IJCER Online Submission
IJCER Paper Submission Format
Publication Charges - IJCER

Frequency: 12 issues per year
ISSN: 2250–3005 (online version)
Published by: IJCER
Call for paper...

International Journal of Computational Engineering Research (IJCER) Volume 2, Issue 8, December, 2012

S.No. Article Title Page No. Paper Index PDF

Estimation Of Consciousness Of Human Mind Using Wavelet Transform

Tinku Biswas, Swarup Sarkar, Akash Ku. Bhoi, Surajit Bagchi


This paper introduces a two non-invasive electrode based electroencephalography (EEG) scheme to pick-up the biopotential (generated by the neuron network of human brain) for the assessment of consciousness level. With the help of a suitable algorithm (developed by us), processed in LabVIEW environment, real -time β-wave (frequency range 13-30 Hz.) is extracted (representing the consciousness level of the brain activities) from the complex bio -signal and reproduced on the computer monitor. The data array is further processed in MATLAB platform using Daubechies wavelet transform (dB 6, level 9) to cross check the results of interpretation of one's awareness level as obtained from Lab VIEW environment. The results provided by our proposed device are in good agreements with the actual physiological actions of the subject s' brain and supported by the clinicians.

Keywords: Electrodes, EEG, β-wave , consciousness ,Level of consciousness, Daubechies wavelet transform, dB6.

Flue Gas Analysis of a Small-Scale Municipal Solid Waste-Fired Steam

A. J. Ujam, F. Eboh


Flue gas analysis of a small-scale municipal solid waste-fired steam generator has been presented in this work. The analysis was based on the selected design parameters: operating steam pressure of 10 bar, with fuel consumption rate of 500 Kg/h and combustion chamber which utilizes mass burn incineration using water wall furnace. The plant is designed as a possible option for thermal utilization of rural and urban wastes in Nigeria. The average daily generation of MSW was considered in order to assess the availability of the material. The data were collected from Enugu State Waste Management Authority (ENSWAMA).This was calculated based on the state population, urbanizat ion and industrialization strengths. Calculat ion of calorific value of the waste to determine the heat contents was carried out using two methods: Bo mb ca lorimeter and Dulong‟s formula . So me samples of the garbage were analyzed with bo mb calorimeter in the National Centre For Energy Research & Development Laboratory, University of Nigeria Nsukka. This is important because it a direct measure of the temperature requirements that the specific waste will place on the system. The calorific values obtained from this analysis were 12572.308 KJ/kg, 14012.05 KJ/kg, 21833.26 KJ/kg and 20551.01 KJ/kg for paper products, woods, plastics and textiles waste respectively, while the energy content obtained from the elemental co mposition of waste using Dulong‟s formula was 15,101 KJ/kg .The maximum temperature of the furnace attained from the energy balance based on this value around the combustion chamber was 833.7 K and the amount of air required per kg of MSW was 8.66kg

Keywords: Solid-Waste, Steam, Temperature, Pressure, Flue gas, Calorific Value, Excess air, Moisture Content, Exergy, Energy, Combustion.

Mapping Fpga To Field Programmableneural Network Array(Fpnna)

H Bhargav, Dr. Nataraj K. R


My paper presents the implementation of a generalized back-propagation multilayer perceptron (MLP) architecture, on FPGA, described in VLSI hardware description language (VHDL). The development of hardware platforms is not very economical because of the high hardware cost and quantity of the arithmetic operations required in online artificial neural networks (ANNs), i.e., general purpose ANNs with learning capability. Besides, there remains a dearth of hardware platforms for design space exploration, fast prototyping, and testing of these networks. Our general purpose architecture seeks to fill that gap and at the same time serve as a tool to gain a better understanding of issues unique to ANNs implemented in hardware, particularly using field programmable gate array (FPGA).This work describes a platform that offers a high degree of parameterization, while maintaining generalized network design with performance comparable to other hardware-based MLP implementations. Application of the hardware implementation of ANN with back-propagation learning algorithm for a realistic application is also presented.

Keywords: Back-propagation, field programmable gate array (FPGA), hardware implementation, multilayer perceptron, neural network, NIR spectra calibration, spectroscopy, VHDL, Xilinx FPGA.

High speed arithmetic Architecture of Parallel Multiplier–Accumulator Based on Radix-2 Modified Booth Algorithm

Harilal, M.Tech, DURGA PRASAD, M.tech,(Ph.D),


The sustained growth in VLSI technology is fuelled by the continued shrinking of transistor to ever smaller dimension. The benefits of miniaturization are high packing densities, high circuit speed and low power dissipation. Binary multiplier is an electronic circuit used in digital electronics such as a computer to multiply two binary numbers, which is built using a binary adder. A fixed-width multiplier is attractive to many multimedia and digital signal processing systems which are desirable to maintain a fixed format and allow a minimum accuracy loss to output data. This paper presents the design of high-accuracy modified Booth multipliers using Carry Look ahead Adder. The high accuracy fixed width modified booth multiplier is used to satisfy the needs of the applications like digital filtering, arithmetic coding, wavelet transformation, echo cancellation, etc. The high accuracy modified booth multipliers can also be applicable to lossy applications to reduce the area and power consumption of the whole system while maintaining good output quality. This project presents an efficient implementation of high speed multiplier using the shift and add method, Radix_2, Radix_4 modified Booth multiplier algorithm. The parallel multipliers like radix 2 and radix 4 modified booth multiplier does theComputations using lesser adders and lesser iterative steps. As a result of which they occupy lesser space as compared to the serial multiplier. This very important criteria because in the fabrication of chips and high performance system requires components which are as small as possible.

