ARPN Journal of Engineering and Applied Sciences                ISSN 1819-6608 (Online)
 

 
GoogleCustom Search
 
 
 
ARPN Journal of Engineering and Applied Sciences                                     April 2015  |  Vol. 10  No. 7
   
Title:

A novel and maximum-likelihood segmentation algorithm for touching and overlapping human chromosome images

Author (s):

Sri Balaji V and Vidhya S

Abstract:

The chromosome abnormality in human is a vital issue. These abnormalities happen due to touching or overlapping chromosomes in human beings. It may cause breast cancer, improper structure or functions in body metabolism, birth defects, down syndrome, turner syndrome etc. To overcome these problems a stringent screening and diagnosing must be followed during earlier stage of pregnancy. In this paper Novel and Maximum-Likelihood segmentation algorithms were used to segment the overlapping and touching human chromosome images. Either the gray scale image was converted into color image or a color image is directly applied as the input to the Novel as well as Maximum-Likelihood segmentation algorithms. After obtaining threshold from binary, the watershed transform was applied. The output of watershed was improper. So after threshold the iterations were applied, followed by edge detection and corresponding segmentation. The Novel algorithm worked better only for touching chromosomes images but failed to work for overlapping images. Then the segmentation was followed using Maximum-Likelihood segmentation algorithm. By comparing with Novel algorithm, the Maximum-likelihood segmentation algorithm works better for both touching and overlapping chromosome images.

   

Full Text

 

Title:

Efficient growcut based image seam covering with quantization matrix estimation using anfis for JPEG error analysis

Author (s):

S. Vishnu Priyan and S.K. Srivatsa

Abstract:

The recognition of JPEG compression plays a significant part in digital forensics. Earlier, JPEG image can be compressed upto n times. However, in the JPEG compression error analysis in the JPEG images are not primarily concentrated. To solve this problem size of the JPEG image is reduced based on Growcut based seam covering technique. For the purpose of assessing the influence of image compression for JPEG image samples, Discrete Cosine Transform-Singular Value Decomposition (DCT-SVD) was computed for single and double image compression, images were quantized through quantization matrices, and quantization matrix results are assessed using Adaptive Neuro Fuzzy Inference System (ANFIS). Extensive experiments and evaluations with previous techniques reveal that the proposed DCT-SVD-ANFIS scheme can discover the double JPEG compression efficiently; it has extremely much significance in the field of digital forensics. The results of the proposed DCT-SVD-ANFIS  it is measured based on the parameters like, Peak Signal to noise Ratio (PSNR) and Mean Square Error (MSE).

   

Full Text

 

Title:

Optimization using fodpso algorithm for uhf rfid reader antenna

Author (s):

Madona jenifer D and Sivasundarapandian S

Abstract:

A new FODPSO algorithm is used to design the radio frequency identification (RFID) reader antenna for gain optimization is presented in this paper.  The problem of choosing the optimum locations and the associated parameters of readers in RFID communication systems is considered. In this paper, a novel optimization algorithm, namely the multi-community FODPSO, is proposed to solve the complicated RFID network planning problem of large-scale system. The effectiveness of using FODPSO (Fractional Order Darwinian Particle Swarm Optimization) for RFID reader antenna design will be investigated by a number of iterations required to achieve optimum solution along with the quality of solution. To validate the proposed design methodology, an antenna working at UHF radio-frequency identification (RFID) band is benchmarked.

   

Full Text

 

Title: A survey on converter topologies in various applications
Author (s): S. Sathiyamoorthy and M. Gopinath
Abstract:

In most scenarios, several categories of DC-DC converter topologies have been utilized in the motor drive systems. On account of their irrespective distinctions, they all try to input the maximum quantity of power from the system with as diminutive loss of energy as possible inside the circuit itself. DC-DC converter is a kind of switching converter which fundamentally offers a certain quantity of ripple in the current, while it results in reducing the effectiveness. In general, this ripple is diminished by using a filter at the output terminals. At the same time as this is a solution, the magnitude, cost and life of the filter is completely based on the types of converter employed. Converters like buck, boost, buck-boost and cuk are derived topologies are employed in numerous applications are discussed here. This survey investigates and examines about the performance of the various converters in several applications especially in BLDC motors.

   

Full Text

 

Title: Enhancing performance of localization using SJFR algorithm
Author (s): Mr. K.Rajkumar, P. Ganeshkumar, G. Nithya Prabha and V. Sakthivelmurugan
Abstract:

In WSN the link failure is conquer by re-routing from the source node which is considered to be a time intense process that increases the overhead of the nodes. Also, in case of various link failures, there is probability for loss of data packets. The recital of the network during link failure has to be maintained vigorously in circumstances such as long data transfer and defend possible attacks during data transmission. Using SJFR algorithm we are going to recover the link failure.

   

Full Text

 

Title: Efficient trajectory protocol for multicasting in vehicular ad hoc networks
Author (s): Nandhini P and Ravi G
Abstract:

Vehicular ad hoc network is a wireless ad hoc network which carries some important functions such as message forwarding and route determination. In areas where there is sparse density of vehicles the network gets disconnected which affects the communication between the vehicles. In the existing system position based forwarding scheme have been used in which the data will be forwarded based on its position. Initially network will be dividing into small zones. Routing will select by the nodes which are placed in the same zone. Dynamically zones will change, because of node mobility in the network. Hence it is difficult to monitor the zone nodes periodically and Over Head will be high. In this paper multicasting technique is introduced based on trajectories. Here the information will be forwarded to group of destinations. Each node estimate the delivery delay to the access point (AP) based on trajectory. Also predict the future position of the nodes. Finally the source will determine which route has less delay and then it predicts route for data forwarding. Multiple nodes are involved in network for route selection. So easily we can select better route for data forwarding in a multicast way and hence the delay is reduced.

   

Full Text

 

Title: Restoration of degraded documents using image binarization technique
Author (s): K. Kaviya Selvi and R.S. Sabeenian
Abstract:

The segmentation of the text from the historical degraded image documents is a very challenging task because the variations between the foreground text and background text are hard to determine. In this paper we have implemented a new segmentation algorithm to analyse and extract the words from a degraded image; the process carried here is the image contrast which is adaptively found to solve the issue. Initially the contrast map is taken from the degraded document images. The combination of local image gradient and the local image contrast is the adaptive image contrast, and then it is converted to binary level and combined with canny edge detecting algorithm to extract text edge pixels. The document text is further segmented by a local threshold that is estimated based on the intensities of detected text stroke edge pixels within a local window.

   

Full Text

 

Title: Hadoop architecture and fault tolerance based hadoop clusters in geographically distributed data center
Author (s): T. Cowsalya and S.R. Mugunthan
Abstract:

In today’s epoch of computer science storing and computing data is a very important phase. In recent days even a petabyte and exabytes of data is not adequate for storing large number of databases which contains large data sets. Therefore organizations today use concept called Hadoop which is a software framework of big data in their application. Hadoop is designed to store and process large volume of data sets consistently. While using geographically distributed data centers there may be a chance of data loss due to network link failure and node failures. Hadoop provides high reliability and scalability features. Along with it also afford faults tolerance mechanism by which the system functions properly even after a node in the cluster fails. Faults tolerance is mainly achieved using data replication and Heartbeat messages. Heartbeat messages are like acknowledgement messages between two nodes and  Data replication is achieved by creating copies of same data sets into more than one computing nodes. In this paper we describe about the Hadoop architecture and its components and also describe how the fault tolerant mechanism is achieved using data replication and heartbeat messages.

   

Full Text

 

Title: Design of robotic exosuit for gait assistance in paraplegics
Author (s): Lokesh. G and V.G. Sivakumar
Abstract:

This project is to design and develop a robotic exosuit intended to assist over ground gait for paraplegic the person who have suffered from spinal cord injury. This robotic suit is giving wheelchair users the chance to walk. Almost fully encasing the bottom half, they hold the legs in place while they walk from place to place, controlled by a small joystick at waist height. Compared to previous soft exoskeleton suit, this device is a very powerful tool which resulting in high mechanical efficiency for steady walk and even it enables the navigation of stairs and slopes safely. This device is a bipedal exoskeleton suit with eight degrees of freedom which can give acceleration to the patient’s hip, knee and ankle. It is designed to implement different control strategies like walk forward, turn left and turn right. The interface between the user and the device can be controlled through mems sensor or joystick. It does not require crutches or a walking frame to provide stability, leaving the hands free.

   

Full Text

 

Title: Secure data embedding using reversible data hiding for encrypted images
Author (s): R. Selveeswari and P.R. Vijayalakshmi
Abstract:

The common methodology in data embedding is that in the sender side, the data is to be hidden within the pixel values of the cover image that is producing the stego image. In the receiver side the embedded data in the stego image is retrieved by reversing the same process that is employed for embedding. The data that is to be hidden which is embedded in the AES encrypted image using Reversible Data Hiding (RDH) method. The RDH improves the data hiding process. In existing the data retrieval process the error is accrue it affect the data, in our proposed improve the data hiding and retrieval accuracy. A content owner encrypts the original image using an encryption key and reserves the room for data hiding. Then, a data-hider hides the data in reserve space of the image. If a receiver has the data-hiding key, he can extract the additional data though he does not know the image content.  AES algorithm uses two different keys for encryption and decryption. Each byte of the state is combined with a block of the round key using bitwise XOR. Then each byte is replaced with another according to a lookup table. The last three rows of the state are shifted cyclically a certain number of steps. Four bytes in each column were combined. In the receiver side the same procedures are reversed in order to obtain the secret message and the cover image. The performance of the process is measured with the help of the calculation of the Compression Ratio, PSNR and MSE. The measured performance indicates that the proposed system is capable of hiding the messages with better accuracy and the process is reversible also and hence has numerous applications.

   

Full Text

 

Title: Analysis of smell prints for quality determination of cosmetics
Author (s): M. Subadra and V. Vijaya shanthi
Abstract:

Quality of the product which is used in our day-to-day life is important to be analyzed. When the level of chemicals increases exceeds day by day then it may cause quality of the product to be low and causes side effects for the person. The sensitivity of the human nose varies according to the unique characteristics of persons. By using E-Nose technology, the array of sensors is placed for sensing the alcoholic content in the samples injected. E-Nose is a simple, rapid and gives accurate result. MOS gas sensors are preferred more than other gas sensing system in the sensory array, it extracts the VOC’s present in the samples. The E-Nose consisting of six MOS gas sensors was used to identify the various smell print. The main purpose of this paper is to identify the various cosmetics products which has alcoholic component with the designed prototype of E-Nose setup which is used in normal day-to-day activity and to identify the various smell print for the product.

