IJCER Online Submission
IJCER Paper Submission Format
Publication Charges - IJCER

Frequency: 12 issues per year
ISSN: 2250–3005 (online version)
Published by: IJCER
Call for paper...

International Journal of Computational Engineering Research (IJCER) Volume 2, Issue 7, November, 2012

S.No. Article Title Page No. Paper Index PDF

Harmonic Mitigation in AC–DC Converters for Induction Motor Drives by Vector Controlled



This paper deals with autotransformer-based multipulse ac–dc converters with reduced magnetics feeding vector controlled induction motor drives for improving the power quality at the point of common coupling. The proposed 12-pulse ac– dc converter-based harmonic mitigator consists of an autotransformer alongwith a passive shunt filter tuned for 11th harmonic frequency. This results in the elimination of 5th, 7th, and 11th harmonic currents. Similarly, the proposed 18-pulse ac–dc converterbased harmonic mitigator eliminates the 5th, 7th, 11th, 13th, and 17th harmonic currents, thereby improving the power quality at ac mains. The experimentation is carried out on the developed prototype of autotransformers-based ac–dc converters. Different power quality indexes of the proposed 12-pulse ac–dc converters are obtained from simulation and verified from experimental results.

A New Survivability Strategy with Congestion Control In WDM Optical Networks

Salil Trived, Sachidanand, Geetanjali


In Due to huge usage of internet and growing business, bandwidth required prove to be difficult resource to fulfill with normal structure of networks. Moreover to provide a good level of quality service is also a big concern. One big solution comes in form of Wavelength Division Multiplexing (WDM).Wavelength Division Multiplexing (WDM) is an important technique to exploit the huge bandwidth of the optical fiber. There has been a wide deployment of WDM transmission technology in today's optical networks. WDM is widely used technology in developed countries and is based on the transmission of several light beams of different wavelength simultaneously through an optical fiber. A wavelength typically operates in hundreds of Mbps or even Gbps needs to be utilized better if the connection request is less than 100 Mbps bandwidth, otherwise there is a tremendous wastage of bandwidth in a fiber for data transmission. Though the fiber bandwidth has been improved due to the advancements in fiber-optic technologies and the increase in number of wavelengths in a fiber, there has not been much research in the area of fault tolerance, routing and wavelength assignment. Due to huge transmission of data through optical fibers, congestion occurred regularly and it became big bottleneck to flow of data in process. To solve congestion issues we are proposing a survivability strategic algorithm with congestion control in WDM optical network which will improve congestion hit network and will provide us with good cost cutting as it can be implemented to developing countries due to low costing factor.

Keywords: WDM, congestion control.

Multiparty Secure Communication by Using Quantum Key Distribution Protocols

K.Gopinath, B.J.Job karuna sagar


By using the order rearrangement of the single photon sequence and unitary transformations, a multiparty controlled quantum communication scheme for Carrier Sense Multiple Access with Collision Detection(CSMA/CD) is presented .In this scheme, messages can only be recovered by the receivers with the permission of all controllers .It is shown that the security of messages transformation can be ensured and the performance of the proposed scheme enhances significantly since the collision can be avoided. In the communication network, transmitting messages from source to destination may traverse several intermediate nodes. For a long period of time, multiple authentications and secure communications between the sender and the receiver are needed for us to transmit messages. In the classical field, authentication provides only conditional security and classical channel cannot provide secure communication for liar detection .In the quantum field , multiple quantum entanglement pairs can be used for liar detection, In this paper, we design quantum authentication protocol and secure communication protocol by only using quantum channel . these protocols previously share a quantum key distribution to detect the dishonest node. The quantum Key distribution can promote authentication and secure communication for achieving higher liar detection probability.

Keywords: single photon sequence, CSMA/CD, multiparty control, quantum communication.

A Location-Based User Movement Prediction Approach For Geolife Project



Recently obtaining knowledge from raw trajectory data has been an interest of many researches. Trajectory data set consists of thousands of records. To discover valuable knowledge from these records advanced data mining techniques must be applied. Models developed from these techniques will be useful for predication. In this paper data mining classification techniques are analyzed on trajectory dataset and Performance of these techniques is evaluated with recall, precision, kappa and accuracy.

Key words: Classification Algorithms, WEKA, recall, precision, kappa and accuracy.