Key words: Booth multiplier, carry save adder (CSA) tree, computer arithmetic, digital signal processing (DSP), ultiplierand- accumulator (MAC).

Nonsplit Dom Strong Domination Number Of A Graph

G. Mahadevan, Selvam Avadayappan, M. Hajmeeral


A subset D of V is called a dom strong dominating set if for every v V – D, there exists u1, u2 D such that u1v, u2v  E(G) and deg (u1 ) ≥ deg (v). The minimum cardinality of a dom strong dominating set is called dom strong domination number and is denoted by γdsd. In this paper, we introduce the concept of nonsplit dom strong domination number of a graph. A dom strong dominating set D of a graph G is a nonsplit dom strong dominating set (nsdsd set) if the induced subgraph V-D is connected. The minimum cardinality taken over all the nonsplit dom strong dominating sets is called the nonsplit dom strong domination number and is denoted by γnsdsd(G). Also we find the upper bound for the sum of the nonsplit dom strong domination number and chromatic number and characterize the corresponding extremal graphs.

Traffic Sign Recognition

Mr. Chetan J. Shelke, Dr. Pravin Karde


Traffic sign recognition is a difficult task if aim is at detecting and recognizing signs in images captured from unfavorable environments. Complex background, weather, shadow, and other lighting-related problems may make it difficult to detect and recognize signs in the rural as well as the urban areas. Two major problems exist in the whole detection process. Road signs are frequently occluded partially by other vehicles. Many objects are present in traffic scenes which make the sign detection hard (pedestrians, other vehicles, buildings and billboards may confuse the detection system by patterns similar to that of road signs). Color information from traffic scene images is affected by varying illumination caused by weather conditions, time (day night) and shadowing (buildings)


Image Compression: An Artificial Neural Network Approach

Anjana B, Mrs Shreeja R


Image compression has become the most recent emerging trend throughout the world. Image compression is essential where images need to be stored, transmitted or viewed quickly and efficiently. The artificial neural network is a recent tool in image compression as it processes the data in parallel and hence requires less time and is superior over any other technique. The reason that encourage researchers to use artificial neural networks as an image compression approach are adaptive learning, self-organization, noise suppression, fault tolerance and optimized approximations. A survey about different methods used for compression has been done. From the above study, recently used network is multilayer feed forward network due to its efficiency. The choice of suitable learning algorithm is application dependent. A new approach by modifying the training algorithm to improve the compression is proposed here. Protection of image contents is equally important as compression in order to maintain the privacy. If any malicious modification occurs either in storage or in transmission channel, such modifications should be identified. So authentication and protection are incorporated into the proposed system to enhance the security.

Keywords: Jacobian, Levenberg-Marquardt, Multilayer perception, Neural network, Radial basis function.

Effect of Radiation on Flow of Second Grade Fluid over a Stretching Sheet Through Porous Medium With Temperature Dependent Viscosity And Thermal Conductivity

G. C. Hazarika, P. K. Mahanta


The effect of thermal radiation on boundary layer flow with temperature dependent viscosity and thermal conductivity due to a stretching sheet in porous media is investigated. The Rosseland diffusion approximation is used to describe the radiative heat flux in the energy equation. The sheet is being stretched linearly in the presence of a uniform transverse magnetic field and the flow is governed by the second –order viscoelastic fluid. The partial differential equations governing the flow and heat transfer characteristics are converted into ordinary differential equations by similarity transformations and solved numerically by fourth-order Runge-Kutta shooting method. The effects of various parameters on the velocity and temperature profiles as well as the skin-friction coefficient and Nusselt number has been shown graphically and in tabulated form and discussed in detail.

Keywords – Heat transfer, Porous medium, Radiation, Second order fluid, Stretching sheet, Thermal Conductivity, Variable viscosity

Decision Support System for Patient Care

Kulvinder Singh Mann, Avneet Kaur, Mohit Sudhera


With rapid development of medical information technology, Electronic Health Record(EHR) provide basis for various health services.This paper presents Decision Support System(DSS) for patient care with help of EHR. This paper tells how this DSS can be helpful for both doctor and patient.To check the effectiveness of this DSS a small survey was done.From results of the survey it is evident that quality of healthcare delivery can be improved by using this DSS.The investigation revealed that it prevent handwritten prescription risk,allow quick access during emergencies & can also be helpful for patient in remote area where doctor is not available.By this means,we provide our consumers an overall scene of the patient's personal history,personal health status & future care plans. This paper tells how DSS for patient care is helful for making better decisions by doctor i.e. by spending less time in management and more with patients & by patient i.e. with application of "Six in one module" function in system.

Keywords: Decision Support System ,Electronic Health Record.

Implementation of an OFDM FFT Kernel for WiMAX

Lokesh C. Dr. Nataraj K. R.


