IJCER Online Submission
IJCER Paper Submission Format
Publication Charges - IJCER

Frequency: 12 issues per year
ISSN: 2250–3005 (online version)
Published by: IJCER
Call for paper...

International Journal of ComputationalEngineeringResearch

(IJCER)

Volume 3, Issue 10, October, 2013

 
 
Version I
S.No. Article Title Page No. Paper Index PDF
1.

Development of A Powerful Signal Processing Approach Using Multi Resolution Analysis & Speech Denoising

N.V. Narendra Babu ,Prof.Dr.G.Manoj Someswar

Abstract

Speech denoising has been a long lasting problem in audio processing community. There exist lots of algorithms for denoising if the noise is stationary. For example, Wiener filter is suitable for additive Gaussian noise. However, if the noise is non-stationary, the classical denoising algorithms usually have poor performance because the statistical information of the non-stationary noise is difficult to estimate.

Keywords:Short-Time-Fourier-Transform, modulation domain, image compression, Lossy compression, Chroma subsampling, Discrete Wavelet Transform
01-10  
03.3005/0310101010
PDF
2.

THEMIS: A Mutually Verifiable Billing Transactions For Cloud Computing Environment

B.Harshini , M. Venkata Krishna Reddy

Abstract

With the widespread adoption of cloud computing, the ability to record and account for the usage of cloud resources in a credible and verifiable way has become critical for cloud service providers and users alike. The success of such a billing system depends on several factors: the billing transactions must have integrity and non-repudiation capabilities; the billing transactions must be non obstructive and have a minimal computation cost; and the service level agreement (SLA) monitoring should be provided in a trusted manner. Existing billing systems are limited in terms of security capabilities or computational overhead. In this paper, we propose a secure and non-obstructive billing system called THEMIS as a remedy for these limitations. The system uses a novel concept of a cloud notary authority for the supervision of billing. The cloud notary authority generates mutually verifiable binding information that can be used to resolve future disputes between a user and a cloud service provider in a computationally efficient way. Furthermore, to provide a forgery-resistive SLA monitoring mechanism, we devised a SLA monitoring module enhanced with a trusted platform module (TPM), called S-Mon. The performance evaluation confirms that the overall latency of THEMIS billing transactions (avg. 4.89 ms) is much shorter than the latency of public key infrastructure (PKI)-based billing transactions (avg. 82.51 ms), though THEMIS guarantees identical security features as a PKI. This work has been undertaken on a real cloud computing service called iCube Cloud

Keywords:Non-obstructive, Non-repudiation, Verification, pricing, Records, Resource allocation and Transaction processing.
11-14  
03.3005/03101011014
 
PDF
3.

Radio Spectrum Monitoring simulation and Design

Nabil Ali sharaf, Abdirasoul Jabar Alzubaidi

Abstract

With rapid development of communication industry, the kinds of communication service vary. According to the increasing use of radio waves, the intelligent and effective radio monitoring system needs to be developed, which is replaced for previous radio monitoring system. Next-Generation Intelligent Radio Monitoring System based on ITU-R, Rule of wireless facilities, and Radio Waves Act is used, and which can accurately and effectively function as effective radio monitoring system through spectrum analysis of channel power, frequency deviation, offset, and an occupied frequency bandwidth, about the analog and digital signal in On-Air of V/UHF bandwidth. In this paper, we proposes method of radio measurement and radio management through the radio quality measurement, unwanted electromagnetic signals(spurious, harmonic) measurement, high-speed spectrum measurement, frequency usage efficiency investigation, illegal radio exploration

Keywords:Radio spectrum, monitoring station, management, mobile communication, GSM, Digital radio receiver, simulation and design, licensing, assignment and billing

15-18  
03.3005/03101015018
PDF
4.

