ARPN Journal of Engineering and Applied Sciences         ISSN 1819-6608 (Online)

   
Custom Search
 
 
 
ARPN Journal of Engineering and Applied Sciences          March 2015 | Vol. 10  No. 4 
   
Title:

Design and implementation of an audiometry system capable of monitoring neuronal activity related to the patient's hearing

Author (s):

A. Soto Otálora, L.A. Guzmán Trujillo, F. E. Calderón Anaya and O. Suaza Medina

Abstract:

The project developed a design for and use of a software controlled audiometry system. The system is able to check the neuronal changes that have relationships with the user audition. It has an audiometer to produce stimuli, an electroencephalograph to track neuronal changes, and a Labview 2012 interface that controls hardware and processes nerve signals. This system uses an Atmel microcontroller (ATXMEGA128A4U); a device that scans the signals recorded by the electroencephalograph, synthesizes tones used by the audiometer, and is equipped with a USB port that allows for connection to a computer.

 
 
 
Full Text 

Title:

Simulation of wind effect on a quadrotor flight

Author (s):

Solovyev Viktor V., Finaev Valery I., Zargaryan Yuri A., Shapovalov Igor O. and  Beloglazov Denis A.

Abstract:

Different disturbances should be taken into account to solve the quadrotor flight control problem. Wind effect is a disturbance in a quadrotor flight control system. A model of wind effect on quadrotor flight was developed in this paper. The model is a number of elements: the model of wind velocity change, the model of a gust (“wind step”), the model of wind velocity change depending on a flight altitude, the model of wind direction change. The model of wind velocity change takes into account wind velocity increasing and decreasing. The wind force expression depending on the effective influence area on a quadrotor was derived. The steps of the wind disturbances simulation algorithm are given here.

 
 
 
Full Text 

Title:

Mapping optimization for common rail diesel conversions from the automotive to the flying applications

Author (s):

Luca Piancastelli and  Leonardo Frizziero

Abstract:

Performance of electronic controlled diesel engine is depended on quality of the map(s).  In this paper, the implementation of  an electronic-control map in common rail diesel engine is made, the character of operational profile in diesel engine and rule of typical profile data obtained from experiment is analyzed, a method of developing these surfaces from very few data point is applied.  The particular application of aircraft and helicopter common rail direct injection diesel engines is considered. The steps of this experimental optimization activity is presented in order to test to operational profile demand. This demand is very different from the automotive to the aircraft/helicopter application. The preparation of the test engine(s) and of the test electronics for brake tests is completely different. Also the mapping technique differs substantially being the primary objectives widely different.

 
 
 
Full Text 

Title:

Numerical study on ecological commensalism between two species with harvested commensal

Author (s):

N. Seshagiri Rao, K. V. L. N. Acharyulu and K. Kalyani

Abstract:

The present paper deals with the numerical studyon the ecological model comprising the commensal species and the host species with a constant harvesting of the commensal species. Further, both the species are considered with the limited resources. The corresponding trajectories of the commensal species (growth, balanced and mortal commensal species) and the host species have been illustrated for wide range of the values of the parameters in the model. The dominance reversal time of the host species over the commensal species or vice versa and the sustainability of the commensalism interaction between the species is also discussed.

 
 
 
Full Text 

Title:

Implementation of five level inverter considering PV system using MPPT technique

Author (s):

G. Balasundaram and  S. Arumugam

Abstract:

This paper exposes a single phase five level inverter for PV scheme with a new pulse width modulation control scheme. The inverter capability is used to five steps of producing voltages (Vdc/2, Vdc, 0, -Vdc/2,-Vdc) from the input voltage. Maximum Power Point Tracking (MPPT) was implemented in Photovoltaic’s system along Fuzzy controller. The excepted scheme was proved over simulation along with carryout in a model.

 
 
 
Full Text 

Title:

Capable task deferment technique for grid networking

Author (s):

R. Natchadalingam and K. Somasundaram

Abstract:

Grid networking is an aggregation of geographically dispersed computing, storage, and network resources, coordinated to deliver improved performance, higher quality of service, better utilization, and easier access to data. It enables virtual, collaborative organizations, sharing applications and data in an open, heterogeneous environment. Scheduling is the process that selects which job in the queue should be considered next. Grid Scheduling is the process of making scheduling decisions involving allocating jobs to resources over multiple administrative domains. The goal of scheduling is to minimize the make-span by finding an optimal solution. In the present Grid Networking environment, the scheduling approaches. In a Grid Networking environment there are many more constraints that would make the job scheduling problem more complicated. The issues in the existing system are the dynamic environment of the Wireless Grid makes necessary the use of sophisticated mechanisms for resource discovery and selection. Task monitoring and check pointing is difficult in dynamic environments. In this paper we have proposed a Task Deferment Algorithm, using activates strategy system to effectively allocate the resources to the tasks by performing sort-out. If a task does not continue its execution due to disconnectivity of resources, the resources for that task will be provided immediately next from the task which has finished its execution.

 
 
 
Full Text 

Title:

Barriers faces telemedicine implementation in the developing countries: Toward building Iraqi telemedicine framework

Author (s):

Mohd Khanapi Abd Ghani, Mustafa Musa Jaber and Nanna Suryana Herman

Abstract:

The Iraqi healthcare services are tussling get possession of lost momentum. Many professional physicians and nurses left Iraq because the current situation there. In spite of the plans of calling back the skilled health workforce but they still afraid of disadvantage of their return. Hence, technology plays a central role to take advantage of their profession through the use of telemedicine. Thus it is the need to study the factors that effects the implementation of telemedicine that covers network services, policy makers and patient understanding. This paper shows the issues that faces the implementation of telemedicine and analyze the literature of previous telemedicine in Middle East countries to find out the essential factors toward building Iraqi telemedicine framework.

 
 
 
Full Text 

Title:

Measurement of tropospheric scintillation using KU band satellite beacon data in tropical region

Author (s):

Govardhani Immadi, Sarat K Kotamraju, M. Venkata Narayana, Habibulla Khan, Sreemadhuri A., K. Sravya Chowdary and  P. Vineela

Abstract:

The down Link signal traveling from satellite to the earth surface need to pass through the layers of the atmosphere situated at an altitude above the earth surface. While passing through these layers the radio wave undergoes some changes in its characteristics. These fluctuations are observed in the troposphere (0 to 12 km containing nitrogen (78 percent) and oxygen (21 percent), with the remaining 1- percent consisting of argon, (.9 percent) and traces of hydrogen ozone (a form of oxygen)), very close to earth surface, so they are called as tropospheric scintillations. There are two types of scintillations called amplitude and phase scintillations. In this paper we are concentrating on estimation of trosposheric amplitude scintillation. While considering lower frequencies (<3GHz) we take the effects of ionosphere into consideration. For higher order frequencies(>10GHz)ionosphere acts as a transparent layer, so only tropospheric scintallations are taken into consideration.Tropospheric amplitude scintillation can be defined as rapid fluctuations in the amplitude of the radio wave caused by changes of refractive index at the altitude. It is caused by humidity and temperature of the atmosphere. The effects of tropospheric scintillation are seasonal and vary from day to day with local climate. In this paper we are estimating the tropospheric amplitude scintillation for ku-band down link signals using RECOMMENDATION ITU-R P.618-8 (Propagation data and prediction methods required for the design of Earth-space telecommunication systems).

 
 
 
Full Text 

Title:

Performance evaluation of MMS routing for campus monitoring wireless sensor network

Author (s):

M. S. Godwin Premi

Abstract:

In this paper, MMS (Multiple Mobile Sinks) routing algorithm which handles the sink node mobility is proposed in order to handle the overhead mobility, with maximum lifetime and energy efficiency, reduced end to end delay amidst topology changes for assured security for monitoring campus and environment control applications. In this MMS routing, multiple mobile sinks are used to collect the data from the wireless sensor network which is deployed around entire campus like university. The mobility of sinks makes the transmission of data from source node to sink node easier by reducing the number of intermediate router nodes. For each mobile sink, a particular region like department block is allotted and the performance of MMS routing with respect to region of interest and the total area of interest are studied. The impact of different mobility models are analyzed with MMS routing and found that the wind mobility model provides better performance. To enhance the performance of MMS routing, security is incorporated as a part of routing to avoid unauthorized data. This is achieved by using SSCA algorithm. The proposed algorithm is simulated using Matlab and Omnet++. Simulation results prove that MMS routing is well suited for monitoring class rooms or blocks as well as environment control applications.

 
 
 
Full Text 

Title:

Performance evaluation of BPN based Viterbi decoder for decoding 2-Bit and 3-Bit errors

Author (s):

V. Balamurugan and N. M. Nandhitha

Abstract:

In communication, convolution codes are extensively used for reliable data communication at receiver’s end the coded messages are decoded with Viterbi Decoders. However when the channel is noisy decoding becomes computationally complex even with enhanced Viterbi Decoder, hence it necessitates an efficient computationally less complex decoders. In this paper Viterbi Decoders are realized in BPN, performance of the decoder for 2-bit errors and 3-bit errors is studied in terms of accuracy. It is found that Back Propagation Network (BPN) based Viterbi Decoder functions well for both 2-bit and 3-bit errors even after shrinking the hidden layer architecture.