Hdl Implementation of Amba-Ahb Compatible Memory Controller

S.Ramakrishna , K.Venugopal, B.Vijay Bhasker ,R.Surya Prakash Rao


Microprocessor performance has improved rapidly these years. In contrast, memory latencies and bandwidths have improved little. The result is that the memory access time has been a bottleneck which limits the system performance. Memory controller (MC) is designed and built to attacking this problem. The memory controller is the part of the system that, well, controls the memory. The memory controller is normally integrated into the system chipset. This paper shows how to build an Advanced Microcontroller Bus Architecture (AMBA) compliant MC as an Advanced High-performance Bus (AHB) slave. The MC is designed for system memory control with the main memory consisting of SRAM and ROM. Additionally, the problems met in the design process are discussed and the solutions are given in the paper.

Keywords: ARM; AMBA; Memory Controller; AHB bus.


Miss.M.A.Tarkunde, Prof.Mrs.A.A.Shinde


An IC constitues area of microelectronics in which many electronic components are combined in to high density modules.IC's, the main component of each and every electronic circuit can be used for wide variety of purposes and functions. IC consists of active and passive components such as resistors, capacitors, transistors on single chip which reduces size of system, power consumption and cost of overall system. But sometime due to faulty ICs the circuit doesn't work. It is lot work to debug the circuit and confirm whether the circuiting is creating problem or the IC is faulty. So the proposed project is designed to confirm whether the IC under consideration is properly working or not. The proposed project can be used to check the IC's of 74 series at gate level.



Varada S.Kolge, Prof.K.V.Kulhalli


Conventional methods of monitoring and diagnosing the diseases rely on detecting the presence of particular features by a human observer. Due to large number of patients in intensive care units and the need for continuous observation of such conditions, several techniques for automated diagnostic systems have been developed in recent years to attempt to solve this problem. Such techniques work by transforming the mostly qualitative diagnostic criteria into a more objective quantitative feature classification problem.Probabilistic Neural Network (PNN) with image and data processing techniques will be employed to implement an automated brain tumor classification. The conventional method for Medical Resonance (MR) brain images classification and tumors detection is by human inspection. Operator-assisted classification methods are impractical for large amounts of data and are also non-reproducible. Medical Resonance (MR) images contain a noise caused by operator performance which can lead to inaccuracies in classification. The use of artificial intelligent techniques like neural networks, and fuzzy logic has shown great potential in this field.

Keywords: P rincipal Component Analysis, Probabilistic Neural Network, Medical Resonance.

Route to Chaos in an Area-preserving System

Dr. Nabajyoti Das


This paper highlights two important objectives on a two-dimensional area-preserving discrete dynamical system: ( , ) ( (1 ) , (1 ) ) 2 2 E x y  y  px   p x x  y  px   p x , where p is a tunable parameter. Firstly, by adopting suitable computer programs we evaluate period-doubling: period 1 period 2 period 4 ... period 2 ... chaos k       bifurcations, as a universal route to chaos, for the periodic orbits when the system parameter p varied and obtain the Feigenbaum universal constant = 8.7210972…, and the accumulation point  = 7.533284771388…. beyond which chaotic region occurs.. Secondly, the periodic behaviors of the system are confirmed by plotting the time series graphs.

Keywords – Period-doubling bifurcations/ Periodic orbits / Feigenbaum universal constant / Accumulation point / Chaos / Area-preserving system 2010 AMS Classificat ion: 37 G 15, 37 G 35, 37 C 45

Lp - convergence of Rees-Stanojevic sum

Nawneet Hooda


We study Lp-convergence ( 0 p 1 )of Rees -Stanojevic modified cosine sum[3] and deduce the result of Ul'yanov [4] as corollary from our result.

Wireless Electricity Transmission Based On Electromagnetic and Resonance Magnetic Coupling

 Prof. Burali Y. N, Prof. Patil C.B.


Wireless Electricity transmission is based on strong coupling between electromagnetic resonant objects to transfer energy wirelessly between them. This differs from other methods like simple induction, microwaves, or air ionization. The system consists of transmitters and receivers that contain magnetic loop antennas critically tuned to the same frequency. Due to operating in the electromagnetic near field, the receiving devices must be no more than about a quarter wavelengths from the transmitter [1].Unlike the far field wireless power transmission systems based on traveling electro -magnetic waves, Wireless Electricity employs near field inductive coupling through magnetic fields similar to those found in transformers except that the primary coil and secondary winding are physically separated, and tuned to resonate to increase their magnetic coupling. These tuned magnetic fields generated by the primary coil can be arranged to interact vigorously with matched secondary windings in distant equipment but far more weakly with any surrounding objects or materials such as radio signals or biological t issue [4].