In this paper we focus on the OFDM Kernel which refers to the inverse fast Fourier transform and cyclic prefix insertion blocks in the downlink flow and the FFT and cyclic prefix removal blocks in the uplink flow. To support orthogonal frequency-division multiple access (OFDMA) an extension to the OFDM kernel is required that allows each user to be allocated with a portion of the available carriers. This process is referred to as sub channelization. The WiMAX building blocks include bit-level, OFDMA symbol-level, and digital intermediate frequency processing blocks. For bit-level processing, Altera provides symbol mapping/demapping reference designs and support for forward error correction using the Reed- Solomon and Viterbi MegaCore® functions. The OFDMA symbol-level processing blocks include reference designs that demonstrate subchannelization and desubchannelization with cyclic prefix insertion supported by the fast Fourier transform, and inverse fast Fourier transform MegaCore functions. Other OFDMA symbol-level reference designs illustrate ranging, channel estimation, and channel equalization. The digital IF processing blocks include single antenna and multiantenna digital up converter and digital down converter reference designs, and advanced crest-factor reduction and digital predistortion.

Keywords: inverse fast Fourier transform (IFFT), orthogonal frequency-division multiple access (OFDMA), intermediate frequency (IF), forward error correction (FEC), digital up converter (DUC), digital down converter (DDC), crest-factor reduction (CFR), digital predistortion (DPD, WiMAX (Worldwide Interoperability for Microwave Access).

Study and comparison of various point based feature extraction methods in palmprint authentication system

Vinod Kumar D, Dr. Nagappan A


Bio metrics is the word derived from Greek words ―Bio‖ means (life) & ―Metrics‖ means (to measure). Bio metrics is the science of measuring human characteristics for the purpose of authenticating or identifying the identity of an individual. Biometrics System is used for automated recognition of an individual. In Informat ion system in particular biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance. In this paper, palmprint biomet ric is used for personal authentication. Various feature extract ion methods to be discussed and compared are Forstner operator, SUSAN operator, Wavelet based salient point detection and Tra jkovic and Hedley corner detector.

Keywords: Biomet ric, Corner, Palmprint, Palmprint features .

Block Diagram and Formal Mathematical Definition of Steganographic System

 Alexey Smirnov


This paper studies a formal mathematical description and the block diagram of the s ecret system and, by analogy with the theory of secret systems, introduces the basic elements and mathematical operators, abstractly d escribing steganographic informat ion protection system.

Keywords: secret systems, steganographic system, formal mathemat ical definition.

A New Geometric Method to Plotting a Family of Functions Logarithm

 B. Nachit, ,A. Namir,,M. Bahra, K. Hattaf, R. Kasour, M. Talbi


In this paper, from the study of the family of logarithmic function, we derive a new method to construct the curves:y= kx+ln(x), kIR. This method will be a new learning situation to present the logarithm function at high school.

Keywords: Algorithm, Family of functions , Function, Logarithm, Register

Statistical Distributions involving Meijer's G-Function of matrix Argument in the complex case

 Ms. Samta , Prof. (Dr.) Harish Singh


The aim of this paper is to investigate the probability distributions involving Meijer's g Functions of matrix argument in the complex case. Many known or new Result of probability distributions have been discussed. All the matrices used here either symmetric positive definite or hermit ions positive definite.

Enhancing Performance of User Authentication Protocol with Resist to Password Reuse Attacks

 Ms. R.R.Karthiga, 2, Mr.K.Aravindhan


Text password is the most popular form of user authentication on websites due to its convenience and simplicity. However, user's passwords are prone to be stolen and compromised by different threats and vulnerabilities. Users often select weak passwords and reuse the same passwords across different websites. Typing passwords into untrusted computers suffers password thief threat. The user authentication protocol proposes the oPass enhancement to protect user identity; it requires a long-term password for cell phone protection and account ID for login on all websites. OPass only requires each participating website possesses a unique phone number, and involves a telecommunication service provider in registration and recovery phases for the creation of one-time password. User can recover oPass system with reissued SIM cards and long-term passwords. Opass is efficient and affordable compared with the conventional web authentication mechanisms. Therefore one-time password mechanism that has enhanced security using private key infrastructure to prevent integrity problem due to phishing attack and keyloggers.

Keywords: Network security, password reuse attack, pass- word stealing attack, user authentication.

Implementation of Serial Communication IP for Soc Applications

K. Raghuram, A.Lakshmi sudha


The serial communication is very commonly used communication protocol between various peripherals and processor. The current trend is all high speed buses are built with serial communication interface. The ALTERA's NIOS II soft processor and PowerPC hard processor are widely used in FPGA based CSOC (configurable system on chip) applications. These processers don't have programmable serial links for interfacing with embedded peripherals which are mostly off chip. In this project it is proposed to implement dynamically configurable serial communication block in Verilog. The developed module shall be interfaced with NIOS II soft processor as a general purpose IO port. The serial interface blocks shall be implemented to handle high data rate serial links and provide parallel interface to the processor. The Nios II IDE (EDK) shall be used for developing the test application in C programming language. The serial interface blocks which are coded in Verilog shall be synthesized using QUARTUS II EDA tool. The CYCLONE III family FPGA board shall be used for verifying the results on board.


