Statistics

    Map

Twitter


Vol.-3, Issue-1, January 2016

Sr No. Paper Detail
1. Drying of Millet using Solar Dryer

Author- Ude M.U*, Ogunjobi S.A, Onyia B.I, Ezigbo L.I Ofili I
Abstract- The purpose of food preservation is to allow it stay longer and as well save resources. Drying of farm produce could be sun drying or solar drying. Farm produce could also be dried using other means of drying such as using kerosene dryer ,electric dryer or it could be processed to either finished or semi-finished products. Sun drying is very good method of drying but the problem it has is unsteady solar radiation which make some of the farm produced get spoilt. Sun drying also has a problem of micro-organism growth before the food is dried due to fluctuation of solar intensity. This work centred on the use of solar dryer for millet drying. The solar dryer has a capacity of holding up to 30Kg of grain. The area of the solar dryer used in the experiment was 0.48m2.The experimental result obtained showed that solar dryer enhances drying of farm produce. The weight reduction of 10kg to 3.4kg was achieved using the solar dryer. The maximum atmospheric temperature recorded during the experiment was 30°C.
Keywords- Drying, moisture, preservation, solar drying, sun drying.
Page No.- 1-4 Download this Article

2. A Comparative Performance in Routing Protocols and Energy Models in MANETs using Qualnet 5.0.2

Author- Kushagr Patwa, Dr. Jagpal Singh Ubhi
Abstract- MANET stands for Mobile Ad hoc Network. An ad hoc network consists of autonomous self organizing mobile devices that communicate with each other by creating a network and each device in this network move freely, independently and randomly. In ad hoc mobile wireless networks, energy consumption is an important issue since nodes are usually mobile and battery-operated. In this project we compared the performance of energy models (generic, mica-motes & micaz) for different routing protocols (AODV, DSR, DYMO, STAR and ZRP) in transmit, receive and idle mode[1] and also compared the routing protocols (AODV, DSR, DYMO, STAR and ZRP) in respect of energy consumption.
Keywords- MANETs, energy models, routing protocols & Qualnet 5.0.2.
Page No.- 5-7 Download this Article

3. Feature Selection for Cancer Classification using Relative Decision Entropy

Author- Ms. L. Meenachi, Dr. S. Ramakrishnan, R. Nivetha, R. Pavithra, S. Vasuki, S. Veena Priya Darsini
Abstract- Features are the basis on which grouping is done to produce accurate results. The main goal of the feature selection is to determine the minimal features that are more efficient and could render high accuracy when compared with the whole set of features. Rough sets could only be considered as the effective tool for feature selection. Nowadays feature selection algorithms based on rough sets are prevailing. When they are considered on some analysis, it reveals that they could make high cost and much time to be worked out, as it suffers from intensive and exponential computation. For the purpose of eliminating the disadvantagesof these existing algorithms, a new algorithm called Feature Selection Models with Relative Decision Entropy is proposed. This algorithm is mainly based on roughness and degree of dependency, that includes both positive and boundary region calculation. It implies that this algorithm could provide good scalability for large data sets and lessens the cost along with the computation time.
Keywords- Cancer Classification, Relative Decision Entropy, feature selection, Data mining
Page No.- 8-11 Download this Article

4. An Overview of Data Protection by Data Leakage Detection

Author- Ms Neha S. Barley, Prof. R. R. Keole
Abstract- In today¡¯s business world, the owner of the data are called as distributors and the trusted third parties are called as agents. Data leakage happens every day when confidential business information such as customer or patient data, company secrets, budget information etc are leaked out. This paper contains the results of implementation of Data Leakage Detection Model. Traditionally, leakage detection is handled by watermarking, e.g., a unique code is embedded in each distributed copy. If that copy is later discovered in the hands of an unauthorized party, the leaker can be identified. Currently watermarking technology is being used for the data protection. But this technology doesn¡¯t provide the complete security against date leakage. Watermarks can be very useful in some cases, but again, involve some modification of the original data. Furthermore, watermarks can sometimes be destroyed if the data recipient is malicious. This paper includes the difference between the watermarking & data leakage detection model¡¯s technology.
Keywords- Agents, Distributor, Data leakage, Data security, Fake records.
Page No.- 12-15 Download this Article

