encryption because Stream cipher algorithm is better than block cipher algorithm. Fuzzy logic is applied in biometric server to use fingerprint matches exactly or not and measure the threshold level consists of exactly 100% or 60-99% or below 60%. Merchant authentication is done by trusted Third party.
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
Maintenance is one of the main software creation activities in terms of allocated resources. As e... more Maintenance is one of the main software creation activities in terms of allocated resources. As existing software ages, newly developed systems are built to improve upon existing systems. As software evolves, modularization structure of software degrades and at one point it becomes a challenging task to maintain the software future. Recently, clustering techniques have been used to help with the issues of software evolution and maintenance. It is well known fact that a good modularized software system is easy to understand and maintain. Software Module Clustering is an important task during the maintenance of the software whose main goal is to achieve good modularized software. In recent time, this problem has been converted into search based software engineering problem. All previous work on software module clustering used a single objective formulation of the problem. That is, twin objectives of high cohesion and low coupling have been combined into a single objective called modularization Quality. We introduced hybrid clustering approach which improves modular structure of the software system. We present the results and comparing the results obtained with this from existing single objective formulation on 7 real world model clustering problems. The results of this empirical study prove that hybrid clustering approach produces significantly better solutions than the existing single-objective approach.
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
The unquestionable relevance of the web in our society has led to an enormous growth of websites ... more The unquestionable relevance of the web in our society has led to an enormous growth of websites offering all kinds of services to users. In the field of software engineering usability defines software system demand and use. HCI is the study of interaction between human and computer and one of the key aspects of the study is usability. Usability is considered to be one of the most important quality factors. To help software engineers set of usability guidelines are defined for software development. A web application or web app is any application software that runs in a web browser and relies on a common web browser to render the application. Usability has been evaluated taking into account the user’s satisfaction by using different evaluation methods. To evaluate usability of web applications, WUEP (Web Usability Evaluation Process) method is proposed. In this paper we present WebML, a notion for specifying complex websites at the conceptual model. To measure the usability different metrics are proposed. Additionally, to perform experts evaluation based on heuristics a Sirius framework is defined.
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
We propose a new model for large scale Software development for Products and Services with high q... more We propose a new model for large scale Software development for Products and Services with high quality expectations. It would be based on investing upfront in the Software Architecture of the system, designing with the software product monitoring and alerting logic in place, end-to-end user experience, experimentation and quality of service based on Poka-Yoke principles. The basic idea behind developing this new model is to have high quality software products and services that can be developed faster, cheaper and in better way, it can scale with demand in various scenarios, can deliver outstanding user experience and be failing safe for SDLC bottlenecks which arise in both conventional and Agile Software Development. The proposed model has the following areas:
- Get the right Software Architecture in place
- Ensure high quality software is developed
- It is based on POKA-YOKE principles
- Focus is on user experience
- Ensuring need of the software is identified
- Architecture design follows 12 factor principles
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
The rapid advancement in production of inexpensive cmos, extremely small cameras and microphones ... more The rapid advancement in production of inexpensive cmos, extremely small cameras and microphones and tiny batteries has led to the development of wireless multimedia sensor networks. Wireless multimedia sensor networks have wide applications in multimedia surveillance network, environment monitoring and traffic avoidanceand control system. But sensor devices are curbed in terms of memory, data rate, processing capability .While transmitting a video using compressed sensing through these WMSNsthe memory and PSNR constraints have a significant effect. With the view to minimize the above mentioned constraints, this paper addresses a compressed sensing scheme which adopts the Hadamard matrix for dimensionality reduction and uses CoSaMP (Compressive Sampling Matching Pursuit)recovery algorithm to reconstruct the video .The advantage of Hadamard matrix over other measurement matrix is that it uses significantly less number of elements compared to other measurement matrices. CoSaMP algorithm minimizes time complexity in comparison to other recovery algorithm.