Keywords: P AC Electricity, Wireless Electricity Device, Oscilating magnetic Field, Resonant Magnetic Coupling, Magnetic Resonance Imaging.

Design of Bovine SemenTemperature ControllerUsing PID

 Tatag Lindu Bhakti, Adhi Susanto, Paulus Insap Santosa, Diah Tri Widayati


Development of better bovine's assisted reproduction device in livestock industry requires a temperature controller to help researcher choosing best bovine's spermatozoa. This study aims to design bovine's semen temperature controller prototype which fully controlled using PID (Proportional Integral Derivative) algorithm. Temperature target is achieved using combination between peltier module's polarity switching and PWM (Pulse-Width Modulation)regulation due to itsreal-time error status. Testing result shows bovine's semen temperature controller prototype were able to achieve linear response ranging from

Keywords: temperature controller, bovine's semen, assisted reproduction, PID, PWM, peltier module, temperature stage.

A Proposal for Implementation of Signature Based Intrusion Detection System Using Multithreading Technique

 Prof.D.P.Gaikwad , Pooja Pabshettiwar, Priyanka Musale , Pooja Paranjape , Ashwini S. Pawar


The rapid proliferation of Internet and mobile computing applications has changed the landscape of network security. The recent denial of service attacks on major Internet sites have shown us, no open computer network is immune from intrusions. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective. Many intrusion detection techniques have been developed on fixed wired networks but have been turned to be inapplicable in this new environment. We need to search for new architecture and mechanisms to protect computer networks. In this paper, we are proposing signature based intrusion detection system, using multithreading technique. The multithreading approach will be used to handle network traffic. It takes the advantage of parallel processing on captured packets. We have described the proposal of our multithread based IDS system .We also suggested the algorithm which will help in updating the database which is used for IDS.

Keywords: Intrusion Detection, Multi-Threading, agent.


 S.Lakshmana kiran, P.Sunitha


Traditional fast Discrete Cosine Transforms (DCT)/ Inverse DCT (mCT) algorithms have focused on reducing the arithmetic complexity. In this manuscript, we implemented a new architecture simultaneous for image compression and encryption technique suitable for real-time applicat ions. Here, contrary to traditional compression algorithms, only special points of DCT outputs are calculated. For the encryption process, LFSR is used to generate random number and added to some DCT outputs. Both DCT algorithm and arithmet ic operators used in algorithm are optimized in order to realize a compression with reduced operator requirements and to have a faster throughput. High Performance Multiplier (HPM) is being used for integer mult iplications. Simulation results show that the encryption is done in the frequency domain. The throughput of this architecture is 656 M samples/s with a clock frequency of 82 MHz.


Some Dynamical Behaviors In Lorenz Model

 Dr. Nabajyoti Das


Loren z's discovery of chaotic behaviors in nonlinear differential equations is one of the most exciting discoveries in the field of nonlinear dynamical systems. The chief aim of this paper is to develop a eigenvaluel theory so that a continous system undergoes a Hopf bifurcat ion, and to investigate dynamic behaviors on the Lorenz model:

Keywords: Nonlinear differential equation, Hopf bifurcation, Dynamic behavior, Eigenvalue theory, Chaotic behavior 2010 AMS Classification: 37 G 15, 37 G 35, 37 C 45

A Novel Parallel Domain Focused Crawler for Reduction in Load on the Network

 Rajender Nath,Naresh Kumar


World Wide Web is a collection of hyperlinked documents available in HTML format. Due to the growing and dynamic nature of the web, it has become a challenge to traverse all the URLs available in the web documents. The list of URL is very huge and so it is difficult to refresh it quickly as 40% of web pages change daily. Due to which more of the network resources specifically bandwidth are consumed by the web crawlers to keep the repository up to date. So, this paper proposes Parallel Domain Focused Crawler that searches and retrieves the Web pages from the Web, which are related to a specific domain only and skips irrelevant domains. It makes use of change in frequency of webpage change to fetch a web page from the web. It downloads only those pages that are changed and ignores those pages that are not modified since the last crawl. Experimentally, it has been found that the proposed crawler reduces the load on the network up to 40%, which is considerable.