A Novel Light-Sensor-Based Information Transmission System for Outdoor tracking tothe Indoor Positioning system

 Dr.Shaik Meeravali, S.VenkataSekhar


The objective of this project describes a novel light-sensor-basedInformation transmission system for indoor positioning andNavigationwith particular benefits for mobile and wearable computers. It canseamlessly extend outdoor GPS tracking tothe indoor environment.In a novel manner, fluorescent lightis used as the mediumto transmit information. The userreceives the encoded light information through a photoreceiver. The information ispassed into the wearable or mobile computer after the data aredecoded. This information allows positioning information to begiven to indoor mobile and wearable computers.The proposedsystem can be used in indoor guidance and navigation applications.An embedded system is a combination of software and hardware to perform a dedicated task.Some of the main devices used in embedded products are Microprocessors and Microcontrollers. Microprocessors are commonly referred to as general purpose processors as they simply accept the inputs, process it and give the output.Itusing PIC16F72, PIC16F877A microcontroller is an exclusive project which is used to find the position identification for the different blocks in the organization by using the Zigbee module. This information is provided by the GPS with the help of the data it receives from the satellites.

Keywords: Augmented reality (AR), electronic ballast, fluorescentlamp, navigation, wearable computer.

Implementation of Berlekamp Algorithm for Error Detection and Correction of Multiple Random Errors Using Reed-Solomon Codes

 P. Chiranjeevi (M.Tech), D. Ramadevi, Asst.Prof. K. Jeevan Reddy, HOD


In the communication systems, RS codes have a widespread use to provide error protection. For burst errors and random errors, RS code has become a popular choice to provide data integrity due to its good error correction capability. This feature has been one of the important factors in adopting RS codes in many practical applications such as wireless communication system, cable modem, computer memory and ADSL systems. Reed Solomon codes are an important sub class of non-binary BCH codes. These are cyclic codes and are very effectively used for the detection and correction of burst errors. Galois field arithmetic is used for encoding and decoding of reed Solomon codes. The design experience will be formulated to form the complete design methodology of the FEC modules at the register-transfer level (RTL). Then we incorporate the knowledge into our RS code generator design flow.

Keywords:RS codes, random errors, BCH codes, Galois Field, ADSL

A Method for Hiding Secret Messages using Minimum-Redundancy Codes

 Srinivas.CH, D.Prabhakar, J.Krishnamurthy, Gopala Krishna.M


This paper demonstrates an effective lossless data hiding scheme using minimum Redundancy codes. The binary secret message is concurrently embedded and encoded with a cover medium such as a video file, an audio file, or even a text file. The proposed scheme not only provides good data hiding capacity and data recovery capability, but also being efficient in space saving. Each symbol in a cover medium can carry one secret bit, and the cover medium can be reversed. And the experimental results show that the redundancy code can saves up to 38% of space compared with the cover medium. In this paper, the symbol or sequence of symbols associated with a given message will be called the "message code." The entire number of messages which might be transmitted will be called the "message ensemble." The mutual agreement between the transmitter and the receiver about the meaning of the code for each message of the ensemble will be called the "ensemble code."

Keywords:data hiding, redundancy codes, Secret messages, method.

Image Mining Method and Frameworks

 Shaikh Nikhat Fatma


Image mining deals with the extraction of image patterns from a large collection of images. Clearly, image mining is different from low-level computer vision and image processing techniques because the focus of image mining is in extraction of patterns from large collection of images, whereas the focus of computer vision and image processing techniques is in understanding and / or extracting specific features from a single image. While there seems to be some overlaps between image mining and content-based retrieval (both are dealing with large collection of images), image mining goes beyond the problem of retrieving relevant images. In image mining, the goal is the discovery of image patterns that are significant in a given collection of images.

Keywords:Image mining (IM); function-driven; knowledge driven; information driven; knowledge remounting

A Study On An Interest & Attitude Of The Student Of Khargone Taluka's Urban & Rural Higher Secondary Schools In English Curriculum

Dr. Shri Krishna Mishra (Principal) , Mr. Badri Yadav (Asst. Professor) 


The main aim of the present research paper to do a study on an interest and attitude of the students of Khargone taluka‟s urban and rural high secondary schools in English curriculum. In the present research paper the investigator tried the compare the attitude of rural and urban students toward English curriculum. But this results are not the last truth. I hoped that in the suggestions and the results will be helpful for the development of the situation of the English curriculum in the schools in present time.

Keywords: Interest & attitude of the student, A study on an interest & attitude, A study of Urban & Rural.

Improving Detection Performance of Cognitive Femtocell Networks

 Ms.Madhura Deshpande, Dr.S.D.Markande


Femtocell is envisioned as a highly promising solution for indoor wireless communications. The spectrum allocated to femtocells is traditionally from the same licensed spectrum bands of macrocells. The capacity of femtocell networks is highly limited due to finite number of licensed spectrum bands and the interference with macrocells and other femtocells. A radically new communication paradigm is proposed by incorporating cognitive radio in femtocell networks. The cognitive radio enabled femtocells are able to access spectrum bands not only from macrocells but also from other licensed systems (e.g. TV), provided the interference from femtocells to the existing systems is not harmful. It results in more channel opportunities. Thus, the co-channel interference can be greatly reduced and the network capacity can be significantly improved. Further, detection performance can be improved by decreasing the collision probability with the help of double threshold energy detection.

Keywords:Co-channel interference, Cognitive radio, Collision probability, Double threshold energy detection, Femtocell network, IEEE 802.22, Licensed user.

Exergy Requirements for the Manufacturing of Carbon NanotubesExergy Requirements for the Manufacturing of Carbon Nanotubes

 Renish M vekariya, Rakesh P Ravani


The purpose of this paper is to address both the high values, and the large variation in reported values for the energy requirements for the production of carbon nano tubes. The paper includes an estimate of the standard chemical exergy for single walled carbon nano tubes, as well as a historical look at how the minimum physical flow exergy improved as the HiPco process developed.