 
 
 
Full Text 

Title:

Deformation analysis of rigid pavement with sub grade of dredged sediment stabilized

Author (s):

Hamzah Yusuf,  Akhmad Azis and Sugiarto Badaruddin

Abstract:

This study aims to determine the elastic deformation of rigid pavement using dredging sediment sub grade stabilized with cement. This research was conducted in the laboratory and in the field using dredging sediment samples from the Intake of Bili - Bili Dam, sediment samples were taken from twelve dredging points with respective distance from the dam’s weir about 100-200 m. The test and analysis of sediment characteristics of cement stabilization adopted standard methods, namely, ASTM. While the test and analysis of deformation models adopted the loading test method. The result of previous studies showed that dredging sediment of Bili - Bili Dam is classified as a fine-grained soil (silt - clay), include in the category of moderate to poor soil. By adding different variations of cement portion (cement stabilization), an increase was showed in the strength capacity/ bearing capacity and meet the condition as a road sub grade as seen from the CBR (capacity bearing ratio) field tests with the addition of cement portion of 5%, 10%, and 20%. Based on those results, loading test was conducted for the rigid pavement using dredging sediment sub grade with cement stabilization. From the test results, elastic deformation was obtained with the variation centric loading up to 9 tons. Furthermore, numeric validation was employed, where its results are in a good agreement with the results of the loading test.

 
 
 
Full Text 

Title:

Study of influence of process parameters on surface roughness of AMMCs in wire electrical discharge machine

Author (s):

B. Naga Raju, K. Ramji, P. SrinivasaRao and VSRK Prasad

Abstract:

The usage of composite materials has been increasing globally in all manufacturing industries. Non-Traditional machining methods like Wire Electrical Discharge Machining (WEDM) plays important role in precision manufacturing. In this study, an attempt is made to study the influence of process parameters like pulse-on time, pulse-off time and peak current on surface roughness of Aluminum Metal Matrix Composites (AMMCs). The composite material containing aluminum alloy as matrix, 5 wt % silicon carbide as reinforcement is produced by stir casting technique. Experiments are conducted based on design of experiments. The results show that the machined Surface quality improves with increase in pulse-off time, while the pulse-on time produces poor surface quality. Higher peak current leads an inferior surface finish. The pulse duration has also an important and overbearing effect on surface roughness. Finally, Prediction of Surface Roughness (Ra) in terms of the process parameters using Artificial Neural Networks (ANN) is performed and the predicted values were compared with experimental data by varying the number of neurons in the intermediate hidden layers (i.e. 5, 6, 7 neurons). Based on the analysis carried out, it was observed that the neural network structure with 3 layers and 7 neurons was best in predicting the surface roughness.

 
 
 
Full Text 

Title:

An improved cross-layer design optimization for TCP performance in wireless networks

Author (s):

Manikandan and Bala Subadra

Abstract:

In this paper, we intend to optimize the cross-layer design in wireless networks to avoid the congestions and packet losses between the network nodes. The conventional TCP used in wired network cannot be adapted to wireless networks as it is. By considering this fact a novel congestion control algorithm is developed with the modified acknowledgement aggregating model to avoid packet losses and for congestion control in the network. The major reason for packet losses is due to high bit error rate in the networks. Instead of invoking a congestion control mechanism after a packet loss, the proposed cross layer mechanism uses the cross layer feedback from the above and below layers, which improves the TCP performance. TCP Reno-2 model has been used for the simulation purpose and the performance of the proposed system is evaluated in terms of end-to-end delay and end-to-end throughput of the system.

 
 
 
Full Text 

Title:

Archimedean spiral antenna on moveable ground plane for UWB applications

Author (s):

Abdi Rahman M. S., Fauziahanim C. S. and Waddah A.

Abstract:

In this paper we investigate the performance of a two-arm Archimedean spiral antenna over a moveable conducting ground plane (GP) for UWB applications. The performance of the antenna in terms of return loss, gain, axial ratio and radiation pattern are analyzed when the electrical separation between the spiral arm and ground plane is maintained at 0.25 λ over the frequency range 3.1 – 10.6 GHz. The results demonstrate that as physical separation of the GP reduces, the overall antenna’s performance deteriorates. The results show that gain of the spiral antenna can be increased more than 9 dB with -10 dB operating bandwidth of more than 100%. The simulated and measured results have shown good agreements.

 
 
 
Full Text 

Title:

Performance of ultra-wideband wearable antenna under severe environmental conditions and specific absorption rate (SAR) study at near distances

Author (s):

Waddah A.  M. A., Khairun N. R. and Abdirahman M. S.

Abstract:

Two ultra-wideband (UWB) planar monopole antennas have been reported in this paper. The antennas have been developed for wearable application. Worn-systems require flexibility and tolerance against external effects. The substrates of the proposed antennas have been made of jeans while radiators were made of copper tapes. Simulated and measured performances of the antennas in terms of return loss and radiation patterns have been discussed in this work. Recorded results have shown that the operating frequency ranges from 3.04 GHz to 10.3 GHz and from 3.04 GHz to 11.3 GHz with respect to -10 dB for the first and second antennas respectively. The antennas have been tested under severe conditions such as operating in water and aggregates and results have been presented and discussed. Moreover, an extended study on the safety concerns of the antennas by means of specific absorption rate (SAR) has been included in this work. The approximated SAR has been found to be within the safety guidelines set by Federal Communications Commission (FCC).

 
 
 
Full Text 

Title:

GA based optimization of the preliminary design of an extremely high pressure centrifugal compressor for a small common rail diesel engine

Author (s):

Luca Piancastelli and Leonardo Frizziero

Abstract:

A method to perform the preliminary design of an impeller for an extremely high pressure ratio centrifugal compressor is introduced  in this paper. The equations used are fully detailed and a design procedure is introduced. This design procedure required a GA (Genetic Algorithm) optimization to obtain an acceptable optimum result. It is demonstrated that a 8:1 compressor can be designed for a mass flow of 500 kg/h. This GA optimized initial design should be then be validated through CFD (Computational Fluid Dynamics) simulation and then tested on a test bench. However, the initial design phase is critical, since a CAD model of the impeller is needed to start the simulation process. In our case this initial phase couldn’t be inspired by existing design, since none were found. Aircraft and Helicopter engines do not have the problem of turbolag, since fan/propeller inertia eliminates this problem. On the contrary these engines necessitate of performance at altitudes (flight levels) much higher than automotive applications. Small turbochargers with high compressor ratio are not available on the market, so a special design is needed.

 
 
 
Full Text 

Title:

Pulse oximetry module to implement in team monitor of vital signs

Author (s):

A. Soto Otalora, L. A. Guzman Trujilloy and A. Diaz Diaz

Abstract:

This article presents meticulous description of a pulse oximetry module. This module allows to measure two variables: the saturation of oxygen in the hemoglobin of the blood and heart rate. The measurement is made through a sensor which contains two LEDs that emit red and infrared light which pass through the patient's finger to a photodetector, which measures the absorbance of each wavelength caused by arterial blood. The microcontroller calculates the percentage of oxygen saturation by the ratio of the absorbance of the red and infrared light. The pulse oximeterplethysmographic sensor wave whose period corresponds to the heartbeat is also obtained. These two facts together with the other variables are shown in a GLCD screen 240x128 pixels.

 
 
 
Full Text 

Title:

Model of the controller for output stream concentration in the mixer of a steam unit

Author (s):

Kobersy Iskandar S., Finaev Valery I., Zargarjan Jury A., Beloglazov Denis A. and Shadrina Valentina V.

Abstract:

There is an actuality validation for the development and research of hybrid intelligent system synthesis methods in this paper. We considered the model of the output stream concentration control for lighting-up equipment of steam unit boiler. The control of the electric motor of the mixer from the lighting-up equipment is carried out by a hybrid controller application. FUZZY LOGIC TOOLBOX was used for simulation. The synthesis of the control model of the mixer output stream has been done. A conventional control method and the fuzzy control method were used for the system synthesis. We used Mamdani algorithm to implement the fuzzy control model of the mixer output stream concentration. There is a description of the procedure of the fuzzy system model integration in SIMULINK interactive system by means of the graphic editor FIS in this paper. The results of this work are meant for the experimental researches of intelligence hybrid control system parameters.

 
 
 
Full Text 

Title:

Effect of structural and doping parameter variations on NQS delay, intrinsic gain and NF in junctionless FETs

Author (s):

B. Lakshmi and R. Srinivasan

Abstract:

This paper investigates the effect of process variations on RF metrices, non-quasi static (NQS) delay, intrinsic gain and noise figure (NF) in 30 nm gate length Junctionless FET by performing extensive 3D TCAD simulations. Sensitivity of NQS delay, intrinsic gain and NF on different geometrical parameters and fin doping are studied. The most significant parameters are found to be gate length, fin width and fin doping. The underlap and gate oxide thickness have a least impact over these RF metrics.