Keywords: WWW, search engine, mobile crawler, network resources, Internet traffic,web change behavior.

HBBABC: A Hybrid Optimization Algorithm Combining Biogeography Based Optimization (BBO) and Artificial Bee Colony (ABC) Optimization For Obtaining Global Solution Of Discrete Design Problems

 Vimal Savsani


Artificial bee colony optimization (ABC) is a fast and robust algorithm for global optimization. It has been widely used in many areas including mechanical engineering. Biogeography-Based Optimization (BBO) is a new biogeography inspired algorithm. It mainly uses the biogeography-based migration operator to share the information among solutions. In this work, a hybrid algorithm with BBO and ABC is proposed, namely HBBABC (Hybrid Biogeography based Artificial Bee Colony Optimization), for the global numerical optimization problem. HBBABC combines the searching behavior of ABC with that of BBO. Both the algorithms have different solution searching tendency like ABC have good exploration searching tendency while BBO have good exploitation searching tendency. To verify the performance of proposed HBBABC, 14 benchmark functions are experimented with discrete design variables. Moreover 5 engineering optimization problems with discrete design variables from literature are also experimented. Experimental results indicate that proposed approach is effective and efficient for the considered benchmark problems and engineering optimization problems. Compared with BBO and ABC separately HBBABC performs better.

Video Compression Using Spiht and Neural Network

 Sangeeta Mishra,Sudhir Sawarkar


Apart from the existing technology on image compression represented by series of JPEG, MPEG and H.26x standards, new technology such as neural networks and genetic algorithms are being developed to explore the future of image coding. Successful applications of neural networks to basic propagation algorithm have now become well established and other aspects of neural network involvement in this technology. In this paper different algorithms were implemented like gradient descent back propagation, gradient descent with momentum back propagation, gradient descent with adaptive learning back propagation, gradient descent with momentum and adaptive learning back propagation and Levenberg-Marquardt algorithm. The compression ratio obtained is 1.1737089:1. It was observed that the size remains same after compression but the difference is in the clarity.

Keywords: Macroblock, Neural Network,SPIHT

Matching Dominating Sets of Euler Totient Cayley Graphs

 M.Manjuri, B.Maheswari


Graph Theory has been realized as one of the most useful branches of Mathematics of recent origin, finding widest applications in all most all branches of sciences, social sciences, computer science and engineering. Nathanson[3] paved the way for the emergence of a new class of graphs, namely,Arithmetic Graphs by introducing the concepts of Number Theory, particularly, the Theory of congruences in Graph Theory. Cayley graphs are another class of graphs associated with the elements of a group. If this group is associated with some arithmetic function then the Cayley graph becomes an arithmetic graph. The Cayley graph associated with Euler Totient function is called an Euler Totient Cayley graph and in this paper we study the matching domination parameters of Euler Totient Cayley graphs.

Keywords: Euler Totient Cayley Graph, Matching Dominating sets.

Preparation and Characterization of Natural Degradable Microcapsules

 M. Geetha Devi, Susmita Dutta, Ashraf Talib Al- Hinai, S.Feroz


In this work, multilayer microcapsules of size 350 nm were prepared by layer-by-layer (L-b-L) assembly of oppositely charged chitosan and dextran sulphate on silica template, followed by removal of silica using Hydrofluoric acid. Particular emphasis is given on synthesis of monodisperse silica particles (310nm) with fine spherical shape. The hollow microcapsules obtained by the removal of the colloidal template with hydrofluoric acid solution were characterized by Scanning Electron Microcopy (SEM) and Energy Dispersive X- ray Analysis (EDX). The size distribution of silica particle was analyzed by Dynamic Light Scattering (DLS) method. Scanning electron microscopy (SEM) and Energy dispersive X-ray spectroscopy (EDX) measurements proved the purity of the hollow capsules. These microcapsules can be used for drug encapsulation and release in pharmaceutical applications.

Keywords: Biodegradable polymers, Chitosan, Dextran sulphate, L-b-L technique, Polyelectrolytes.


 Dr K RameshBabu, Vani.kasireddy


In this paper, we propose a high capacity CDMA based watermarking scheme based on orthogonal pseudorandom sequence subspace projection. We introduced a novel idea to eliminate the interference due to the correlation between the host image and the code sequences in the watermark extraction phase, and therefore, it improve the robustness and message capacity of the watermarking scheme. We give the implementation steps of the proposed scheme and test its performance under different attack conditions by a series of experiments. Experimental results show higher robustness than the canonical scheme under different attack conditions.