   

Full Text

 

Title: A design of sram structure for low power using heterojunction cmos with single bit line
Author (s): G. Indumathi, V.P.M.B. Aarthi alias Ananthakirupa and M. Ramesh
Abstract:

The Present day workstations, low-power processors, computers and super computers are using fast Static Random Access Memory (SRAMs) and will require, in the future, larger density memories with faster access time and minimum power consumption. Acknowledging the intense requirements for power, in current high performance memories of computing devices, the circuit designers have developed a number of power optimizing techniques which target several sources of energy dissipation in an SRAM. The total power dissipated in a typical SRAM architecture is the active and standby power. The access to the memory cell is performed through word line and bit line. The hetero junction concept of SRAM was simulated. The single bit line for a 16 SRAM cell was implemented in an array fashion and the power results are computed and compared with multiple individual SRAM cell structures .The results show that single bit line results in 2.5 times reduction of power. The simulation results are obtained from tanner 14.1 environments.

   

Full Text

 

Title: Cloud based dynamic monitoring of patient health parameters using rtm-wise architecture
Author (s): Jijin Godwin. J, Sanjeev Kumar. R, Aravindh Nagappan and Kirubasankar. V
Abstract:

Health monitoring is regarded as a crucial part in the patient management, since it provides vital data for diagnosis and treatment. The main challenges in current health monitoring devices are the lack of remote monitoring in real time and logging for future evaluation. Typical devices used for health parameter measurement provide basic information regarding health status. A proposal for dynamic monitoring is done to overcome these challenges. A system for patient monitoring using biomedical sensors and displaying it in a remote place is proposed. Constant measurement of health factors such as electrocardiogram, oxygen saturation in blood, heart rate, and surface temperature of the body is incorporated into this system. A prototype is developed to process and transmit the accumulated sensor data to the receiving unit where it is viewed through the implementation of cloud services.

   

Full Text

 

Title: Modeling and analysis of proton exchange membrane (PEM) fuel cell
Author (s): R. Gopikaramanan B.E., M.E, R. Praburaja B.E., M.E. and S. Bhaskar B.E, M.E
Abstract:

The investigation of the modeling of Proton exchange Membrane Fuel cell is generally rely on the rudiments of the chemical reaction or other chemical equations which governs the behavior of fuel cell , But in this manuscript probes about likely numerical solutions of a fuel cell. This manuscript probes about maximum attainable potential upshot yielded by fuel cell by analyzing the Voltage - Current characteristics obtained from the simulative analysis of the fuel cell modeling of fuel cell done using Matlab for diverse operating condition and maximum harvestable latent output is evaluated at that juncture.

   

Full Text

 

Title: Web prediction method on social network analysis
Author (s): M. Mohamed Iqbal Mansur, C. Kavitha and K. Thangadurai
Abstract:

Web Mining is the integration of information gathered by traditional Data Mining methodologies and techniques with information gathered over the World Wide Web. The World Wide Web today provides users access to extremely large number of Web sites many of which contain information of education and commercial values. Web mining research, in its last 15 years, has on the other hand made significant progress in categorizing and extracting content from the Web. Nowadays the Web has proved to be as a rich and extraordinary data source of information, where multiple domains can be accessed and mined. Mining Web data is referred as Web Mining. Some of the objectives of mining web data include finding relevant information discovering new knowledge from web personalized, web synthesis and learning about individual users. Amongst these the most common use is finding relevant information. In this paper, we represent Web Prediction Method on Social Network Analysis. These techniques can be used for real world applications like market strategies, business intelligence and etc... Social Networks the interest of a single user represents the interest of the whole group. Ontology defines a set of representational primitives with which to model a domain of knowledge or discourse.

   

Full Text

 

Title: Distribution network reconfiguration for loss minimisation using differential evolution algorithm
Author (s): K. Sureshkumar and P. Vijayakumar
Abstract:

This paper presents a method of reducing the losses and balancing the loads in the radial distribution network. Differential evolution strategy is used for reconfiguration of the radial distribution network. Multiple objectives such as loss reduction, voltage deviation and maximum branch current are considered. These objectives are integrated into the objective function through weighting factors and the configuration with minimum objective function is selected for each tie-switch operation. The proposed methodology is tested and validated on 33 radial bus distribution networks. Performance is assessed by using the results of the implemented algorithm with various other algorithms.

   

Full Text

 

Title: Portable camera based visual assistance for blind people
Author (s): Rajalaskhmi P, Deepanraj S, Arun Prasath M and Dinesh Kumar S
Abstract:

The proposed system is a portable camera based visual assistance prototype for bind people to identify currency notes and also helps them to read printable texts from the handheld objects. To read printable texts, an efficient algorithm that combines an Optical Character Recognition (OCR) with Hierarchical optimization is used. In Pattern Recognition OCR every character is localized and separated then the resulting character image is sent to a pre-processor to reduce noise and to perform normalization. Certain characteristics will be extracted from the character for comparison. After comparison the identified characters are grouped and reconstructed to form original text strings, then the output is given to the speech engine to perform text to voice conversion. For identification of currency notes a novel recognition system is developed using SIFT (Scale Invariant Feature Transform) to improve precision and accuracy. The input image undergoes pre-processing and thereafter the distinct features are extracted and compared with the templates from the database. The resulting outcome is given through Earphone to the blind users.

   

Full Text

 

Title: Design and implementation of multiport bidirectional dc- dc converter for hybrid energy storage systems
Author (s): R.B. Devi and S.M. Balaganesan
Abstract:

Multiport dc/dc converters are widely used in hybrid energy generation systems, microgrids and electric vehicles to provide stable power to key loads with high power density. In this project, a multiport isolated bidirectional dc–dc converter is anticipated for hybrid energy storage system in microgrids. Microgrids are connected to the nearby renewable energy generation systems as solar, wind, etc. These systems do not provide pure DC voltage for conversion into AC required by the grid. Hence a single stage DC-AC-DC conversion is required. For energy management and single stage power conversion, multiport BDC is the best choice. Also to minimize the switching losses and henceforth to improve the efficiency of the converter system, Zero Voltage Switching (ZVS) can be achieved for all switches in any direction of power flow in the whole load range with decoupled duty cycle control and phase shift.

   

Full Text

 

Title: Fuzzy based self-transforming robot
Author (s): K. Radha and K.Valarmathi
Abstract:

Self-transforming robot is a robot which transforms its shape according to the hindrance occurring in the path where the robots are being moved. Such robots have been recognized as very attractive design in exhibiting the reliable transformation according to the situations. Military and defense application needs a robot should possess arbitrary movements like human. In some scenarios transformations are made by biological inspired control strategies using Central Pattern Generators (CPG). CPG is used in the locomotion control of snake robots, quadruped robots, to humanoid robots. This paper presents a Fuzzy system for the Self-transforming robot which possess alteration in its original shape to exhibit a human-like behavior while passing over the particular location. Quadrupedal locomotion on rough terrain and un-predictable environments is still a challenge, where the proposed system will provide the good adaptability in rough terrain. It allows the modulation of locomotion by simple control signal. The necessary conditions for the stable dynamic walking on irregular terrain in common are proposed. Extensive simulations are carried out to validate the performance of the proposed Fuzzy system using LABVIEW. Arbitrary parameters such as distance, angle and orientation of the obstacles are provided as input to the fuzzy system which gives the required speed modulation on the motoric module.

   

Full Text

 

Title: Design and implementation of visible light communication system in indoor environment
Author (s): K. Sindhubala and B. Vijayalakshmi
Abstract:

Visible Light communication (VLC) using White Light Emitting Diode (LED) is a promising technology for next generation communication for short range, high speed wireless data transmission. In this paper inexpensive transmitter and receiver of VLC system is designed and its performance is evaluated. The effect of natural and artificial ambient light noise sources is also considered. Experimental results show that the data transmission distance achieved upto 0.45m.Performance analysis is done with respect to optical power, photo sensitivity of photodiode at the receiver and the increase in distance between the transmitter and receiver.

   

Full Text

 

Title: Simulation of sinusoidal pulse width modulation (spwm) based dstatcom for compensation of reactive power
Author (s): Jadhav Prajakta S. and A. R. Thorat
Abstract:

A Distribution Static Compensator (DSTATCOM) is a powerful tool for mitigation of the power quality problems. The power quality problem arises due to increasing number of sensitive loads. Hence, in order to maintain power quality the DSTATCOM has been installed. DSTATCOM will provide or absorb the reactive power. In distribution system reactive power is the main reason of power quality problems and system loses. This paper explains the system used to compensate the reactive power, Unbalance load condition and unbalance voltage. The effectiveness and performance of the DSTATCOM to mitigate the power quality problems are analyzed by using SPWM technique. The results are obtained through MATLAB and Simulink software.

   

Full Text

 

Title: Design of mixer using five port structure in rf front end receiver architecture and its performance evaluation
Author (s): Karthikeyan. K. V
Abstract:

In this paper, the design of five port structures using power dividers and hybrid coupler was done using Advance Design Systems. Micro strip lines were used in the design procedure and the termination is done with 50 ohm resistance. This methodology yields encouraging results in impedance matching, performance improvement  and the scattering parameter simulation has been done for the design and simulation results are obtained. 

   

Full Text

 

Title: Efficient modelling technique for classification and transliteration of ancient stone inscription
Author (s): P.M. Beulah and Sahana. R
Abstract:

The ancient stone inscriptions and epigraphy corroborate information from other sources; afford the dossier and habit of pharmaceutical remedies and also the hints of Ayurveda significance, which provides an insight into early Indian bureaucratic structure, legal codes, and myth practices. Hence here proposed a theme to analyze and translate the epigraphs of Bhrami, Grantha, Vattezhuthu and Devenagiri font into our 21st century Tamil fonts using segmentation technique integrated using Sobel edge detector, Otsu thresholding and Particle Swam Optimization (PSO) technique whereas the filtering techniques play a crucial role in enhancing the quality of an image. Probabilistic Neural Network (PNN) involves to identifying the noise as well as help to predict the suitable filter for the removal of a specific type of noise, along with the PNN for noise removal and accurate segmented image, there were mapping technique of ancient Grantha font to our 21st century image are wrought by Lab VIEW thus the recognized and translated output is been obtained.