 
 
 
Full Text 

Title:

Text independent human voice ranking system for audio search engines using wavelet features

Author (s):

A. Jose Albin and N. M. Nandhitha

Abstract:

Performance of conventional text based audio search engines can be improved with feature based search engines. In this paper, text independent audio ranking system for audio engines with audio signal as query is proposed. Discrete Wavelet Transform (DWT) is used for feature extraction. Ranking is obtained using three different distance metrics namely Euclidean distance, Manhattan distance and Maximum distance. An efficient ranking system is identified based on the performance of the proposed technique in terms of accuracy of detection.

 
 
 
Full Text 

Title:

A fast and efficient feature selection algorithm for microarray gene expression and cancer classification

Author (s):

M. Yasodha and  P. Ponmuthuramalingam

Abstract:

Cancer research is one of the most important research areas in the medical field. The most vital process for gene is identification and classification of cancer. The significance of the every gene is to be initiated by the gene raking measurement. Gene expression summary by microarray method has been efficiently use for classification and analytical guess of cancer nodules. Gene ranking technique which use mostly is T-Score. Genes are collected from the dataset. Amount of feature selection algorithm may form mistake for their ranked gene appearance. To avoid this, proposed technique makes the improved precision by producing a feature selection algorithm in gene expression data investigation of model classifications. That the planned technique choose the gene and divides the genes into subset, from the features, gene ranks are chosen. The Lymphoma and Leukemia dataset genes are utilized. The proposed technique shows capable classification accuracy for the whole test data sets.

 
 
 
Full Text 

Title:

Computer aided detection of tumors in mammograms using optimized support vector machines

Author (s):

Ramani R. and N. Suthanthira Vanitha

Abstract:

Mammography is a low dose x-ray procedure for the visualization of internal structure of breast. It detects about 80–90% of the breast cancers without any note of symptoms. A framework for classifying mammograms as tumor and no tumor is presented in this paper. Symlet wavelet and Singular Value Decomposition (SVD) are used for feature extraction and reduction respectively. Boosting algorithm is applied to predictive data mining to generate a sequence of classifiers. A hybrid learning Artificial Bee- AdaBoost (AB-AB algorithm) is proposed by combining concept of Artificial Bee Colony (ABC) algorithm and AdaBoost algorithm. The proposed hybrid algorithm boosts the classification ability of Support Vector Machine (SVM). MIAS dataset is used for evaluating the proposed method. Experimental results are conducted for AdaBoost and proposed optimization technique.

 
 
 
Full Text 

Title:

Cluster image processing technique for porosity estimation of carbonate rocks

Author (s):

N. D. Nurgalieva  and  N.G. Nurgalieva

Abstract:

It is known that the exact value of rocks porosity is difficult to measure. In present paper it is proposed using Cluster Image processing technique which is considered as cost-effective alternative direct method for estimating 2D-porosity from thin sections images of carbonate rocks on base of core samples picked out from carbonate reservoir rocks of Tournasian age in well, situated on southern slope of  South-Tatarian Arch (Volga-Ural region, Russia).

 
 
 
Full Text 

Title:

The investigation of suitability of various line coding techniques for fiber-optic communication

Author (s):

Ashraf Ahmad Adam and Habibu Hussaini

Abstract:

Fiber-optic communication is a way of transmitting information from one place to another by sending pulses of light through an optical fiber (usually made of glass or plastic), and has formed an integral part of the core network across many countries. Line coding deals with various techniques involved in representing digital signal transmission over an analog channel. This paper investigates the performances of recent line coding techniques when used across a fiber optic channel through the representation of the digital signal to be transported over the fiber channel and the effect of the drawbacks involved, such as the inability of the long distance communication owing to DC components when using this technique.

 
 
 
Full Text 

Title:

Bang of LER and RDF in CMOS devices

Author (s):

Priya Stalin and  C. Arun

Abstract:

Device level variability in silicon double gate lateral Tunnel Field Effect Transistors (TFETs) due to Line Edge Roughness (LER) and Random Dopant Fluctuation (RDF) is researched for designs with a 20 nm gate length and body width of 5 nm. Variability in TFET threshold voltage (Vth), on state drive current (Ion), off state leakage current (Ioff ) and sub threshold swing is examined by means of statistical technology computer aided design(CAD) simulations with forethought of body LER likely 1 nm in amplitude as well as RDF for body heights ranging from 10 to 40 nm. The effects of body Line-Edge Roughness (LER) and Random Dopant Fluctuations (RDF) are found to be alike in magnitude and also comparable to those in identical designed Fin FETs, with the uncommonness of Ion variability which is roughly three times higher for TFETs. Arguments are submitted to explain these research based on the operating principle of TFETs be like  to standard metal oxide.

 
 
 
Full Text 

Title:

System dynamics approach in managing complex biological resources

Author (s):

H. Husniah, N. Anggriani and A. K. Supriatna

Abstract:

This paper discusses an application of System Dynamics approach in managing renewable biological resources.  In essence, a management of a biological resource can be regarded as a control to the size of the associated population of the resource subject to certain criteria. For example, in harvesting theory or in fishery industries the management is directed to finding the best size of the population giving rise to an optimal harvest as the objective. In finding this best size one should incorporate both the biological concern (sustainability of the resources) and the economic concern (maximum profit). In this regards, the objective can also be stated in other words, i.e. we have to find the maximum level of harvest such that the long-term sustainability of the resource is warranted.  Technically this level of harvest often is called as the Maximum Sustainable Yield (MSY). The paper is aimed to find the MSY for biological resources having a complex ecosystem structure.  We will assume that the resource forms a metapopulation and in each sub-population the intra-specific competition may vary according to low, moderate and high level of competition. The paper shows that a different harvesting strategy should be applied depending on the level of competition status in each sub-population. Keywords: Maximum sustainable yield, Intraspecific competition, Metapopulation model.

 
 
 
Full Text 

Title:

Performance of al-fly ash metal matrix composites

Author (s):

R. Elangovan and M. M. Ravikumar

Abstract:

Aluminium fly ash metal matrix composites (MMCs) find important applications in aerospace and automobiles where specific stiffness is important. Low cost fly ash and silicon carbide reinforcement are widely used in aluminium metal and matrix composite due to its low density, high young modulus and strength apart from good mechanical and chemical compatibility & thermal stability. However the MMCs often suffer from low ductility, toughness and fatigue crack growth resistance relative to the matrix alloy. Such applications require materials offering light weight, high strength to weight ratio with required mechanical properties. The applications of Al-Flyash-SiC MMCs are limited due to their poor machinability. In order to overcome the machining difficulty, Hybrid Al-Flyash- SiC composites are fabricated. The present study deals with the machining characteristics of Hybrid Al-Flyash-SiC MMC of different volume fractions (5%, & 10%) by weight.

 
 
 
Full Text 

Title:

Durability of binary and ternary concrete mixtures considering aging effect

Author (s):

Petr Konecny and Petr Lehner

Abstract:

The paper is focused on the evaluation of the effect of concrete long-term maturity with respect to chloride ion ingress related durability. The binary and ternary high performance concrete mixtures are selected for the analysis. The effect of concrete maturing is investigated as well. The data set from complementary laboratory investigation is used for the description of resistance of concrete against ingress of chlorides. The Finite Element-based numerical model is applied in order to evaluate the effect of concrete type as well as the effect of aging.  The influence of extended concrete maturing on the chloride ingress related durability is indicated.

 
 
 
Full Text 

Title:

Multiple crack detection in beams from the differences in curvature mode shapes

Author (s):

K. Ravi Prakash Babu, B. Raghu Kumar, K.L. Narayana and K. Mallikarjuna Rao

Abstract:

The presence of crack in a structure tends to modify its modal parameters (natural frequencies and mode shapes). The fact can be used inversely to predict the crack parameters (crack depth and its location) from measurement of the changes in the modal parameters, once a functional relationship between them has been established. The machine components like turbine blade can be treated as a cantilever beam and a shaft as a simply supported beam. Vibration analysis of cantilever beam and simply supported beam can be extended successfully to develop online crack detection methodology in turbine blades and shafts. In the present work, finite element analysis of a cantilever and simply supported beams for flexural vibrations has been considered by including two transverse open U-notches. The modal analysis has been carried out on cantilever and simply supported beams with two U-notches and observed the influence of one U-notch on the other for natural frequencies and mode shapes. This has been done by carrying out parametric studies using ANSYS software to evaluate the natural frequencies and their corresponding mode shapes for different notch parameters (depths and locations) of the cantilever and simply supported beams FEM model. Later, by using a central difference approximation, curvature mode shapes were then calculated from the displacement mode shapes. The location and depth corresponding to any peak on this curve becomes a possible notch location and depth. The identification procedure presented in this study is believed to provide a useful tool for detection of medium size crack in a cantilever and simply supported beam applications.