Keywords: CDMA, watermarking, high capacity, oval approach sub space projection, and wavelet transform.

FPGA implementation of wavelet-based denoising technique toanalysis of EEG signal

 T.Chaitanya, G.S.Siva kumar


The electroencephalogram (EEG) is widely used clinically to investigate brain disorders. However, abnormalities in the EEG in serious psychiatric disorders are at times too subtle to be detected using conventional techniques. This paper describes the application of the wavelet transform, for the classification of EEG signals. The data reduction and preprocessing operations of signals are performed using the wavelet transform. Five classes of EEG signals were used: Alpha,beta,Gamma,Delta,Theta. The EEG signal is generated with the help of MATLAB. After several iteration we found the suitable wavelet coefficients which will able to correctly classify all five class of EEGs, respectively. The wavelet transform thus provides a potentially powerful technique for classification of EEG signals. Finally we carried out FPGA implementation of these resulting parameters.

Keywords: FPGA,Wavlet,MATLAB,etc.

Area Optimized and Pipelined FPGA Implementation of AES Encryption and Decryption

 Mg Suresh,Dr.Nataraj.K.R


Advanced Encryption Standard (AES), a Federal Information Processing Standard (FIPS), and categorized as Computer Security Standard. The AES algorithm is a block cipher that can encrypt and decrypt digital information. The AES algorithm is capable of using cryptographic keys of 128, 192, and 256 bits. The Rijndael cipher has been selected as the official Advanced Encryption Standard (AES) and it is well suited for hardware. This paper talks of AES 128 bit block and 128 bit cipher key and is implemented on Spartan 3 FPGA using VHDL as the programing language.Here A new FPGA-based implementation scheme of the AES-128 (Advanced Encryption Standard, with 128-bit key) encryption and decryption algorithm is proposed in this paper. The mode of data transmission is modified in this design so that the chip size can be reduced. The 128-bit plaintext and the 128- bit initial key, as well as the 128-bit output of cipher text, are all divided into four 32-bit consecutive units respectively controlled by the clock. This system aims at reduced hardware structure and high throughput.ModelSim SE PLUS 6.3 g software is used for simulation and optimization of the synthesizable VHDL code. Synthesizing and implementation (i.e. Translate, Map and Place and Route) of the code is carried out on Xilinx - Project Navigator, ISE 12.1i suite.

Keywords: AES,FPGA,FIPS,VHDL,Plaintext,Ciphertext




A simulation for numerical analysis of internal combustion engines, both spark-ignited and compression-ignited systems, running on duel fuel of Hydrogen and any hydrocarbon developed is presented in this report. The program coded using Matlab is used to simulate various engine conditions and discern its effect on the emissions. The engine emissions, including species like NOx, CO, and CO2, in accordance with the extent of hydrogen fraction, the equivalence fuel-air ratio, combustion equilibrium temperature and pressure are simulated. The paper focuses on simulation of exhaust emissions while using H-CNG blend. Simulation attempts to find an optimum extent of dual-fuelling, equivalence ratio, combustion temperature with regard to quality of emissions.

Keywords: Hydrogen,Matlab,CNG,emissions etc.

An Affine Combination of TVLMS Adaptive Filters for Echo Cancellation

 B. Srinivas, M.Tech, Dr. K. Manjunathachari


This paper deals with the statistical behaviour of an affine combination of the outputs of two TVLMS adaptive filters that simultaneously adapting the same white Gaussian inputs and it's cancelling the echoes by system identification. The purpose of the combination is to obtain TVLMS adaptive filters with faster convergence and small steady-state mean-square deviation (MSD). The linear combination is used in this paper, is a generalization of the convex combination, in which the combination factor (n) is restricted to interval (0, 1). The viewpoint is taken that each of the two Filters produces dependent estimates of the unknown channel. Thus, there exists a sequence of optimal affine combining coefficients which minimizes the MSE and it find's the unknown system response. These results will be verified on the MAT LAB 7.8.0 version software by using signal processing tool box. The applications of this paper are System Identification with low MSE and Echo Cancellation. Now a day in real time applications can be implemented using an affine combination of TVLMS adaptive filters because, it is easy way to design, implementation, robustness, with low MSE, and high level noise cancellation and it requires less number of computational operations.

Keywords: Adaptive filters, affine combination, analysis, time varying least mean square (TVLMS), stochastic algorithms.