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
Predicting defect-prone software components is an economically important activity. Software defec... more Predicting defect-prone software components is an economically important activity. Software defect prediction work focuses on three ways 1) Estimating the number of defects remaining in software systems, 2) Discovering defect associations, and 3) Classifying the defect proneness of software components. The software defect prediction that supports both unbiased and comprehensive comparison between competing prediction systems. This methodology is comprised of 1) scheme evaluation and 2) defect prediction components. The scheme evaluation analyzes the prediction performance of competing learning schemes for given historical data sets. The defect predictor builds models according to the evaluated learning scheme and predicts software defects with new data according to the constructed model. In the evaluation stage different learning schemes are evaluated and best one is selected. In the prediction stage the best learning scheme is used to build a predictor with all historical data and the predictor is finally used to predict defect on new data. This system classifies the defect-proneness of software components into two classes, defect-prone and non defect-Prone.
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
Secure distance-based localization in the presence of cheating beacon (or anchor) nodes is an imp... more Secure distance-based localization in the presence of cheating beacon (or anchor) nodes is an important problem in mobile wireless ad hoc and sensor networks. Despite significant research efforts in this direction, some fundamental questions still remain unaddressed: In the presence of cheating beacon nodes, what are the necessary and sufficient conditions to guarantee a bounded error during a two-dimensional distance-based location estimation? Under these necessary and sufficient conditions, what class of localization algorithms can provide this error bound? In this paper, we attempt to answer these and other related questions by following a careful analytical approach. Specifically, we first show that when the number of cheating beacon nodes is greater than or equal to a given threshold, there do not exist any two-dimensional distance-based localization algorithms that can guarantee a bounded error. Furthermore, when the number of cheating beacons is below this threshold, we identify a class of distance-based localization algorithms that can always guarantee a bounded localization error.
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
All the company employee have some unique username and password .If colleague anyone know usern... more All the company employee have some unique username and password .If colleague anyone know username and password of others means ,there is chance to leak out our company details and important document .so we have to avoid that. If hackers any one can type username and password in pc without permission means the intimation msg will be sent to authorized mobile. At the same time the authorized person will logout and change their password of unique id through mobile .so the unauthorized person will not able to take the file or document .The unique id will logout and next time hacker will not able to access the account
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
Communication systems have been marching towards rapid developments due to the advancements in sc... more Communication systems have been marching towards rapid developments due to the advancements in science and technology. Wireless Sensor Networks (WSNs) have been gaining importance recently due to the development of low-cost nodes and electronics. But WSNs always come with certain constraints like battery power, resources etc. In order to extend the network lifetime and to minimize the energy consumption, it is essential to propose techniques that will serve the purpose. In clustered Sensor networks Cooperative Multiple-Input-Multiple-Output (CMIMO) can be used to bring in diversity among the different nodes in the cluster. By doing so, all the nodes in the cluster will cooperatively transmit the sensed data to the sink or access point (AP). Data aggregation is one more technique which can be combined with CMIMO to reduce the number of bits present in the data that is transmitted to the destination or AP. In any communication ninety percent of the energy is spent in transmission of the data. So it is essential to compress the data before transmission. In terms of clustered WSNs, nodes that are spatially close to each other will sense more or less the same information like, for example, temperature, pressure, humidity etc. As a result there is redundant data and this redundancy should be removed to enable energy-efficient transmission. The technique combining CMIMO and Data Aggregation is named as CMIMO-A.
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
This paper deals with a biosensor using a micro fabricated array of micromechanical cantilevers. ... more This paper deals with a biosensor using a micro fabricated array of micromechanical cantilevers. This biosensor is used to detect tuberculosis. The sensor consists of antibody layer immobilized onto gold-coated cantilevers and interacts with antigen. The patient blood sample is placed on the cantilever surface. If the sample contains disease causing antigen, immobilized antibody binds with the antigen. This antigen antibody binding causes increase in surface stress. The addition of mass due to antigen antibody binding involved in this process causes the cantilever to bend. The deflection of these cantilever beams can be detected using various techniques like piezoresistive, piezoelectric or capacitive effects. The detection of pathogens requires an extremely sensitive cantilever. Increasing the sensitivity of a microcantilever biosensor can be done by changing the shape of the cantilever. Intellisuit software is used to analyze the proposed microcantilever with increased sensitivity.