 
 
 
Full Text 

Title:

Firefly optimization based design for improving efficiency of induction motor

Author (s):

P.S. Prakash and P. Aravindhababu

Abstract:

This paper presents a Firefly Optimization (FFO) based design methodology for improving the efficiency of Induction Motor (IM). Firefly Algorithm, inspired by social flashing behaviour of fireflies, is one of the evolutionary computing models for solving multimodal optimization problems. Among the number of design variables of the IM, seven variables are identified as primary design variables and the FFO based design methodology is tailored to optimize the chosen primary variables with a view to obtain the global best design. The developed methodology is applied in solving two IM design problems and the results are presented with a view of exhibiting the superiority of the developed algorithm.

 
 
 
Full Text 

Title:

Measurement of rain attenuation for Ku band satellite signal in tropical environment using DAH, SAM models

Author (s):

Govardhani Immadi, Sarat K. Kotamraju, M. Venkata Narayana, K. Rajkamal, Habibulla Khan, G. Viswanath and I. Avinash

Abstract:

Nowadays Telecommunications and broadcasting services are in a rapid phase of expansion. There is an increasing demand for the multimedia services such as high-speed internet, on demand digital TV services, video conferencing and tele-education etc., which need high-speed data rates to cope with the demand whilst guaranteeing a high quality of service[9][10]. The current microwave frequency spectrum allocated for telecommunication and broadcast services has become packed as the proposed broadband systems requires higher bandwidths. However, the attenuation due to atmospheric gases, clouds and rain increases significantly, for the frequencies above Ku- band. Though the attenuation is due to clouds and gases frequently, it is rain that causes the largest attenuation. In this paper three sophisticated models (ITU-R, DAH and SAM) have been explained to calculate rain attenuation. ITU-R model is the most widely accepted model by the international propagation community and is used for estimating long term statistics of rain attenuation at high frequencies in most of the regions. DAH stands for Dissanayake-Allnutt-Haidara Model. This is similar to and an extension of the ITU-R model. This model is also used at high frequencies. SAM stands for Simple Attenuation Model, which is suitable for tropical climate and heavy rainfall regions to calculate attenuation at point rainfall.

 
 
 
Full Text 

Title:

Feature selection based hybrid classification algorithm with embedded zero tree wavelet

Author (s):

T. Karthikeyan and P. Manikandaprabhu

Abstract:

With the development of the remote sensing imaging systems and hyperspectral sensors, the use of hyperspectral image is becoming more interesting. Remote sensing classification is a difficult procedure and requires thoughtfulness of lots of factors. The most important process of image classification may comprise resolve of a fitting classification system, selection of training samples, image pre-processing, feature extraction and accuracy assessment. Land cover information plays an important role in sustainable management, development and exploitation of resources, environmental protection, scientific analysis, modeling, monitoring and planning. Feature extraction recognizes and extracts remarkable features for a challenging task in order to decrease the complication of processing. Embedded Zero tree wavelet (EZW) are used for feature extraction process. Multi-layer perceptron (MLP) is recognized as the best ANN used in classification. The main aim of feature selection is to determine a minimal feature subset from a problem domain while retaining a suitably high accuracy in representing the original features. Particle Swarm Optimization (PSO) is a population based optimization technique used for feature selection. This paper focus on Land cover image classification using EZW algorithm. Here, MLP is an classifier and PSO used for Feature selection process.

 
 
 
Full Text 

Title:

A novel decision tree approach for option pricing using a clustering based learning algorithm

Author (s):

JKR Sastry, KVNM Ramesh and JVR Murthy

Abstract:

Decision tree analysis involves forecasting future outcomes and assigning probabilities to those events. One of the most basic fundamental applications of decision tree analysis is for the purpose of option pricing. The binomial tree would factor in multiple paths that the underlying asset's price can take as time progresses. The price of the option is calculated using the discrete probabilities and their associated pay-offs at maturity date of the option. In this work we came up with an approach to build a binomial decision tree that can be used to price European, American and Bermudian options and a methodology to train the decision tree using a clustering based learning algorithm that minimizes the mean square error (MSE) between the observed and predicted option prices. The training methodology involves clustering the options based on moneyness and fit a linear equation for each cluster to calculate the confidence that needs to be used in building the binomial decision tree for a particular strike price within the cluster. It is observed that the MSE for option price using the proposed model is less when compared to the Black-Scholes model for the proposed learning algorithm.

 
 
 
Full Text 

Title:

Clustering of data sets by using fuzzy algorithm

Author (s):

M. Saravanan and V. L. Jyothi

Abstract:

In this Technological era Clustering is inevitable. For any function arrangement of Data is a primary task.  The collected Data has to be grouped based on their features, Clustering is a method of arranging same or similar attributes and that attributes which are closer to each other are also grouped together.  Clustering is formed of three major process initializing Data is the principle process, Data sets are selected randomly and distance metrics are used.  Iteration reduction is a great challenge as for clustering is concerned.  Fuzzy c-means is applied with the intention of reducing iteration.  This Fuzzy c-means permits one data to function in two sets.  When iteration is reduced clustering will be more effective.  This paper deals with intervention of Fuzzy c-means algorithm in a specified Data set which thereby is to reduce iteration to make the function flaw less and reliable.

 
 
 
Full Text 

Title:

Structural software testing:  Hybrid algorithm for optimal test sequence selection during regression testing

Author (s):

J. Albert Mayan and T. Ravi

Abstract:

Regression testing is one of the testing methods, which is done to assure that the changes  made in fixes or other improvement changes does not affect the previously developed functionality of the software. Due to the reasons mentioned below, the regression testing posses a significant place in the software testing.  Since it reduces the gaps of an application, modification has to be created and tested, test the new modifications to check that the modification did not change the any other part of the application, test coverage must be enhanced without conciliation of timelines. Thus, the test case generation and test case selection is the import role in the SUT (Software Under Test). More techniques are proposed to overcome these issues however those techniques could not be achieved complete code coverage with less time duration. In this paper proposed a hybrid algorithm which is used to resolve an optimal test case sequence selection as well as new test case generation for regression testing.  The experimental results are shown our proposed approach is achieved better results rather than other approaches.

 
 
 
Full Text 

Title:

A new diamond – orthogonal search algorithm for fast block matching motion estimation

Author (s):

Nurul ‘Atiqah Hamid, Abdul Majid Darson, Nurulfajar Abdul Manap,  Redzuan Abdul Manap and Mohd Shakir Md Saat

Abstract:

In video processing, Block Matching Algorithm or BMAs plays an important part as it is widely used in most of well-known video codes due to its simplicity and high compression efficiency. This paper proposed a new algorithm, namely Diamond-Orthogonal Search Algorithm (DOS) which employs large diamond search pattern and orthogonal shape for its search steps. At initial step, an additional step is added to predetermine static block to further speed up the search process as it is beneficial to small motion video sequence contents. Several established algorithms, namely Full Search (FS), Three Step Search (TSS), Hexagon –Diamond Search (HDS) and Orthogonal Diamond Search (ODS) together with proposed algorithm are implemented using MATLAB and their performance are being compared and analyzed in terms of peark signal-to-noise ratio (PSNR) and number of search points. Based on the simulation result, motion vector can be found with fewer search points while maintaining close video quality performance with other algorithms.

 
 
 
Full Text 

Title:

A high efficient fuzzy logic controlled maximum power point tracking (FLMPPT) in solar PV for brushless DC motor drives

Author (s):

Max Savio and Sasikumar Murugesan

Abstract:

In this paper, the solar panel using fuzzy controlled maximum power point tracking is analyzed for a brushless DC motor (BLDC). The BLDC is powered by the solar panel through an integrated inverter circuit to produce an AC signal. The solar panel power obtained is tracked by an artificial intelligent technique using fuzzy logic controller to extract the maximum power from the panel. The maximum power tracking is obtained using the DC to DC converter circuit. The DC to DC converter is controlled to operate at buck and boost mode by controlling the duty cycle. The DC power output is inverted using a three phase inverter circuit to source the BLDC motor. The proposed method improves the power transfer capability by using intelligent controller which overcomes the power losses during the transfer of energy. The proposed system is mathematically modeled using MATLAB. A similar model is experimented and the results are compared and analyzed.

 
 
 
Full Text 

Title:

Design of ultra wideband small circular patch antenna for wireless communication

Author (s):

Soufian Lakrit and Hassan Ammor

Abstract:

This paper presents the design of an ultra-wideband Circular microstrip patch antenna for (UWB) communications. In this structure there is a small Circular patch consists of a partial ground plane and fed by a 50 Ω microstrip line.  The proposed antenna can achieves a wide bandwidth from 2.72 GHz to 12.17 GHz with VSWR < 2 with stable and bi-directional radiation pattern. The simulation of this antenna has been performed by using Ansoft High Frequency Structure Simulator (HFSS) and Computer Simulation Technology- Microwave Studio (CST).

