|
ARPN Journal of Engineering and
Applied Sciences
August 2015 | Vol. 10 No. 14 |
|
|
Title: |
Phishing
website detection system based on enhanced iTree classifier |
Author (s): |
D. Muthu
Krishnan and V. Subramaniyaswamy |
Abstract: |
Nowadays, a lot of attacks have cropped up
for phishing of emails and password of users. In order to get one’s
confidential information like passwords, bank details such as debit or
credit card numbers illegally, phishing act can be done. For doing an
identity theft or financial gain or some fraudulent activities, an
individual or group of persons gets confidential information from
unsuspecting victims via email. This study proposes data mining
techniques to classify phishing data’s and then attempts to rectify
phishing. A decision classifier tree model is used for detecting
phishing datasets and another hybrid session based model is also
developed to escape from such phishing attacks. The use of the session
based unique password is scrutinized to protect the privacy of the users
which is not revealed by attacks or infected systems. The proposed model
generates a novel minimum spanning tree called iTree which takes only a
minimum time to construct it. The proposed iTree model classifies the
inputs which are resistant to a number of phishing attacks and is also
resilient to keyboard logging as well, thus ensuring reliability. The
tree classifier model will be able to identify any types of attacks in
the future. The proposed models of session based authentication and data
mining based decision tree classification are much more accurate in the
usage of the anti-phishing than the existing method. |
|
|
Full Text |
|
|
Title: |
L Z
source inverter with closed loop control system |
Author (s): |
Chokkalingam C. and M. Pushpavalli |
Abstract: |
This paper proposes closed loop of L Z
source inverter. This inverter has three diode and two inductors in the
main circuit. It boosts up the input DC voltage. The traditional
inverters have capacitors in the main circuit which lead to many
problems such as resonance produced in the circuit, voltage surge which
can damage the devices, large volume, more cost, and reduced life span
of the system. This inverter does not have capacitor in the main circuit
and therefore eliminates the problems present in traditional inverters.
But in industrial applications the control of output voltage becomes a
difficult factor. The sudden voltage change creates many problems such
as instability in the system, damage to devices etc. The voltage control
is an important factor for stable operation of the system in real time.
It can been achieved using the closed loop control of L Z source
inverter. |
|
|
Full Text |
|
|
Title: |
Elimination of power system harmonics using shunt active
power filter with hysteresis current control technique |
Author (s): |
D. Maruthu Pandian and
D. Godwin Immanuel |
Abstract: |
This paper proposes a SAPF with hysteresis
current control technique. Active power filter consist of VSI, gate
pulse to VSI is given by pulse generation circuit. This pulse is
generated by the hysteresis controller which consists of PI controller,
pulse generation circuit and control technique circuit. VSI and Vref
will drive the PI controller which in turn gives to control technique
circuits and then to pulse generation circuit. The load voltage is not
constant in the line when extra load is connected, which create
unbalance in the system. By means of online tuning the above said
drawbacks can be eliminated. |
|
|
Full Text |
|
|
Title: |
A hybrid genetic algorithm based Lagrangian relaxation
approach profit based unit commitment problem |
Author (s): |
Logavani K. and S.
Senthil Kumar |
Abstract: |
In this paper an application of a combined
method for the profit based unit commitment problem (PBUC) using Genetic
Algorithm and Lagrangian Relaxation (LR) is presented. The algorithm is
proposed to solve PBUC under deregulated environment with the objective
of maximizing GENCO’s profit and minimizing the operating cost. The
problem formulation of the unit commitment takes into consideration the
minimum up and down time constraints, start-up cost, and spinning
reserve. UC schedule depends on the market price in the deregulated
market. However demand satisfaction is not an obligation. GENCO can
consider a schedule that produce less than the predicted load demand and
reserve but creates maximum profit. The LR procedure solves the UC
problem by dual optimization. The Genetic Algorithm (GA) develops the
optimal schedule and Lagrangian Relaxation method produces Economic
Dispatch. The proposed hybrid approach improves the performance of
solving the Unit Commitment problem. The resultant schedule maximizes
the profit and the proposed algorithm is tested for a 10 unit system
taken as an individual GENCO and the simulations are carried out using
MATLAB. |
|
|
Full Text |
|
|
Title: |
Web usage
forecast with adapted least recently used model |
Author (s): |
Prapai Sridama, Somchai
Prakancharoen and Nalinpat Porrawatpreyakorn |
Abstract: |
The research focuses on decreased
downloading of web pages from other web servers and decreased
expenditure of cost. The quantity of web usage from people is
increasing. This situation is effected to the networking traffic. The
researchers try to solve this problem with new techniques. Unlucky,
those techniques can give the hit rate not more 40 percent. Therefore,
this research investigates Adapted Least Recently Used (ALRU) algorithm
for solving the networking traffic. Many Mathematical Statistics
theories are used in this algorithm for increasing the hit rate of the
web cache memory as following; Estimated value equation, Interpolation
with Cubic Spline, Interpretation of first derivative, Interpretation of
second derivative, First Order Condition (FOC) and to find area under
curve function. In addition, this model is tested with data sets of web
usage from Walailak University. The result of this algorithm is shown
that the quantity of downloading decrease more than other algorithms.
However, the performance of ALRU algorithm has compared with the LRU
algorithm which is a popular algorithm in the present. Furthermore, the
maximum of the hit rate of the ALRU algorithm is 72.56 percent but the
LRU algorithm can give the maximum hit rate 53.8 percent. However, the
average value of the hit rate of the ALRU algorithm is 53.8 percent
while the LRU algorithm can give 12.99 percent. |
|
|
Full Text |
|
|
Title: |
IEEE 754
compliant floating point fused add sub unit |
Author (s): |
Sharmila Hemanandh,
Siva Subramanium |
Abstract: |
Floating point arithmetic is a key component in the
development of many algorithms for DSP applications that require large
dynamic range and high level of accuracy. This paper proposes a floating
point fused add sub unit that computes the sum and the difference of two
operands simultaneously. Algorithms like FFT and DCT require the sum
and the difference of two operands. The proposed fused unit is compliant
with both single precision and double precision IEEE 754 standard of
floating point representation. It also supports all rounding modes. When
compared with the conventional floating point adder, the results
obtained using the fused unit are more accurate since the number of
rounding operations is reduced in the proposed unit. The fused unit is
implemented using Verilog HDL and synthesized using Xylinx 14.1. |
|
|
Full Text |
|
|
Title: |
The influence of clustering techniques in the diagnosis
of genetic disorders |
Author (s): |
B.
Lakshmipathi and G. Kousalya |
Abstract: |
Clustering is a process of putting similar data into
groups. Clustering has considered the most important unsupervised
learning technique so, as every other problem of this kind; it deals
with finding a structure in a collection of unlabeled data. This paper
reviews the six types of clustering techniques namely k-Means,
Hierarchical, DBSCAN, OPTICS, STING. All these algorithms have compared
according to the factors: size of dataset, the number of clusters, types
of dataset and the type of software used. Some conclusions that have
extracted belong to the performance, quality, and accuracy of the
clustering algorithms. |
|
|
Full Text |
|
|
Title: |
Numerical
analysis on piston optimization for enhanced mass flow rate in oil pumps |
Author (s): |
S. J. Park and Y. L.
Lee |
Abstract: |
Oil pumps are used when friction occurs
between components in automotive engines or compressors. This study
performed piston optimization to improve the mass flow rate of oil pumps
for use in linear compressors. In addition to adjusting the piston
length, a taper and fluid diode was used. Under the proposed conditions,
the mass flow rate improved by 19% by adjusting the piston length, 43%
from using a fluid diode, and 56% from using a taper. |
|
|
Full Text |
|
|
Title: |
A web
based approach to detect mimicking attacks in homogeneous environment |
Author (s): |
R. Padmapriya and S.
Igni Sabasti Prabu |
Abstract: |
Botnets have become major engines for
malicious activities in cyberspace nowadays. Botnets are the main
drivers of cyber attacks, such as distributed denial of service (DDoS),
flash crowds, information phishing and email spamming. Both flash crowds
and DDoS attacks have very similar properties in terms of internet
traffic. Flash crowds are legitimate flows whereas DDoS attacks are
illegitimate flows. To sustain their botnets, botnet owners are
mimicking legitimate cyber behavior. This poses a critical challenge in
anomaly detection. In this work, study of mimicking attacks and
detections from both sides, as attackers and defenders is done. First of
all, a semi-Markov model for browsing behavior is established.
Based on this model, a botmasters can
simulate flash crowd successfully in terms of statistics, with a
sufficient number of active bots (not less than the number of active
legitimate users). But it is hard for botnet owners to satisfy the
condition to carry out a mimicking attack most of the time. With this
new finding, we conclude that mimicking attacks can be discriminated
from genuine flash crowds using second order statistical metrics. We
detect the mimicking attacks when the sufficient number condition does
not hold for botmasters. Detection is proclaimed to the user.