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
Studying user's varied requirement, composition of Web services becomes more and more important i... more Studying user's varied requirement, composition of Web services becomes more and more important in order to fulfill user’s demand. The traditional systems of web services composition don't support variability of user's requirement. Therefore, introducing user's requirement into system of web services composition and extend the modules of composition system. In this paper, we deal with the issues of reconfigurable service modeling and efficient service composition decision making, design web services composition framework based on user’s requirement, and the composition module in detail. User requirement are read by defining the semantic information of web service, defining the user requirement provide trust for web services, extend the need to understand the exact attribute of web services in all aspects like, QoS Choreographies and Trust helps in Composition and Automation Framework for reconfiguration.
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
The use of information technology and management systems for the betterment of health care is mor... more The use of information technology and management systems for the betterment of health care is more and more important. However, current efforts mainly focus on informatization of hospitals or medical institutions within the organizations, and very few are directly oriented to the patients, their families, and other ordinary people. The crude demand for various medical and public health care services from customer’s calls for the creation of powerful individual-oriented personalized health care service systems. In this paper, we present and implement a software modelled healthcare Information Service Platform, which is based on such technologies. It can support numerous health care tasks and provide individuals with many intelligent and personalized services, and support basic remote healthcare. In order to realize the personalized customization and active recommendation of intelligent services, techniques such as decision making are integrated.
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
Cloud computing is the use of computing resources that are delivered as a service over a network.... more Cloud computing is the use of computing resources that are delivered as a service over a network. Cloud computing can be used for in different ways; in present market it is the attractive one which can be use by everyone. Load balancing is the cost effective concept in cloud computing environment and it shows influence on the performance. An optimum load balancing can make cloud computing more cost effective and it gives fulfillment results for user. Load balancing will perform in public cloud based on the cloud partitioning concept and here we have to choose different methods for different problems. In existing system, Round-Robin algorithm used for ideal status and game theory can be used for normal status of the system and as well as for load balancing process. When number of clients send request to cloud at that time we need to face traffic at this time we cannot schedule task to the partitions to avoid this traffic here we are using KP (Koutsoupias, Papadimitriou) model. The nature of the KP model, can be use for the reduce compilation of the tasks which we got from user due to that we can schedule task to the partition without facing traffic.
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
Traditional Service Discovery methods are based on the centralized UDDI registries and can easily... more Traditional Service Discovery methods are based on the centralized UDDI registries and can easily suffer from the problems of performance bottlenecks like single node failures, load balancing etc. To address these problems, many approaches based on distributed architecture have been proposed such as peer-to-peer-based decentralized service discovery approaches (CAN, Chord,Chord4S etc )which suffer from routing inefficiency and causes over head delays. Hence a new hybrid approach that is based on the decentralized peer to peer system as well as a centralized global repository is defined to address the problems. Based on the Chord 4S it supports service query with wildcards also. Load Balancing and Data Availability are further extended by distributing the domain specific services with respective peers and also a method called Request Mediator is introduced to reduce the overhead delay and improve the performance of the system.
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
As the available number of web services are increasing, the problem of discovering and selecting ... more As the available number of web services are increasing, the problem of discovering and selecting the most suitable service has become complex. Hence, a new discovery mechanism is needed as the existing discovery techniques fail to find the similarities between Web services capabilities. A new discovery framework is proposed in this paper, this framework includes techniques like part-of-speech tagging, lemmatization, and word sense disambiguation. After detecting the senses of relevant words gathered from Web service descriptions and the user’s query, a matching process takes place and displays the relevant services. The proposed technique is implemented and its components are validated using some test samples. The results of this experiment promise the proposed framework will have a positive impact on the discovery process.
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
Web services are gaining momentum in academia and industry as they hold the promise of developing... more Web services are gaining momentum in academia and industry as they hold the promise of developing loosely coupled business processes. This momentum is witnessed from the widespread adoption of Web services in multiple research projects and application domains. LCS is a dynamic collaboration between autonomous web services that collectively provide a value-added service .change reaction process will go through a set of steps, such as discovering Web services based on the requirement, and regenerating a collaboration among outsourced Web services. A short-term has a very limited lifetime. Once the goal is reached, the collaboration among its component services is then dissolved. A framework is presented to detect and react to the exceptional changes that can be raised inside workflow driven Web application. First, the provisioning of Web services drastically reduces the capital required to start a business. Web services are readily available for integration and orchestration. LCS enable a wide-integration of business entities for the business organization. Web services are having some different features like: global availabilities and standardization.