   

Full Text

 

Title: FPGA based system for denial of service detection in smart grid
Author (s): A. Jayanth Balaji and D. S. Harish Ram
Abstract:

The availability of cheap computing power and instrumentation electronics accompanied by the communication revolution has engendered a complete paradigm shift in the design and implementation of electrical grids. Power grids are envisaged to be transformed into “Smart Grids” incorporating a high degree of intelligence with a view to enhance the reliability and efficiency of generation, transmission and distribution systems. Real-time monitoring of grid parameters enables more effective management of power generation. Prevention of theft by means of smart metering is another major advantage. However, the large scale use of embedded systems, computing resources and communication networks makes the grid vulnerable to cyber attacks. These vulnerabilities can result in consequences ranging from diminished quality of service to catastrophic events such as line trips, extended blackouts and downright damage or destruction of assets. This paper gives a review of the current state-of-the art in cyber security for the smart grid environment. An FPGA based engine for detection of denial-of-service attacks in packets in an Ethernet link is also proposed.

   

Full Text

 

Title: A sama scheme for improving qos in 4g multihops wireless networks
Author (s): Vinoth.V and C. Monica Manoreya
Abstract:

There exists several `attributes for a data, and among them confidentiality and security is gained by the entity which is termed as Authentication. The defined entity exhibits the involvement of another entity called as identification involving two or more parties, which in turn confirms an identity. Worldwide interoperability for Microwave Access (WiMAX) and Long-Term Evolution (LTE) has been the alluring Fourth Generation (4G) wireless technology in the networking between vehicles providing explicit quality of service (QoS) and security architecture. In spite of its advantage it has some security threats such as denial of service (DOS), node capture attack, etc., which mainly occurs in Multihop wireless networks. It could be alleviated by secured and prompt authentication methods. In the VANET communication, especially in Multihop networks the forwarder node authentication is more important. So, we need to provide authentication for each and every hops. Hop by Hop message authentication is required to provide high level security in VANET. Simultaneously, the address of the data origin known by the attacker leads to node capture attack. So, to avoid this, we have to consider the source anonymity also. To provide Hop by hop authentication and the source anonymity, we are going to use the SAMA on Elliptic Curve Cryptography in VANET.

   

Full Text

 

Title: Incremental conductance based mppt for pv system using boost and sepic converter
Author (s): Rahul Pazhampilly, S Saravanan and N. Ramesh Babu
Abstract:

Maximum power point tracking (MPPT) algorithm increases the solar energy efficiency of a solar PV systems.  Incremental conductance based MPPT technique is used to track maximum power point exactly with fast response. The Incremental conductance method search the exact MPP based on the feedback voltage and current but does not depend on the characteristics of PV array. The MPPT algorithm is implemented in PV based power generation systems along with two different DC-DC converters to boost up the output voltage. The working of proposed algorithm is checked by simulation using Matlab/Xilinx system generator. The performance of the algorithm with boost converter is validated and compared with SEPIC and the conclusions were drawn at the end of this paper.

   

Full Text

 

Title: An efficient personalized hotel recommendation system for big data applications
Author (s): B.Blesson Raja, A.R.Arhun and A.V.K. Shanthi
Abstract:

Administration recommender frameworks have been indicated as important apparatuses for giving proper proposals to clients. In the most recent decade, the measure of clients, administrations and online data has developed quickly, yielding the enormous information examination issue for administration recommender frameworks. Also the greater part of existing administration recommender frameworks, exhibit the same appraisals and rankings of administrations to distinctive clients without considering various clients' inclination, and hence neglects to meet clients' customized necessities. Consequently we approach a customized administration proposal rundown for the most suitable administrations to clients, by proposing a keyword-aware suggestion strategy and Natural Language Processing, to address the above difficulties. Particularly, keywords are utilized to demonstrate clients' inclination, and a client based Collaborative Filtering calculation is received to create proper suggestions. To enhance its versatility and productivity in vast information environment, it is actualized on Hadoop platform, a generally embraced appropriated figuring stage utilizing the MapReduce parallel transforming framework. At long last, far reaching trials are directed on certifiable information datasets, and results exhibit that personalized search technique fundamentally enhances the exactness and versatility of administration recommender frameworks over existing methodologies.

   

Full Text

 

Title: Equal service providing virtual organization formation in grid
Author (s): P.Balaji, A.Edison S.L. Jany Shabu
Abstract:

Large-scale application programs in grid requires resources from several grid service providers (GSPs). These grid service providers form virtual organizations (VOs) by pooling their resources together to provide the required capabilities to execute the application. In this model, the VO formation in grids using concepts from the coalitional game theory and design a mechanism for VO formation. The mechanism enables the GSPs to organize into VOs, reducing the cost of execution and guaranteeing maximum profit for the GSPs. In this approach, the mechanism guarantees that the VOs are stable but GSPs not stable it will break away from the current VO and join some other VO. Thus the results show that the mechanism produces VOs that are stable yielding high cost for the participating GSPs.

   

Full Text

 

Title: Improved binary increase congestion control algorithms for data transfer in satellite network
Author (s): M. Nirmala, Ramachandra V. Pujeri and M. L. Valarmathi
Abstract:

In our previous work, it was proved that the performance of bic-tcp was good under satellite network, and a new adaptive window increment based bic-tcp algorithm (bic_AWI) was proposed to show an improved data transfer in satellite network. We, implemented the idea on ns2’s implementation of bic tcp. Proposed modifications has been made on bic-tcp, and improvement in performance has been realized. Even though, the congestion avoidance mechanism of standard bic will be very much influenced by this proposed adaptive window change strategy, in update method of the bic, some of the parameters like BICTCP_B are kept as constant during finding a optimum tcp windows size. The constant value BICTCP_B has been cahnged dynamically with respect to the acceleration and deceleration of rtt, has shown a considerable improvement in performance. Based on that idea, we proposed a dynamic parameter estimation  based binary increase congestion control algorithm (bic_DPE) for data transfer in satellite network. In this method, with respect to the acceleration of deceleration of rtt the important parameter BICTCP_B will be dynamically adjusted to provide best performance. Further, we added the mechanism to minimize packet loss during terminal handover. Proposed modifications has been made on bic-tcp, and the performance of the improved protocol “bic_AWI” and “bic_DPE”  has been compared with normal bic-tcp under Iridium satellite constellation. The  performance of the algorithms has been measured using suitable metrics and theproposed bic_DPE performed better than normal bic-tcp  as well as our previous “bic_AWI” method.

   

Full Text

 

Title: Investigations on diabetic macular edema using motion pattern estimation to prevent vision loss
Author (s): S.Murugeswari and R. Sukanesh
Abstract:

Diabetic macular edema (DME) is a complication of diabetes .It can blur or distort patients’ vision and make the blindness. It is categorized by the presence of lesions. Habituallythe presence of lesions is detected by Ophthalmologists from the dilated retinal images captured by dropping chemical solution into an eye. This process peeves the patients. So, there is a need for an autonomous method to detect the presence of lesions using image processing algorithm from the non-dilated images to help the ophthalmologists to diagnose the disease without inconvenience and irritation to the patient and thus protects patients from vision loss. In this work, Meadian filter and Contrast Limited Adaptive Histogram Equalization used in image preprocessing. Motion pattern estimation with masking process used for segmentation. To extract the feature Grey Level Co-occurrence Matrix isused.  Support vector machine used to classify the severity level for disease.The proposed algorithm has produced the sensitivity of 99.743%, specificity of 97.14% and accuracy of 97.711%.It is more helpful for ophthalmologist in the detection of DME. Since this method is automated, it detects faster and this level of accuracy in result helps the ophthalmologists to diagnose the disease very easily.

   

Full Text

 

Title: Investigations on fuzzy controlled interleaved buck converter fed PMBLDC drive system
Author (s): S. Prakash and R. Dhanasekaran
Abstract:

Permanent Magnet Brushless DC Motor (PMBLDC)  is one of the best electrical drives that has increasing popularity, due to their high efficiency, reliability, good dynamic response and very low maintenance. Its predominant applications are in automotive, aerospace, household appliances, office automation and other industries. This paper proposes a new multistage interleaved buck converter fed PMBLDC drive system having very low switching losses and improved step down conversion ratio, which is suitable for the applications where the input voltage is high and the output voltage is low, where the operating duty cycle is below 50%. When compared  with the conventional interleaved buck converter where two active switches are connected in series and a coupling capacitor is connected in the power path,  where as in the proposed Multistage Interleaved Buck Converter(MIBC) fed system it can be seen that the voltage stress across all active switches is half of the input voltage before turn on or turn-off when the operating duty cycle is below 50%, the capacitive discharging and switching losses can be reduced considerably, following that the MOSFET fed inverter bridge is feeding the PMBLDC drive system. This allows the proposed multistage IBC to have higher efficiency and operate with higher switching frequency. In addition, the proposed Multistage IBC has a higher step-down conversion ratio and a smaller output current ripple compared with a conventional IBC. The multistage IBC fed PMBLDC drive system features, operation principles, relevant analysis and results are presented in this paper. The validity of this study is confirmed by the experimental results of prototype system with 40-60V Input, 12V/5A output. Further the closed loop system is controlled using Fuzzy controller to enhance the motor performance in various load conditions and the corresponding results are also presented.

   

Full Text

 

Title: Minimum cost estimation of generation expansion planning incorporating wind power plant
Author (s): J. Booma, K. Mahadevan and S. Kannan
Abstract:

The most significant planning bustle in the electric utilities is the Generation Expansion Planning (GEP). This paper aims to incorporate Wind Power Plant (WPP) as one among the candidate option in GEP and analyse the cost incurred to incorporate WPP as one of the candidate. The total cost consists of the Initial cost, Operation and maintenance cost, Outage cost and Salvage cost. Outage Cost is calculated based on Expected Energy Not Served (EENS). In this paper, equivalent energy function method is applied to compute EENS and to compute Loss of Load Probability (LOLP) which is considered as a reliability constraint. Particle Swarm Optimization (PSO) technique has been applied. The results obtained by PSO were compared with Dynamic Programming (DP) method. Addition of WPP to instead of conventional plants is expected to increase the total cost, and it is necessary to study the impact of such increase. The resulting cost and reliability indices variations were also reported.