Furthermore, the findings can be widely applied to similar situations in
other research fields. |
|
|
Full Text |
|
|
Title: |
Bandwidth
enhanced and sidelobes level reduced radial line slot array antenna at
28 GHZ for 5G
next generation mobile communication |
Author (s): |
Ibrahim Maina, Tharek
Abd. Rahman and Mohsen Khalily |
Abstract: |
Radial
Line Slot Array Antenna has simple structure and exhibit good radiation
characteristics. It is low cost, easy to manufacture with high gain and
it found application in services like Direct Broadcast Services and
Wireless LAN. Its features make it attractive for millimeter wave mobile
broadband applications like the fifth generation (5G) mobile
communication system. Also, it can be designed for circular, linear or
elliptical polarization. But achieving a reduced sidelobes level has not
been an easy task in its design. This paper presents a simple technique
to improve the impedance bandwidth and reduce the sidelobes level in
linearly polarized Radial Line Slot Array Antenna at 28 GHz for 5G
communication system. In the design, high frequency laminate RT duroid
5880 and air gap were utilized with a modified dielectric coated 50 Ω
SSMA connector as the coaxial to waveguide transition. The technique was
experimented via simulation on Computer Simulation Technology Microwave
Studio 2014 software. The simulation result gave a return loss of -18.98
dB at 28 GHz. Gain of 23.3 dB, 10 dB impedance bandwidth of 1.28 GHz,
sidelobes levels of: -16.5 dB (E- plane); -17.5 dB (H- plane) and
efficiency of 96 % were realized. |
|
|
Full Text |
|
|
Title: |
Robust image steganography by embedding selective
intrinsic mode functions with discrete wavelet transform |
Author (s): |
S. Senthil Kumar and K.
Palani Thanaraj |
Abstract: |
Steganography is the method of embedding
information in a carrier medium for secure transmission. Steganography
enables protection of confidential data that arise in many military and
communications systems, online retail and banking systems, medical data
transmission etc. This paper focuses on medical image steganography that
involves hiding a secret medical image into a cover image thereby
preserving patient privacy. In this work improvements to discrete
wavelet transform (DWT) based steganography is attempted in different
clinical settings. Here we propose to combine DWT with empirical mode
decomposition (EMD) at different frequency scales for robust and secure
image steganography. Initial step involves decomposing the cover and
secret image to predefined approximation level using DWT. Then the
approximate secret image is decomposed to intrinsic oscillating modes
that contain details at different frequency scales. A selection
procedure is initiated in this stage where the user can embed the secret
image at different detail level based on the application requirements.
The predefined intrinsic modes of secret image are embedded in the cover
image by a linear mixing model. Then inverse DWT is applied to
reconstruct the stegano image. Performance assessment of the proposed
method is carried out (6.5% of payload) with image quality metrics such
as peak signal to noise ratio (PSNR), mean Square Error (MSE), maximum
absolute error (MAXERR) and ratio of squared norms (L2RAT) are tabulated
and compared with DWT based steganography. Our study shows that proposed
method can be a robust tool in secure transmission of secret images. |
|
|
Full Text |
|
|
Title: |
Signature
based intrusion detection in cloud based multi-tenant system using MTM
algorithm |
Author (s): |
N.
Thirumoorthy, M.
Aramudhan and M.S. Saravanan |
Abstract: |
The improvement of security prevents
the malicious attacks from various types of networks. The intrusion by
the malicious attackers in real time cloud networks has major issues for
security credentials. The various types of attacks are identified in
cloud networks are not enough to handle the critical situations. This
paper contributes a new class of malicious attacks or intrusions in the
cloud network and addresses the mischievous and malicious behaviour,
which is the root cause for the modification of cloud network stored
data. The cloud based storage services are handled by single or
multi-tenant based system. This paper uses the patient healthcare
record, which is handled by multi-tenant users for various applications.
This is the first attempt to identify the multi-tenant user attacks in
cloud network. In this attempt a new algorithm is introduced, that
identifies the multi-tenant user database malicious attacks. The basic
idea of this algorithm is devised from the wireless LAN malicious
attacks. Hence Multi-Tenant Mapping (MTM) Algorithm developed to analyse
data flow inconsistency with the less number of packet transfer between
the cloud nodes. This type of analysis is presented in this
communication. Analysis of information in the unbound values determines
whether the database value has been compromised for any attacks.
Results show that the proposed algorithm has a promising prediction for
malicious attacks for multi-tenant based user data security |
|
|
Full Text |
|
|
Title: |
Reversible watermarking technique using time-stamping for relational
data |
Author (s): |
Malathi K. and Veeramuthu A. |
Abstract: |
Watermarking procedure is a conspicuous pattern used to
recognize credibility. This procedure is elusive and harm against
malicious attack. Watermarking has been utilized for ownership
protection for a couple data organizations like pictures, video, sound,
program, xml records, geographic information frameworks related data,
content archives, relational databases that are utilized as a part of
distinctive application domains. As of late, cunning mining systems have
been utilized for data which is extracted from relational databases.
This is utilized to identify captivating patterns that give critical
backing to leaders in making compelling, right, and applicable choices.
By and large, data imparted between its proprietors and true blue
clients obliges data security. To be sure data protection and security,
proprietor’s database is outlined with watermarking data. The proprietor
of the social database implants the watermark data. The bends in the
first data are kept inside positive points of confinement, which are
characterized by the ease of use limitations that save the learning
contained in the data. The proposed method inserts each minor bit of a
multi bit watermark in every chose column with the point of having
greatest vigor. Guaranteeing the assailant is not able to degenerate the
watermark of the dataset. |
|
|
Full Text |
|
|
Title: |
Source
and destination anonymity using end-to-end anonymous addressing scheme
in WSN |
Author (s): |
D. Angeline Deborah
Monica, S. Karthikeyan and V. Brindini |
Abstract: |
The wireless sensor network is most widely
used for the critical applications; we need to provide the anonymity for
the source and destination. The proposed scheme named as End to End
anonymous addressing scheme will provide anonymity with less
computational and storage overhead. In the proposed scheme, the hop by
hop authentication is provided by using the Elliptic Curve Cryptography
(ECC) based Digital signature scheme. The source node sends the message
along with signature. Each and every intermediate node should validate
the signature to ensure that it receives the message from authenticated
node. It will forward to next hop node, only the signature is valid
otherwise it will drop the message. The anonymous address scheme is used
to provide the destination anonymity. In this technique, the Duplicate
Address List (DAL) is constructed by destination and send to the source
node. The source node attaches this DAL with DATA packet. To provide
high security for the destination address the destination address is
encrypted by using ECC and then append with DAL. The performance of the
proposed scheme is evaluated by using the network simulator NS2. The
packet delivery ratio, packet loss ratio, End to End delay is used to
evaluate the performance. |
|
|
Full Text |
|
|
Title: |
Examination of pasture records on web safety measures commitment |
Author (s): |
Sinthuja Mohan and
A. Sivasankari |
Abstract: |
Most data frameworks
and business applications constructed these days have a web frontend and
they have to be generally accessible. These web applications, which can
be gotten to from anyplace, may make a security helplessness issue will
most likely be uncovered and misused by programmers. To see how these
vulnerabilities are truly happened, this paper likewise shows an
examination of the source code of the scripts used to assault them. This
likewise can be utilized to prepare programming designers and code
auditors in the identification of such blames and are additionally the
establishment for the examination of sensible weakness and assault
injectors. In this paper, we accordingly propose to make trusted
equipment a top of the line subject in the safe information
administration stadium. Additionally, we trust that cost-driven
experiences and compositional standards will on a very basic level
change the way frameworks and calculations are planned. |
|
|
Full Text |
|
|
Title: |
A novel
approach for fusion of panchromatic and multispectral image through
neural network |
Author (s): |
Gayathri Rajagopal, Saranya Velu and Dhivya Sampath |
Abstract: |
In this paper, a new technique for image
segmentation from high resolution fused multispectral image is
recognized. The proposed techniques are a mixture of image fusion,
feature extraction like shape and edge and also perform fused
multispectral image classification. Researchers have performed an
enormous amount of experiments on multi-focus image fusion techniques.