Keywords:Carbon Nanotubes, Exergy Analysis, SWNT

Experimental Study of Partial Replacement of Fine Aggregate with Waste Material from China Clay Industries

 A.Seeni, Dr.C.Selvamony, Dr.S.U.Kannan, Dr.M.S.Ravikumar


The utilization of industrial and agricultural waste produced by industrial process has been the focus of waste reduction research for economical, environmental and technical reasons. This is because over 300 million tones of industrial waste are being produced per annual by agricultural and industrial process in India. The problem arising from continuous technological and industrial development is the disposal of waste material. If some of the waste materials are found suitable in concrete making not only cost of construction can be cut down, but also safe disposal of waste material can be achieved. The cement of high strength concrete is generally high which often leads to higher shrinkage and greater evaluation of neat of hydration besides increase in cost. A partial substitution of cement by an industrial waste is not only economical but also improves the properties of fresh and hardened concrete and enhance the durability characteristics besides the safe disposal of waste material thereby protecting the environment form pollution This paper deals with partial replacement of fine aggregate with the industrial waste from China Clay industries. The compressive strength, split tensile strength and flexural strength of conventional concrete and fine aggregate replaced concrete are compared and the results are tabulated.

Keywords:China Clay, Compressive strength, Concrete, Fine aggregate, Flexural strength, Industrial waste, Split tensile strength,

Robust LMI-Based Controller Design using H∞ and Mixed H2/H∞ for Semi Active Suspension System

 Saeed M. Badran


Control of vehicle suspension systems has been the focus of extensive work in the past two decades. Many control strategies have been developed to improve the overall vehicle performance, including both ride quality and stability conditions. In this paper, we use the H∞ and mixed H2/H∞ techniques with a semi active suspension system to increase the passenger's ride comfort performance A two degree of freedom dynamic model of a vehicle semi-active suspension system was presented. The role of H∞ is used to minimize the disturbance effect on the system output whereas H2 is used to improve the transients against random disturbances. The capability of the system of improving comfort of operators has been evaluated through simulations carried out with a validated model of the entire vehicle. The results of this study revealed that the use of mixed H2/H∞ with pole placement for a semi-active suspension system showed a great improvement compared with H∞ systems. In addition, the results of the simulation showed that ride comfortable of the vehicle can be improved effectively by using the semi-active suspension with mixed H2/H∞ control method, and also the mixed H2/H∞ control method more effective than the H∞ control method. Finally, this paper showed a robust use of both H∞ and mixed H2/H∞ problem which can be solved using linear matrix inequality (LMI) techniques.

Keywords:H∞ control; mixed H2/H∞ control; robust control; semi-active suspension; ride comfort; simulation; pole placement.

Analysis of Deep Beam Using Cast Software and Compression of Analytical Strain with Experimental Strain Results

 Kale Shrikant M. Prof.Patil.S.S., Dr. Niranjan B.R.


Analysis of deep beam by using CAST software based on strut and tie method. as per ACI 318-05(Appendix -A).Design and casting of several deep beam using STM. Testing of deep beams in heavy structures laboratory for two point loading condition. Measurement of strain, load and deflection under controlled condition. Comparison of analytical flexure strain with experimental results.

Keywords:Analysis of deep beam, CAST (computer aided Strut and Tie) Software, Deep beam, Strut and tie Method(STM), Strain measurement, Strain gauge, Experimentation

Adopting Trusted Third Party services for Multi-level Authentication accessing cloud

 Vivekananth.P , Dr.Ritish Khanna


Cloud computing is an emerging, on-demand and internet-based technology. It provides variety of services over internet such as, software, hardware, data storage and infrastructure. This technology has been used by worldwide customers to improve their business performance. At present, authentication is done in several ways: such as, textual, graphical, bio-metric, 3D password and third party authentication. The framework have seven processes, including: processes-selecting relevant critical areas, strategy and planning, risk analysis, risk assessment, risk mitigation, assessing and monitoring program, and risk management review. To develop the dynamic Trusted Third Party auditing key role of public auditability in the cloud storage security API. The main objective of this research question is to understand information security threats relevant in cloud computing. Considering the security and efficiency in data sharing, we introduced the trusted third party (TTP). In this paper aims at identifying SLA based information security metrics relevant in cloud computing. In this research investigates different Objects relevant in cloud policy models and each of them can be used as a component in the proposed framework. A role represents a specific function within an organization and can be seen as a set of actions or responsibilities associated with this function.

Keywords:Secure Data collection, Cloud Storage Services, Secure distributed storage, Third Party Auditor, Insider Access, Service Level Agreement

Optimized DES Algorithm Using X-nor Operand Upto 4 Round on Spartan3

 PoojaRathore, Jaikarn Singh, MukeshTiwari, Sanjay Rathore


In this paper, linear cryptanalysis is a known-plaintext attack that uses a linear relation between input-bits, output- bits, and key-bits of an encryption algorithm that holds with a certain probability. If enough plaintext-ciphertext pairs are provided, this approximation can be used to assign probabilities to the possible keys and to locate the most probable one. Along with the society relies on more and more greatly to the computer, people also attach more and more importance to the security problem in the application. The cryptography is continuously safeguarding the safe effectively protective screen of system. Owing to the fact that to break the key using mathematics technology is very difficult, people put forward the side-channel attack method in recent years.