   

Full Text

 

Title: Radio resource optimization in cooperative cellular network with network coding at relay stations
Author (s): L. R Priya, K. Ruba Soundar and S. Kamala Gomathy
Abstract:

Wireless cellular networks have to be designed and deployed with unavoidable constrains on the limited radio resources such as bandwidth and transmit power. The primary objective of this paper is to improve the capacity and utilization of the radio resources that are available by the service providers. This paper deals with the resource allocation problem relay-based Orthogonal Frequency Division Multiple Access (OFDMA) cellular network where relay stations (RS) perform network coding with downlink and uplink sessions of a mobile station (MS). The aim of the paper is to maximizing the weighted sum rate for both uplink and down link for all users while satisfying quality-of –services(QoS).To make the proposed system more realistic additive white Gaussian noise, and fading present in the communication channel for both uplink and down link.

   

Full Text

 

Title: Reduction of NOx emission in biodiesel (Soyabean) fuelled DI diesel engine by CETANE improver
Author (s): R. Muneeswaran and M. R.Thansekhar
Abstract:

Biodiesel is explored to be used in standard diesel engines and is thus distinct from the mineral oils. Biodiesel can be used alone, or blended with diesel in any proportions. A numberof studies have shown significant increase in nitrogen oxides (NOx) emissions in biodiesel fuelled diesel engine. The increase in NOx, HC and CO emissions and solutions to this problem has been the subjects of research for considerable time.Itis difficult to control NOx emissions. In the Internal Combustion Engine, at high temperature, oxidation of nitrogen takes place and a significant amount of NOx will be formed at the end of combustion. The majority of NOx formed will however decompose at the low temperatures of exhaust.  But due to very low reaction rate at the exhaust temperature, a part of NOx formed remains in exhaust. An attempt has been made to reduce this emission using Cetane improver DEE that helps to reduce the ignition delay thereby reducing the combustion temperature. As the NOx increases linearly with the amount of blend, in this experiment, DEE is added at 0.01 to 0.05% by volume to the different blends and NOx emissions are measured with exhaust gas analyzer. From the results, it is shown that B30 blend with DEE gives the better results for reduction in NOx.

   

Full Text

 

Title: Testing of stuck at faults in reversible sequential circuits using VERILOG HDL
Author (s): M. Diana AmuthaPriya and R. Arun Prasath
Abstract:

Conservative logic is one of the best nano technologies to design digital circuits. This paper proposes testable reversible sequential circuits based on conservative logic. Any sequential circuit can be tested for classical unidirectional stuck at faults 1’s using only two test vectors. The completely testable sequential circuits design based on conservative logic gates using fault leeway model is proposed here.  The proposing fault leeway model consist of two test vectors all 0’s and 1’s. The proposing design of D latch, master slave flip-flop, DET flip-flop is done with the help of conservative logic gate (Fredkin gate). This results in reduction of testing time. With that result the proposed work takes some advantages such as reduced number of gates, reduced power consumption and reduced delay time.

   

Full Text

 

Title: VLSI based color interpolation algorithm for real time image applications
Author (s): SudalaiUtchimahali C. and Rajakumar G.
Abstract:

Applications of Digital Image Processing (DIP) have become common in our day to day life. Exploitation of digital image processing systems for real time applications indeed requires efficient computing techniques., the proposed algorithm mainly focuses on Very Large Scale Integration (VLSI) chip based implementation of digital image processing applications since it suits better for real time processing. The proposed method VLSI implementation for interesting applications such as identification the pest affected or not affected crops in the agriculture field. But farmers used fertilizer at certain period of time at field crops growth. These crops are purchased by the customers without any knowledge. All the fertilizers are made from chemicals. These chemicals affect the human health. To overcome all the problems mentioned above, a system is proposed with high computation speed in this research work. This will help the customers as well as farmers in the agriculture field. The equipment for this purpose should be portable, and the measurement method should be quick, capable of providing test results within a very short time. High Quality Interpolation Algorithm (HQIA), Edge Matching Algorithm, Edge detection, anisotropic weighting model and filter based compensated methods is used. The design is based on VLSI for the hardware implementation using Mathematical Laboratory Matlab and Modelsim software. Field Programmable Gate Array (FPGA) Cyclone III kit is used for the hardware implementation.

   

Full Text

 

Title: Web enabled temperature sensing using energy aware WSN node with zigbee for critical sensing environments
Author (s): Linoy A. Tharakan and R. Dhanasekaran
Abstract:

Wireless Sensor Network become a promising technology to observe various universal parameters and conditions and help to diminish decline virtual and physical world.  This article describes an application based temperature sensing in a critical sensing environment such as military environment or furnace temperature etc. where the cut of value of a temperature value is so important. It is based on microcontroller in the transmitter side and a web enabled management of data in the receiver side. The algorithm adopted here is SEEMD which is security enabled energy efficient Middleware for WSN.

   

Full Text

 

Title: Virtual control hand gesture recognition system using raspberry pi
Author (s): Geraldine Shirley N. and  S. Jayanthy
Abstract: Hand gesture recognition embedded system can be used as an interfacing medium between the computer and human using different hand gestures in order to control the computer. In this proposed system, a real time vision based hand gesture interaction prototype which depends upon finger gestures using color markers is designed. The objective is to develop an embedded system by which one can communicate with any digital device with less hardware requirements and using an external camera to capture the gestures. To avoid the limitations of PC an embedded system consisting of Raspberry Pi which is a Linux based platform is used to identify different color markers on the fingers and when the mouse emulation is started, the software tracks those markers using the camera. The main aim is to create a framework with low cost and effective gesture interpretation system which uses computer vision to analyze different sets of gestures or actions done using the human fingers. 
   

Full Text

 

Title: Leakage reduction using power gating techniquesin SRAM sense amplifiers
Author (s): Deepak Mittal and Vigneswaran T.
Abstract:

Now-a-days leakage power is an important issue in microprocessor’s and hardware’s. In modern computer systems memory components covers 70 to 80 percent of total area of microprocessors that means memory contains more number of transistors. Generally leakage power dissipation proportional to the number of transistors. So the leakage power dissipation is more in the memories. In high performance memories systems sense amplifiers are very important part for sensing the output. In this paper we are focusing on memory leakage power reduction particularly in sense amplifiers using Fine Grain Power Gating (FGPG), Variable Body Biasing Technique (VBBT), Proposed Different Footer Dual Stack Technique (FDST) based both PMOS, one PMOS and one NMOS, both NMOS and Proposed PMOS Footer Triple Stack Technique (PFTST), PMOS Footer Four Stack technique (FFST) in Current Sense Amplifier (CSA), Charge Transfer Sense Amplifier (CTSA) and High Speed Sense Amplifier (HSSA).Variable Body Biasing Technique and PMOS Footer Triple Stack Technique are proposed techniques. We are applying these techniques in Different Sense Amplifiers. Proposed Variable body biasing leakage power dissipation in Current Sense Amplifier  1.5 times less than compare to Sleep Stack, Sleepy Keeper and 0.73 percent less than Forced Stack technique and this technique is much power efficient than other existing techniques. Second proposed Triple stack technique leakage power dissipation in Current sense amplifier is 2 to 3 times less than other techniques and total power dissipation almost 99 percent less than other existing techniques. Proposed techniques are also much efficient for other sense amplifiers.

   

Full Text

 

Title: Raspberry-Pi based cost effective vehicle collision avoidance system using image processing
Author (s): LohitUjjainiya and M. KalyanChakravarthi
Abstract:

Highway obstacle detection is one of the most challenging task in real time for autonomous vehicle navigation system. The basic idea is to design an effective system for real time environment, which detects the presence of obstacles in the track of the vehicle. In the proposed work Raspberry Pi Camera module is employed for object detection and image acquisition. A thorough investigation is performed on a test image in order to validate the best algorithm suitable for edge detection of images. Sufficient analysis is performed to consolidate the results.

   

Full Text

 

Title: Detection of objects using shadow removal and image reconstruction
Author (s): A. Abinaya and V. Ganesan
Abstract:

This project presents moving object detection based on background subtraction under complex wavelet transform domain for video surveillance system. The proposed approach has some advantages of background noise insensitiveness and invariant to varying illumination or lighting conditions. It also involves background updating model based on current frame and previous background frame pixels comparisons. The object detection also helps to track detected object using connected component analysis. The simulated result shows that used methodologies for effective object detection has better accuracy and with less processing time consumption rather than existing methods.

   

Full Text

 

Title: Skin ulcer image segmentation based on grow cut method 
Author (s): C. Rajivegandhi, Rishi Sankineni, Sungkrityayan Khan and Vishrut Sharma
Abstract:

In this specific paper, we have suggested an algorithm for synergistic segmentation of skin ulcer images of the diseased. If a small number of user pixels are provided, then by using Grow Cut method, we can automatically segment the rest of the images. User can sharply observe the segmentation procedure and guide the algorithm whenever the segmentation becomes difficult. In particular areas, where the segmentation is done automatically, no extra effort by the user is necessitated. The segmented skin ulcer images are presented.

   

Full Text

 

Title: Effect of leakage power reduction techniques on combinational circuits
Author (s): M. Manoranjani, T. Ravi and R. Ramya
Abstract:

This paper deals with power dissipation in digital circuits. Effect of leakage power reduction techniques are deal with digital circuit design. Analyses of these techniques are done in MICROWIND environment. Power dissipation of these techniques is calculated and compared with conventional design. The layouts are designedusingMicrowind. The simulation outputs are taken and observed. Power dissipation of the circuits are tabulated and compared.