To extract superior quality information and consistency by using
multi-focus image fusion and also it is developing into many image
processing applications. A fusion method enhances the feature of image
and also enlarges the application of these data. The panchromatic image
has high spatial information while multispectral image has high spectral
information when merging these images to get a high resolution
multispectral image. By using spectral and spatial information the
feature is extracted to enhance the accuracy of the image. Therefore,
conventional methods are suffering from either spatial or spectral
characteristics, but the proposed methods save both spectral and spatial
characteristics simultaneously. Conventional methods like a high pass
filter modified principal component analysis and atour’s method. The
proposed method uses multi-wavelet transforms through a pulse coupled
neural network. Performance can be evaluated based on the classification
of fused multispectral image and also investigate the impact of image
fusion using selected features of reference and fused image. Using, SVM
classifier to build classification experimentation on fused
multispectral image. Therefore, the final results of the proposed method
are more efficient than the conventional methods. |
|
|
Full Text |
|
|
Title: |
Circularly polarized Koch fractal triband antenna for wireless
communication applications |
Author (s): |
B T P Madhav, K. Sairam,
M. Deepika, V. Naresh, Ch Saisri, K. Mounika |
Abstract: |
A novel monopole asymmetric fractal micro
strip antenna is designed and analyzed in this paper. The proposed Koch
fractal monopole antenna is resonating at triband with circular
polarization operation. Five diff structures - without slot (basic
model), single slot (Iteration 1), double slotted (Iteration 2), triple
slotted (Iteration 3), and optimized fractal slot (Iteration 4) are
studied for circular polarization radiation. Perturbations in the
structure for triband CP radiation are introduced by employing
optimization in the asymmetrical Koch fractal curves as boundaries of a
square patch and embedded triangular slots. The generated 3-dB axial
ratios are analyzed with the simulation results demonstrate that the
proposed antenna design is suitable for wireless communication
applications. |
|
|
Full Text |
|
|
Title: |
Securing
the privacy of sensitive data on health management system using elgamal
encryption |
Author (s): |
G. Nagapriya and
Jeberson Retnaraj |
Abstract: |
Most healthcare systems still rely on paper medical
records. To coordinate care between patients and physicians and amongst
the medical community is limited. The online health analysis system will
help to check the patient health condition regardless of the patient or
doctors geographical location. In practical life patients such as old
aged or handcrafted peoples face lot of difficulties in tracking their
health status. In this paper, the proposed solution is track the
patient’s health records in digital format and uploads the file in to
cloud space using personal computers. The patient health record file can
be encrypted by using strong security algorithm and stored in the cloud
space. The doctors will check their assigned patient status by checking
the client module. The Doctors and Nurses who are authenticated or
Government approved doctors can be registered in to the system; they can
able to view the patient records. Doctors will login in to the system,
get the patient’s health records from cloud space, review their health
condition and reply the patients by proposing the prescribed medicines.
The proposed application will help the patients by reducing their
travelling time to hospitals, reduce time spending in getting their
appointments, reduce time spending in taking the proposed reports by
doctors and the patient reports can be viewed online without any issues. |
|
|
Full Text |
|
|
Title: |
Secured
data storage design using cryptography |
Author (s): |
V. Jayanthiand Maria
Anu |
Abstract: |
Cryptography is the practice and study of techniques for secure
communication in the presence of third parties
(called adversaries). More generally, it is about constructing and
analyzing protocols that overcome the influence of adversaries and that
are related to various aspects in information security such as
data confidentiality, data integrity, authentication,
and non-repudiation. Applications of cryptography include ATM
cards, computer passwords, and electronic commerce. In this paper, we
implement the self-generating key approach it is proposed to use an
algorithm stored in a procedure in the SYS schema which will be made
executable by PUBLIC with a public synonym. However only the DBA can
view or edit the procedure thus preserving the secrecy. The algorithm
will generate a RAW key value using the filename of the Binary Large
OBject (BLOB) or CLOB and the date of uploading into the LOB with a
shuffling algorithm stored in the procedure. This is used as the
encryption key. |
|
|
Full Text |
|
|
Title: |
FPGA
implementation of highly area efficient advanced encryption standard
algorithm |
Author (s): |
D. Arivazhaki, V. Vijayakumar and T. Ravi |
Abstract: |
Cryptography is art of science that
encrypts plain text into cipher text (unreadable form) for security in
electronic data transmission over network fields. For this method the
current encryption method is Advanced encryption standard. The proposed
method is hardware implementation of AES-128 and the key length is
varying 128,192 and 256 bits is designed by Impulse C language with the
help of Xilinx Platform Studio. Impulse C is a high level synthesis tool
and supports parrel programming in particular for programming
applications mainly targeting FPGA based devices. |
|
|
Full Text |
|
|
Title: |
Characterization of the spherical stabilization flow regime by transient
pressure analysis |
Author (s): |
Freddy Humberto Escobar, Alfredo Ghisays-Ruiz
and Priyank Srivastav |
Abstract: |
There are three typical cases in which a
constant-pressure boundary is combined with some other transient periods
giving origin to the formation of new flow regimes. Such cases are
radial stabilization, linear stabilization and spherical stabilization.
The first one when a radial flow regime finds a constant-pressure
boundary, the late pressure derivative will display a straight line with
a negative unit slope. Once all the boundaries have been felt by the
transient wave the pressure derivative will take the classic cascade
behavior. The third case takes place in elongated system when the well
is near a lateral pressure-constant boundary, then a transient period is
expected along the other side of the reservoir. A combination of that
with the effect of the constant–pressure boundary leads to the formation
of the linear stabilization or parabolic flow regime. The third case
corresponds to a limited-entry well completed near a constant-pressure
boundary. In that case a -3/2 slope is seen in the pressure derivative
plot and no characterization of this has ever been presented in the
literature. So, a governing equation for such flow regime is developed
and characterization of that is achieved by both conventional analysis
and the TDS technique so both vertical and horizontal
permeabilities can be estimated. Synthetic examples were run to validate
the applicability of the provided equations. |
|
|
Full Text |
|
|
Title: |
Common rail
diesel-automotive to aerial vehicle conversions: An update (Part III) |
Author (s): |
Luca Piancastelli,
Leonardo Frizziero and Giampiero Donnici |
Abstract: |
Back to the 1997 when this activity began,
it was generally though that CRDIDs (Common Rail Direct Injection
Diesel) would have completely replaced the piston gasoline engines used
in aircrafts within a decade. This fact did not happen for several
reasons. This paper tries to individuate these reasons. The more updated
solutions to the many problems that almost stopped this application are
also introduced. In this third part, maintenance and cost effectiveness
related issues are introduced. Automotive OBD concept is described as a
method to reduce maintenance costs and risks. |
|
|
Full Text |
|
|
Title: |
A study
on performance enhancement of refrigerators using economizers |
Author (s): |
J. W. Jeong and Y. L.
Lee |
Abstract: |
Many studies have been conducted to
overcome the deterioration of COP (coefficient of
performance) that occurs from lowering the
evaporating temperature of a cascade cycle to extremely low
temperatures. This study applied economizers to low stage and high stage
cycles to enhance the performance of the R134a-R404a cascade cycle.