 
 
 
Full Text 

Title:

A new secured VoIP using verifiable secret sharing

Author (s):

R. Shankar  and E. Karthikeyan

Abstract:

Voice communication carried out using the Internet Protocol (IP) for the transaction is known as Voice over Internet Protocol (VoIP). Voice over Internet Protocol is a technology for communicating using “Internet protocol” instead of traditional analog systems. Some VoIP services need only a regular phone connection, while others allows making telephone calls using an Internet connection instead. Some VoIP services may allows only to call other people using the same service, but others may allow to call any telephone number - including local, long distance, wireless and international numbers. The fundamental idea of secret sharing is the secret message is sending through a single specified path in secured manner, so secrete sharing is must for sharing VoIP messages. There are several secret sharing’s used in VoIP, the most secured VoIP is Verifiable Secret Sharing (VSS). Verifiable Secret Sharing is an important primitive in distributed information that allows a dealer to share a secret among huge number of parties. Verifiable secret sharing is a way of giving information to a set of processors such that a quorum of processors is needed to access the information. VSS is a fundamental tool and distributed computing. Experimental result shows thus the proposed method of verifiable secret sharing is much secured because it overcomes the problems from packet loss, delay, security and quality.

 
 
 
Full Text 

Title:

Helmet cooling system using phase change material for long drive

Author (s):

A. Chelliah, B. Karthick,  A. Vimalkodeeswaran and V. R. Hariram

Abstract:

The helmet is critical safety equipment for a two wheeler drivers. The primary purpose of helmet is to protect the head against injuries and to safeguard the eye from sunlight and dust particles. It is crucial that the motorcyclist is comfortable while wearing the helmet. The inconvenient equipment may affect concentration and create hazards that could lead to accidents. The motorcyclist can be affected by temperature which results in loss of concentration. This work focuses on absorbing the heat produced inside the helmet. To achieve this, a suitable Phase change material (PCM) Glauber Salt is encapsulated inside an Aluminum Foil. In addition, holes are created on the front and rear sides of the helmet. This allows circulation of fresh air flow inside the helmet so that the heat produced in the helmet is instantaneously tapped out. Thus continuous cooling is achieved till it he entire PCM fuses. Solid works is mechanical design software; provide tools to help you implement a sophisticated standard based architecture. Solid works software sketcher is used model and flow simulation, heat is removed by providing the phase change material.

 
 
 
Full Text 

Title:

Maximizing the lifetime of cognitive sensor network using sub fusion centers

Author (s):

Jenifer Angel J, Punal M. Arabi

Abstract:

A cognitive radio is a transceiver which enables an unlicensed user to adaptively adjust its operating parameters and exploit the spectrum which is unused by licensed users in an opportunistic manner.  Cognitive Radio optimizes the utilization of radio resources, by switching channel to the most suitable transport channel based on traffic volume (throughput), radio resources availability, radio conditions and mobility.  Spectrum opportunity deals with the usage of an available (free) channel that is a part of the spectrum which is not currently used by primary users. Extending the lifetime of the energy constrained wireless sensor networks is a main challenge in sensor network applications.

 
 
 
Full Text 

Title:

Modeling and simulation of control actuation system

Author (s):

R. Arulmozhiyal, M. Murali and R. Manikanadan

Abstract:

In this paper a dynamic simulation model is implemented using Fuzzy logic controlled Brushless direct current motor drives for fin control actuation. The Brushless direct current (BLDC) motor is modeled using MATLAB-SIMULINK models and controlled by fuzzy logic controller. In addition to this, current hysterias controller block, inverter block and speed estimated block, entire blocks are modeled in SIMULINK environment and resulted are compared with conventional methods. In order to validate the models, the models are loaded with different loads conditions and a simulation output during loaded conditions has satisfactory results.

 
 
 
Full Text 

Title:

DEC-LEACH: An enhanced leach protocol for life span enrichment in WSN

Author (s):

Pranit Jeba Samuel C. and Selva Kumar R.

Abstract:

Wireless sensor networks (WSN) has cluster of nodes whose major constraint is to monitor various ambient parameters in the environment and transfuse it to the base station. As this conduction is the pivotal issue for energy depletion in the network, hence designing the network with minimal energy depletion is negotiated, which further increases the robustness of the network. In this paper, algorithm for LEACH protocol is propounded with revamping. The modified protocol called DEC-LEACH (Density-Energy-Capacity) focuses on amending the continuance of the sensor nodes by opting the cluster head formation based on locus-intercourse and residual energy with its neighbor nodes. Here the cluster head preference  is congruous rather than arbitrary. Entire nodes assert to be cluster head corresponding to the pre-defined standard. The Cyclic Redundancy Check (CRC) is employed to check whether the data from the cluster head reaches the Base station or not. These functions assist to enhance the wireless sensor networks (WSN) interims of lifespan and throughput.

 
 
 
Full Text 

Title:

Design of 6 dof robotic arm controlled over the internet

Author (s):

G. Rajiv and Siva Kumar

Abstract:

The purpose of the project is to build a robotic arm, which can be controlled remotely over the internet, and to perform operations exhibiting higher accuracy with 6 degrees of freedom. The robotic arm uses IP network to receive data/commands from the user, over the internet, which are interpreted into proper instructions and then relayed to the controller. It reduces the human effort when used for applications such as nuclear waste disposal and bomb disposal when compared to present methods.

 
 
 
Full Text 

Title:

Hybrid CSMA/CA-TDMA based MAC protocols for wireless sensor networks

Author (s):

B. Rajesh Shyamala Devi and A. George

Abstract:

Wireless sensor network consists of several tiny sensor nodes connected to each other in Ad hoc environment and coordinate with each other to form a network. The sensor nodes are typically battery powered, energy optimization and efficiency is extremely important in WSNs. Such networks have the ability to be self organized and failure-adaptive to provide an efficient and reliable network.  Wireless sensor networks have a wide variety of applications such as intruder alert and tracking, environmental monitoring, industrial process monitoring, and tactical systems. In wireless sensor network deployments, reliably reporting data while consuming the least amount of power is the ultimate goal. Energy conservation is needed especially at MAC layer level. Medium access control (MAC) is an important technique that ensures the successful operation of the network. The performance of MAC protocols in congested wireless networks can be enhanced by the combined carrier-sense multiple access with collision avoidance (CSMA/CA) with that of time-division multiple access (TDMA). One of the main functions of the MAC protocol is to avoid collisions from interfering nodes and enhance the channel access performance in wireless networks. Designing power efficient MAC protocol is one of the ways to prolong the life time of the network. The proposed hybrid CSMA/CA-TDMA scheme can preserve the scalability property. Hybrid CSMA/CA-TDMA Schemes uses the transmission strategies based on Markov Decision Process (MDP) to access both contention period and contention-free period. This paper also deals with the performance comparison of proposed Hybrid CSMA/CA- TDMA scheme in NS-2 simulator.

 
 
 
Full Text 

Title:

A secure channel protocol for MELP speech transmission using des-ga based approach

Author (s):

Srinivasan Nagaraj and G. S. V. P. Raju

Abstract:

Integrity, non repudiation, confidentiality, and authentication are important entities in information security. Cryptography is the field of writing a secret code  and a genetic algorithm is nothing but a revolutionary approach that is used in symmetric  key  and support for encryption and decryption and also they are  faster and are suitable for performing huge flow of data. Many problems can be solved using genetic algorithms through modeling a simplified version of genetic processes. In this paper we developed a security algorithm using the feature of genetic algorithm to provide the security for MELP-compressed speech transmission in a noisy communication channel in conjunction with a Forward error correction code (FEC). FEC is a system of error control for data transmission, the sender adds redundant data to its messages and this method avoids retransmission of data and saves band width. We also devised a method to reduce noise during communication.

 
 

 

Full Text 


Title:

Performance analysis of autonomous location based energy efficient ACO routing protocol with dissimilar MANET mobility models

Author (s):

R.  Vallikannu and A. George

Abstract:

Performance evaluations of routing protocols for wireless adhoc networks were largely done using simulation tools. Few factors need to be controlled to have useful simulation results are transmission power, power consumption, mobility model, traffic etc. since performance of an ad hoc network protocol can vary significantly with different mobility models and also under same mobility models with different parameters, we  consider the mobility model of nodes, which determines the frequent link changes as one of the factor for evaluating our routing protocol for Mobile Adhoc Networks (MANETS). Therefore, the goal of this paper is to evaluate an Autonomous Location based Energy Efficient routing Protocol with ACO (ALEEP-with-ACO) for MANETS under two specific mobility models i.e Disaster area and random street model and compare the same with the benchmark Random Way Point mobility model. We use Bonn Motion Mobility scenario generation and analysis tool in ns-2.34. Simulation results showed that ALEEP-with ACO performs well in Disaster area and Random Way Point model and setback with Random street model in most of the metrics.