   

Full Text

 

Title: Survey on cache memory design techniques for low power high performance processor
Author (s): R. Ramya, T. Ravi and M.Manoranjani
Abstract:

Cache memory is a additional and fast memory unit that has to be placed between the processing unit and the physical memory. The most recently used instructions and data, where this information are needed to be accessed again are stored in cache .The use of cache memory makes the processing to be faster. As the cache memory moves away from the CPU, the access time and the size of the cache memory storage unit increase as well. The physical memory and external disk storage devices can be accessed faster by the internal registers and cache which are located near to CPU. Cache which are accessed faster and also with less miss rate can be considered to be more power efficient. On-chip caches which are of large size are used in order to overcome cache miss are increasingly used by the modern processors. Also, with each CMOS technology generation, the leakage power consumption is said to be increasing for the past few decade. For this reason, cache power management has become a very important scenario in modern processor design. To address this challenge and also sustainable computing goals are met by several energy efficient techniques that are proposed for the cache architecture. The static and dynamic power consumption will lead to the total power consumption. The power consumption of set associative cache due to access of every cache is more when compared to the direct mapping method, this includes both the tag and the data parameter of the cache. This paper presentsa review on different cache technique and the cache optimization parameters and there are different low power techniques for low power cache.

   

Full Text

 

Title: Advanced music player with audio recognition and   touch interface for visually impaired
Author (s): G. Kiruthikamani and E. EsakkiVigneswaran
Abstract:

Music player are provided with very few search options. In this paper, two different user interfaces touch screen and audio recognition module are used to access music player. This can be used by both blind people as well as normal persons. The project is based on the MSP430 microcontroller which has low power consumption. Feedback is also provided when song selected is not present in music player. This overcomes the disadvantage of other audio players by providing search option in an easy manner.

   

Full Text

 

Title: Fundus-fovea localization image analysis based on automatic screening
Author (s): T. Vandarkuzhali, Aswani S. Babu and C. S. Ravichandran
Abstract:

Fovea is one of the important features of a fundus image. Extract the different features like blood vessels, optic disk, and fovea are automatically from the retinal image is very difficult process. Fovea detection helps doctors to identify Diabetic Retinopathy (DR), Age Related Macular degeneration (AMD), Retinopathy of Pre-maturity (ROP) and some other diseases of the patients. Diabetic Retinopathy is a cause of sight loss sometimes it will reach an advanced stage and cannot be cure. However Retinal image is essential and crucial for the ophthalmologists to diagnosis the disease. In the RGB image the green channel exhibits the best contrast between the vessels and background. With the help of Adaptive Histogram Equalization, thresholding method and smoothening method, can detect the fovea region. Also the Automatic screening will help for the doctors to quickly identify the condition of patients. Here implemented a new efficient method to localize the fovea in retinal fundus image. In this proposed work aim for automatic screening of Fovea for detection of Diabetic Retinopathy. By automatically identifying the normal images, the workload and its costs will be reduced by increasing the effectiveness of the screening programs. Here collected the data base from LOTUS EYE HOSPITAL, Coimbatore. Based on that data base done this work.

   

Full Text

 

Title: Design and implementation of VEDIC multiplier using efficient charge recovery adiabatic logic
Author (s): G. Paulin Sheela and J. Jayashree
Abstract:

Now a day it is indeed to design and implement an adiabatic logic in Vedic multiplier. Normally the power consumption was the main thing to remember before designing and implementing. So, the main aim to concentrate on the power consumption is very important. Here the proposed adiabatic logic is efficient charge recovery adiabatic logic based design. Compare with other multiplier the Vedic multiplier consume very less power, here combining with this adiabatic logic the power consumption is dramatically reduced. The tool used here was tanner EDA to designing the Vedic multiplier using efficient charge recovery adiabatic logic.

   

Full Text

 

Title: Genetic algorithm based routers arrangement in network on chip using the union multiprocessor
Author (s): M. Dhivyalakshmi, M. Devanathan and V. Ranganathan
Abstract:

System On Chip is a complete integrated system because it consists of several different microprocessor subsystems together with memories and I/O interfaces. So the connections between these IP’s components are the major issue and the Network On Chip (NOC) plays an important role in connecting these IP’s. The adaptive XY routing never runs into deadlock or live lock therefore it consumes more power and it also passes the data through fault path. In the proposed, a new Network On Chip use Genetic Algorithm which is an optimization algorithm used to find the shortest path and critical path analysis by routing the router on four sides so this algorithm is free from live lock and deadlock problem thereby it consumes less power. It also finds fault part of NOC components by using fault analysis process to identify the damaged router in NOC chip architecture. The experimental results shows reduction in power with 20% and delay can be reduced with 40% on average compared to adaptive router architecture for network on chip.

   

Full Text

 

Title: Simulation of series resonant inverter using pulse-density modulation 
Author (s): Kunapuli Sahiti and V. Geetha
Abstract:

This paper explains the simulation of a high frequency (20kHz) single phase full-bridge voltage-fed Series Resonant Inverter for the Induction heater and the Pulse Density Modulation has been employed in-order to control the output power.. The open loop system and the closed loop system with PI and FLC are simulated and their results are presented. The results of FLC based system are compared with those of PI based system. This inverter system has advantages like high power density, reduced steady-state error and improved response.

   

Full Text

 

Title: Survey of fuzzy inference model and impact on QOS parameters using adaptive neuro-fuzzy inference system in MANET
Author (s): P. Madhavan and P. Malathi
Abstract:

Adhoc Networks are new paradigm of wireless communication which lack specific infrastructure. Scalability and Routing are the two major challenging issues that needs to be addressed for providing better performance of the network. Due to mobility nature and dynamic topology, the conventional routing protocol should be manipulated to meet QoS requirements required for multimedia traffic.  To overcome the scalability issue, QOS parameters are kept in rigorus bound for group communication. Fuzzy Inference based System (Adaptive Neuro Fuzzy Inference) is used to optimize the QoS parameters such as delay and node speed for attaining the better performance of the network. This proposed scheme provides improvement in QoS metric such as delay, packet delivery ratio and minimizes the possibility of link failures and the overhead needed to construct the paths.

   

Full Text

 

Title: Sinusoidal PWM based t-source inverter for induction heating
Author (s): K. Arunyuvaraj and R. Gopalakrishnan
Abstract:

T-Source Inverter (TSI) is proposed for Induction Heating (IH) applications to obtain higher efficiency with reduced Total Harmonic Distortion (THD). Sinusoidal Pulse Width Modulation (SPWM) technique is used to control the switches of T-source inverter. Utilization of shoot through switching operation provides voltage boost ability to the inverter. Operation of induction heating load is based on the principle of electromagnetic induction. Skin effect and eddy current is used to produce heat in working pot. The operating performance of T-Source Inverter was shown through experiment results.

   

Full Text

 

Title: Design of enhanced multi-bit threshold bit flipping algorithm for low complex LDPC decoders
Author (s): Saumiya Jose Thomas and B. Rajasekar 
Abstract:

Communication is transfer of information from source to sink or sender to receiver. The signal when transferred through the noisy channel gets affected by the noise and becomes an error signal when it reaches the receiver. Decoding is the process of retrieving the correct information from the received signal. The weighted bit flipping LDPC decoding algorithm gives a good performance in retrieving information. The proposed algorithm which is modified multi bit threshold weighted bit flipping decoding (MMTWBF) algorithm of low density check code (LDPC) gives a good performance and an effective practicability in comparison with reliability rate weighted bit flipping algorithm (RRWBF) and good speed compared to multi-bit threshold rate based weighted bit flipping algorithm(MTRWBF). This algorithm flips the plurality of bits at each time, which helps in reducing the shortcomings in improved reliability rate weighted bit flipping algorithm (IRRWBF) decoding convergence speed. The simulation results reveal the improvement in simulation speed and the decoding iteration is reduced.

   

Full Text

 

Title: VLSI implementation of  modified guided filter for real time video 
Author (s): B. Soorya and S. Dhanalakshmi
Abstract:

Filtering techniques are used in  image and video processing applications for various technologies. Field Programmable Gate Array (FPGA) technology has become a viable target for the implementation of real time algorithms and it  is suitable for real time  video image processing applications.  Explicit type of  image filter called  the guided filter is proposed to remove the noise in video by smoothing and  sharpening of image frames and it is also used to preserve the edges . Weighted least square filter is used to remove the halo effect. Here, the systolic array architecture is proposed for modified guided filter. Systolic array architecture is an efficient data  to improve the pipeline and parallel processing. The guided filter is derived from the local linear model which  computes the filtered output by considering  the content of  the guided frame  as  the input frame. It  can also transfer the structure of filtering image to the filtering output enabling the filtering application like dehazing  and guided feathering. Application such as  Computer  vision and computer graphics includes edge-aware smoothing,  HDR compression, image matting. FPGA can be used to implement any logical function that an ASIC could perform. An efficient modified guided filter architecture is implemented on cyclone II FPGA device which offers less cost ,speed and supports the NTSC video.

   

Full Text

 

Title: MHD peristaltic flow of a couple stress fluids permeated with suspended particles through a porous medium under long wavelength approximation
Author (s): M. Vidhya, E.P. Siva and A. Govindarajan
Abstract:

The MHD peristaltic flow of a couple stress fluid permeated with suspended particles through a porous medium in two dimensional flexible channel under long wave length and low Reynolds approximation is studied. An analytical method of solution is obtained in terms of wall slope parameter and closed form of expressions has been derived for axial velocity and transverse velocity in fluid phase and particle phase. The expression for velocity profile and pressure gradient and the volumetric flow rate in the wave frame is obtained. The graphical results obtained for velocity profile and pressure gradient. It is observe that velocity profile decreases with increase in Hartmann number M and couple stress parameter S. The pressure gradient has an opposite behavior compared with velocity profile for Hartmann number M.

   

Full Text

 

Title: A comparative analysis of prediction using artificial neural network and auto regressive integrated moving average 
Author (s): E. Priyadarshini
Abstract:

Box Jenkin’s Auto Regressive Integrated Moving Average (ARIMA) technique is one of the most sophisticated extrapolation methods for prediction and Artificial Neural Network (ANN) is a modern non linear technique used for prediction. This paper compares the performance of both these models for the net asset values of Sahara Mutual fund-Growth for a period of 6 years (from 2006 to 2012) and the Mean Absolute Error (MAE), Mean Square Error (MSE), Mean Absolute Percentage Error (MAPE), Root Mean Square Error (RMSE) and Mean Percentage Error (MPE) are used to evaluate the accuracy of the models. In all these error estimates ANN model performs much better than ARIMA model.