Facts Placement for Maximum Power Transfer Capability And Stability in a Transmission Line

 C.Vasavi, Dr. T.Gowri Manohar


Maximum power transfer capability in the transmission line is the utmost important consideration in power systems. Facts devices are very effective and capable of increasing power transfer capability of a line, as thermal limit permits, while maintaining the same degree of stability. So, as to transfer maximum power to the consumer through a transmission line. Shunt FACTS devices are placed at the midpoint of the transmission line and degree of series compensation is provided to get the maximum possible benefit. It is observed that the optimal location of facts devices deviates from the centre of the line towards the generator side with the increase in the degree of series compensation.This paper presents a two stage approach a conventional method is used to determine the optimal location of shunt facts device in a series compensated line and then Fuzzy logic is used to determine the optimal placement. The proposed method is considered for 13.8KV Base, 6*350 MVA, 360 km long transmission line.

Keywords: Fuzzy logic, Maximum power transfer, optimal placement, shunt FACTS devices, series compensation, stability.

Hybridization of Neighbourhood Search Metaheuristic with Data Mining Technique to Solve p-median Problem

 D.Srinivas Reddy, A.Govardhan, Ssvn Sarm


Combinatorial optimizat ion is the most panoptic area in current research paper. The p-median problem which is a combinatorial optimization problem is NP-Hard in nature that realizes facilitators which serves the maximum locations. The p-median problem will be pract ical in several applicat ions areas such as escalating marketing strategies in the sphere of Management Sciences and in locating server positions in computer networks. In the proposed work the Metaheuristic based on Neighbourhood Search (NS) is hybridized with Data Mining Technique (HDMNS) with Frequent Mining to provide a solution to p-median problem. The resulting local optimal solution from NS method serves as a basis for identification of feasible solution space that holds different possible solutions of similar size and by the application of frequent mining technique on it results in identificat ion of frequent items. Basing on the support count, most feasible solution is identified.

Keywords: Data Mining, Frequent item, GRASP, HDMNS procedure, Neighbourhood Search, NS Approach, USS

Key infrastructure elements for cloud computing

 S.J.Mohana, M.Saroja, M.Venkatachalam


Clouds consist of a collection of virtualized resources, which include both computational and storage facilities that can be provisioned on demand, depending on the users' needs. users are charged on a pay-per-use basis. This paper gives a quick overview of cloud and describes the key infrastructure elements for cloud computing. This paper is a brief survey based of readings on "cloud" computing and it tries to address, related research topics and challenges ahead.

Keywords: cloud computing, middleware, hypervisor, security,management, virtualization.

Control Of Unstable Periodic Orbits Coexisted With The Strange Attractor

 Dr. Nabajyoti Das


It is known that the frame of a chaotic attractor is given by infinitely many unstable periodic orbits, which coexist with the strange attractor and play an important role in the system dynamics. There are many methods available for controlling chaos. The periodic proportional pulses technique is interesting one. In this paper it is aimed to apply the periodic proportional pulses technique to stabilize unstable periodic orbits embedded in the chaotic attractor of the nonlinear dynamics: f x  ax  bx 2 ( ) , where x[0,4], a and b and are tunable parameters, and obtain some illuminating results.

Keywords: Controlling chaos, periodic proportional pulse, unstable periodic orbits, chaotic attractor, discrete model. 2010 AMS Classification: 37 G 15, 37 G 35, 37 C 45.

A Distributed Canny Edge Detector and Its Implementation on FPGA

 Chandrashekar N.S, Dr. K.R. Nataraj


In this paper, we present a distributed Canny edge detection algorithm that results in significantly reduced memory requirements decreased latency and increased throughput with no loss in edge detection performance as compared to the original Canny algorithm. The new algorithm uses a low-complexity 8-bin non-uniform gradient magnitude histogram to compute block-based hysteresis thresholds that are used by the Canny edge detector. Furthermore, FPGA-based hardware architecture of our proposed algorithm is presented in this paper and the architecture is synthesized on the Xilinx Virtex 4 FPGA. The design development is done in VHDL and simulates the results in modelsim 6.3 using Xilinx 12.2.

Keywords: Canny Edge detector, Distributed Processing, Non-uniform quantization, FPGA.