Keywords:Encryption; Key; Modalism; S-boxes.

Voltage Unbalance Correction in a Grid Using Inverter

 K.Jayakumar, N.Sriharish, Ch.Rambabu


This paper presents the control of a "voltage unbalance correction in a grid using inverter". The inverters are proposed give additional function to decrease the negative sequence voltage at the point of correction with the utility grid. By using improved multi variable filter, the grid inverter absorbs a small amount of negative sequence current from the grid, and which based up on symmetric sequence voltage decomposition, thereby helping to correct the negative sequence voltage. But the amplitude reduction by each individual inverter system is small as compared to the entire negative sequence component, and these inverter modules can achieve to collect substantial results in the grid. Finally the analyses of the scheme along with the suitable design are presented by using basic circuit diagram and proposed control has been verified by simulation results are shown.

Keywords:PWM inverter, multi variable filter, voltage unbalance, point of correction, negative sequence voltage, distributed generation, grid interfacing etc.

Hotellings T-square & Principal Component Analysis Approaches to Quality Control Sustainability

 Onwuka, Gerald. I.


In this paper, Multivariate Techniques are applied to a Production/Manufacturing industry to examine various measurable characteristics of a product since no two items produced are exactly alike. Although, natural or assignable causes of variation possibly must be found in every production process, attempt has been made using this technique to examine correlation and tests for equality of means on collected multivariate data. Principal Component Analysis and Hotelling‟s T2 tests were used, with the 3-characteristics measured showing negligible/low correlation with nearly all the correlation coefficients small. Only one variable possess on the average about 70% of the total variation. The result of Hotelling T2 test shows that the average daily means are not equal and provide estimate of the interval to use. The purpose of this study is to monitor the in-control condition for data on pipes production, which clearly concludes that data for the production process was really obtained from a statistically monitored and controlled process.

Keywords:Quality Control, Multivariate Analysis, PCA & Hotelling T2.

Comparative Study and implementation Mixed Level&Mixed Signal Simulation using PSpice and VHDL

G.Ramachandran, N.Manikanda Devarajan,T.MuthuManickam, S.kannan, C. ArunKumarMadhuvappan , PM Murali


PSpice CMOS & Logic Gates package that is used to analyze and predict the performance of analog and mixed signal circuits. It is very popular especially among Printed Circuit Board (PCB) engineers to verify board level designs. However, PSpice A/D currently lacks the ability to simulate analog components connected to digital circuits that are modeled using Hardware Descriptive Languages (HDLs), such as VHDL and Verilog HDL. Simulation of HDL models in PSpice A/D is necessary to verify mixed signal PCBs where programmable logic devices like Field Programmable Gate Arrays (FPGAs) and Complex Programmable Logic Devices (CPLDs) are connected to discrete analog components. More than 60% of the PCBs that are designed today contain at least one FPGA or CPLD. This paper investigates the possibility of simulating VHDL models in PSpice A/D and also coming future implemented solar cell on various sectors in the trainer kit . A new design methodology and the necessary tools to achieve this goal are presented. The new design methodology will help engineers verify a complete mixed signal design at the board level. This reduces design failures and hence increases reliability. It also reduces the overall time to market. A mixed signal design of softwares,Combinational circuits, analog circuits and Electronic Components are used in the DC motor where efficiency economy and performance are essential .this flexible ,inexpensive circuit eliminates costly PWM devices and complex floating upper rail drives, while delivering efficient motor control and Protection. The application is implemented by following the proposed design methodology.


Finite Element Simulation of Single Stage Deep Drawing Process for Determining Stress Distribution in Drawn Conical Component

 Shishir Anwekar, Abhishek Jain


To avoid the expensive and difficult experiments, modern manufacturing is based on the analysis of forming processes in numeral atmosphere before the actual production set-up. In the presented work , the single stage deep drawing process of thin walled, mild steel, conical back plate of radial impeller of blowers is approached by means of a finite element analysis. Simulation of the drawing process for determining stress distribution in the drawn component for a particular displacement is explained in the presented work. The distribution of stress in the drawn component is obtained. The study was conducted by using ANSYS12.0, in which, two models have been tested. Both models constructed solely out of axisymmetric, quad 4 node, PLANE 42 elements which have been used to simulate the drawing process of drawing quality mild steel IS2062 grade. The experimental analysis is carried out on two different flat plates having thickness 3 mm and 5 mm from which the conical back plate is manufactured. This study will be beneficial to the tool designer and the manufacturers doing work in this field

Keywords:Deep drawing , Finite element simulation, Forming, Manufacturing, Sheet metal, Tool designer,.

The Hardware Implementation of Devices Forming Discrete Signals with Multi-Level Correlation Function

  Alexey Smirnov


Algebraic approach to study the formation of large assemblies of discrete signals with multi -level correlation function, which is based on the section of circular orbits of group codes, is studied. The number and value of side -lobe levels of the correlation function of the generated sequences, and the power of the assembly signals are determined by remote and structural properties of polynomial rings over finite fields. Proposals for the hardware implementation of devices forming discrete sign als with multi-function correlation are developed.