   

Full Text

 

Title: Detection of melanoma skin cancer using digital camera images
Author (s): V. JeyaRamya, J. Navarajan, R. Prathipa and L. Ashok Kumar
Abstract:

Skin cancer is rapidly increasing in western parts of the world. Survival rate of skin cancer is high, if detected early. So an efficient method is necessary to detect skin lesion at the earliest. Since the cost of dermatoscope scan for screening the patient is high, there is a need for an automated system to detect skin lesions captured using a standard digital camera. The main aim of a skin cancer detection system is to reduce the percentage of error by choosing the appropriate method in each stage .In this paper, for pre-processing stage adaptive histogram equalization technique and wiener filter is used. A novel method is proposed for the segmentation and classification of skin lesions.

   

Full Text

 

Title: Automatic segmentation of fovea and classification of different stages of diabetic retinopathy 
Author (s): Suresh Babu V., S. Vijayan, Anju Susan, NeepamRamakrishnan and Jestin V. K.
Abstract:

Fovea is the centre most part of the macula. A healthy fovea is key for reading, watching, driving  etc... Fovea detection helps doctors to identify diseases like diabetic retinopathy (DR), age related macular degeneration (AMD) and retinopathy of pre-maturity (ROP). Diabetic retinopathy is the most common diabetic eye disease and it can eventually leads to blindness. With the help of adaptive histogram equalization, threshoulding method and smoothing method can detect the fovea region. These features are proceeded with the help of Fuzzy C-Means clustering algorithm to detect the different diabetic  retinopathy stages and the result will be compared with KNN. The accuracy of the diabetic retinopathy detection system is 98.5%.

   

Full Text

 

Title: INPULSE noise estimation in frequency selective fading channel
Author (s): J. Sujatha and S. Marirajan
Abstract:

OFDM Orthogonal Frequency Division Multiplexing is a multicarrier modulation scheme. It is widely used in wired and wireless communication systems. Impulse noise can be mitigated by considering it as a sparse signal in time, and using recently developed algorithms for sparse signal reconstruction. We propose an algorithm that utilizes the guard band null subcarriers for the impulse noise estimation and cancellation.

   

Full Text

 

Title: Measuring cohesion and coupling in object oriented system using java reflection
Author (s): N. Rajkumar, C. Viji, S. Duraisamy
Abstract:

Creating an efficient and effective system is a motto of a software engineer. The companies are spending 60% of cost for producing good quality software, software metrics require to measure qualitative in terms of software performance and reliability related characteristics like dependencies, coupling and cohesion etc. This paper proposes a set of new measures to find coupling and cohesion in a developmental system using Java reflection components to assess the usability. It will predict the fault in an object oriented system. Coupling and cohesion metrics are calculated by considering a number of relationships of a class. In this paper these metrics are calculated by using structural parameters like classes, methods and attributes. The structured information embedded in the source code. Classes, methods and attributes are retrieved in a package by using Java reflection. The retrieved information helps to measure the coupling and cohesion.

   

Full Text

 

Title: Enhanced security framework to protect orphanage sensitive data using claim-carry-catch method in cloud environment
Author (s): N. Jayapandian, A. M. J. Md. ZubairRahman and A. Sowntharya, V. Nivedha
Abstract:

Cloud computing is well developed popular option for renting of computing and storage infrastructure services. Cloud computing is a computing resource in which tasks are assigned to a different set of connections, services and software that can be accessed over internet. This paper proposes the security methods provided in orphan home secure system. The main aim of this project is to protect sensitive data of orphans using claim carry catch method (CCC). The Orphan Home Management System is going to be secured to overcome the problems that occur in the orphan home. We proposed a secure cloud storage model that addresses security and storage issues for cloud computing environments. In this paper Security is achieved by anonymous authentication which ensures that cloud users remain anonymous while getting duly authenticated. Cloud gives more storage area to the system. The cloud computing relies on the internet. We used cryptographic and claim carry catch method to enhance security in cloud.

   

Full Text

 

Title: An experimental analysis and implementation of ontology based query expansion
Author (s): S. Ruban and S. Behin Sam
Abstract:

Search engines history goes back to the field of Information Retrieval, that has gone through a tremendous change over the period of time.  Though search Engines have experienced many enhancements in the last few years, the query processing Techniques that the Information Retrieval (IR) Technology relies on are still based on Keywords.  It is difficult to formulate queries which are well designed for retrieval purpose. Query Expansion can solve this problem.  Query Expansion is normally aimed to form a query into one that is more responsive for Information Retrieval.  Though there are many approaches aimed at query expansion, ontology based query expansion has been found to have more advantages compared to the traditional ones.  This paper compares the performance of the Traditional query processing methodology with the Domain Independent Ontology based query expansion Methodology.

   

Full Text

 

Title: Automatic detection of cartilage thickness for early detection of koa
Author (s): M. Lakshmi Kumara and N. Prabakaran
Abstract:

Knee Osteoarthritis is a common joint disorder that is most prevalent in the knee joint. Knee osteoarthritis (OA) can be characterized by the gradual loss of articular cartilage (AC).  Articular Cartilage is a hard but greasy coating on the end of each bone which forms the joint. Cartilage seizes up and erodes away in OA. In this work, image processing techniques are applied on magnetic resonance images (MRI) of knee, the Adaptive histogram equalization, Contrast enhanced image process, Gaussian Filter, OstuThresholding Algorithm, Edge Detection Technique, Automatic Region Detection Method, Euclidean and connected component algorithm are adopted in this work. Quantification of cartilage thickness is carried out for normal and OA cases. The results are useful in the study of measurement of articular cartilage for OA and for therapeutic decisions.

   

Full Text

 

Title: Android based smart parking system using slot allocation and reservations
Author (s): Renuka R. and S. Dhanalakshmi
Abstract:

Among the challenges that we face in our day to day life one of most unavoidable challenge is parking the car wherever we go. As our need increases our travelling increases but due to drastic increase in usage of vehicles and increase in population we face the tough task of parking our car particularly during busiest hours of the day. During peak hours most of the reserved parking area gets full and this leaves the user to search for their parking among other parking area which creates more traffic and leaves them with no indication on availability of parking space. To overcome this problem there is definitely a need for designed parking in commercial environment. To design such parking slot we need to take into the account of reservation of parking slot with optimal parking space which depends on cost and time. Cost function should also combine with the parking cost and proximity to the destination. However here we have designed the time driven sequence method which solves the problem of parking using slot allocation method. This paper proposes an android application, which is used to implement a prototype of Smart Parking System based on Reservation (SPSR) that allows drivers to effectively find and reserve the vacant parking spaces with the help of IoT (Internet of Things) with slot allocation method and performs automatic billing process.

   

Full Text

 

Title: Analysis of the performance parameters of a novel plasma launcher in RAILGUN
Author (s): P. Balamurali, G. Vijila, S. Thiruselvam and D. Saravanakumar
Abstract:

An Electro Magnetic (EM) launcher can be utilized as an observational tool to accelerate low-mass specimens up to 350 m/s to study impact phenomena. A plasma armature is used to avoid the friction developed by a sliding metal armature. High current flows are applied to achieve high accelerations, resulting in high plasma temperatures. Yet to our knowledge, there are no existing design methods to control the plasma temperature so we propose a new model using gold coil and plasma gases to reduce the plasma temperature and armature friction. For this purpose, 2-D and axisymmetric plasma models are widely used as these are less complicated and fairly available. This proposed model solves the drawbacks of rail guns, these simulations are performed using ComsolMultiphysics version 4.3b software.

   

Full Text

 

Title: Lifetime enhancement in wireless sensor networks with fuzzy logic using SBGA algorithm
Author (s): M. Yuvaraja and M. Sabrigiriraj
Abstract:

The wireless sensor network (WSN) poses many challenges due to critical mobility environment such as large propagation delay and limited bandwidth capacity of communication channels. WSN often finds difficulties on the overhead produced during message passing, constant energy and node cost. The solution has expressed to address these issues, this paper proposes Fuzzy logic and Search Based Gravitational Routing Protocol (FSBGRP) for Lifetime improvement. The Search based Gravitational Algorithm (SBGA) is used for searching the paths. As SBGA finds the global optimum faster, it has higher convergence rate. An improved routing technique is proposed for lifetime improvement in WSN. To estimate the node cost using fuzzy logic, the parameters such as link quality, residual energy and system load are used. Simulation results prove that the proposed protocol performs well compared to the existing protocols.

   

Full Text

 

Title: A cluster based mobile sink path selection using weighted rendezvous planning 
Author (s): D. Janani and A. Ponraj 
Abstract:

Mobile sink is used to collect the data and as well as to transfer the data. For delay sensitive application mobile sink can be used. This is not suitable for all kinds of network. Sensor node will be charged with some battery power. This cannot be charged again and again because it may be costly, so we have to sense the data before it loses it power. To reduce the usage of energy, hybrid moving pattern is formed so that mobile sink visits only the rendezvous points. Furthermore to reduce the delay and energy Weighted Rendezvous Planning (WRP) is used. Weight is assigned to each node, the highest weight will be given first preference and mobile sink collect the data from it. Clustering is the effective method to improve network lifetime. EECS is implemented along with WRP. EECS is used in the applications where the data is being collected periodically.

   

Full Text

 

Title: Diminishing delay with routing and resource assignment in cognitive radio networks 
Author (s): R. Dhaya and C. Ambhika
Abstract:

Cognitive Radio (CR) is a emerging technology that enables optimal utilization of the of the spectrum. Reduction of delay and the maximization of the throughput should be satisfied which possess a challenge to the proposed cognitive mesh network. A collaborative routing and spectrum utilization with minimal interference with the use of on demand routing protocol finds a reliable solution of optimization. The evolved protocol is proposed to solve the spectrum sharing capabilities in the cognitive mesh networks. The existing protocol in cognitive network challenges aspects like hidden terminal, cross layer design communication in the established network.