Cycle analysis was performed to examine changes in cycle performance
with condensing temperature, evaporating temperature, cascade
temperature difference and economizer ratio. Numerical analysis revealed
a 13% improvement in both cooling capacity and COP from applying an
economizer to the low stage cycle. The optimal temperature difference of
the cascade heat exchanger was approximately 6oC. |
|
|
Full Text |
|
|
Title: |
Analysis
of superposition ratio control method for the improvement of voltage
utilization factor in three phase multilevel inverter |
Author (s): |
S. Narasimha and M.
Sushama |
Abstract: |
In
this paper, a new approach for the control of superposition ratio of odd
harmonic wave into output voltage feedback control and improvement on
voltage utilization factor is presented. The input DC sources feeding
the inverter are considering being varying in time, In case of solar and
fuel cell applications. In fact, each one of the dc sources can have
different values at any time, but the output fundamental voltage will
stay constant. This paper gives detailed analysis of the improvement on
the controllability and absorption of the DC voltage fluctuation by
superimposing the moderate odd harmonic wave. The results obtained using
5level and 7level cascade multilevel inverters with static and dynamic
loads with spwm, using simulink/MATLAB. |
|
|
Full Text |
|
|
Title: |
Analyzing of free transverese vibration of an elastically
connected rectangular plate-membrance system with a Pasternak layer
in-between |
Author (s): |
M. Nasirshoaibi and N. Mohammadi |
Abstract: |
This paper theoretically analyzes free
transverse vibrations of an elastically connected rectangular
plate-membrane system with a Pasternak layer in-between. Solutions of
the problem are formulated by using the Navier method. Also natural
frequencies of the system are determined. The effect of Pasternak layer
on the natural frequencies of this mixed system is discussed in a
numerical example. Increasing shear foundation modulus of the Pasternak
layer causes an increase in the value of natural frequency of the system
(ωimn); however this influence of the shear foundation
modulus of the Pasternak layer is different at some particular
frequencies. That is, this effect is stronger at ω2mn
frequencies rather than what is seen at ω1mn
frequencies. The mixed system has an interesting feature which allows
each natural frequency to change as a function of shear foundation
modulus of the Pasternak layer, whilst other constructional and physical
parameters of the system can remain unchanged. The important result on
which this paper puts an emphasize, is that the magnitudes of the
frequencies become larger with increasing shear foundation modulus of
the Pasternak layer and the Pasternak layer can increase the magnitude
of frequencies more than Winkler elastic layer can. Thus the Pasternak
layer can be used instead of Winkler elastic layer to more effectively
suppress the excessive vibrations associated with plate-membrane
systems. Numerical results of the present method are verified once
compared with those available in the literature. |
|
|
Full Text |
|
|
Title: |
Evaluating the performance of various hybrid fuzzy
clustering algorithms on brain magnetic resonance images |
Author (s): |
T. Avudaiappan, R.
Shanmuga Priya and R. Balasubramanian |
Abstract: |
Image Segmentation is an indispensable
process in the visualization of human tissues, particularly during
clinical analysis of MR Images. The Objective of this paper is to talk
about the usage of Fuzzy Logic in MRI Brain image segmentation. There
are different fuzzy approaches to segment the MRI Brain image. In this
paper, different fuzzy clustering algorithms are used for the
segmentation of brain MR Images. One of the major issues of the fuzzy
clustering algorithm based brain MR image segmentation is how to select
the initial prototypes of different classes or categories. In this
paper, the quantitative indices are described to extract local features
of brain MR Images, when applied on a set of synthetic and real brain MR
Images, for segmentation. |
|
|
Full Text |
|
|
Title: |
Score
level fusion of multiple features for efficient personal recognition |
Author (s): |
Esther Rani P. and Shanmugalakshmi R. |
Abstract: |
Hand based biometric systems are widely
used in many applications owing to their reliability and high user
acceptance. In this work, a multimodal biometric system for personal
identification using score level fusion of palmprint and finger knuckle
print is proposed. Features are extracted from palmprint using Gabor
filter and Principal Component Analysis. Euclidean distance is used for
matching and the minimum scores generated by the matchers are combined
using sum rule. Also from finger knuckle print Speeded up Robust
Features and Bidirectional Empirical Mode decomposition is used to
extract features and scores are combined using sum rule after score
normalization using min-max technique. Finally score level fusion using
different rules is applied on the palmprint and finger knuckle print
matching scores. The multimodal system is implemented using MATLAB and
it is found that it provides low value of false acceptance rate, false
rejection rate and equal error rate and high genuine acceptance rate in
comparison to unimodal system using either palmprint or finger knuckle
print. |
|
|
Full Text |
|
|
Title: |
Road restraint systems
monitoring with stereoscopic dip-technique |
Author (s): |
Marco Guerrieri and Raffaele Mauro |
Abstract: |
Road restraint systems (RRS) are used to
protect vehicle occupants from dangerous roadside elements such as rigid
obstacles, slopes, utility poles, etc. The crashes on a road restraint
system damage its structure and, therefore, the functional behavioral;
for this reason is required monitoring the RRS into their operational
conditions. The research addresses the problem of the measurement of
safety barrier (SB) deformations by means digital image processing
technique (DIP). This technique is founded on the analysis of high
resolution photos/videos, obtained by means of 3D camera installed into
a data vehicle. The DIP technique has been used for evaluating the
longitudinal safety barriers deformations. A case study concerning N2
W-beam guardrails installed along a rural road in Italy was examined.
The procedure has shown that the DIP technique can be used with the aim
to monitoring guardrails and, therefore, to identify the cases in which
damaged SB must be repaired or replaced. |
|
|
Full Text |
|
|
Title: |
Decision
tree based feature selection and multilayer perceptron for sentiment
analysis |
Author (s): |
Jeevanandam
Jotheeswaran and S. Koteeswaran |
Abstract: |
Sentiment Analysis plays a big role in brand and product
positioning, consumer attitude detection, market research and customer
relationship management. Essential part of information-gathering for
market research is to find the opinion of people about the product. With
availability and popularity of like online review sites and personal blogs, more chances and challenges arise as people now can, and do use
information technologies to understand others opinions. In this paper, a
Multi-Layer Perceptron (MLP) is used to classify the features extracted
from the movie reviews. A Decision Tree-based Feature Ranking is
proposed for feature selection. The ranking is based on Manhattan
Hierarchical Cluster Criterion In the proposed feature selection; a
decision tree induction selects relevant features. Decision tree
induction constructs a tree structure with internal nodes denoting an
attribute test with the branch representing test outcome and external
node denotes class prediction. In this paper, a hybrid algorithm based on Differential Evolution (DE) and
Genetic Algorithm (GA) for weight optimization algorithm to optimize
MLPNN is proposed. IMDb dataset is used to
evaluate the proposed method. Experimental results showed that the MLP
with proposed feature selection improves the performance of MLP
significantly by 3.96% to 6.56%. Classification accuracy of 81.25% was
achieved when 70 or 90 features were selected. |
|
|
Full Text |
|
|
Title: |
Magneto-hydrodynamics non-newtonian squeeze film
characteristics of porous curved circular plates |
Author (s): |
Santhana Krishnan
Narayanan and Sundarammal Kesavan |
Abstract: |
The squeeze film characteristics between
porous curved circular plates lubricated with an electrically conducting
non-Newtonian fluid in the presence of an external magnetic field are
investigated in this paper. Based upon the Magneto-hydrodynamic flow
theory together with the Stokes micro-continuum theory, the
magneto-hydrodynamic non-Newtonian (MHNN) Reynolds equation is derived
and applied to predict the porous curved circular squeeze film
behaviours. The expressions for MHNN porous squeeze film pressure,
load-carrying capacity and squeeze film time are obtained. Comparing
with the hydrodynamic Newtonian case, the squeeze film characteristics
for porous curved circular plates are improved by the use of an
electrically conducting non-Newtonian fluid in the presence of external
magnetic fields. |
|
|
Full Text |
|
|
Title: |
The
effect of upflow velocity and influent concentration to cod removal on
UASB reactor treating domestic wastewater |
Author (s): |
Syafrudin, Sudarno Anif
Rizqianti and Mochamad Arief Budihardjo |
Abstract: |
This
study aims to estimate the laboratory scale of domestic wastewater (grey
and black water) processing ability of UASB (Upflow Anaerobic Sludge
Blanket) reactors by varying the upflow velocity and influent
concentration. Three kinds of influent concentrations; low, medium and
high was determined. The parameter examined was the Chemical Oxygen
Demand (COD). The concentration of the COD that can be removed by the
UASB reactor increased with the increased wastewater concentration. The
maximum removal efficiency values obtained for the COD was 69%. Overall,
the reactor with slower upflow velocity allowed more time for the
microorganisms to decompose the wastewater substrate, increasing the
observed removal efficiency. However, the UASB reactor treatment results
did not meet the waste water quality standards released by Ministry of
Environmental of Indonesia and thus requiring further processing before
discharging to the environment. |
|
|
Full Text |
|
|
Title: |
Efficacy
of dolime fine stabilized red mud-fly ash mixes as subgrade material |
Author (s): |
Akshaya Kumar Sabat and Swapnaranee
Mohanta |
Abstract: |
Red mud is an industrial solid waste
produced during the production of aluminum. The effects of dolime fine
on compaction properties, unconfined compressive strength (UCS), soaked
California bearing ratio (CBR) and durability of red mud stabilized with
optimum percentage of fly ash has been discussed in this paper. Modified
Proctor compaction and UCS tests were conducted on red mud -fly ash
mixes to find the optimum percentage of fly ash (15%) for stabilization
of red mud. Dolime fine was added to red mud stabilized with optimum
percentage of fly ash from 0 to 12% at an increment of 2%. Modified
Proctor compaction, UCS, and soaked CBR tests were conducted on dolime
fine stabilized red mud-fly ash mixes. The optimum percentage of dolime
fine obtained was 8%. Durability test was conducted on the sample,
having optimum percentage of red mud, fly ash and dolime fine. It was
observed that, the sample having optimum percentages of red mud, fly ash
and dolime fine is durable. The economy of addition of fly ash and
dolime fines was studied by designing a flexible pavement and found that
there would be substantial savings in cost of construction if dolime
fine stabilized red mud -fly ash mixes is used as subgrade in place of a
low CBR soil. |
|
|
Full Text |
|
|
Title: |
Analysis
of effect of in-wheel electric motors mass on passive and active
suspension systems |
Author (s): |
Abdussalam Ali Ahmed Omar and Basar Özkan |
Abstract: |
This study presents evaluation of effect
of in-wheel electric motors mass on the performance of passive and
active suspension systems using Matlab. Linear Quadratic Regulator (LQR)
is one of more common control methods which is used to complete the
design of the active suspension system in this paper .Unsprung mass is
one of the important parameters which effects on road holding and ride
comfort behaviors in the vehicles, this effect obtained in this work by
comparing the performance of the two systems using standard tire and
tire with In-Wheel Electric Motor. Also, modeling and simulation of
quarter car model completed to construct the Simulink models of the
systems using MATLAB software. The study summarized bad effect of
increasing the weight of tires by add In-Wheel Motors to the passive and
active suspension systems on the road traction and the vehicles drivers
comfort, at the same time the active suspension system with in-wheel
motor needs high actuator force to work compared to the same system
without in-wheel motor. |
|
|
Full Text |
|
|
Title: |
Multimodal biometric system based on fuzzy logic and genetic algorithm |
Author (s): |
N. Jeevitha, K.
Krishneswari and A. Swathi |
Abstract: |
In this paper a novel technique for multimodal biometric
system based on fingerprint and palm print is proposed. The proposed
system combines features of palm print and fingerprint using an
appropriate fusion scheme. In order to avoid redundant as well as
irrelevant features, it is necessary to select an optimal subset of
features from a larger set. The main issue of choosing a suitable
feature set is to achieve high recognition rate. The proposed system
employs genetic algorithm to select discriminating features which
provides more robust solution. The similarities between the templates
are identified by Euclidian distance. The performance of the system was
evaluated using a publicly available dataset. The result obtained has
shown significant improvement in the recognition rate. |
|
|
Full Text |
|
|
Title: |
Multispectral palmprint recognition using ant colony optimization |
Author (s): |
R. Gayathri, L.
Jayalakshmi, K. Mahalakshmi, K. S. Nevethitha |
Abstract: |
Biometric authentication is an effective
method for automatically recognizing a person's identity with high
confidence in which feature extraction and classification are key
considerations. Palm vein pattern biometric technology is a promising
feature for use in forensic and access control application. It uses the
unique patterns of palm veins to authenticate personals at a high level
of accuracy. Our proposed work is to accommodate the rotational,
potential deformations and translational changes by encoding the
orientation conserving features. The proposed system analyses the
palm-vein authentication on two different databases that are acquired
with the contactless CASIA and touch-based imaging setup collected from
PolyU palmprint database. |
|
|
Full Text |
|
|
Title: |
Model-based design of LTE baseband processor using xilinx system
generator in FPGA |
Author (s): |
C. Sasikiran and V. Venkataramanan |
Abstract: |
Long Term Evolution (LTE) is likewise
brought up to as Evolved - Universal Terrestrial Radio Access (E-UTRA).