 
 
 
Full Text 

Title:

Dynamic power tuning for downlink interference mitigation in heterogeneous LTE network

Author (s):

R. Sharanya, R. Gunasundari and K. Jayanthi

Abstract:

Heterogeneous Long Term Evolution (LTE) network comprising femtocells leads to cross-tier interference that arises between macrocells and femtocells in both uplink and downlink degrading the performance of the cellular system. The downlink interference from the femtocell to Macro User Equipments (MUE) being the most serious interference case is focused in this work. A power tuning technique has been proposed to mitigate this interference taking into consideration the number of User Equipments present in the interfering femtocells along with the information received from the interfered MUE. Simulation results show that this scheme mitigates the interference to the MUE effectively while the total transmission power of femtocells also reduce in the process of interference mitigation which is an added benefit obtained effortlessly in the dense deployment of femtocells.

 
 

 

Full Text 


Title:

MRI medical image denoising by combined spectral subtraction and wavelet based methods

Author (s):

B. Deepa and M. G. Sumithra

Abstract:

Image denoising is a compromise between the removal of the largest possible amount of noise and the preservation of signal integrity and image resolution. To address this issue, a new hybrid approach is proposed by fusing dual band spectral subtraction and wavelet packet based thresholding method. The dual band spectral subtraction method (SS) is used for preprocessing of noisy MRI images in order to initially reduce the noise level and further the quality of images is improved by wavelet packet based thresholding method. Here threshold value is determined by Stein’s Unbiased Risk Estimator (SURE) and three kinds of thresholding are considered for denoising. According to the computer simulation, the best method of threshold process is obtained by comparing the performance of three wavelet threshold selection rules that are applied to enhance the images. It is suggested from the experimental results that the proposed scheme gives an improved performance, which reflects in better image quality in all types of noisy environment. This approach is incorporated with spatial domain and frequency domain analysis. Results are measured objectively by Peak Signal to Noise Ratio (PSNR), Root Mean Square Error (RMSE),Universal Quality Index (UQI) and subjectively by measuring the visual quality with Picture Quality Scale (PQS). Overall results indicate that the enhancement quality is performing well in proposed method.

 
 
 
Full Text 

Title:

A secure method of optimized low complexity video watermarking

Author (s):

K. Swaraja, Y. Madhaveelatha and V.S.K. Reddy

Abstract:

In recent existence numerous video watermarking schemes have been anticipated, but the majority of them are functional to uncompressed video. At this point we propose a blind digital compressed video watermarking scheme for H.264 compressed domain to condense the number of computations. Due to its characteristics of high compressibility, it can acquire immense quality at minor bit rate, this is the reason why many applications conform H.264 Codec. The planned method elites the macro block performing the Differential Evaluation algorithm further based on the fore determined threshold and the coefficient rarefied for watermark embedding is deployed on the parity of the coefficients after transformation and quantization. The proposed method impede the bit rate increase within a decent end point by selecting appropriate non-zero quantized AC residuals for embedding the watermark. Experimental results flaunt that there is more acceptable control towards bit rate augment and at the same time perceptual quality can be kept in existence even after undergoing different attacks.

 
 
 
Full Text 

Title:

Anomaly detection in wireless LAN using rough set theory combined classifier model

Author (s):

P. Kavitha and M. Usha

Abstract:

In this paper, we suggest to exploit the framework for detecting anomalies in Wireless Local Area Networks (WLAN) using Rough Set Theory (RST). With the expansion of wireless network there is a challenge to compete with the intruders who can easily break into the system. So it becomes a necessity to device systems or algorithms that can not only detect intrusion but can also improve the detection rate. In this paper we propose an intrusion detection system that uses rough set theory for feature selection, which is extraction of relevant attributes from the entire set of attributes called minimal set. The extracted features are used by Naïve Bayesian classifier model to learn and test respectively. The simulation results with Kyoto2006+ data set demonstrate that our proposed method achieves the increasing performance for intrusion detection.

 
 
 
Full Text 

Title:

Efficient retrieval of data from cloud using data partitioning method for banking applications [RBAC]

Author (s):

Rajalakshmi V., Jothi Nisha V. and Dhanalakshmi S.

Abstract:

Cloud computing is a pioneering area, where abundant services are provided for storing and handling data. Though the cloud usage reduces the cost of its customers, there is a severe drawback towards its privacy. As access to the data is provided open, there is a tendency for the lack of privacy of data. The existing methods use different encryption algorithms to handle this issue. Encryption algorithms being costlier and depends on the chosen key value the method becomes less secured. Hence, in this paper a simple yet secured perturbation procedure using integer partitioning which uses the keyword itself for generating the key value. The procedure is explained with the algorithm and the results are compared with the existing method.

 
 
 
Full Text 

Title:

Chemical reaction effects on radiative MHD oscillatory flow in a porous channel with heat and mass transfer in an asymmetric channel

Author (s):

M. Vidhya, R. Vijayalakshmi and  A. Govindarajan

Abstract:

This paper deals with the effect of heat and mass transfer with chemical reaction on MHD oscillatory flow through porous medium in the presence of heat source/sink in an asymmetric channel. Based on some simplifying assumptions, the governing momentum, energy and diffusion equations are solved and the analytical solutions for fluid velocity, temperature distribution, mass concentration, skin friction, Nusselt number and Sherwood number are obtained. The effects of radiation parameter, porous medium shape factor, Schmidt number, Peclet number, Hartmann number, chemical reaction parameter, heat source/sink parameter, geometric parameters on flow and heat transfer characteristics have been examined in detail. It is observed that velocity profiles increase due to an increase in Grashof number, while the profiles decrease for an increase in Hartmann number or an increase in radiation parameter or an increase in Reynolds number. It is noted that concentration profiles decrease whenever there is an increase in chemical reaction parameter or an increase in Schmidt number.

 
 
 
Full Text 

Title:

Intelligent tuning of PI controller in an aerobic bioreactor

Author (s):

S. Saravana Kumar, K. Latha and V. Rajinikanth

Abstract:

This paper proposes an intelligent controller tuning technique for a PI controller using a nature inspired metaheuristic algorithm, Firefly algorithm (FA). The PI controller is designed to maintain Dissolved Oxygen (DO) concentration in an aerobic biological reactor of a waste water treatment plant (WWTP). The proposed technique is compared with IMC based PID tuning method and PI parameters of Benchmark Simulation Model1 (BSM1).  The PI controller tuned using the proposed technique produces satisfactory response and gives better results when subjected to set-point tracking and disturbance rejection test respectively.

 
 
 
Full Text 

Title:

Design and fabrication of high efficiency squirrel cage induction motor using finite element method

Author (s):

Govindasamy K. Sathishkumar,  N. Vimalraj, T. S. Sivakumaran and A. Paramasivam

Abstract:

This paper presents the design and analysis of a die- cast copper rotor cage, to improve the efficiency of three phase induction motor used in industrial applications and also it describes the various factors affecting the efficiency of motor. The proposed copper rotor motor has better efficiency and increase in torque with minimum losses. An incremental difference in the efficiency is also discussed with different values of loads.  Simulation has been carried out using Finite element Analysis (FEA) and experimental results are shown. Simulation and experimental results presented here demonstrates the feasibility of the copper rotor motor.

 

 

 

Full Text 


Title:

A pipelined approach for FPGA implementation of bi modal biometric pattern recognition

Author (s):

S. Hariprasath, T. N. Prabakar and M. Santhi

Abstract:

A Biometric system is essentially a pattern recognition system that makes use of biometric traits to recognize individuals. Systems which are built upon multiple sources of information for establishing identity which are known as multimodal biometric systems can overcome some of the limitations like noisy captured data, intra class variations etc… In this paper a Bi modal biometric system of iris and palm print based on Wavelet Packet Transform (WPT), gabor filters and a neural classifier implemented in FPGA is described. Iris is the unique observable visible feature present in the detailed texture of each eye. Palmprint is referred to the textural data like principal lines wrinkles and ridges present in the palm. The visible texture of a person’s iris and palm print is encoded into a compact sequence of 2-D wavelet packet coefficients constituting a biometric signature or a feature vector code. In this paper, a novel multi-resolution approach based on WPT for recognition of iris and palmprint is proposed. With an adaptive threshold, WPT sub image coefficients are quantized into 1, 0 or -1 as biometric signature resulting in the size of biometric signature as 960 bits. The combined pattern vector of palm print features and iris features are formed using fusion at feature level and applied to the pattern classifier. The Learning Vector Quantization neural network is used as pattern classifier and a recognition rate of 97.22% is obtained. A part of the neural network is implemented for input data of 16 dimensions and 12 input classes and 8 output classes, using virtex-4 xc4vlx15 device. This system can complete recognition in 3.25 microseconds thus enabling it being suitable for real time pattern recognition tasks.