   

Full Text

 

Title: Relaying with location based repeated double auction for cooperative network
Author (s): R. Dhaya and Anjana Devi J.
Abstract:

Cooperative communication is an active area of research, and wireless devices are evolving into multipurpose systems with data extensive applications running on them, by this such applications require strong error protection and high speed connectivity. These networks are emerging to support the varied networks for an effective communication between the end users. The overall network performance depends on the optimal choice for relay nodes. In this paper, a relinquish mechanism based on locations with repeated selection technique is proposed for efficient the relaying. Nodes are made to be grouped. This plays a significant role for the usage of location based algorithm. Simulation is done by using NS2 and Simulation results shows that this relinquishing mechanism works seamlessly enhancing the overall performance of the wireless cooperative network.

   

Full Text

 

Title: A novel design technique for variable fiber length of 32-channel DWDM system with hybrid amplifier and DCF
Author (s): Punal M. Arabi, Nija P. S. and  Chinchu Joseph
Abstract:

The majority of telecommunication service providers use DWDM systems which allow expansion of existing capacity without laying additional fiber optic cables. For the successful transmission of optical signals over long distance single mode fibers and EDFA are used. The performance is degraded if single mode fiber is used because of nonlinear effects like dispersion, FWM etc. To ensure the communication quality,   reduction of these nonlinear effects becomes essential. This paper proposes a novel design technique which aims at improvement in performance of a DWDM system by the usage of hybrid amplifier and dispersion compensated fiber. Performance of the proposed system is analyzed for different fiber length of 50km, 80km and 100km. Optisystem 13.0 is the software used for the analysis of the design study. The results obtained shows that the Q- factor is very much enhanced by the proposed system while BER is very much reduced. The impact of the fiber length studied here shows that if the fiber length is increased beyond 80km the Q- factor is very much degraded and BER is increased.

   

Full Text

 

Title: An efficient parallel architecture in design and implementation of adaptive LMS algorithm
Author (s): R. Thenmozhi and S. Karthikeyan
Abstract:

The proposed work is to implement the parallel architecture for adaptive LMS filter configuration, a concurrently processed filter is realized which adapts the time controlled block. The filter co-efficient are negotiated, which are uploaded in to the look up table. These data are further configured and retrieved from the stored buffers. Single block is realized here depends upon the timing control these blocks are called a function. This architecture reduces the area utilization and Power consumption. The proposed system is precise and easy to configure and update.

   

Full Text

 

Title: Implementation of stable energy based load balancing protocol for MANET
Author (s): Vijitha S. and M. Sudha
Abstract:

In general, mobile nodes consume more energy than the sensor nodes due to the presence of mobility. If the path stability is not maintained properly, network partition will occur. From the analysis of the previous work, the load balancing of energy routing is not established well. It leads to network performance degradation. In this work, Efficient Energy based Load Balancing Routing Protocol (EELBP) is proposed to make a balance between load balancing and energy consumption. The main aim of the proposed work is to reduce energy consumption and provide better stability using the stability model.  The proposed scheme consists of three phases like Load balanced Routing, stability of path and energy consumption model. Multipath routing is developed to ensure better network lifetime and more energy efficiency. The multipath routing stability is calculated to ensure more network stability. Energy spent for transmission is reduced using the energy consumption model.  By simulation results the proposed algorithm EELBP achieves better performance in terms of packet delivery ratio, delay, overhead, network lifetime, energy consumption link availability than the existing method PLSS and LAER schemes.

   

Full Text

 

Title: Cluster based location aided routing based on energy model in MANET 
Author (s): Sreeleja N. Unnithan, M. Sudha
Abstract:

Localization is one of key issues in MANET. It provides information about coverage, deployment, routing, location service, target tracking and rescue. If high mobility among the Mobile nodes occurs, path failure breaks. Hence the location information cannot be predicted.  Here, we have proposed aLocalization based Optimized Energy Routing (LOER) based on cluster and energy consumption model to provide location information of nodes based on Trilateration in WSNs. Proposed approach consists of three phases. In first phase, Cluster head is chosen based on energy level. In second phase, location aided routing is chosen to alleviate computation cost and save Mobile nodes energy.  In third phase, localization method is developed to improve accuracy and reduce node degree. To locate the target and Mobile Nodes Discrete Fourier Transform and distributed algorithm was used. By simulation results, the proposed approach LOER achieves high location updated rate, improved network lifetime, less end to end delay and overhead in terms of mobility, pausetime, throughput, and number of nodes than existing protocol ALERT.

   

Full Text

 

Title: Effective current control design and analysis of  single phase inverter for power quality improvement
Author (s): Rameshkumar Kanagavel and  A.Sakthivel
Abstract:

Using an effective Predictive Current Control strategy to a single phase voltage source inverter and to analysis its performance for various parameters variations is the main objective of this paper. An improved performance of the proposed predictive current control method has been analyzed with various conditions is carried out such as steady state, transient state, non sinusoidal references, input frequency variations, sampling frequency variations, current reference amplitude variations and filter inductance variations, that offers excellent reference tracking with less current harmonic distortion for all conditions. The control algorithm and inverter model was developed in Matlab/Simulink software.

   

Full Text

 

Title: A novel approach for a high performance lossless cache compression algorithm 
Author (s): K.Janaki, K. IndhumathiP.Vijayakumar and K.Ashok Kumar
Abstract:

Speed is one of the major issues for any electronic component. Speed based microprocessor system mainly depends on speed of the microprocessor and memory access time. The off-chip memory takes more time for accessing than on-chip memory. For these reasons, microprocessor system designers find cache compression is such a technique to increase the speed of a microprocessor based system, as it increases the cache capacity and off-chip bandwidth. Previous work on cache compression has made unsubstantiated assumptions about performance, power consumption and area overheads of the proposed compression algorithm and hardware. In this work we propose a lossless compression algorithm that has been designed for high performance, fast on-line data compression and particularly for cache compression. This algorithm has a number of novel features tailored for this application, including combining pairs of compressed lines into one cache line and allowing parallel compression of multiple words while using a single dictionary and without degradation in compression ratio.

   

Full Text

 

Title: Analysis  of power management in  portable embedded DSP applications
Author (s): D. Haripriya,  C.Govindaraju and M.Sumathi
Abstract:

Now a day, Embedded systems has greatly improved in terms of performance and features. However the process of managing the power consumption is becoming complicated. Many techniques are proposed to address this issue. In this paper the techniques for reducing the power consumption in discussed. This paper summarizes about different   ideas   regarding the working of different power management techniques so that better techniques can be designed for more efficient and high performance embedded systems. Also this work focuses on most of the portable embedded systems that are used in the real time Applications.

   

Full Text

 

Title: Modeling of brushless doubly fed induction generator with converter control
Author (s): Resmi R. and V.Vanitha
Abstract:

The tremendous increase in the use of fossil fuels and rapid depletion of natural resources are lead to the alternative sources of energy which is environment friendly are renewable energy. There has been a great interest in wind energy in recent years because it is a potential source for electricity generation with minimal environmental impacts and with no cost of fuel. The usually used wind electric conversion system (WECS) based on Doubly Fed Induction Generator (DFIG) uses slip rings and brushes. Due to depreciation of the slip rings and brushes of generator maintenance is a major issue. Also it will be very difficult to access them in the case of offshore wind farm. So, Brushless Doubly-Fed Induction Generator (BDFIG) was proposed to replace the traditional DFIG. This paper deals with mathematical modeling of BDFIG based Wind Electric Generator (WEG) with converter control. Modeling is done for 5kW WEG with the help of mathematical equations governing each component using MATLAB Simulink and the results are presented.

   

Full Text

 

Title: Fingerprint combination system based on protection of virtual identity 
Author (s): R. Malathy and K. Senthil Prasad
Abstract:

A fingerprint authentication system for the privacy protection of the virtual identity is introduced. By extracting minutiae points from one fingerprint, orientation from other fingerprint and reference points from both the fingerprints, a new biometric authentication framework is proposed for identifying an individual. With the help of these three combined features a new virtual identity is generated. A combined biometric composed of two fingerprints is stored in the server database, and query fingerprints from both fingers are required in the verification process which reduces loss of privacy and misuse. The main intention of this paper focuses on the security and privacy of a virtual identity. In order to attain high security and privacy Liveness Detection technique is applied to distinguish legitimate and imposter user. To protect the virtual identity templates Delaunay quadrangle based fingerprint authentication system which deals with nonlinear distortion-induced local structural change. Finally the virtual identity is compressed and stored in database for further verification process. 

   

Full Text

 

Title: Fault tolerant based hyper-heuristic algorithm for task scheduling in cloud 
Author (s): R. Priyanka, P. Priyadharsini and M. Nakkeeran
Abstract:

Cloud computing is one of the recent emerging technologies for providing classy services by means of the Internet based on the requirements of the users. Numerous efficient scheduling algorithms are required to make a valuable use of terrific capabilities of the cloud environment. The aim of task scheduling is to schedule the tasks within the given deadline to achieve minimum makespan. The heuristics scheduling algorithm schedules the tasks on cloud by multiple iterations. The diversity revealing and improvement revealing operators are used to determine which low-level heuristic is to be used for finding enhanced solutions in task scheduling. The heuristics task scheduling should be fault tolerant to overcome the failure of tasks. The proposed Fault Tolerant Based Hyper Heuristic Algorithm (FT-HHA) provides fault tolerance in task scheduling by using task replication and task resubmission. FT-HHA schedules the tasks within the given deadline even in the occurrence of failures. The experiments were carried out in a simulated cloud computing environment by scheduling tasks in the existence of malfunction which are generated randomly. 

   

Full Text

 

Title: Algorithm and implementation of distributed canny edge detector on FPGA 
Author (s): Aravindh G. and Manikandababu C. S. 
Abstract:

Edge detection is one of the most commonly used operations in image analysis particularly in the areas of feature extraction. Edge in an image indicates the boundaries between overlapping objects. An edge represents the boundary between an object and the image background, hence if the edges are identified with high accuracy in an image then all its objects can be located and basic properties of an image can also be measured. An edge can also be defined as a set of connected pixels that forms a boundary between two disjoints regions. Edge detection is a basic method of segmenting an image into regions of discontinuity. The data which are extracted in edge detection is too large, so to achieve the high speed of image processing is a difficult task. To solve this problem, a distributed canny edge detection algorithm is proposed that results in significant reduction of memory requirements with decreased latency and increased throughput with no loss in edge detection performance as compared to the original canny algorithm. In addition, the new algorithm uses a non uniform gradient magnitude histogram to compute block-based hysteresis thresholds. The resultant block-based algorithm has significant reduction in latency and can be easily integrated with other block-based image codecs then it is made capable of supporting fast edge detection of images and videos with high resolution rate, including full-HD videos as the latency is changed as a function of the block size instead of the frame size. In addition to that, quantitative conformance evaluations and subjective tests show that the edge detection performance of the proposed algorithm is better than the original frame-based algorithm, especially for noisy images. Furthermore, FPGA-based hardware architecture of our proposed algorithm is presented in this paper and the architecture is synthesized on the Xilinx Virtex-5 FPGA. Simulation results are dispensed to illustrate the performance of the proposed distributed Canny edge detector. The FPGA simulation results displays that we can process a 512×512 image in 0.287ms at a clock rate of 100 MHz.