Analytic Hierarchy Process for Evaluation Of Environmental Factors For Residential Land Use Suitability

 V.D.Patil, R.N.Sankhua, R.K.Jain


An attempt has been endeavored in the Analytical Hierarchical Process of land use suitability for residential land uses of in conjunction with environmental factors Response using spatial technique for Pimpri-Chinchwad-Municipal Corporation (PCMC) area. This is just an amalgamation of a heuristic algorithm that provides good approximate, but not necessarily optimal solution to a given model in the area under consideration. To derive ratio scales from paired comparisons in employing such an algorithm, one may be able to precisely measure the 'goodness' of the approximation. In the present envisaged study, the environmental elements factors like Water availability, Flood line distance, Air pollution data, Water Quality Index and Distance of Waste disposal site affecting in the process are analytically and logically encompassed to make a gainful research through a scientifically proven method, which has been depicted in this present paper in a sequential manner.

Keywords: Multi Criteria Decision Analysis (MCDA), Analytical Hierarchy Process (AHP), land-use suitability, environmental factors, Consistency Index( CI), Random Index (RI) , Consistency Ratio (CR)

Steganography With Data Integrity



Steganography is the technique of hiding private or sensitive information within something that appears to be nothing out of the usual. Steganography is often confused with cryptology because the two are similar in the way that they both are used to protect important information. The difference between the two is that Steganography involves hiding information so it appears that no information is hidden at all. In this paper, we describe method of Steganography based on embedding encrypted message bits using RSA Algorithm in the 1st least significant (LSB Technique) and last 4 significant bits (Modulus 4 bit technique) of the pixel of image. Here we also provide integrity using MD5 hash algorithm. The analysis shows that the PSNR is improved in the case of LSB technique. Use of hash algorithm provides data integrity.

Keywords: Data integrity, LSB technique, MD5 Hash Algorithm, Modulus 4 bit algorithm, PSNR, RSA Algorithm, Steganography.

Estimation of Word Recognition by Using Back-Propagation Neural Network

 Pin-Chang Chen, Hung-Teng Chang, Li-Chi Lai


In recent years, the studies on literacy and reading have been taken seriously. A lot of researchers mention that the key factor to improve the students' reading ability is word recognition. If teachers realize the ability of students' vocabulary, they can use remedial teaching to help the sub-standard students. This study uses the back-propagation neural network to establish an experimental model. The comparison of the literacy estimated results between the back-propagation neural network and the traditional statistical method is verified. This study proves that the back-propagation neural network has good credibility and extension, as well as the estimated results can be taken as the classified basis on students' literacy.

Keywords: Word Recognition, Reading Ability, Back-Propagation, Neural Network, Vocabulary Volume.


 Biplab Das, Dr.AdityaBandyopadhyay


Watershed management is very important in our modern society. Basically watershed is a region delineated with a well-defined topographic boundary and water outlet. It is a geographic region within which hydrological conditions are such that water becomes concentrated within a particular location. The terms watershed, catchment, and basins are often used interchangeably. They have long been recognized as desirable units for planning and implementing developmental programmes. A watershed, also called a "drainage basin" in North America, is an area in which all water flowing into it goes to a common outlet, such as the same estuary or reservoir. Watersheds themselves consist of all surface water and include lakes, streams, reservoirs and wetlands, as well as all groundwater and aquifers.

Formation of Knowledge Sharing System for Asia-Pacific Countries by Using Modern Information Techniques

 Nalin Warnajith, Sarkar Barbaq Quarmal, Masanori Itaba, Atsushi Minato, Satoru Ozawa


This paper describes the establishment of an e-Learning platform for Asia-Pacific countries where teachers and researchers of this region can share their knowledge and collaborate in education and research activities in order to face the challenges of the rapidly changing world. In the first part of the paper, the present e-Learning status, scopes and constraints in the Asia-Pacific region have been briefly discussed. In the later part, the technical issues regarding the development and implementation of the knowledge sharing system (Knowledge Integration Servers System for E-Learning: KISSEL) is explained. From the test results and feedbacks from the teachers' communities in the project member countries, it has been found that the KISSEL is useful for the improvement of education and research activities in Asia-Pacific countries.

Keywords: e-Learning, Knowledge-sharing, KISSEL, Data Synchronization.

Location Of The Zeros Of Polynomials

 M.H. Gulzar


In this paper we prove some results on the location of zeros of a certain class of polynomials which among other things generalize some known results in the theory of the distribution of zeros of polynomials.

Keywords: Polynomial, Zeros, Bounds.