 

 

 

Full Text 


Title:

Video based vehicle detection using morphological operation and HOG feature extraction

Author (s):

A. Shakin Banu and P. Vasuki

Abstract:

Vehicle detection plays an effective and significant role in the area of traffic surveillance system, where efficient traffic management and safety is the main concern. In this paper, the video based vehicle detection method using morphological operations and Histogram of Gradient (HOG) feature is proposed. The ROI region is selected and the pixels inside the selected ROI regions alone were detected. Sobel operator is used for the identification of the edge pixels. The gradient is obtained by finding the common pixels in the detected edge and the ROI regions. Finally, the object detection process is employed using Morphological process and Histogram Of gradient Process. Thus, a success rate of around 83% of accuracy is achieved in vehicle detection using proposed method.

 
 
 
Full Text 

Title:

A novel semi-automated 3-D CAD visualization system as an aid for surgical planning of lung cancer

Author (s):

Manikandan T. and Bharathi  N.

Abstract:

Lung cancer is the leading cause of cancerous deaths in the world in men and women. It is the most difficult cancer to cure and the number of deaths that it causes is generally increasing. It is very difficult to detect in its early stage. In advanced stages, treating the disease includes surgery, chemotherapy, radiation therapy or combination. Normally, the radiologists and surgeons detect the locations of the cancerous tumor from the computed tomographic images. However, the computed tomographic images are two dimensional. The mapping of stacks of two dimensional images into original lung cavities in three dimensional involves lot of mental work and long time for the surgeons before they plan for surgery. This work aimed to develop a novel semi-automated three dimensional computer-aided diagnostic system to localize the cancerous lung tumor in isotropic chest computed tomographic images. In addition, it measures the volume and size of the cancerous tumor. Low dose helical computed tomographic scan images retrospectively obtained from 23 subjects who suffered from lung cancer (conformed through biopsy test) have been taken for this study. To validate the system performance, results were compared with the three independent radiologist’s results. The obtained results show that a computer-aided diagnostic system performance is satisfactory and may useful for surgical planning of lung cancer.

 
 
 
Full Text 

Title:

Design of Si/SiGe heterojunction line tunnel field effect transistor (TFET) with high-K dielectric

Author (s):

Amrutha T. P., Flavia Princess Nesamani I. and  V. Lakshmi Prabha

Abstract:

In this paper we propose a Si/SiGe heterojunction line tunnel field effect transistor (TFET) with high-K dielectric. The main objective of this device is to increase the ON current. In the case of Si TFETs the ON current is very low. It is because of poor band-to-band tunneling efficiency. This problem can be avoided using heterojunction materials, high-k gate insulators. The device is designed with the source material replaced by SiGe material. The device aims at providing high ON current without compromising the OFF current and sub threshold swing. In this work a heterojunction line tunnel FET is designed using TCAD and the various characteristics of the device are analysed. The device has high ON current of about 2.5mA/µm.

 
 
 
Full Text 

Title:

Efficient secure routing algorithm for wireless sensor networks using light weighted trust management protocol

Author (s):

R. Mohan Kumar, A. V. Ramprasad and G. N. Priyadharshini

Abstract:

In wireless sensor networks, secure routing and trusted transmission of data through the nodes is one of the most challenging application. In this paper, we are implementing the concept of trust management by using QOS metric estimation and  the concept of Light weight trust management protocol is also  introduced. The trust degree is calculated among the nodes by the method of direct and indirect trust computation with the help of neighbor’s recommendation and direct monitoring of packet forwarding process. The packets are transmitted only through the trusted nodes. The trust degree is calculated with the help of threshold value that is set  to every nodes and the packet forwarding behavior. The nodes are said to be highly trusted node based on the trust degree value of the nodes. This method is implemented using Trust based QOS routing algorithm (TQR) .From this we can achieve the most efficient transmission among the network. Finally the performance is compared with AODV, Watchdog DSR and QAODV protocol. This will conclude that it can prevent attacks from the malicious nodes and increase the security level among the network Index Terms—Component, formatting, style, styling, insert.

 
 

 

Full Text 


Title:

Efficient and reliable vehicle-to-vehicle communication using on-demand routing protocol

Author (s):

D. Sivaganesan, S. Karthikeyini and R. Kavitha

Abstract:

The cooperative vehicle safety systems (CVSs) of Vehicular Ad-hoc Network (VANET) provides vital vehicle tracking information. In CVS, the physical state information about the vehicles is transmitted over a shared wireless channel in order to let the neighbors to track the location of the vehicle and predict possible accidents. However, the physical state information’s are beneficial only if they delivered in a timely manner. Thus, the need of efficient and robust routing protocol arises in order to enable more efficient communication. Thus, in this paper an efficient on demand routing protocol is employed in the communication sub component of the CVS system to generate and transmit the location information of the vehicle rapidly. The performance of the proposed approach is analyzed in terms of energy consumption, throughput, packet drop, and delay and packet delivery ratio. Thus, the results indicate that the proposed approach provides efficient and robust communication over VANET.

 
 

 

Full Text 


Title:

An improved contrast enhancement approach for panoramic dental X-ray images

Author (s):

R. Somas Kandan and A. John Sanjeev Kumar

Abstract:

The Panoramic Dental X-ray image is an important tool for a thorough dental examination. These X-ray images suffer from poor contrast because of the luminance non-linearity introduced by medical imaging techniques. Hence an automatic method of image enhancement of panoramic X-ray image is essential. A novel method of improving the quality of these images is determined based on gamma correction using GLCM (Gray level co-occurrence matrix) by minimizing the homogeneity feature and by computing a global gamma value based on cumulative histogram without any knowledge of the imaging device. The performance of both the methods is compared in terms of metrics like MSE, PSNR & AMBE and it is illustrated that gamma correction based on GLCM by minimizing the homogeneity yields better results in terms of low MSE, high PSNR and low AMBE.

 
 

 

Full Text 


Title:

Modeling vertical coherence for shallow water ambient noise

Author (s):

V. G. Sivakumar

Abstract:

Ambient noise is the prevailing unsustainable noise in the sea. It is the background noise, typical of the location & depth against which a signal like the sound of a submarine or the echo from a target must be detected. Underwater ambient noise continuously varies in level and spectral content. It excludes self noise like electrical noise, current flow around measurement hydrophone. So we need to measure the ambient noise considering different factors like wind, precipitation, biological noise, tides etc. The ambient noise is measured using the vertically spaced hydrophones in the shallow water of the Arabian Sea region. Using these ambient noise measurements, vertical coherence is estimated. Theoretical model for vertical coherence is also calculated. In this paper comparison between the theoretical and the practical vertical coherence is done.

 
 

 

Full Text 


Title:

Voltage control for three- phase inverter based distributed generation under grid disturbances

Author (s):

Ashwini D. Udgave and  H. T. Jadhav

Abstract:

The recent trend of distributed generation leads to several issues regarding power quality and energy efficiency. To meet the increased demand of electricity services and to increase service quality the current power grid structure should be controlled in such a way that distributed generation could be easily connected to it. The various services are becoming challenging concern to elegantly integrate distribute generation to the grid. One of these services is voltage control which provides support to the voltage under grid fault conditions. During voltage sag condition continues power supply should be provided to grid.  According to grid code requirement of transmission system, several kind of voltage sag requires different voltage control strategies. Hence in this paper a flexible control strategy for three phase grid connected inverter is proposed. The inverter should be controlled in such way that it should inject reactive power in case of three phase balanced voltage sag condition in order to raise voltage in all three phases. In case of single line to ground fault, double line to ground fault condition and in several fault condition the main aim of inverter is to balance the voltages. The proposed inverter balances the voltages by sinking negative sequence components during this fault conditions. Thus the proposed control strategy avoids discontinuation of supply while accomplishing the chosen voltage support service so that voltage dips and voltage swell can be avoided. And this can be investigated and simulated by using Matlab/Simulink. This paper proposes a new control algorithm for the generation of the reference current which offers voltage provision in case of grid disturbances.

 
 

 

Full Text 


Title:

Classification of diseased plant leaves using neural network algorithms

Author (s):

K. Muthukannan, P.  Latha, R. Pon Selvi and  P. Nisha

Abstract:

Agriculture is the mother of all cultures. It played a vital role in the development of human civilization. But plant leaf diseases can damage the crops there may be economic losses in crops. Without knowing about the diseases affected in the plant, the farmers are using excessive pesticides for the plant disease treatment. To overcome this, the detected spot diseases in leaves are classified based on the diseased leaf types using various neural network algorithms. By this approach one can detect the diseased leaf variety and thus can take necessary steps in time to minimize the loss of production. The proposed methodology uses to classify the diseased plant leaves using Feed Forward Neural Network (FFNN), Learning Vector Quantization (LVQ) and Radial Basis Function Networks (RBF) by processing the set of shape and texture features from the affected leaf image. The simulation results show the effectiveness of the proposed scheme. With the help of this work, a machine learning based system can be formed for the improvement of the crop quality in the Indian Economy.