The Role of Processes Re-Engineering and Workflow In The Transformation Of E-Government

Faisal Mohammed Nafie, Samani A. Talab

Abstract

This paper aims to support the concept of workflow and the transition to e-government through a new technology by applied Arabdox for workflow system and design models electronic transfer operations from station to another (from one user to another) according to a high-security controls for users. Our case study is vacation request which various kinds in the National Pensions Fund (NPF) and use monitors and reports showing the path of the flow process and follow-up workflow .This process focuses in controlling the requests of vacations of the organization, from the initial request up to its approval or rejection.

Keywords: Arabdox,Workflow,E-government, BPR,WFMC,BPM,Reengineering.
19-25  
03.3005/03101019025
PDF
5.

Perturbation Technique and Differential Transform Method for Mixed Convection Flow on Heat and Mass Transfer with Chemical Reaction

J. Prathap Kumar, J.C. Umavathi

Abstract

A new analytical solution is introduced for the effect of chemical reaction on mixed convective heat and mass transfer in a vertical double passage channel. The vertical channel is divided into two passages (by means of a baffle) for two separate flow streams. Each stream has its own individual velocity, temperature and concentration fields. After placing the baffle the fluid is concentrated in one of the passage. Approximate analytical solutions are found for the coupled nonlinear ordinary differential equations using regular perturbation method (PM) and Differential Transform method (DTM). The validity of the Differential Transform series solutions are verified with the regular perturbation method. The velocity, temperature and concentration solutions are obtained and discussed for various physical parameters such as thermal Grashoff number, mass Grashoff number, Brinkman number and chemical reaction parameter at different positions of the baffle. It is found that the thermal Grashoff number, mass Grashoff number, Brinkman number enhances the flow whereas chemical reaction parameter reduces the flow at all baffle positions. It is also found that as Brinkman number increases the DTM and PM show more error.

Keywords:Baffle, first order chemical reaction, mixed convection, perturbation method, Differential Transform method.
26-44  
03.3005/03101026044
PDF
6.

XMPP A Perfect Protocol for the New Era of Volunteer Cloud Computing

Kamlesh Lakhwani , Ruchika Saini

Abstract

Volunteer Cloud Computing is based on the concept where highly distributed non-dedicated resources are harnessed to build a cloud so as to offer cloud services. By volunteer cloud computing, users and contributors can experience the impact of cloud computing by allowing users to share any type of services be it physical resources, software resources or applications. As volunteer clouds entities are allowed to communicate with each other and with other commercial clouds and clients also, it's necessary to implement an enhanced interoperable environment that can carry out effective communication between the communicating parties. This thesis contributes toward developing an enhanced interoperable environment where volunteer cloud entities are allowed to communicate with each other and also with other commercial clouds and clients via XMPP protocol (Extensible messaging and presence protocol). In this paper we propose an XMPP based messaging middleware architecture that can help in implementing such an environment

Keywords:cloud computing, commercial cloud, interoperability, middleware architecture, volunteer cloud, Service oriented architecture, security
45-52  
03.3005/03101045052
PDF
7.

Evaluation of Performance Measures of Bulk Arrival Queue With
Fuzzy Parameters Using Robust Ranking Technique

B.Palpandi ,G.Geetharamani

Abstract

This paper proposes a procedure to find the various performance measures in terms of crisp values for bulk arrival queuing systems with varying fuzzy batch sizes where the arrival rate, service rate and batch sizes are fuzzy numbers. Here the inter arrival time, service time and batch sizes are Trapezoidal as well as Triangular fuzzy numbers. The basic idea is to convert the fuzzy inter arrival rate, service rate and batch sizes into crisp values by applying Robust ranking technique. Then apply the crisp values in the classical queuing performance measure formulas. Ranking fuzzy numbers plays a vital role in decision making under fuzzy environment. This ranking technique is a very convenient method, simple to apply and can be used for all types of queuing problems. Illustrations are given to find the performance measures of the characteristics of bulk arrival queuing systems with varying fuzzy batch sizes

Keywords: Bulk arrival queues, Fuzzy ranking, fuzzy sets (normal and convex), Membership functions, Trapezoidal fuzzy number, Triangular fuzzy number
53-57  
03.3005/03101053057
PDF
8.