IJEDR (INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH) (ISSN:2321-9939) www.ijedr.org
Enterprise service architecture creates an IT environment in which standardized components will w... more Enterprise service architecture creates an IT environment in which standardized components will work together for reducing complexity. Service Discovery discovers a web services that meets our requirements and hence describes a particular service. Since there is no complete and clear understanding about the behavior of service, ontology is used for providing relevant services to the end user. Even though Web Service Definition Language (WSDL) and Universal Description Discovery Integration (UDDI) standards are used for the definition of service interfaces and service registries, they do not provide enough basis for a service consumer to get a full understanding of the behavior of a service. Ontology is a generic knowledge that represents agreed domain semantics that can be reused by different kinds of applications or tasks which is an efficient method to provide clear notion of service. Hence a generic service specification framework for an enterprise using ontology is proposed to get a clear view about the service provided and its functionality. The service specification framework is based on a founded theory, the ψ theory which can be applied both for specifying human services (i.e., services accomplished by the human beings) and IT services (i.e., services accomplished by the IT systems) .The ψ theory is all about the operation of organizations and communication between and production by social actors which underlies the notion of services.
The sun produces an unbelievable amount of energy that reaches the earth. The amount of energy th... more The sun produces an unbelievable amount of energy that reaches the earth. The amount of energy that is absorbed by the earth in one hour is more energy than mankind uses in one year. The total amount of solar energy reaching the earth in one year is huge twice as much energy as ever existed from all sources of coal, oil, natural gas, and uranium combined. With its abundance of sunlight, India has tremendous potential to emerge as one of the leaders in solar power generation. According to the Government of India’s policy for the solar sector – Jawaharlal Nehru Nationaln Solar Mission (JNNSM) – a target of 20 GW of solar installations by 2022 has been set. India is endowed with vast solar energy potential, About 5,000 trillion kWh per year energy is incident over India’s land area with most parts receiving 4-7 kWh per sq. m per day. Solar energy intensity varies geographically in India, but Western thar Rajasthan receives the highest annual solar radiation energy. Its western thar part blessed with abundant natural resource with more then 325 days of sunshine every year. Jodhpur , popularly known as the sun city of india. A dedicated 400 kV network with associated 220 & 132 kV strong transmission network in Barmer, Jaisalmer, Jodhpur, Bikaner area was created. Indeed, Rajasthan is the only State in India which has established a strong power evacuation network in desert area. Hence current status, various issues, regulatory policies and incentives for promotion of Solar PV Power Parks in Rajasthan along with a case study , site report and geotechnical investigation for Photovoltaic Solar Power Plant has been discussed in this Paper. Keywords - PV Solar Power, Renewable Energy, JNNSM, Research and Devlopment in Solar Projects of Rajasthan.
India is blessed with rich solar energy and if exploited efficiently, the country has the potenti... more India is blessed with rich solar energy and if exploited efficiently, the country has the potential of producing trillionkilowatts of electricity. Sunlight is converted to electricity directly when made to fall on solar photovoltaic (SPV) modules. Systems /devices are made for various applications based on SPV modules connected with suitably designed power conditioning units for meeting electricity requirements. These systems/devices are designed to work in offgrid mode (usually supported with batteries to allow use when sunlight is low or during night). In recent years solar PV systems became viable and attractive. Utility scale plants are being set up worldwide with promotional mechanisms which are set up on ground surface. Available rooftop area on the buildings can also be used for setting up solar PV power plants, and thus dispensing with the requirement of free land area. The electricity generated from SPV systems can also be fed to the distribution or transmission grid after conditioning to suit grid Integration.Currently, whole world is in the midst of an energy revolution that is fundamentally changing the future of rural electrification. So we present a review in this paper on todays policy and status of grid connected roof top PV system in Rajasthan
Objective of this study is to identify barrier of supply chain management (SCM) in manufacturing ... more Objective of this study is to identify barrier of supply chain management (SCM) in manufacturing organization through systematic literature review of past ten years and identify most critical barrier which hinder the performance of supply chain. List of barrier identified by comprehensive literature review is presented here. This paper has identified 23 key SCM barriers which help industrial practitioners and academic experts to implement SCM. Nowadays manufacturing organizations are competing based of supply chain to supply chain rather than organization to organization. Effective supply chain management help organization to in securing his position in this competitive environment and improving organizations performance.