5. Renaissance of Economic-Efficiency through Competition Law in India

Author- Dr. Somnath
Abstract- The Indian economy underwent a paradigm shift owing to widespread economic reforms that were undertaken in nineties, moving away from ¡®Command and Control¡¯ economy to an economy dependent on free market principles; as a result the extant competition law regime governed by the Monopolies and Restrictive Trade Practices Act (MRTP Act) called for an overhaul in order for it to address the needs and challenges of the new economic paradigm. Therefore, the new competition law, competition act 2002 was enacted in 2003 and amended in 2007 for extracting the benefits of competition in post reform period. Competition in markets promotes efficiency; encourages innovation; leads to higher productivity; punishes the laggards; facilitates better governance; boosts choice, improves quality, reduce costs; ensures availability of goods in abundance of acceptable quality at affordable price. Given the benefits of competition and enactment of new competition law; the present paper focuses on explaining the need of competition law and increasing role of competition commission of India (CCI) for protecting all sectors of the economy from anti-competitive practices. Also, it uses creative investigation to describe the revival of Economic Efficiency through competition law after the economic reforms in 1991.
Keywords- Competition, market power, economic efficiency, corporate governance, antitrust law, competition policy JEL Classification: D41, D42, D61, G34, K21
Page No.- 16-21 Download this Article

6. Study on vibration characteristics of drill pipe drilling mining seam for gas drainage

Author- HAN Xiao-ming, HAN Xing-yu, LUO Chen-xu, WANG Han
Abstract- In the process of coal seam gas drainage drilling, under the pressure of the drilling machine,any position of the drill pipe will be have the possibility of transverse vibration, then made the phenomenon of contact and collision between drill pipe and hole wall. Through the analysis of the transverse vibration, axial vibration and torsional vibration of drill pipe, reveals the changes of drill pipe diameter, drilling depth and other factors on lateral vibration, axial vibration, torsional vibration and natural frequency of the drill pipe, found that the transverse vibration of drill pipe is the root cause of drill pipe fatigue fracture, at the same time, it is also an important reason for the phenomenon of coal seam hole wall collapse, plugging hole and stuck drilling.
Keywords- Soft coal seam, drilling tool, vibration characteristics, drilling depth
Page No.- 22-26 Download this Article

7. Comparative investigations of FS welding and Pulsed TIG welding processes of 5083 Aluminum Alloys

Author- B. Ravindar, Dr. K. Gururaj, Dr. A. Somi Reddy
Abstract- In this study, AA5083 aluminum alloy plate of thickness 4mm have been welded by conventional fusion welding process Pulsed Current tungsten inert gas (PCTIG) welding and friction stir welding (FSW) process. The welding process was performed with different process parameters and the joints has been investigated to find their microhardness properties, SEM Images (Scanning Electron Microscope) and Chemical Analysis properties.Vickers hardness tester was used to characterize the hardness of the weld area for both the welding process. Then Scanning Electron microscope is used to analyses the size and shapes of the grains at weld zone and heat affected zone. Taking into consideration the process conditions and requirements, FSW and TIG processes Next test is chemical analysis test on Edax Energy dissipate machine and compared with each other to understand the advantages and disadvantages of the welding processes. Microstructural examination reveals that smaller grain sizes are obtained in the weld centre of FS welded specimens due to recrystallization, where as grain growth has been observed in TIG welded Specimen due to severe heat input. The Vickers hardness test results show that among the two welding methods employed, FSW has yielded the best mechanical properties and found that evaporation of magnesium is more in Pulsed TIG welding compared with FSW process.
Keywords- AA 5083 plates, Micro hardness Properties, Sem Images, Chemical analysis, straight cylindrical pin, Butt Joint.
Page No.- 27-33 Download this Article