Development of Intensity-Duration-Frequency Relationships for Abha City in Saudi Arabia

Khalid K. Al-anazi, Dr.Ibrahim H. El-Sebaie

Abstract

Intensity-Duration-Frequency (IDF) relationship of rainfall amount is one of the most commonly used tools in water recourses engineering. The IDF relationships are used as an aid when designing drainage works for any engineering project, and allow the engineer to design safe and economical flood control measures. The main objective of this paper is to develop the rainfall intensity-duration-frequency relationships (IDF) curves and to derive a relationship between intensities and durations for a number of recurrence intervals through regression of generated IDF curves for Abha city in the Kingdom of Saudi Arabia. These curves have been generated from a 34-year recorded rainfall data for Abah region. Different frequency analysis techniques have been used to develop the relationship from rainfall data between the rainfall intensity, storm duration, and return periods from rainfall data for Abha region. These techniques are: Gumble, Log normal and Log Pearson Type III distribution. In order to do that, good record of the rainfall data was obtained for different durations. These methods were used to obtain the IDF curves for eight different durations (10, 20, 30, 60, 120, 180, 360, 720 mints) and six frequency periods (2, 5, 10, 25, 50, 100 years). It was shown that there were small differences between the results obtained from the three methods. Rainfall intensities obtained from three methods showed good agreement of the study area. Derived equations for calculating rainfall intensity for Abha region was obtained using three techniques based on the results obtained from IDF data. Estimation of the parameters of the IDF equations for different return periods was performed by using linear regression analysis. One of the goodness-of-fit tests (chi-square test) was used to choose the best statistical distribution among them.

58-65  
03.3005/03101058065
PDF
Version II
S.No. Article Title Page No. Paper Index PDF
1.

Framework for Data Mining In Healthcare Information System in Developing Countries: A Case of Tanzania

Salim Amour Diwani, Anael Sam

Abstract

Globally the healthcare sector is abundant with data and hence using data mining techniques in this area seems promising. Healthcare sector collects huge amounts of data on a daily basis. Transferring data into secure electronic system of medical health can save lives and reduce the cost of healthcare services as well as early discovery of contagious diseases with advanced collection of medical data. In this study we have proposed a best fit for data mining techniques in healthcare based on a case study. The proposed framework aims to provide self healthcare treatments where by several monitoring equipments using the cyberspace devices have been developed to help patients manage their medical conditions at home for example, diabetic patients can test their blood sugar level by using e-device, which ,with the click of a computer mouse, downloads the results to a healthcare practitioner, minimizes time to wait for medical treatments, and minimizes the delay time in providing medical treatments. Data mining is a new technology used in different types of sectors to improve the effectiveness and efficiency of business model as well as solving problems in business world.

Keywords:Healthcare, Data Mining, Knowledge Discovery, OLAP, NIMR, NGOs, DSS, KDD.
01-07  
03.3005/031020107
PDF
2.

Design and Implementation A Home Cnc Open Control System

Abdal-Razak Shehab, Mohammed Falah Yasir, 

Abstract

This paper presents a utilization of software KCAM4(Computer Aided Manufacture) based open architecture control system (OAC) as a computer numerical control (CNC) solution for the plotter suggested. The characteristics of the chosen OAC solution, and implementation details are briefly depicted. This work give us an ability to implementation of home CNC machine robust efficient and inexpensive (about 250 $) with multipurpose utilization output tools. The implemented machine is rugged and reliably work in all environment , the cost is very cheap comparing with that found in market, except that it has the ability of changing the output tools to make others skills like drilling and figuration.

Keywords:Open Control Systems, Enhanced Machine Control, KCAM4
08-12  
03.3005/0310208012
PDF
3.