In this project the development of a motorcycle security system that uses a microcontroller to de... more In this project the development of a motorcycle security system that uses a microcontroller to detect theft and inform the owner using a mobile phone when theft occurs. This system protects motorcycle from theft and provides a reliable security system to motorcyclist with affordable price. The microcontroller is the interface between the GSM module and the vehicle. It stimulates the module in message forwarding and it is programmed in such a way that it switches OFF the engine once it receives a message from the user, thus emphasizing its significance in preventing vehicle hi-jack. The process happens in a short period of time, and hence proves to be vital for theft control. For security purpose we need to interface EEPROM for password. And here we are also sending the coordinates in the way of LAT &LOT getting from GPS nothing but vehicle location to the user .They are much smaller and simplified so that they can include all the functions required on a single chip. Having the micro- controller is of great use, as it has low design cost and adds intelligence to the system.
Cognitive radio is a seemly hopeful technology for future. Spectrum sensing is the most important... more Cognitive radio is a seemly hopeful technology for future. Spectrum sensing is the most important function of cognitive radio. Most of the spectrums sensing techniques proposed become dysfunctional at lower signal to noise ratio environments. This paper proposes a reliable spectrum sensing algorithm for cooperative cognitive network. A dynamic threshold updating method is developed for which threshold changes with the environmental noise impact. Energy detector will be used as basic block to development. The reliability of sensing technique is evaluated in terms of probability of error and minimum signal to ratio it tolerates. The work includes study of existing spectrum sensing techniques that are single threshold energy detector and double threshold energy detector and their implementation in the cooperative sensing environment. Finally they are juxtaposed in cooperative environment. Optimal number of cognitive radios required in the decision making process is also calculated.
Load flow has always been a critical problem and has been approached by several researchers. The ... more Load flow has always been a critical problem and has been approached by several researchers. The techniques like Newton Raphson and Gauss Siedel works well but has severe computational disadvantages.The purpose of this paper is to analyse the voltage stability of electric power distribution system. A new method is established for computing voltage stability index (VSI) for each nodes of any distribution network. The most sensitive node is that node which having minimum value of voltage stability index. This paper proposes a novel direct method to load flow for distribution systems. The system has been simulated for constant power load considering losses. The methodology has been implemented on MATLAB R2013b and voltages of each bus are found out and real and reactive losses are calculated. Also the most sensitive node is found out. The results shows an improvement over traditional methods
Load flow has always been a critical problem and has been approached by several researchers. The ... more Load flow has always been a critical problem and has been approached by several researchers. The techniques like Newton Raphson and Gauss Siedel works well but has severe computational disadvantages. Since only two of the required four parameters are known, hence a load flow approach has to be implemented. This paper proposes a novel direct method to load flow for distribution systems using losses which saves computation power. The system has been simulated for constant power load considering losses. The methodology has been implemented on MATLAB R2013b and voltages of each bus is found out and real and reactive losses are calculated. Also the most sensitive node is found out. The results shows an improvement over traditional methods.
Obstacle detection is a main key of autonomous vehicles. When communicating with huge robots in u... more Obstacle detection is a main key of autonomous vehicles. When communicating with huge robots in unstructured background, resilient obstacle detection is required. Few of the existing methods are mainly suited for the backgrounds in which the ground is comparatively flat and with roughly the same color throughout the terrain. A novel procedure proposed in the work presented here uses a monocular camera, for real-time performance. We compute the homography between two successive frames by computing the fundamental matrix between the two frames. Estimation of fundamental matrix is followed by triangulation so as to estimate the distance of the object from the camera. We examine a difficulty intrinsic to any fundamental matrix-based outlook to the provided task, and show how the discussed way can resolve this difficulty by a huge level. An obstacle detection and distance estimation system based on visual particular attribute and stereo vision is hence discussed in the presented work.