   

Full Text

 

Title: Web page access prediction using fuzzy clustering by local approximation member ships (flame) algorithm
Author (s): P. Sampath and  Prabhavathy M
Abstract:

Web page prediction is a technique of web usage mining used to predict the next set of web pages that a user may visit based on the knowledge of previously visited web pages. The World Wide Web (WWW) is a popular and interactive medium for publishing the information. While browsing the web, users are visiting many unwanted pages instead of targeted page. The web usage mining techniques are used to solve that problem by analyzing the web usage patterns for a web site. Clustering is a data mining technique used to identify similar access patterns. If mining is done on those patterns, recommendation accuracy will be improved rather than mining dissimilar access patterns.  The discovered patterns can be used for better web page access prediction. Here, two different clustering techniques, namely Fuzzy C-Means (FCM) clustering and FLAME clustering algorithms has been investigated to predict the webpage that will be accessed in the future based on the previous action of browsers behavior. The Performance of FLAME clustering algorithm was found to be better than that of fuzzy C-means, fuzzy K-means algorithms and fuzzy self-organizing maps (SOM). It also improves the user browsing time without compromising prediction accuracy.

   

Full Text

 

Title: Maximizing the lifetime of cognitive sensor network using cluster head 
Author (s): Jenifer Angel J., GokulR. and Punal M. Arabi
Abstract:

In this paper a novel method is proposed to enhance the lifetime of the nodes by introducing clusters which communicate to the main fusion center of the cognitive sensor network. Each sensor sends its spectrum sensing result to the cluster head the node which is nearer to the fusion center is selected as cluster head. The cluster heads sends its decision to the main fusion center which makes the final decision. The proposed method is tested with a simulation scenario of three clusters with a total of thirty sensing nodes and a main fusion center. The results simulated using NS-2 shows that there is a reduction in consumed energy in the proposed network model when compared with the Parallel distributed spectrum sensing network model. The percentage remaining energy in the proposed model is 86.9646 and that of Parallel distributed spectrum sensing network model is 81.4277. Since the remaining energy in the proposed model is more ultimately this would lead to the maximization of its life time. 

   

Full Text

 

Title: Privacy protection in personalized web search using generalized profile
Author (s): M. Radhika and  V. Vijayachamundeeswari
Abstract:

Personalized web search is effective way of improving the quality search result based on the use profile. But people who want to search in internet do not want to reveal his identity or profile to the outside world. In this paper, the privacy of the user profiles is analyzed as a hierarchical data structure. The framework captures the user profiles in a hierarchical taxonomy. The framework adaptively generalizes a user profile for a query, keeping the preferences of the user privacy. Since the hierarchical taxonomy which maintain in the server will take more time to search if the number of users increases. So, a greedy algorithm in map reduce paradigm is evolved to process the hierarchical taxonomy tree structure in parallel.

   

Full Text

 

Title: Location based query system by securing private information
Author (s): Farzana S. and  Ramyadevi R.
Abstract:

Location based system are used for discovering the point of interests (POI)s from a specific location based search on the user queries. The GPS latitude and longitude is sent as an input to the location servers which is based on the GPS coordinate with the point of interests and the current location of user can be served back to the client from the location server. This issue is characterized as tails: (i) a user needs to inquiry a database of area information, known as Points Of Interest (POI) s, and would not like to uncover his/her area to the server because of security concerns; (ii) the manager of the area information, that is, the area server, would not like to just convey its information to all clients. The area server longings to have some control over its information, since the information benefit for the location server. On the other concerns over how such possibly untrusted area servers can prompt client's private data revelation. This paper gives an exhaustive study of area based protection safeguarding, and present the different area security models and systems successful in the area anonymization based system.

   

Full Text

 

Title: Monitoring the plant growth Using sensor network
Author (s): P. S. Sathish and B. Chellaprabha
Abstract:

A Sensor Network (SN) is a group of sensor nodes work collaboratively to perform a common task. Sensor Networks plays a major role in the development of monitoring air, soil and water, habitat monitoring, agricultural monitoring, military surveillance, inventory tracking etc. Sensors are used in agriculture to monitor Temperature, Humidity (soil, leaf, ambient), Soil moisture, Wind (speed and direction), Pressure, Ph and Redox. In the existing system microcontroller, bridge rectifier, PAR sensor, solar power system and GPRS are used to find the canopy growth. The circle node of canopy which receives the total solar radiation for data processing to calculate a leaf area index and the Moderate Resolution Imaging Spectroradiometer (MODIS), is used to observed the data continuously, Advanced Spaceborne Thermal Emission and Reflection radiometer (ASTER) is used to collect details about maps of land surface temperature, reflectance, and elevation. GPRS is used to collect the data; if it fails data collection is lost. To overcome the failure in data collection, GSM is used with LDR sensor. In proposed system, when a canopy growth reaches a defined threshold value a message will be displayed in the printed circuit boards (PCB) LCD, and a SMS will be sent to the users’ mobile phone.

   

Full Text

 

Title: Packet processing engine with firefly scheduling in green networking
Author (s): S. S. Saranya and S. Srinivasan
Abstract:

With the aim of controlling power consumption in core networks, we consider energy-aware devices able to reduce their energy requirements by adapting their performance. We propose new algorithm for scheduling the task to different pipelines to balance the energy consumption in networking. We also use MILP(Mixed Integer Linear Programming) which is an optimization problem of task assignment, data loading and data movement. The firefly algorithm (FA) is a meta heuristic algorithm, inspired by the flashing behavior of fireflies. The primary purpose for a firefly's flash is to act as a signal system to attract other fireflies. Mixed integer linear programming framework that solves the virtual topology problem under the communication delay constraint. An arbitrary optical network has been considered with different distances between the nodes and different link capacities. We are using following steps to minimize the energy consumption ,Packet Segmentation for avoiding the collision in single pipeline,  Firefly Algorithm for optimizing the identifying the pipe line , Mixed Integer Linear Programming is for joint optimization of task assignment , data loading and data routing. The purpose of our work is to minimize the energy consumption in overall network.

   

Full Text

 

Title: Optimal keyword search for recommender system in big data application
Author (s): J. AmaithiSingam and S. Srinivasan
Abstract:

Currently, online searching process increases and people searches new information in the search process. Most of the search engine gives additional supporting information. Recommender system involves in this process and implements as service.  Service recommender system gives additional information to the user but if information grows then these process become a critical one. The proposed work analyses issues occurring when service recommender system implements in large data sets. This work proposes a keyword-Aware services Recommender method, to split the services to the users and mainly focused keywords from the user preferences. Hybrid Filter algorithm generates keyword recommenders from the previous user preferences. To implement effective results in big data environment, this method is implemented using the concept of Map Reduce parallel processing on Hadoop. Experimental results are shown the effective results on real-world datasets and reduce the processing time from large datasets.

   

Full Text

 

Title:

A hybrid paradigm of artificial immune systems with fuzzy cognitive maps for Classification of learning disabled datasets

Author (s): M. Revathi and  K. Arthi
Abstract:

In recent years, Soft computing techniques have been researched and implemented in various domains. These methodologies which include Fuzzy Cognitive Maps (FCMs) are similar to the human reasoning approach and effectively applied in a variety of application domains. These techniques learn from experimental data and deals with the uncertain values and imprecise data. It plays a vital role in image processing, data compression, classification, clustering and decision support systems. Also there is a huge increase in emphasis of interest in studying biologically inspired systems called artificial immune systems (AIS) which are a class of computationally intelligent systems inspired by the principles and processes of the vertebrate immune system. Researchers are particularly interested in the capabilities of this system, whose complexity is comparable to that of the human brain. AIS algorithms are machine-learning algorithms that typically exploit the immune system's characteristics of learning and memory to solve complex problem. It attempts to take advantages and benefits of natural immune systems for use in tackling complex problem domains. It is a class of adaptive or learning computer algorithm inspired by function of the biological immune system, designed for and applied to difficult problems such as intrusion detection, data clustering, and classification and search problems. A new hybrid paradigm of artificial immune recognition system algorithm along with FCM (AIRS_FCM_LD) is proposed for classification of learning disabled datasets and yields a classification accuracy of 94.87%.

   

Full Text

 

Title: Synchronization error suppression and precoder design in ofdm channel
Author (s): Ganesavadivu S, B. Jesvin Veancy and P.Yogesh
Abstract:

Orthogonal Frequency Division Multiplexing (OFDM) is digital multi-carrier modulation technique which divides the whole channel into several orthogonal sub- channels. OFDM transmits a high data rate signal and offers high frequency efficiency, helps to increase robustness against Inter Symbol Interference (ISI) and fading caused by multi- path propagation. OFDM is chosen as air interface technique for LTE and it has high sensitivity. CA (Carrier Aggregation) is defined by 3GPP (the 3rd Generation Partnership Project) to support wide-bandwidth transmission. Carrier Frequency Offset (CFO) and Sampling Time Offset (STO) is a challenging problem in OFDM. Non continuous CA scenario’s synchronization problem is addressed and CAZAC algorithm is proposed to suppress synchronization error, STO (Sampling Time Offset) and CFO (Carrier Frequency Offset). Precoder design is used to improve BER (Bit Error Rate) performance and to minimize the MSE (Mean Square Error Value).

   

Full Text

 

 

     

  

   

  

  

  

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

       arpnjournals.com                                                       Publishing Policy                                                  Review Process                                           Code of Ethics