Keywords:ensembles of digital signals, mult i-level correlation function

Avoidance of Bottleneck in PCS Network

  Sidhi Pandey, Alka, Pratima Singh,


This paper contains the concept of Personal Communication Service (PCS) network and schemes to avoid bottleneck in PCS network. One of the key issues in mobile communication is to find the current location of mobile terminal (MT) to deliver the services, which is called as location management. In this paper we will discuss various schemes for improving location management in PCS network and focus on surveying the location management mechanisms in PCS system.

Keywords:De-registration, hand-off, HLR/VLR, Location Management, Mobile terminal, MSC, PCS.

Exploring a Microcontroller Based Hearing Aid with an Output Level Indicator

  Aru Okereke Eze , Eng. Dr. Gozie Ihekweaba ,Ngwu Rosemary Chinyere


This research explores the design and implementation of a microcontroller based electronic Hearing aid with output level indicator. The incoming sound oscillates the base of a transistor which in turn amplifies the signal at the collector. The output is interfaced to an ADC which converts the signal to digital output. After the conversion, the microcontroller processes the signal and further feeds it in to the DAC for an analog conversion. This output is now fed into the audio level indicator, LM3915, to indicate the level of the audio signal at the ear phone.

Keywords:Microcontroller, Hearing Aid, Digital, Ear, Noise, Electronics.

Object-Oriented Full Function Point Analysis: An Empirical Validation

 Sheeba Praveen, ,Dr. Rizwan Beg


this research work focuses on validation work of my proposed work to determine the functional size of real time application at early stage. This paper will describe how to calculate the functional size of real time system using my proposed model that is Object Oriented Size Estimation Model for Real Time Application [1]. Here in this paper I am validating my proposed model with the help of Real Time System. I am taking Human Emotion detection which is real time software and applying OOFFPA on it. OOFFPA metrics of my proposed model will calculate the size in terms of Function Point of this HED software and after calculating the size I compare this size with the size which is calculated by other metrics. Comparisons will prove that OOFFP metrics of my proposed model is best for size measurement of real time system.


Parametric Analysis of Four Wheel Vehicle Using Adams/Car

   Jadav Chetan S., Patel Priyal R


Inspiring from the Multibody dynamics this paper has been carried out for estimating the dynamics of vehicle in motion. As there is more and more importance is given to the handling performance to the vehicle for its comfort, certain parameters like roll, yaw, pitch and, side slip angle etc., are to be studied, analyzed, controlled and adversely changed for increasing the overall performance and vehicle behavior. Here the focus is intended on the roll, pitch and yaw phenomena of the vehicle while changing the lane tack and its effects are simulated at different speeds. Results show certain variation and its effect. Hence this tool for multibody dynamics proves more and more efficient for such conditions.

Keywords:ADAMS/CAR, Lateral force, Multibody Dynamics, Pitch, Roll, Tire slip angle and, Yaw.

Study of Genetic Algorithm for Process Scheduling in Distributed Systems

  Usha Barad


This paper presents and evaluates a new method for process scheduling in distributed systems. The problem of process scheduling in distributed system is one of the important and challenging area of research in computer engineering. Scheduling in distributed operating system has an important role in overall system performance. Process scheduling in distributed system can be defined as allocating processes to processor so that total execution time will be minimized, utilization of processors will be maximized and load balancing will be maximized. Genetic algorithm is one of the widely used techniques for constrain optimization. The scheduling in distributed systems is known as an NP-complete problem even in the best conditions, and methods based on heuristic search have been proposed to obtain optimal and suboptimal solutions. In this, paper using the power of genetic algorithms. We solve this problem considering load balancing efficiently. We evaluate the performance and efficiency of the proposed algorithm using simulation result.

Keywords:Distributed system, scheduling, Genetic algorithm, load balancing

Parameter Optimization of Tube Hydroforming

  Edina Karabegović, Miran Brezočnik


Tube hydroforming is mostly applied in automotive industry. In this respect, necessity for the procedure improvement of fluid forming is constant. One of the reasons of its improvement is the procedure performance in optimal conditions. The process parameters have the direct influence on quality and optimal of forming procedure. This paper provides an example of the fluid pressure optimization in T-shape tube hydroforming. Three types of material have been analysed, with three wall thickness and three course levels of axial printers. For the optimization, the evolutional method with applied genetic algorithm (GA) was utilized. The application of GA is significant in solving of many problems in engineering practice. The simplicity and adaptability of the genetic algorithm to the engineering problem results with the increasing volume of applications in a research work. In this paper we investigated interactions of the internal parameters of the T tube hydroforming process, towards achieving the GA model for the optimal internal pressure, necessary for hydroforming.

Keywords:Hydroforming, tube, modelling, optimization, parameter,genetic algorithm, T-shape,

Development Of Embedded Ethernet Drivers For Arm9

  T.Satyanarayna, S.Latha(Associate Proffesor)


with the widely application of ARM technique, building the embedded operating system based on ARM processor has been a hot point of research. In this paper, the design of network device driver in Linux operating system based on ARM920T processor is implemented on the S3C2410- S development platform made in Beijing universal pioneering technology. Focused on discussing implementation principle of embedded Linux network drivers and detailed to analysis of the frame structure of the program code.