Uploads
Volume3 Issue2 by Editor International Journal of Engineering Development and Research IJEDR
A Truck’s chassis Frame forms the structural backbone of a commercial vehicle. The main function of the truck chassis frame is to support the components and payload placed upon it. When the truck travels along the road, the chassis is subjected to vibration induced by road roughness and excitation by vibrating components mounted on it. This paper presents the study of the vibration characteristics of the truck chassis that include the natural frequencies and mode shapes. The responses of the truck chassis which include the stress distribution and displacement under various loading condition are also observed. The method used in the numerical analysis is finite element technique. The results show that the road excitation is the main disturbance to the truck chassis as the chassis natural frequencies lie within the road excitation frequency range. The mode shape results determine the suitable mounting locations of components like engine and suspension system. Some modifications are also suggested to reduce the vibration and to improve the Strength of the truck chassis.
Keywords - Distributed arithmetic (DA), Anti-symmetric Product Coding(APC) and modified Odd Multiple Storage(OMS), Least-mean-square(LMS).
Keywords-Digital Image Watermarking, Wavelet Transform, Discrete Cosine Transform, Attacks
Keywords - ECG, Arduino Uno, Zigbee.
Index Terms – multitenancy, Cloud computing, database as a service, elasticity.
Index Terms – multiuser detection, matched filter, decorrelating, MMSE, CDMA.
Index Terms- Robust Statistics, Feed-Forward Neural Networks, M-Estimators, Classification, Robust classifier.
Index Terms—dc-dc converter, dc micro-grid, voltage droop control
Router drives the incoming packet which comes from the input port to output ports based on the address contained in the packet. The router has a one input port from which the packet enters. It has three output ports where the packet is driven out. The router has an active low synchronous input resetn which resets the router. Thus the idea is borrowed from large scale multiprocessors and wide area network domain and envisions on chip routers based network. This helps to understand how router is controlling the signals from source to destination based on the header adders. It also tells when data have to be extracted for a particular port and also it gives idea about port is full or empty.
This method removes most of the problems cited above and improves the performance of router. The most familiar type of routers are home and small office routers that simply pass data, such as web pages and email, between the home computers and the owners’ cable or DSL modem, which connects to the internet (ISP). Routers may also be used to connect two or more logical groups of computer devices known as subnets, each with a different sub-network address.
At present, bus operation through Public Private Partnership is given to the private operator “VTCOS” strictly on the contractual period of 5 (Five) years only. The capacity of the buses is not so good and effective transportation is not provided. It does not cover the major part of the city area and the routes are not effective.
In this paper, we use the BSIMSOI Model to simulate the analog circuits using EDA tools like Cadence and thereby verify the modeling of SOI MOSFET’s.
- Get the right Software Architecture in place
- Ensure high quality software is developed
- It is based on POKA-YOKE principles
- Focus is on user experience
- Ensuring need of the software is identified
- Architecture design follows 12 factor principles
Keywords - PV Solar Power, Renewable Energy, JNNSM, Research and Devlopment in Solar Projects of Rajasthan.
producing trillionkilowatts
of electricity. Sunlight is converted to electricity directly when made to fall on
solar photovoltaic (SPV) modules. Systems /devices are made for various applications based on SPV
modules connected with suitably designed power conditioning units for meeting electricity requirements.
These systems/devices are designed to work in offgrid
mode (usually supported with batteries to allow
use when sunlight is low or during night). In recent years solar PV systems became viable and attractive.
Utility scale plants are being set up worldwide with promotional mechanisms which are set up on ground
surface. Available rooftop
area on the buildings can also be used for setting up solar PV power plants,
and thus dispensing with the requirement of free land area. The electricity generated from SPV systems
can also be fed to the distribution or transmission grid after conditioning to suit grid Integration.Currently,
whole world is in the midst of an energy revolution that is fundamentally changing the future of rural
electrification. So we present a review in this paper on todays policy and status of grid connected roof
top PV system in Rajasthan