Leaf Spring Analysis with Eyes Using FEA

B.Mahesh Babu , D.Muralidhar Yadav, N.Ramanaiah

Abstract

The objective of this present work is to estimate the deflection, stress and mode frequency induced in the leaf spring. The component chosen for analysis is a leaf spring which is an automotive component used to absorb vibrations induced during the motion of vehicle. It also acts as a structure to support vertical loading due to the weight of the vehicle and payload. Under operating conditions, the behaviour of the leaf spring complicated due to its clamping effects and interleaf contact, hence its analysis is essential to predict the displacement, mode frequency and stresses. The leaf spring, which we are analyzing, is a custom designed leaf spring with different eyes like viz., Berlin and upturned eyes with different materials at different sections. In analysis part the finite element of leaf spring is modelled. Appropriate boundary conditions, material properties and loads are applied selected as per intended performance. The resultant deformation, mode frequencies and stresses obtained are analyzed.

Keywords:ANSYS, Clamping effects, Leaf spring, Pro-E
13-17  
03.3005/03102013017
PDF
4.

SIRS Model For The Dynamics Of Non-Typhoidal Salmonella Epidemics

Ojaswita Chaturvedi, Shedden Masupe, Tiny Masupe

Abstract

A continuous mathematical model of salmonella diarrhea is introduced in this paper. According to the pathogenesis of salmonella, the model had been designed as an SIRS system comprising of a non-constant population. The disease-free state and the basic reproduction number (R0) have been computed for this system. In epidemics, there are always two cases: R0 < 1 (disease-free state) and R0 > 1 (epidemic existing state). Simulations of the system have been presented for both these cases which show the variations of the population in different situations. Data that has been used for examples and simulations is based on the demographics and disease outbreaks in Botswana

Keywords:Salmonella, Salmonellosis, Diarrhea, Mathematical Modeling, Epidemics, Epidemic Modeling, Basic Reproduction Number
18-26  
03.3005/03102018026
PDF
5.

Cloud Computing Along Web-Os" (How Webos Uses the Concept of Cloudcomputing in Data Storage)

D.Bala Krishna , ,R.A.Melvin Meshach

Abstract

With the increasing use of high-speed Internet technologies during the past few years, the concept of cloud computing has become more popular. Especially in this economy, cloud services can provide speed, efficiencies and cost savings. In cloud computing, users work with Web-based, rather than local, storage and software. These applications are accessible via a browser and look and act like desktop programs. With this approach, users can work with their applications from multiple computers. In addition, organizations can more easily control corporate data and reduce malware infections. Now, a growing number of organizations are adding to the cloud concept by releasing commercial and open source Web-based operating systems. This paper deals with how Web OS uses cloud computing concept. The Web OS goes beyond basic desktop functionality. It also includes many of a traditional OS's capabilities, including a file system, file management, and productivity and communications applications. In the case with Web-based applications, the Web OS functions across platforms from any device with Internet access. The Web OSs that run on the browser are platform-independent, since browsers are built to work across different operating systems. As users become more comfortable working over the Web, the Web OS could become more popular

27-30  
03.3005/03102027030
PDF
6.

Wide Band W-Shaped Microstrip Patch Antenna With Inverted U-Slotted Ground Plane For Wireless Applications

M. V. Annapurna, Ch. Vijay Sekhar Babu

Abstract

In this paper, a Wide Band antenna with W-shaped patch prototyped on FR4 Substrate is proposed and analyzed. The antenna is fed by co-axial probe with an impedance matching of 50 ohms. A parametric study is performed by varying the feed location and the variations in Return Loss are observed. The simulation results of the parameters like VSWR, Return loss, Radiation pattern etc., satisfied the theoretical conditions. An Impedance Bandwidth if 24.5% (9.55 GHz - 12.18 GHz) is obtained with a ground plane having multiple inverted U-shaped slots. The model is analyzed using Finite Element Method based Ansoft High Frequency Structure Simulator v.13.

Keywords:Co-axial feed, Impedance Bandwidth, Wide Band and VSWR
31-38  
03.3005/03102031038
PDF
7.

