IJAIR- Volume 3 Issue 9 (September 2014)


Sr/No/ Title Pdf
1 Automated vulnerability detection and prevention reporting of php-based web applications using PVRS and comparison between PVRS & RIPS
Santosh Naidu, Subba Raju KV

Abstract —Most of the web servers support some sort of scripting environment today to deploy dynamic web applications. PHP is a general-purpose server-side scripting language for creating dynamic webpages. Most people learn PHP syntax quite quickly and within short period of time they were able to write a script that works using mainly through online tutorials, references and books. The major problem is that most of the people forget the security aspect of PHP that one must consider while writing PHP based applications. Also mentioned are the common programming mistakes done by developers when building PHP web applications and necessary means to protect against such vulnerabilities. Presented are the most common PHP web application vulnerabilities and the necessary mechanisms required to compose secure code by leveraging PHP’s unique features. So the paper here finally discusses about the tool PVRS which was specially developed for vulnerability detection of php-based web applications and also discusses in brief about the vulnerabilities that are mentioned in the tool and finally compares PVRS tool analysis results with the existing tool RIPS.

2 Deadline Perception with Enhanced Dynamic Multilevel Priority Scheduling Scheme for Wireless Sensor Networks
Amulya P, Subba Raju KV

Abstract—The swift towards wireless sensor networks has motivated extensive research endeavours that target to reduce energy consumptions and end-to-end transmission delays. One such thread that aims to achieve is the packet scheduling algorithm. The multilevel priority packet scheduling schemes that target to reduce transmission delays, schedule data packets in a multilevel queue based on type of packet and in turn packets are scheduled within each level of queue based on shortest job first (SJF) and First Come First Serve (FCFS) to break the tie. The real difficulty with SJF algorithm lies in determining the processing time of next task. And FCFS increases transmission delays. To overcome the problems in the internal scheduling in multilevel queues in multilevel priority packet scheduling, we propose Deadline Perception with Enhanced Dynamic Multilevel Priority (DP-EDMP) packet scheduling. In the proposed scheme, data packets are first scheduled using type of packet among multiple levels of queue and then within each level of queue they are scheduled using Earliest Deadline First (EDF), thereby reducing average packet waiting time and end-to-end delay. Secondly, we remove the packets with expired deadlines from the medium which reduces data processing overhead and also saves energy consumptions of the sensor nodes. This facet is achieved by programming the sensor nodes to be intelligent enough to sense packets with expired deadlines.

3 To Study the Anticancer and Apoptotic Activity of Mentha arvensis. Linn in ROS Induced Buccal cells
Syama. M. Suresh, Dr. S. N. Suresh, Bindu Jacob, Sagadevan. P and Rathish Kumar. S

Abstract—The anticancer activity tested has shown notable activity against the cell lines. The present study confirms that the plant will be a potential source of medicine in future and extensive study is required for the discovery of new drugs on the active biological molecules. The methanolic leaf extract Mentha arvensis has shown significant cytoprotective activity too. The cell treated with H2O2 has a reduced viability than the methonolic leaf extract treated cells. In H2O2 treated cells the cytotoxicity was more than 70% i.e. only 34.76 % is viable and the cells treated with the methanolic leaf extract of M. arvensis has shown viability up to 54.23 %. It can be observed that addition of hydrogen peroxide produced approximately 79.3 % increase in DNA fragmentation which can be attributed to the DNA lesions formed by breaking phosphodiester bond in intact chromosomes by OH radicals. The plant extracts produced 63.7% decrease in DNA fragmentation indices suggesting potent cytoprotective effect against deleterious effects of hydrogen peroxide.

4 Analysis And Comparison Of CMOS Decoder Using 0.12μm Technology
Devesh Kishore, Dr Madhuri Asati, Aastha Hajari

Abstract— In present scenario of embedded system, size, speed and cost maters a lot. A decoder is an integral part of integrated circuit. In almost all the logic circuit we use decoders to decrease the number of input without affecting the number of output. In memories such as SRAM and DRAM, access of the memory cell is done using logic of decoders the ever increasing demand for larger data storage capacity and its access time is also an important issue for high speed and smaller size for design of decoder. We have design and compared the different design of decoder for better speed and cost effectiveness. The complete implementation and verification is done on the Tanner tool, Schematic of the decoder is designed on the S-Edit and net list simulation done by using T-spice and waveforms are analyzed through the W-edit. The circuit is characterized by using the 0.12μm technology which is having supply voltage 0f 1.2volt

5 Wireless Boat for Rescue Operation
Mr.vikas.D.Patil, Mr.Vinay.S.Mandlik, Mr.Veeresh.P.M

Abstract-Day by day, we9 are facing the some unwanted changes in environment, like irregularity in seasons, irregularity in rain. This is again resulting in cyclones, tsunami, and etc. Sometimes due to some environmental conditions irregular rainy season occurs & sometimes it rains cats and dogs but sometimes it rains very less. When over raining occurs, it again results in heavy flooding. Many people get trapped in flooding and government arrange some protecting programs to save the trapped people. This boat has to go where people have caught and save them. Using DTMF technology we derived the boat, give direction to the boat, the boat is controlled by user mobile phone that makes a call to a mobile placed in the boat.