Keywords:ARM9 processor; embedded linux; network device driver; CS8900A

Temperature Control of Shell and Tube Heat Exchanger by Using Intelligent Controllers-Case Study

  Mr.P.Sivakumar, Dr.D.Prabhakaran ,Dr.T.Kannadasan


Temperature control of the shell and tube heat exchanger is characteristics of nonlinear, time varying and time lag. Since the temperature control with conventional PID controller cannot meet a wide range of precision te mperature control requirement, the temperature control system of the shell and tube heat exchanger by combining fuzzy and PID control methods was designed in this paper. The simulation and experiments are carried out; making a comparison with conventional PID control showing that fuzzy PID strategy can efficiently improve the performance of the shell and tube heat exchanger.

Keywords:Control algorithm, Fuzzy logic, PID Controller, Tuning

Performance Evaluation of Routing Protocols in MANETs under Wormhole Attack

  Pardeep Kaur, Deepak Aggarwal


Mobile Ad-Hoc Network is a group of wireless mobile nodes connected to each-other without any central administrator. Nodes can move from one place to another in the network or may leave or join the network at any time. Due to this the topology of the network changes rapidly. So the routing protocols are required that can adopt the frequent changes in the network topology. Due to the absence of central administrator the MANETs are vulnerable to attacks. In this paper comparison of reactive protocols i.e AODV and DYMO has been done under three types of wormhole attack. Performance is measured with metrics like Packet Delivery Ratio, Average End-to-End Delay, Throughput and Jitter by varying the number of nodes.

Keywords:AODV, DYMO, MANET, Wormhole

Fundamental Theorem Of Algebra A Study

  Dr Mushtaq Ahmad Shah


This paper is a study of the Fundamental Theorem of Algebra which states that every polynomial equation of degree n has exactly n zeroes. It gives a historical account of the theorem in different periods; by different mathemat icians it also includes the contribution of different countries. In addition to this I present different proofs of Fundamental Theorem of Algebra by using different techniques which is actually the main theme behind the paper.

Keywords:Polynomials, zeroes, analytic, bounded, constant, Maximum Modulus,

Promoting a culture of health and safety at work in cement plants

  Taleb Mounia, Chaib Rachid, Chetouani YahyiaI.


Safety is a priority of any industrial activity. It is a positive cultural element that allows other improvements in the factory. An administration that does not attain to manage safety is not in a position to manage other functions. However, as work accidents and occupational diseases have an enormous impact on the health of workers and considerable economic and social impacts. In addition, with the increasing complexity of industrial tissue and with the rapidity that the techniques develop in the big factories, risks assessment becomes a crucial and strategic answer to preserve workers health and safety on the one hand and to maintaining a qualified labour on the other hand. These are data, among others, that have triggered the alarm signal and impose the necessity of an increased safety in the factories. Therefore, a priori assessment of these risks and the implementation of a prevention approach within a factory is required to become one of the main drivers of progress. Hence, for some employers, employees and their representatives, health and safety at work do not mean so much. In addition, with the permanent evolution of work, even its risks, it becomes increasingly insufficient to establish general safety rules of, relying solely upon standards and regulations to comply [1], but move to awareness, information, training and motivation of staff on the role of health and safety at work, steps previously required for the implementation of a prevention, even to a mitigation measures relevant and effective. That allows to define a general policy of prevention and to bring to successful management of industrial risk within the entity. Hence, it has become essential to give all staff a real sense of safety that will predict and act in very affective way; objective of this work. This article presents a technique of analysis to better understand the dynamic of the policy in terms of health and safety at work established in the cement plants.

Keywords:health and safety at work, promote health, evaluation, accidents, prevention, sensitization.

Performance Evaluation of Energy Traffic In Ipv6 Networks

 Dharam Vir, S.K.Agarwal, S.A.Imam


In this paper, we present a study of energy traffic based simulative and analytical methods in IPv6 networks. This research examine to find out which MANET routing protocol performs better in the case of TCP/IP (Application and Physical layer) under congested IPv6 networks. We investigates & undertakes simulation based study of Ad-hoc routing protocols in wireless sensor Network. We compare the five MANET routing protocols AODV, DYMO, Olsrv2 Niigata, OLSR Inria and RIPng with varying network nodes and fixed random waypoint mobility model using QualNet 5.0.1 Simulator. The metrics used for performance evaluation in TCP/IP application layer are Throughput, Average Jitter, End-to End delay, Total packets received / efficiency. In addition, the energy traffic model in the physical layer we simulate Total energy consumed in transmit mode, Total energy consumed in received mode and Total energy consumed in ideal mode in Ipv6 networks. The simulation has been carried out using QualNet 5.0.1 which is scalable network simulator. Finally results obtained by scrutinized from different scenarios to provide qualitative evaluation of the protocols.

Keywords:AODV, DYMO, Energy Traffic, IPv6, Olsrv2 Niigata, OLSR Inria, RIPng , QualNet 5.0.1

Motion Blur Image Fusion Using Discrete Wavelate Transformation

 Er. Shabina Sayed


The methodology for implementing a image fusion system using deconvolution and discrete wavelate transformat ion is proposed in this papers. This project proposes a method to remove the motion blur present in the image taken from any cameras. The blurred image is restored using Blind de-convolution method with N=20 number of iterat ion and DWT using averaging, maximum likelihood and window based method.the comparision result of both the method prove that image restoration using dwt gives better result than image restoration using deconvolution.

Keywords:mult isensory system,pyramid transform,discrete wavelet transform,Motion blur,blind deconvolution,