The specifications define a new physical air interface in order to
increase of the data rate of the cellular mobile wireless. In this
paper, to appraise the effectiveness of LTE physical layer, the
Reed-Solomon coder is used for Forward Error Correction (FEC) in systems
where the data are transferred and vulnerable to errors before the
reception. In an indispensable of convolution encoder, based on the
encoder output rate more than to 2 bits are sent over the channel for
every input bit. It is employed in a full combination of error
correcting applications and frequently used in terminal with the Viterbi
Decoder. These subsystems are implemented in MATLAB/Simulink model based
design and the analysis of power parameter like Total power, Thermal
power, Quiescent, Dynamic with family package in the Xilinx System
Generator (XSG), and realize with FPGA. |
|
|
Full Text |
|
|
Title: |
A statistical comparison of logistic regression and
different bayes classification methods for machine learning |
Author (s): |
L. Mary Gladence,
M. Karthi and V. Maria Anu |
Abstract: |
Recent machine learning algorithms are
widely available for various purposes. But which classifier is suitable
for particular data is not yet defined. To consider this into account,
well known classifiers Logistics Regression and Bayesian Classifier is
taken to validate the work. To validate this, consider some factor such
as Asymptotic error (i.e Normally Naive Bayes reaches its asymptotic
error very quickly with regards to the number of training samples), how
performance takes place when we increase the data set size etc. Here we
discuss how various bayes classifiers like Bayes Network, Naive Bayes,
Naïve Bayes Multinomial Text, and Naïve Bayes Updateable are working and
how they differ with each other based on given data and these results
are effectively compared with Logistics Regression. Moreover, proposed work compared Naïve Bayes and Logistic
Regression by using some standard dataset results as input. Finally it
shows how the Bayes classifier methods and Logistic Regression differs
each other in terms of performance factor. |
|
|
Full Text |
|
|
Title: |
Performance analysis of optical transmission system using
FBG and Bessel filters |
Author (s): |
Antony J.S, Jacob Stephen and Aarthi.G |
Abstract: |
The optical fiber has found great
application in long distance communications, as light the medium of
information transfer attenuates very less compared to electric pulses in
cables. However the major issues that limit efficiency are chromatic
dispersion and non-linear effects. Fiber Bragg Grating (FBG) is widely
used as a component to compensate dispersion on account of its low
insertion loss. This paper provides a method of using a combination of
FBG as a dispersion compensator and Bessel filter to improve the Q
factor of the system and also reduce the noise figure. A 10 Gb/s NRZ
pulse is launched into the fiber and the performance of the system is
evaluated using Optisystem simulator. The Q factor of the system is then
investigated with and without use of Bessel filter. The simulation is
analysed with respect to input power, fiber length, and attenuation
coefficient. |
|
|
Full Text |
|
|
Title: |
Four branches Yagi array of microstrip patch antenna’s
design and analysis for wireless LAN application |
Author (s): |
Nuraiza Ismail, Rina
Abdullah, Suziana Omar and Suziyani Rohafauzi |
Abstract: |
This paper presents the design and
analysis of a new kind of Yagi array microstrip patch antenna which
appropriate for wireless LAN application. The design is a derivative of
the original microstrip Yagi antenna of two branches that comprises of
two elements including driven and parasitic elements which consists of
reflector and directors. The analysis has been carried out to identify
the effect of adding another two more branches in comparison to the
microstrip Yagi structure of one branch and two branches. The four
branches of this microstrip Yagi antenna has been connected using two
branches that are cooperated to each other in a composite array format
using corporate-feed network. The proposed antenna design is fed by
microstrip line that based on quarter wave impedance matching technique
and simulated using Computer Simulation Tool (CST) Microwave Studio. The
simulation result of return loss has shown the operated frequency at 5.6
GHz that is appropriate coverage standard of IEEE 802.11 in 5 GHz band
between 5.15-5.875 GHz. The proposed four branches Yagi array of
microstrip patch antenna can also achieve a gain above 10 dB and a high
front-to-back (F/B) ratio as much as 13 dB. |
|
|
Full Text |
|
|
Title: |
Test vector based multiple soft faults detection in
linear analog circuits with hardware implementation |
Author (s): |
G.
Puvaneswari and S. Uma
Maheswari |
Abstract: |
A method to detect multiple soft faults in
linear analog circuits using test vectors is proposed in this paper. The
circuit under test (CUT) is simulated used Modified Nodal Analysis (MNA)
and with the knowledge of circuit topology and the component values, the
test vectors associated with each components of the CUT and diagnosis
variables are derived. In real time fault detection, the dependency of
test vector to component values and tolerance limits the fault detection
process in analog circuits. To solve this issue, test vectors are
generated for nominal values, upper bound and lower bound values of the
components of CUT and the fault detection is performed. Hardware
implementation and verification of benchmark circuits such as Sallen Key
Band Pass Filter and Linear Voltage Divider shows the robustness of the
proposed approach in real time testing. |
|
|
Full Text |
|
|
Title: |
Null clines, phase
planes of both harvested host-mortal commensal eco-system |
Author (s): |
N. Seshagiri Rao,
K.V.L.N. Acharyulu and K. Kalyani |
Abstract: |
This paper introduces the null clines and
threshold diagrams of commensalism interaction between two species. This
biological model comprises commnesal and host species and the host is
being migrated at constant rate. Further both are consider within the
limited available natural resources. |
|
|
Full Text |
|
|
Title: |
Classification bundle
block detection using magnitude squared coherence |
Author (s): |
Padmavathi Kora
and K. Sri Ramakrishna |
Abstract: |
This paper conveys a
technique for the detection of Bundle Branch Block (BBB) ECG patterns
using Magnitude Squared Coherence (MSC) function. The MSC function finds
common frequencies between two signals and evaluates the similarity of
the two signals. The ECG variation in BBB can observed through the
changes in the ECG signal. MSC technique uses Welch method for
calculating the PSD. For the detection of Normal and BBB beats, MSC
output values are given as the input features for the LMNN classifier.
Overall accuracy of LMNN classifier is 98.5 percent. The data was
collected from MIT/BIH arrhythmia database. |
|
|
Full Text |
|
|
Title: |
A novel personal
authentication using knuckle multispectral pattern |
Author (s): |
Gayathri Rajagopal, Dhivya Sampath,
Saranya Velu and Preethi Sampath |
Abstract: |
With the increased use of
biometrics for identity verification, there have been similar increases
in the use of unimodal biometric system. The finger knuckle print
recognition is one of the newest biometric techniques research today. In
this paper, one of the reliable and robust personal identification
approaches using finger knuckle print is presented. Many researchers are
going on in face, finger print and iris recognition and which finds its
usage in many applications. These biometric which find its usage in many
applications are easily duplicated for fraudulent activities. But the
finger knuckle print recognition is the unique pattern to identify the
individuality at a high level of accuracy. This paper proposes new
algorithms for finger knuckle print recognition using SIFT algorithm and
this algorithm presents, extracting a new original constant features
from images As the proposed method matches the different angles of
finger knuckle print with the database, its reliability is very high
when compared to other biometrics. The features of SIFT which are
invariant to image scale and rotation, are shown to provide robust
matching across a substantial range of fine distortion, change in 3D
viewpoint, addition of noise, and change in illuminance. The features are highly distinctive, in the sense