Enhancement of Sharpness and Contrast Using Adaptive Parameters

Allabaksh Shaik , ,Nandyala Ramanjulu

Abstract

In the applications like medical radiography enhancing movie features and observing the planets it is necessary to enhance the contrast and sharpness of an image. We propose a generalized unsharp masking algorithm using the exploratory data model as a unified framework. The proposed algorithm is designed to address three issues:1) simultaneously enhancing contrast and sharpness by means of individual treatment of the model component and the residual,2)reducing the halo effect by means of an edge-preserving filter, and 3)solving the out of range problem by means of log ratio and tangent operations. We present a new system called the tangent system which is based upon a specific bregman divergence. Experimental results show that the proposed algorithm is able to significantly improve the contrast and sharpness of an image. Using this algorithm user can adjust the two parameters the contrast and sharpness to have desired output.

Keywords:Bregman divergence, exploratory data model, generalized linear system, image enhancement, unsharp masking.
39-46  
03.3005/03102039046
PDF
8.

Modelling the rip current flow on a quadratic beach profile

 Dr. Evans F. Osaisai

Abstract

In this paper we develop an analytical theory for the interaction between waves and currents induced by breaking waves on time-scales longer than the individual waves. We employed the wave-averaging procedure that is commonly used in the literature. The near-shore zone is often characterized by the presence of breaking waves. Hence we develop equations to be used outside the surf zone, based on small-amplitude wave theory, and another set of equations to be used inside the surf zone, based on an empirical representation of breaking waves. Suitable matching conditions are applied at the boundary between the offshore shoaling zone and the near-shore surf zone. Essentially we derive a model for the interaction between waves and currents. Both sets of equation are obtained by averaging the basic equations over the wave phase. Thus the analytical solution constructed is a free vortex defined in both shoaling and surf zones. The surf zone solution is perturbed by a longshore component of the current. Thus the presence of the rip current cell combined with the longshore modulation in the wave forcing can drive longshore currents along the beach. The outcome, for our set of typical beach profile, is a description of rip currents.

Keywords:Wave-current interactions, surf zone, shoaling zone, matching conditions, wave-averaging, rip currents, radiation stress
47-62  
03.3005/03102047062
PDF
Version III
S.No. Article Title Page No. Paper Index PDF
1.

KVL Algorithm: Improved Security & PSNR for Hiding Image In Image Using Steganography

Kamlesh Lakhwani, Kiran Kumari

Abstract

The captivating increase in internet communication in the last few era, guide the necessity of the secure communication of data between two or more remote receivers. Mainly security troubles a lot during transmission of images and videos over internet communication. The methods or technique for secure real time image transmission, in this technique cover (dummy) image will be used as a carrier of secret (main/original) image will be hiding inside the cover image using LSB algorithm. In addition to this a key will be generated with help of Triple DES algorithm using to hide secret image inside the cover image. Secret image is encrypted using the key and then inserted into the cover image. The key is same at the receiver side to release the hidden image inside the cover image.

Keywords:LSB, DES, RLE, Image Steganography, Secret key, Cover Image, Secret Image
01-06  
03.3005/031030106
PDF
2.

Digital Video Watermarking Using Dwt and Pca

Supriya A. Patil , Prof. Navin Srivastava

Abstract

Due to the extensive use of digital media applications, copyright protection and multimedia security has gained tremendous importance. Digital Watermarking may be a technology used for the copyright protection of digital applications. During this paper, a comprehensive approach for watermarking digital video is introduced, and a hybrid digital video watermarking scheme based on Discrete Wavelet Transform (DWT) and Principal Component Analysis (PCA). PCA helps in reducing correlation among the wavelet coefficients obtained from wavelet decomposition of each video frame thereby dispersing the watermark bits into the uncorrelated coefficients. The video frames are first decompose using DWT and also the binary watermark is embedded in the principal components of the low frequency wavelet coefficients. An imperceptible high bit rate watermark embedded is robust against various attacks that will be carried out on the watermarked video, like filtering, geometric attacks and contrast adjustment.

Keywords:BinaryWatermark.; Digital Video, Principal Component Analysis, Discrete Wavelet Transform , Inverse DWT , Inverse PCA
07-10  
03.3005/0310307010
PDF
3.