8. A Dexterous Approach to Monitor Street Light Systems using LDR and GSM Technologies

Author- Rajkumar. S, Ramvignesh. P, Logeshwari. V, Ranjith. G.R
Abstract- The upkeep of street lights is one of the major problems for any electricity board. On the other hand it also has the problem to save the powers which are consumed by the street lights. To maintain and control the street light is more complex and uneconomical. At present there are various street light controlling systems. But all of them have their own discrepancies. The proposal aims at designing a system with the help of the advanced development in embedded systems for reducing the wastage of electricity happening via street lights. The proposal thereby offers a way to save electricity. It is hence keen in eliminating the inconsistencies of the present system. The key idea of the proposal travels around the automation of switching control in the street light system. To create such advancement in the street lighting control system and street lighting maintenance system, few technologies related to wireless communication and optical sensing has become the key requirements. The proposal is about an entirely new mechanism that is to maintain the street light with automated switching control by using a simple circuit composing of an LDR and a microcontroller which completely eliminates the manual operation involved in the current traditional lighting system. Also, GSM technology is incorporated to facilitate with a fault detection mechanism which becomes a complement for the system.
Keywords- Circuit breakage detection, GSM, LDR, Microcontroller, Street lamps.
Page No.- 34-38 Download this Article

9. CFD Analysis Of Rocket Engine Nozzle

Author- Prosun Roy, Abhijit Mondal, Biswanath Barai
Abstract- The main objective is to analyze a rocket engine nozzle to understand the phenomena of various design conditions under different convergent angle, divergent angle and throat radius by Computational Fluid Dynamic (CFD). There have also mentioned about inlet boundary conditions with specification according to the experimental information. The paper also addresses static pressure optimization and Mach number optimization. The values on the basis of results along by optimal values of nozzle design parameters obtained from optimization techniques of Taguchi Design. Convergent angle, Divergent angle and Throat radius are considered. Also response of static pressure and Mach number values of CFD analysis in two types of inlet pressure value applied for optimal parameters of nozzle attained.
Keywords- Computational Fluid Dynamics (CFD), Mach number, Divergent Angle, Convergent Angle and Static Pressure.
Page No.- 39-46 Download this Article

10. Secure Network Implementation using VLAN and ACL

Author- Mr J. Ramprasath, Dr S. Ramakrishnan, P. Saravana Perumal, M. Sivaprakasam, Vishnuraj, U. Manokaran
Abstract- The contributions of this article are two folds; first, we introduce the virtual LAN and second one is the introduction of time varying nodes. In virtual LAN implementation we segregate the network into two groups such as staff and students systems. By separating the network into two groups the staff system will receive only their information and students system will receive only the student¡¯s data and no other staff information will be received. By introducing this concept, security is maintained so that unwanted access of data is restricted. The router and the switches in the LAN will be configured to implement the virtual LAN. Each VLAN is given a separate name and identification number. By using this we can easily identify the VLAN¡¯s present inside the campus network. Data can be transferred only within the nodes present inside the VLAN. No other nodes present outside VLAN can receive the data which means that security is assured for sure. The main aim of moving to VLAN is that it can provide segregation of groups, by means of which security is provided. Here these concepts are used for the campus network which consists of two groups such as students and staff.
Keywords- Computational Fluid Dynamics (CFD), Mach number, Divergent Angle, Convergent Angle and Static Pressure.
Page No.- 47-50 Download this Article

11. Automatic Load Frequency Control of Multi Area Power System using Fuzzy Logic

Author- Amit Panwar, Prof. Sunita Chahar
Abstract- This paper provides of using of computing technology for controller application in power system. PI controller is mostly used in industrial application to control the different parameters in power system. Conventional PI controllers are not efficient for multi area power system because of high peak over shoot and settling time. The main focus of of this work is on the controller to obtained good output frequency response .The output response of proposed Fuzzy controller shows better performance and found reasonably good compare to conventional controllers.
Keywords- Conventional controller, Proposed Fuzzy controller, Tie-line, frequency, Load, Load frequency control(LFC).
Page No.- 51-55 Download this Article