that a single feature could be correctly matched with high probability
against a large database of features from many images. |
|
|
Full Text |
|
|
Title: |
Li-Fi design for high speed data transmission |
Author (s): |
M. Samuel Lazar and T. Ravi |
Abstract: |
Li-Fi represents Light
Fidelity. Li-Fi is the future upcoming technology and this can transmit
the information through light at high speed as compared to the present
wireless technologies. The Li-Fi technology can transfer the data
through LEDs. It is a high speed and low cost wireless communication
system, compared to Wi-Fi. It can provide high security, large
bandwidth, and low cost. While using various color LEDs can get the
different bandwidth and speed. This paper describes the design of Li-Fi
high speed data transmission system and analyzing its performance. |
|
|
Full Text |
|
|
Title: |
Forced transverse vibration analysis of an elastically connected
rectangular double-plate system with a pasternak middle layer |
Author (s): |
M. Nasirshoaibi and N.
Mohammadi |
Abstract: |
Forced transverse
vibrations of an elastically connected rectangular double-plate system
with a Pasternak layer in-between are considered in this paper. Based on
the Kirchhoff-Love plate theory, the general solutions of forced
vibrations of the plates subjected to arbitrarily distributed continuous
loads are found. The forced vibration problem is generally solved by the
application of the modal expansion method for the case of simply
supported boundary conditions for the plates. The effects of Pasternak
layer on the forced vibrations of the double-plate system are discussed
for the case of particular excitation loading. The dynamic responses of
the system caused by arbitrarily distributed continuous loads are
obtained. Vibrations caused by the harmonic exciting forces are
discussed, and conditions of resonance and dynamic vibration absorption
are formulated. Shear foundation modulus of the Pasternak layer doesn’t
have any effect on the first frequencies, but has an efficient effect on
the second frequencies. Thus the plate-type dynamic absorber with a
Pasternak layer can be used to more effectively suppress the excessive
vibrations of corresponding plate systems with respect to those with a
Winkler elastic layer in-between. The numerical results of the present
method are verified once compared with those available in the
literature. |
|
|
Full Text |
|
|
Title: |
A multiband mimo antenna for s and c-band communication applications |
Author (s): |
B T P Madhav, D. Lakshmi
Kranthi, Ch Kusumanjali Devi, N. Navyasanthi and B. Tarunteja Reddy |
Abstract: |
A compact multiband antenna
that covers operating bands of C and S for communication applications is
proposed in this paper. A multiple-input-multiple-output configuration
is used in this design with two ports connected to the radiating element
of the antenna. The MIMO antenna structure consisting of step shaped
radiating element on four sides of the antenna model. Different
iterations are constructed by introducing stepped slots on the basic
antenna structure. The overall performance of the antenna in terns of
s-parameters, radiation pattern, field distributions, directivity and
efficiency are investigated and verified the basic parameters through
measurements. |
|
|
Full Text |
|
|
Title: |
FRAGDEG algorithm for Bigdata |
Author (s): |
Rekha and A. S. |
Abstract: |
The ultimate aim of this paper is to overcome the
challenges faced in data mining and data warehousing in the field of big
data. There are two types of data storage such as scalable and elastic.
If it is scalable then existing techniques can be used. But while
dealing with the elastic data, it needs concentration on many areas. It
needs to concentrate on split up of data whenever the user adds some new
data. It should be properly fetched without loss when needed no matter
how many split-ups are there. Here a FRAGDEG Algorithm is used for
integrating data. This fragmentation algorithm allows using a threshold
value according to the user convenience. The big data handled in the
existing best peer++ system provides platform for corporate network
applications. This system delivers data sharing services for corporate
networks with peer to peer data management platform. The total cost of
ownership is reduced in inter companies. It eliminates the hadoop tool.
The FRAGDEG algorithm works efficiently with bigdata on both velocity
and variety aspect. The performance is made more efficient using this
algorithm. |
|
|
Full Text |
|
|
Title: |
Performance evaluation of I- shaped patch wearable
textile antenna in leather substrate for 2.45 GHZ |
Author (s): |
Jeyakumar S. and Karthikeyan
K. V. |
Abstract: |
The aim of our work is to
design an I-patch over textile substrates (soft substrates) instead of
hard substrate such as RT Duroid and FR4 and to test its performance
over ISM band (2.45 GHz). Wearable textile antennas are current research
for the ISM band. Electrical properties such as dielectric constant and
loss tangent angle of various textile materials such as Leather, nylon,
silk were considered for the design of I - patch is kept constant so
that the various antenna parameters with different textile substrate
also simulated and compared under the operating frequency of 2.45 GHz by
using High Frequency Simulation Software (HFSS). Ansoft HFSS is used for
design and simulation of Leather substrate wearable textile I - shaped
patch antenna |
|
|
Full Text |
|
|
Title: |
Design of suboptimal and optimal SU-MIMO system with improper
modulations using per antenna power constraint and perfect CSI |
Author (s): |
C. Manikandan,
P. Neelamegam, A. Srivishnu and M.S. JeyaSuganthi |
Abstract: |
Achieving good bit error rate performance without considering practical
constraint is a major concern of the industries in the design of MIMO
transcevier system. In this paper two type of Single-User
Multiple-Input, Multiple-Output (SU-MIMO) transceiver which employing
one dimensional improper modulations are designed by considering the
practical constraint and the perfect channel state information, Finally
the performance of the both the design are analyzed in terms of Bit
Error Rate(BER). From the result the system which providing low BER
named as optimal SU-MIMO system and which providing high BER is named
as suboptimal SU-MIMO System. |
|
|
Full Text |
|
|
Title: |
A study of the oxygen
absorption characteristics of unsaturated fatty acids of linseed, rubber
seed, soybean and melon seed oils: Effect of temperature |
Author (s): |
Isiuku B. O. and
Ibemesi J. A. |
Abstract: |
The oxygen-induced
polymerization of the fatty acids of soybean (S.B.A.), linseed (L.S.A.),
rubber seed (R.S.A.), and melon seed (M.S.A.) oils were monitored
manometrically at 10-minute intervals for five hours at 31.5, 45, 60, 75
and 90oC. Moles of absorbed oxygen were calculated from
pressures of un-reacted oxygen using the ideal gas equation. Plots of
m moles of absorbed oxygen against time at the various temperatures show
parabolic rise in oxygen absorption, for all temperatures except for 90oC
when the optimum oxygen absorption was reached at about the fourth hour.
Oxygen absorption rates were highest within the first 2.5hours for all
temperatures except for 90oC where the rates were highest
within the first 1.5hours. Fifth-hour oxygen absorption values were
plotted against temperature. The plots show that the optimum oxygen
absorption temperature range for the acids was within the range of 60-75oC.
Oxygen absorption trends were generally not in conformity with degree of
unsaturation. |
|
|
Full Text |
|
|
Title: |
Analysis of chemical
composition of rice husk used as absorber plates sea water into clean
water |
Author (s): |
Humayatul Ummah,
Dadang A.Suriamihardja, Mary Selintung and Abdul
Wahid Wahab |
Abstract: |
Chaff is part of the grain
grains (cereals) in the form of dry sheets, scaly, and can not be eaten,
which protects the inside (endospermium and embryo). Husk can be found
in almost all members of grasses (poaceae), although in some kinds of
cultivation were also found that the variation of grain without husk (eg
maize and wheat). This husk is a waste of life from the Plant. In
agriculture, rice husk can be used as a mixed feed, litter, mixed in the
soil as fertilizer, burned, or ashes are used as growing media, in print
used as a fuel substitute for oil. In this study, rice husk fuel and
charcoal briquettes will be used as the absorber. The results showed
that the composition of rice husk after being submerged in sea water
distillation process and experience a decline. The conclusion was that
the actual rice husk as waste can be made as briquettes, fertilizer,
fuel and others but also it can be used as an absorber plate in the
distillation process sea water into clean water. The results obtained in
which the chemical composition of all decreased for example Cl = 36.41
mm% decreased to 23.71mm%, Si = 30.48mm% to 22.27mm% and Fe = 17.27mm%
to 9.62mm% and so on. This was due to rice husk briquettes as an
absorber plate in the container of distilled lead compounds dissolved
therein participate after undergoing a process of condensation. |
|
|
Full Text |
|
|
Title: |
Effect of squeeze pressure on mechanical properties of LM6 aluminium
alloy matrix hybrid composites |
Author (s): |
M. Kamaraj and
A. Ramesh |
Abstract: |
Melt stirring and squeeze
casting technique was successfully used to fabricate hybrid aluminium
matrix (LM6) composites containing SiC and Al2O3
particles. The reinforcement particles were added into molten aluminium
matrix by a mechanical stirrer and composite mixture was cast by
applying pressure using a hydraulic press. The effect of squeeze
pressure (30 - 120 MPa) on mechanical properties of LM6 aluminium alloy
and composite were investigated. The specimens were prepared from the
casting and are subjected to microstructural and mechanical
characterization. The microstructural characterization revealed that
grain size is decreased with increasing squeeze pressure. The density
and hardness of composite increased with increasing squeeze pressure,
but porosity decreased. The tensile properties such as yield strength,
ultimate tensile strength of composite increased with increasing squeeze
pressure and reached maximum value at a pressure of 90 MPa but
elongation decreased. The tensile fracture surface of composite specimen
indicates the modes of fracture mechanism. |
|
|
Full Text |
|
|
Title: |
A new control method for power inverter based on dynamic evolution
control |
Author (s): |
Ahmad
Saudi Samosir |
Abstract: |
This paper proposes a new control method for Power Inverter. The
analysis and design of the proposed control technique are provided. A
new approach for power inverter controller synthesis based on dynamic
evolution control theory is presented. In order to synthesize the
controller formulation, the dynamic evolution control employs a simple
analysis of nonlinear equation models of the inverter. The performance
of the proposed controller is verified through MATLAB-Simulink. To
validate the simulation results, an experimental prototype of power
inverter is developed. |
|
|
Full Text |
|
|
Title: |
Design and evaluation of a portable meter oil pollution prototype
wastewater with temperature control using arduino technology |
Author (s): |
A. Soto Otálora,
C. A. Achury Bohorquez, M. J. Gómez Gutiérrez |
Abstract: |
In search of an efficient
and quick way to determine the amount in ppm hydrocarbons in wastewater
sample, design and evaluation of prototype portable meter oil pollution
in wastewater temperature control is performed Using arduino technology,
depositing the sample of water in a flask, is carried to the base of the
device where the heating plate is located; the flask is plugged with
plug support containing the temperature sensor and gas sensor. Depending
on the concentration of hydrocarbon in water and using the increase in
temperature causes the oil to evaporate, causing increased conductivity
in the sensor as it is composed of metal oxide, which is a better
conductor in the presence of hydrocarbons. Operation of the device is
designed with the LabVIEW program, which allows obtaining the data
generated by the sensors by means of an algorithm in language G, wherein
the temperature sensor is required and the temperature of this is shown
marked plus a graph of voltage vs. time obtained using the gas sensor.