A Novel Fault Recovery Scheme for Motion Analysis Testing Applications

 S.Vasanth Vigneshwaran, R.S.Venkatesan

Abstract

This paper develops a novel Fault Recovery(FR) architecture for Motion Analysis Computing Arrays (MACA). Any single fault in each Processing Element (PE) in an MACA can be effectively detected and corrected using the concept of Dual-Remnant codes i.e., Remnant and Proportionate (RP) code. A Good Example is the H.264 video compression standard, also known as MPEG-4 Advanced Video Coding application. It uses a context-based adaptive method to speed up the multiple reference frames Motion Analysis by avoiding unnecessary reference frames computation. A large PE array accelerates the computation speed especially in High Resolution devices such as HDTV(High Definition Television).The Visual Quality and Peak Signal-to-Noise Ratio (PSNR) at a given bit rate are influenced if a fault occurred in MA process

Keywords:Motion Analysis, Fault Recovery, Remnant and Proportionate Code, Processing lement
11-19  
03.3005/03103011019
PDF
4.

Materialized Optimization of Connecting Rod for Four Stroke Single Cylinder Engine

 Marthanapalli HariPriya, K.Manohar Reddy

Abstract

Connecting rods for automotive applications are typically manufactured by forging from either wrought steel or powdered metal. They could also be cast. An optimization study was performed on a steel forged connecting rod with a consideration for improvement in weight and production cost. For this optimization problem, the weight of the connecting rod has little influence on the cost of the final component. Change in the material, resulting in a significant reduction in machining cost, was the key factor in cost reduction. This study has two aspects. The first aspect was to investigate and to compare fatigue strength of steel forged connecting rods with that of the powder forged connecting rods. The second aspect was to optimize the weight and manufacturing cost of the steel forged connecting rod. Constraints of fatigue strength, static strength, reducing inertia loads, reducing engine weight , improvised engine performance, fuel economy were also imposed. The fatigue strength was the most significant factor in the optimization of the connecting rod.

Keywords:PM Connecting rod, fatigue behavior, forged steel.
20-24  
03.3005/03103020024
PDF
5.

Acoustic Ear Scanning With Fingerprint Technology

 S. Niveda , K. Dhavamani

Abstract

We often hear about the theft of our valuable devices. Day-by-day it is increasing too. So, in order to control the theft of electronic devices such as iPod, smart phones, scientists have introduced a new technology called "acoustic ear scanning technology" for their security. The predecessor for this technology is fingerprint scanning, face recognition, etc., but these all have a common disadvantage. And to overcome that disadvantage, we have introduced finger print scanning along with it in our paper.

Keywords:iPod, smart phones, earphone, biometric template.
25-29  
03.3005/03103025029
PDF
6.

Novel Design of A 4:1 Multiplexer Circuit Using Reversible Logic

Vandana Shukla, O. P. Singh, G. R. Mishra, R. K. Tiwari 

Abstract

Area of reversible logic is attracting much attention of researchers nowadays. Reversible logic concept of digital circuit designing is gaining wide scope in the area of nanotechnology, quantum computing, signal processing, optical computing etc due to its ability to design low power loss digital circuits. This paper presents an optimized multiplexer circuit based on reversible logic using various available basic reversible gates. Optimization of the multiplexer circuit is achieved on the basis of total number of gates used in the circuit and total number of outputs generated. These circuits are useful for further circuit designing with low power loss.

Keywords:Reversible circuit design, Basic reversible gates, Multiplexer circuit.
30-35  
03.3005/03103030035
PDF
7.