 
 

 

Full Text 


Title:

Adaptive neuro fuzzy inference system based sensorless rotor position estimation of SRM

Author (s):

K. Kasi Rajan and P. Latha

Abstract:

This paper presents sensorless rotor position estimation of Switched Reluctance Motor (SRM) where the position is to be determined by Adaptive Neuro Fuzzy Inference System (ANFIS). The rotor position sensing is very essential for the SRM for its efficient operation. Previously rotor position sensors are used to estimate the position of rotor for SRM. Due to its drawback the sensors have to be replaced by sensorless techniques. So in this paper ANFIS is used to map the nonlinear behavior of the SRM and rotor position is estimated. Mapping is done by the inputs of flux linkage and current to the rotor position as its output. The error between the target and the actual rotor position output is to be calculated. Also the time period of the process, Mean Absolute Error (MAE), Mean Square Error (MSE) and MSEREG are calculated and the comparison is to be made among them. Then comparison of different membership functions, number of epochs and number of membership functions are being carried out for ANFIS. The performance of the ANFIS is analyzed using the error and efficiency. The proposed application will proves the superiority of ANFIS for the rotor position estimation.

 
 

 

Full Text 


Title:

Performance of DC to DC dual active bridge converter driving single phase inverter

Author (s):

Digvijay B. Kanase, H. T. Jadhav and R. A. Metri

Abstract:

Solid state transformer is a high frequency transformer can be used as power electronic converter. The three stage SST configuration includes ac to dc rectifier, isolated dc to dc dual active bridge converter, dc to ac inverter. The switching frequency of inverter part is greater than DAB part so inverter stage is model for double line frequency i.e. at 120 Hz. The second harmonics are dominant at this frequency. For better performance of DAB converter PI control is used but at 120 Hz it has limited gain. To proposed methods are PI plus feed forward and PI plus Resonant controller.

 
 

 

Full Text 


Title:

Detecting and tracking moving vehicles for traffic surveillance

Author (s):

Y. Mary Reeja, T. Latha and W. Rinisha

Abstract:

Traffic surveillance has become an important issue in traffic monitoring. In general, to observe the traffic flow, vision based traffic surveillance is one of the most popular methods. This paper presents an efficient method for detecting and tracking vehicles that aims to locate and segment interesting vehicle from a video with occlusions in traffic surveillance. Initially background subtraction is used for detecting moving vehicles from static cameras using frame differencing method. This method detects the foreground objects based on the difference between the reference frame and the original frame. Then the shadows in the foreground are eliminated by the edge extraction and the edge of the moving vehicle is detected. Finally the vehicle is detected using Histogram of Oriented Gradient (HOG) and Relative Discriminative Histogram of Oriented Gradient (RDHOG) method which represents the shape and magnitude of the vehicle and by generating trajectory of the moving vehicles. This method can detect the vehicle with any shape, color and with occlusion. After the detection of vehicles in the frame, the detected vehicle is tracked using a particle filter which is based on the likelihood estimation of the probability density function. This method can detect and track vehicles with occlusions effectively.

 
 

 

Full Text 


Title:

Security key management and authentication scheme for wireless sensor networks

Author (s):

S. Jayapraba and  A. F. Sheik Hakkani

Abstract:

Wireless Sensor Networks (WSN) is vulnerable to node capture attacks in which an attacker can capture one or more sensor nodes and reveal all stored security information which enables him to compromise a part of the WSN communications. Due to large number of sensor nodes and lack of information about deployment and hardware capabilities of sensor node, key management in wireless sensor networks has become a complex task. Limited memory resources and energy constraints are the other issues of key management in WSN. Hence an efficient key management scheme is necessary which reduces the impact of node capture attacks and consume less energy. In this study, we develop a cluster based technique for key management in wireless sensor network.

 
 

 

Full Text 


Title:

Operation and control of an alternate arm modular multilevel converter

Author (s):

J. M. Kharade and A. R. Thorat

Abstract:

An Alternate Arm Modular Multilevel Converter (AAMMC) is the recently introduced power electronics converter topology suitable for High Voltage DC Transmission (HVDC) system applications. This paper focuses on the operating principle of an Alternate Arm Modular Multilevel Converter. At the beginning the advantages of multilevel converter, basic schematic of converter topology, and its operation is discussed. For the controlling of the converter the simple sorting technique is employed. The AAMMC is a new converter topology which offers several advantages over existing multilevel converter topologies such as scalable and modular structure, low switching losses, DC fault tolerance property which eliminates the need of AC/DC breakers of large size and ratings, lower number of cells as compared to modular multilevel converter. The performance of the 21 level AAMMC without sorting and with sorting technique is verified with MATLAB Simulation.

 
 

 

Full Text 


Title:

Design and simulation of a dual material double gate tunnel field effect transistor using TCAD

Author (s):

Ashly Ann Abraham and V. Lakshmi Prabha

Abstract:

High leakage currents and short channel effects become significant enough to be the major concerns for circuit designers as semiconductor devices are miniaturized. Tunnel field effect transistor (TFET) show good scalability and have very low leakage current .These transistors have very low leakage current, good sub-threshold swing, improved short channel characteristics and lesser temperature sensitivity. In this paper a dual material gate (DMG) in a tunnel field effect transistor is proposed in order to optimize ON current and nature of output characteristics. Significant improvement is shown by a TFET if appropriate work functions are chosen for gate material on the source side and drain side. A dual material gate in double gate TFET is applied to show an overall improvement in performance. In comparison with conventional TFET, the proposed model provides a higher ON state current.

 
 

 

Full Text 


Title:

Analysis of optimal location of superconducting fault current limiter for the smart grid

Author (s):

Rohini A. Desa, Mangesh R. Bongale and H. T. Jadhav

Abstract:

In today’s world, smart grid is the new term used for future power system. Also, there is dramatic growth in power system and interconnected network. Due to this increased interconnected network possibility of occurrence of abnormal events is more, which may harm the physical equipments in power system. Use of Superconducting fault current limiter is an effective solution to avoid these problems. Superconducting fault current limiter is an innovative protection device which is used to reduce the magnitude of fault current in high voltage system. In this paper the application of resistive type superconducting fault current limiter is explained, which is used to reduce the magnitude of fault current in designed smart grid system.  However, Finding optimal location for installation of superconducting fault current limiter is difficult task. This paper describes a study on performance analysis of smart grid with superconducting fault current limiter and its optimal location.    

 
 

 

Full Text 


Title:

Failure analysis of centrifugal pumps based on survey

Author (s):

Selvakumar J. and Natarajan K.

Abstract:

The problems commonly encountered in a centrifugal pump are leakage, excessive noise, excessive heat, suction clog no-pumping, and damage of its components. Major reasons for the failure of a pump are excessive stress, reduction in strength of its component, variation in applied load, and poor design. Continuous working of the centrifugal pumps is essential in process industries such as paper mills, textile mills and refineries, for non-stop operation of the plants. In such cases reliable functioning of the pump is an absolute necessity. The major objective of this paper is the analysis of component life and frequency of occurrence of problems in a centrifugal pump. A survey was conducted among pump users to collect data on component life and occurrence of problems in pumps. Data collected through the survey were subsequently analyzed.

 
 

 

Full Text 


Title:

A survey on machine scheduling techniques

Author (s):

Cyril Joseph Francis, K. Jeyaprakash, A. Vimalkodeeswaran and P. Yuvaraj

Abstract:

In this paper the study about the different methodologies and techniques implemented for different types of scheduling problems in single machine, job shop and flow shop scheduling. Every author tells about the different scenario and approach to minimize the Make span, Tardiness and different parameters in scheduling. Every author implements their own algorithms and the strategies to find out the result, it may be positive or negative. This paper gives the clear idea for the future research work.

 
 

 

Full Text 


Title:

Energy efficient adaptive broadcasting scheme for wireless sensor networks

Author (s):

P. K. Kowsalya and R. Harikumar

Abstract:

Energy-efficiency is a critical issue in wireless sensor networks (WSNs), since sensors are battery operated with limited life time. Energy efficient broadcasting will have a direct impact on network lifetime. Since the minimum energy broadcasting schemes are affected by broadcast storm problem, it has to be addressed to improve the energy efficiency. To overcome the broadcast storm problem, probabilistic schemes have been proposed in the literature to make a rebroadcast decision. However, the random assessment delay (RAD) in probabilistic broadcasting schemes results in poor reachability and increased end to end delay in the congested networks. In the proposed work, the probabilistic scheme adapts its RAD based on network congestion level. The simulation results reveals that the new scheme outperforms the existing schemes in term of saved-rebroadcast, packet delivery and routing overhead.

 
 

 

Full Text 


   

 

     

  

   

  

  

  

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

       arpnjournals.com                                                       Publishing Policy                                                  Review Process                                           Code of Ethics