Both graphs generated data that is exported as a table and then perform
the analysis of the results obtained from the sample. To determine the
concentration of parts per million (mg / l) of hydrocarbons in the water
is required experimentally obtained table, which entered with the aid of
voltage and determine the concentration of hydrocarbon. After several
tests and compared to the analysis performed by a laboratory certified
to perform Aqualim total hydrocarbon tests, resulting in an error
between the device and the laboratory is 3.27%. Being a very low
percentage, compared to the elements used. |
|
|
Full Text |
|
|
Title: |
Comparison of fuzzy AHP and TOPSIS evaluations of luggage bag design
alternatives |
Author (s): |
Shivang Gupta,
Shaurabh Kumar Singh, Kunal Agrawal and Dega
Nagaraju |
Abstract: |
Selection of design concepts is an area of design research that has been
under considerable interest over the years. It has become a very
critical activity to the performance of organizations and supply
chains. Studies presented in the literature propose the use of the
various Multi Criteria Decision Making (MCDM) approaches. This paper
presents a comparative analysis of Technique for Order of Preference by
Similarity to Ideal Solution (TOPSIS) and Fuzzy Analytic Hierarchy
Process (Fuzzy AHP) in the context of decision making for design
selection. The comparison was made based on the factors: cost; quality;
ergonomics and environmental factors. To illustrate the proposed model,
a few design concepts of luggage bags are considered and the most
appropriate one is determined. In addition, rank correlation is carried
out to analyse the order of rankings obtained by TOPSIS and Fuzzy AHP
techniques. This paper contributes to helping research practitioners as
well as industrial decision makers to choose the more appropriate MCDM
techniques for design selection. |
|
|
Full Text |
|
|
Title: |
Artificial cooperative search algorithm based load frequency controller
for multi-area deregulated power system with coordinated control of TCPS,
RFB and AC-DC parallel tie-lines |
Author (s): |
Ramesh Kumar Selvaraju and Ganapathy Somaskandan |
Abstract: |
This paper presents the design and analysis of
Artificial Cooperative Search (ACS) algorithm based Load Frequency
Controller with the presence of Thyristor Controlled Phase Shifter (TCPS),
Redox Flow Battery (RFB) and AC-DC parallel tie-lines for interconnected
deregulated power system. In deregulated power scenario, specialized
agencies for generation, transmission and distribution have been formed
for increasing the reliability and efficiency of power system operation.
This effects the formulation of LFC problem, so the traditional LFC
model is modified to consider the bilateral contracts in the deregulated
environment. The deviations in frequency and interarea tie-line power
from their prescribed values following a load disturbance are of great
concern in power system operation and control. It is possible to
effectively suppress the frequency and tie-line power deviations by
coordinated control of TCPS and RFB with AC-DC parallel tie-lines for
different operating scenarios in deregulated environment. The simulation
results reveal the superior performance of Artificial Cooperative Search
(ACS) algorithm tuned Load Frequency Controller. |
|
|
Full Text |
|
|
Title: |
Noticing emotion from bodily movement |
Author (s): |
Nurnadia M. Khair, M.
Hariharan, S. Yaacob and Shafriza Nisha Basah |
Abstract: |
In this study, we investigate critical
emotion-specific posture and movement features, which typically depended
only on a small number of joints. The main goal is to minimal
representative of emotional display by reducing the amount of joints
involved in the movement. Beside to improve the computational
efficiency, we can identify the important aspects of emotion expression.
This work is inspired by the motor-control concept which defines the
involving components of movements that cover only limited set degrees of
freedom that are jointly controlled. The approach is based on the basic
statistical analysis that is extracted from dynamic motion qualities
such as position, velocity, acceleration and jerk. Four discrete
categories of emotion, such as angry, happy, neutral and sad were
analyzed through actions such as knocking, lifting, throwing and
walking. Then, we evaluate the performance from the combination of
statistical features extracted using different classifier, k-nearest
neighbor (KNN), fuzzy k-nearest neighbor (FKNN), probabilistic neural
network (PNN), support vector machine (SVM) and naive bayes (NB)
classifier. The findings show that, it is informative enough to consider
right arm movement to classify different emotion in actions such as
knocking, throwing, lifting and full body for walking. |
|
|
Full Text |
|
|
Title: |
Simulation of neutron
transport for the purpose of neutron filters optimization in the pulsed
neutron logging apparatus |
Author (s): |
Kosarev V. E., Goncharova G. S., Platov
B. V., Rakaev I. M. and Kosareva L. R. |
Abstract: |
Numerical modeling of thermal neutron
filters, which are an integral part of the apparatus of pulsed neutron
logging (PNL), has been carried out. Many models of filters were
created. The neutrons slowing down and absorption processes in filters
was analyzed. Optimum structure and dimensions of neutron filters was
offered. |
|
|
Full Text |
|
|
Title: |
Energy efficient MCDS
algorithm for MANETs based on convex hulls |
Author (s): |
Chakradhar P and P. Yogesh |
Abstract: |
This paper proposes and
analyzes energy efficient Convex Hull based Minimum Connected Dominating
Set [CHMCDS] algorithm. The algorithm achieves energy efficiency, bandwidth efficiency,
reliability and robustness by reducing redundant rebroadcasts of control
packets in the network. The Connected Dominating Set (CDS) is widely
used as a virtual backbone or Spine in mobile ad-hoc networks for the
purpose of routing and broadcasting. Here the MCDS is based on
distributed Convex Hull algorithm and Unit Disk Graph. In this paper we
use a quick hull algorithm with incremental sweeping which is more
suitable for the MANETs than other algorithms. Mobility and
Residual energy of the nodes are considered as parameters in the
maintenance of MCDS. The resultant CHMCDS has relatively longer lifetime
than other MCDS algorithms. This is a distributed algorithm with a time
complexity of O(nh log n) and the message complexity O(nh log
n), where ‘n’ is the number of nodes in the network and ‘h’
is the number of convex hull nodes in the network. The
performance evaluation of this algorithm yields better results in dense
networks as well as sparse networks. The cardinality and the performance
ratio of this CHMCDS algorithm are optimal compared with existing MCDS
algorithms. The simulation results show that the proposed algorithm
performs better.
|
|
|
Full Text |
|
|
Title: |
Simulation research of free-space optical communication based on linear
polarization shift keying modulation |
Author (s): |
Akshay
Chawla, Sonali Mishra and G. Aarthi |
Abstract: |
Free-space optical communication is utilized for transmitting data
between the source and destination using light traveling through free
space. In this paper, the modulation technique applied to the
propagating light is linear polarization shift keying. An FSO system is
simulated in Optisystem software using the aforementioned modulation
technique under different weather conditions. The performance analysis
of the system is carried out by examining minimum BER values and the
corresponding transmission distance achieved with different specific
attenuations. |
|
|
Full Text |
|
|
Title: |
Chaotic behaviour of host-monad commensal species pair-a special
numerical case study |
Author (s): |
N. Seshagiri Rao,
K.V.L.N. Acharyulu and K. Kalyani |
Abstract: |
In this paper we
present the numerical
solutions of a week commensal of a two species commensalism interaction
with Monad type-variable commensal coefficient with limited resources
and with mortality rate for the commensal species. The commensal
coefficient depends up on the host population size. Very interestingly
we observed the chaotic behavior of the dynamical system for an
arbitrary change in the commensal coefficient. Also we noted the
bifurcation timings of the trajectories of the commensal species over
the host species. |
|
|
Full Text |
|
|
Title: |
Effect of changing mass ratio of styrene/butyl acrylate on the behavior
of nano organo-silica in poly (styrene-co-butyl acrylate)
emulsion core-shell |
Author (s): |
Abd El-Shafey I. Ahmed,
Ahmed M. El-Masry, Ahmed.