3-Phase Ac Motor Monitoring and Parameter Calculation Using Labview and Daq

Dr. K.Ravichandrudu, P.Suman Pramod Kumar,YN.Vijay Kumar, C.Praveen

Abstract

3-phase AC motor monitoring and parameter calculation using lab VIEW is the project which makes use of lab VIEW to monitor and control operation of the electrical machine. The real time variables of electrical machine are measured and given to lab VIEW through DAQ. Lab VIEW allows us to program as per our requirements. We continuously observe the operating voltage and current of the motor and trip the circuit if the motor exceeds a safe value. A comparison has been made such that the voitage or current above safe value would turn on an LED emitting red light. When the light glows, a digital signal of 5V is generated at the selected line on DAQ. This 5V is drawn into the relay arrangement, which is used to energized itself and trip the contact, hence isolating the machine from the main supply.s A Data Acquisition Card (DAQ) is used to perform the core of the control action by switching on the relay. The DAQ, USB 6009 is selected for this project. In order to provide precise input voltages to the DAQ, such that change in each volt of voltage or amp of current is observable; the current is read to the DAQ through current sensor. A suitable logic using is written into the DAQ in the Lab VIEW. Observing the voltages that are obtained from the step down transformer the relay is operated. When the voltage or current exceeds its operating range the relay is operated

Keywords:3-Ph Motor, LabView, DAQ, Voltage, Current
36-48  
03.3005/03103036048
PDF
8.

Impulse Noise Suppression and Edge Preservation of Digital Images Using Image Fusion

Geeta Hanji, M.V. Latte, Shilpa T

Abstract

Noise Suppression from images is one of the most important concerns in digital image processing. Impulsive noise is one such noise, which may corrupt images during their acquisition, transmission or storage etc. A variety of techniques are proposed to suppress the impulse noise effectively, but the important and minute details of the image such as lines, edges etc are not preserved to the desirable extent. To meet the conflicting requirements of noise suppression with edge preservation, the concept of image fusion of filtered noisy images for impulse noise suppression has been considered in our work. Image fusion is the process of combining two or more images into a single image while retaining the important features of the image and is widely used in military, remote sensing and medical applications. In our work five different filtering algorithms are used individually for filtering the noisy images. Then the filtered images are fused to obtain a high quality image compared to individually filtered images. Simulation results on a diverse set of images and the comparisons show that our work is more robust and effective than many other well-known median filtering based algorithms and combines simplicity, good filtering quality with edge preservation

Keywords:Salt and Pepper noise, noise suppression, image fusion, SNR, edge preservation
49-54  
03.3005/03103049054
PDF
9.

Effect of Angle Ply Orientation On Tensile Properties Of Bi Directional Woven Fabric Glass Epoxy Composite Laminate

 K.Vasantha Kumar  , Dr.P.Ram Reddy , Dr.D.V.Ravi Shankar

Abstract

This work investigates that the effects of angle ply orientation on tensile properties of a woven fabric bi-directional composite laminate experimentally. Laminated Composite materials have characteristics of high modulus/weight [1] and strength/weight ratios, excellent fatigue properties, and non-corroding behaviour. These advantages encourage the extensive application of composite materials, for example, in wind turbine blades, boat hulls, automobiles, water tanks, roofing, pipes and cladding. and aerospace. The understanding of the mechanical behaviour of composite materials is essential for their design and application. Although composite materials are often heterogeneous, they are presumed homogeneous from the viewpoint of macro mechanics and only the averaged apparent mechanical properties [2] are considered. For a transversely isotropic composite material, five elastic constants are necessary to describe the linear stress-strain relationship. If the geometry of the material could be considered as two-dimensional, four independent constants are necessary due to the assumption about the out-of-plane shear modulus or Poisson's ratio. The most common method to determine these constants is static testing. For composite materials, ten types of specimens with different stacking sequences, [3] i.e., (±00, ±100, ±300, ±400, ±450, ±550, ±650, ± 750, and ±900) are fabricated. In this work, specimens are prepared in the laboratory using compression mould technique with bi-woven epoxy glass as fiber & with epoxy resin as an adhesive. The specimens are prepared for testing as per ASTM standards to estimate the tensile properties.

Keywords:compression moulding, E-glass, Epoxy, Degree of orientation, Resin, stacking sequence, tensile property,
55-61  
03.3005/03103055061
PDF