12. Segmentation of Large Scale Medical Images using HPC: Classification of Methods and Challenges

Author- Kodrani Kajal Pradipkumar, R. Rajamenakshi
Abstract- Medical imagining is one of the major disciplines for analyzing human tissues non-invasively. Image segmentation is a sub-process in image processing that divides the given image into meaningful regions that can used for further classification and analysis. This step is challenging, as it difficult to identify precisely and extract that portion of the image having abnormal tissues for further diagnosis and analysis. There are several methods and techniques that exist for image segmentation. But not all algorithms and techniques can be applied on medical images. Owing to the growth of medical image corpus and the need for automated image techniques, there is a need for large scale image segmentation techniques that can precisely identify the region-of-interest in real-time for diagnosis. This paper presents a comprehensive survey and review of the medical image segmentation models, techniques, algorithms and challenges that exists from medium and large scale image processing perspectives. We have explored the large scale segmentation using parallel and distributed computing platforms for handling data with ease with reduced cost.
Keywords- Medical image analysis, Medical image segmentation, Large scale image processing.
Page No.- 56-61 Download this Article

13. Large Scale Image Feature Extraction from Medical Image Analysis

Author- Desai Devanshi Manojbhai, R.Rajamenakshi
Abstract- Research in big data is focused on deriving knowledge from multiple data formats using intelligent analytics techniques. Medical analytics is a typical example, which encompasses data in multiple formats available as text, images and the data in the databases. Performing large scale image data analysis for near real time results is a challenging task. The challenge here is to extract features without compromising on the performance. Medical images are derived from multiple devices and are analyzed by health professionals manually which is qualitative. Automated deriving of intelligence and guidance will make the disease diagnosis accurate and faster. Automated analytics will also help to predict the progress of the disease and treatment plans. Data processing on huge image corpus is both storage and compute intensive. This paper presents a comparative survey of the image feature extraction techniques using parallel and high performance computing against non-parallel ones over the medical images.
Keywords- Big data, Medical Image analysis, Feature extraction.
Page No.- 62-66 Download this Article

14. Discrete Analysis and Modern Assessment of Packet Sniffer and Network Monitoring Tools-A Comparative Survey

Author- Mohd Muntjir
Abstract- Network monitoring signifies to the practice of managing the procedure of a computer network using specified management software tools. As network persist to grow,it isvery important that network administrators are responsive of the various types of traffic that is navigating their networks ,and offers appropriate resources for decision making system. Network monitoring systems are operated to confirm availability and inclusive enactment of computers and network facilities. In modern days there are more than billions of packets moving throughout the web sky. A significant numbers of them are of malicious focused. These packets assist us to comprehend when there are prominent security or presentation procedures occurring on the network and also to find out collective network complications such as loss of connectivity and slow network etc. These paper emphases on the comparative study of diverse packet analyzers, that are accessible in current market and how we can select amongst them rendering to our necessities. Network monitoring for a commercial network is a analytical IT function that can save money in network functioning, employee efficiency and organization cost overruns. Traffic monitoring and analysis is very important in order to more efficiently troubleshoot and solve issues when they happen. A number of tools are accessible to help administrators to monitor and evaluation of network traffic in network. This paper presents a comparative analysis of some present packet sniffers with their functioning.
Keywords- Packet analysis, Sniffer Traffic Flow, Packet capturing, Wireshark, Tcpdump, Etherape, capsa, libpcap,snoop.
Page No.- 67-75 Download this Article

15. Study on Different Approaches for Head Movement Deduction

Author- Vyshagh A, Vishnu K.S
Abstract- Technology, which means the development and application of tools, machines, materials and processes that help to solve human problems, is a wonderful thing. With computers, all the information you could ever want is available on the Internet with a few keystrokes in a search engine. Technology has undoubtedly linked the world together, making it seem so much smaller and interconnected. A Human life getting improves by the use of a recent new application in the field of Human-Computer Interaction (HCI) and Computer Vision (CV). To deal with the versatile use cases is requiring the future desired Perceptual User Interfaces (PUI) and user interface devices for more reliable and fast performance. But this is the scenario for common people like us, physically challenged and mentally disabled are also important in our society. Hence such kinds need special kind of interfaces of interacting with system. The interface we propose is mouse, control by head movements and face gesture. In this survey paper we compare and contrast different algorithm and methods for detecting head movement. We study algorithm like Lucas - Kanade algorithm, Kalman filter algorithm etc. Devices like Gyrosensor, Accelerometer, Memes sensor etc.
Keywords- Adaboost, Camera Mouse, Gyrosensor, MEMS, LK Algorithm.
Page No.- 76-80 Download this Article