I. Hussain and Ahmed Saleh |
Abstract: |
Poly (styrene-co-butyl acrylate) as shell and nano
organo-silica as core were prepared by in situ seed emulsion
polymerization. The influence of changing mass ratio, butyl acrylate (BuA),
and styrene (St) on the prepared emulsion were studied. The ratio of the
monomers St/BA were 60/40, 70/30, 40/60 and 30/70 at constant dose of
nano organo-silica 3% (based on total monomer content). The prepared
nano polymers were characterized using thermal analyses, HRTEM, FESEM,
FTIR and UV-Visible. Results have shown that monomer ratio has a
significant influence on glass transition temperature (Tg). Thermo
gravimetric analysis showed that the systems with higher (BuA) fraction
have better thermal stability than systems with higher (St) fraction. |
|
|
Full Text |
|
|
Title: |
Characterization of hybrid black toner using the parameters waste toner
and nano phase carbon |
Author (s): |
C.
Krishnaraj and R. Vaira Vignesh |
Abstract: |
Toner is used in photocopiers to form the latent electrical image on the
electrostatically charged drum. The paper picks up the toner particles,
when it slides over the drum. Specific factors cause 10% of toner
particles (approximately) to be left over the drum. This left out toner
is cleaned by the unit to ensure the quality of the proceeding copies.
This left out toner is called as waste toner and is collected in cleaner
sump. If this waste toner is used in the photocopiers, the quality of
the copier is reduced. The waste toner is mixed in proportion with Nano
phase Carbon and original toner to get Hybrid Black Toner. The original
toner is the toner prescribed for the photocopier by the manufacturer.
The hybrid black toner is characterized by the two parameters say waste
toner and nano phase carbon in this article. |
|
|
Full Text |
|
|
Title: |
Analysis of machining and surface finishing of various materials in EDM |
Author (s): |
C. Krishnaraj, G. Sundaram, C. Karthickkumar and K. Kathirvel |
Abstract: |
The proper selection of manufacturing conditions is one of the most
important aspects to take into consideration in the majority of
non-traditional machining processes and particularly, in processes
related to Electrical Discharge Machining (EDM). EDM process is based on
thermoelectric energy between the work piece and an electrode. Material
Removal Rate (MRR), Tool Wear Rate (TWR) and surface finish are
important performance measures in EDM process. Despite a range of
different approaches, all the research work in this area shares the same
objectives of achieving more efficient material removal rate and
improved surface quality. The paper researches on EDM relating to MRR
and TWR along with surface finish in various work materials like Hot Die
Steel (11 / 13) and Aluminium (1100 / 2024) with different tool
electrodes (Copper and Brass) and analysis will be carried out for the optimal solution as well as the result. |
|
|
Full Text |
|
|
Title: |
Flexural behaviour of hemp fiber reinforced concrete beams |
Author (s): |
K. Ramadevi and S. Deepa
shri |
Abstract: |
In this research work, an attempt was made to obtain low cost building
materials using natural fibres. Fibers are usually used in concrete to
control cracking due to both plastic shrinkage and drying shrinkage and
bridge across the cracks that develop in concrete. Hemp fibres were used
in this work to exploit the enormous potentials of renewable resources
in the non-food areas of natural fibers. The fibres in volumetric ratios of 0.25%, 0.5%, 0.75% and 1% fibers were used. It was attempted to determine the optimum percentage of Hemp fiber in
concrete that is found to bring about an appreciable increase in the
mechanical properties of concrete. Reinforced concrete beams of grade
M25 were cast and tested under two-point loading. The test results were
found to be appreciable for RC beams with hemp fibres. |
|
|
Full Text |
|
|
Title: |
Studies on relationship between compressive and splitting tensile
strength of high performance concrete |
Author (s): |
K. Athi
Gajendran, R. Anuradha and G. S. Venkatasubramani |
Abstract: |
This
experimental study is intended to identify the relationship between
Compressive strength and splitting tensile strength of High performance
concrete. For this purpose the applicability of existing relationship
between the Compressive strength and Splitting tensile strength of
Concrete was examined. The commonly accepted 0.5 power relationship as
per IS 456-2000 was investigated and then a similar kind of relationship
developed for High performance Concrete. M60 grade HPC mixes
incorporating different percentages of high reactivity metakaolin and
silica fume by weight of cement along with some suitable super
plasticizer. The results of the study indicate that the strength
properties of HPC mixes improved by incorporating metakoalin and silica
fume up to a desirable content of 15% and 5% respectively by weight of
cement. It was analyzed from the test result that the Compressive
strength and splitting tensile Strength were related together and the
0.5 power relationship was found to be inaccurate. Thus the alternative
relations were proposed for the High performance Concrete with the
support of results and figures. |
|
|
Full Text |
|
|
Title: |
Flexural behavior of self compacting geopolymer concrete
using GGBFS with various replacements of R-sand and M-sand |
Author (s): |
T.G. Ushaa, R. Anuradha
and G.S. Venkatasubramani |
Abstract: |
This paper presents an experimental investigation on
flexural response of self-compacting geopolymer concrete
(SCGC) beams by partial replacement of fly ash by GGBFS and various
replacement of River sand by M-sand under two point loading. Mixtures
were prepared with alkaline liquid to binder ratio by mass value is 0.33
for mix M1, M2, M3, M4, M5.The molarity of sodium hydroxide is 12M and
replacement of fly ash by GGBFS of 30% is kept as constant for all mix.
The ratio between sodium hydroxide to sodium silicate solution is 1:2.5.
The specimen was cured for 48 hrs of heat curing and 28 days of ambient
curing. Super Plasticizer is added to achieve the properties of
self-compacting geopolymer concrete (SCGC). It is found that the SCGC
beams have shown good improvement in flexural strength. |
|
|
Full Text |
|
|
Title: |
Lingo based pricing and revenue management for multiple
customer segments |
Author (s): |
Anand Jayakumar A. and
Krishnaraj C. |
Abstract: |
Pricing is an important lever to increase
supply chain profits by better matching supply and demand. Pricing
influences the amount of product demanded and the total revenue
generated. Revenue management is the use of pricing to increase the
profit generated from a limited supply of supply chain assets. In this
paper a numerical problem is solved using the LINGO software.
|
|
|
Full Text |
|
|
Title: |
Performance of magnetic fuel induction technology to reduce the exhaust
emission |
Author (s): |
T. Varun Kumar, S.
Balaji, K. Mohan Babu and K. Hari Gautham |
Abstract: |
Automobiles are the basic necessary
part in our day today life, while they have made transport easy and
convenient from one place to other. Nowadays, due to the toxic emissions
and an increased risk of accidents they have also made human life more
complicated and vulnerable. Emission is the major cause of air pollution
and this paper states about the emission in automobile sector. When
analyzing the emission in automobiles, they have the major application
of air pollution and it creates many major harmful diseases. To control
the automobile emission system here we use the Magnetic fuel induction
technology to detect and control the emission. Finally this
article also review about new emerging technology i.e. fuel induction
Technology and developments done across the various areas. |
|
|
Full Text |
|
|
Title: |
A solid
waste management in Coimbatore city, India |
Author (s): |
Pa. Ganeshwaran and S.
Deepa Shri |
Abstract: |
Municipal solid waste management (MSWM) is one of the
major environmental problems of Indian cities. Improper management of
municipal solid waste (MSW) causes hazards to inhabitants. It is an
obligatory duty of municipal authorities in the country to keep
cities/towns clean and provide a good quality of life to the citizens.
However, the services provided by the municipal authorities are outdated
and very inefficient. Domestic, commercial, biomedical and variety of
toxic and domestic hazardous wastes are generally disposed of by the
citizens on the streets, drains, open spaces, water bodies, etc.,
causing serious problems of health and environment. Studies have
revealed that waste generation rate varies from 0.12 to 0.60 kg per
capita per day amounting to 115000MTs of waste per day i.e. 42 million
tons annually in India. Analysis of physical composition indicates total
compostable matter in the waste is in the range of 40-60 percent while
recyclable fraction was observed between 10 and 25 percent. The moisture
content in the MSW was observed to vary from 30 to 60 per cent while the
C:N ratio was observed to be in the range of 20-40. The TATA Energy
Research Institute (TERI) has estimated that the waste generation will
exceed 260 million tons by 2047 which speaks volumes of the problems
that urban areas are going to face in coming decades in managing their
waste. |
|
|
Full Text |
|
|
Title: |
Photo
degradation studies on Ziram using homogeneous and heterogeneous
Photocatalyst |
Author (s): |
K. Ramadevi, S. K.
Shivaranjani |
Abstract: |
Photocatalytic degradation of Ziram was
performed on wastewater by various photo degradation techniques via
Solar, Solar/TiO2, UV and UV/TiO2processes.
Studies were also performed to optimize the operating parameters such as
pH, initial concentration, catalyst dosage and contact time. It was
found that the UV/TiO2 photo catalytic process was more
effective than any other methods studied for degradation of the Ziram.
The maximum degradation of Ziram was 92.7% at 300 minutes for initial pH
5, initial Ziram concentration of 20mg/l and TiO2 dosage of 1
g/l. The kinetic constant (k) for UV/TiO2 was found to 9.62
times greater than solar/TiO2 process and 8.19 times greater
than the UV process. The order of reaction rate constant was UV/TiO2>UV
> Solar/TiO2> Solar. |
|
|
Full Text |
|
|
|
|
|
|