6 Experimental verification of flow through convergent nozzle using CFD simulation
R Jayakumar, Harish H.V, Nishant Desai, Srikanth H V4 ,Santhosh N

Abstract -Nozzle is a device where pressure energy is converted to kinetic energy. In this paper, the aim is to analyse the behaviour of flow parameters through a convergent nozzle. The variation of pressure and velocity distribution profile inside the nozzle is experimentally obtained for exit velocities. The result obtained from experimental setup is validated through CFD simulation. For CFD simulation, ICEM-CFD was used for modelling & meshing, CFX-13 for solving and CFD POST for plotting the results.

7 Performance and Comparison of Native Bays Classification in WEKA Environment
Richa, Saurabh Mittal

Abstract-In our days, electronics attacks can cause a very destructive damage for nations which make necessary the use of completed security policy to minimize the potential threats. Intrusion Detection System (IDS) is becoming a vital This research proposed IDS by integrated signature based (Snort) with anomaly based (Naive Bayes) to enhance system security to identify attacks. This research used Knowledge Discovery Data Mining (KDD) CUP 20 Percent dataset and Waikato Environment for Knowledge Analysis (WEKA) program for testing the proposed hybrid IDS. Accuracy, finding rate, time to build model and false alarm rate were used as parameters to evaluate performance with Naïve Bayes, Snort by way of J48graft and Snort with Bayes Net. The result shows good presentation of using Naive Bayes algorithm.

8 Development of synthetic seed and its evaluation under controlled conditions
Neetu Choursiya, Ravinder Singh, Pushpender Singh, Sujeet Kumar Singh

Abstract-The artificial seed technology provides an alternative method of micro-propagation for a wide range of medicinal plants, especially desirable elite genotypes. In the present study Rose (Rosa indica), Boganvalia (Bougainvillea glabra) and Sweet neem (Murraya koenigii) nodal part (2-5mm) were collected for the callus induction. The callus was encapsulated in 4% sodium alginate using MS media. The culture condition of the MS media was optimized at different pH to study the germination of artificial seed. The germination of artificial seed was found to be best at pH 6.6. The in vitro encapsulated nodal segments technology facilitates conservation of genetic diversity.

9 A Survey on Recommendation system in Big Data environment
M.Nandakumari, K.Boobalsingh

Abstract-As the number of data sets increasing larger, the scalability and efficiency problems increases in fields like commerce and business, society administration, scientific researches. Recommendation system is one of the application being affected in the problem as scalability and efficiency. From the survey, Collaborative Filtering is one of the most frequently used filtering technique for recommendation system which can be implemented on a cloud computing tool named Hadoop, a widely-adopted distributed computing platform using the MapReduce parallel processing.

10 A New Approach Of Fault Current Mitigation By Using Dynamic Voltage Restorer
D.V.Srinivasarao, P.D.V.S.K Kishore

Abstract─This paper introduces and evaluates an auxiliary con-trol strategy for downstream fault current interruption in a radial distribution line by means of a dynamic voltage restorer (DVR). The proposed controller supplements the voltage-sag compensation control of the DVR. It does not require phase- locked loop and independently controls the magnitude and phase angle of the injected voltage for each phase. Fast least error squares digital filters are used to estimate the magnitude and phase of the measured voltages and effectively reduce the impacts of noise, harmonics, and disturbances on the estimated phasor parameters, and this enables effective fault current interrupting even under arcing fault conditions. The results of the simulation studies performed in the PSCAD/EMTDC software environment indicate that the proposed control scheme: 1) can limit the fault current to less than the nominal load current and restore the point of common coupling voltage within 10 ms; 2) can interrupt the fault current in less than two cycles; 3) limits the dc-link voltage rise and, thus, has no restrictions on the duration of fault current interruption; 4) performs satisfactorily even under arcing fault conditions; and 5) can interrupt the fault current under low dc-link voltage conditions.

11 Regulation of rfg1 (Repressor of Filamentous Growth) Gene Expression Candida albicans Treated with Andrographis paniculata (Nees)
A.R. Revathy Rajan, S. N. Suresh, P. Sagadevan.P. and S. Rathishkumar

Abstract - The phytochemical screening of methanolic leaf extract of Andrographis paniculata was tested for the presence of secondary metabolites such as Alkaloids, Terpenoids, Tannins, Saponins, Flavanoids and Steroids. The chemical constituents present in the methanolic leaf extract of A. paniculata was analyzed by GC-MS and the compounds were identified based on comparison of their retention indices (RI), retention time (RT) and mass spectra. Antifungal effect of the methanolic leaf extract of A. paniculata showed inhibitory effects against human pathogen, Candida albicans. This may be due to the presence of effective biochemical compound present in A. paniculata. The gene expression studies showed decreased level of Rfg1 gene expression in C. albicans upon treatment with methanolic leaf extracts of Andrographis paniculata. The Rfg1 gene was monitored after 48 hours treatment. The Rfg1 gene was re- expressed that shows the organism might have adapted to the environment and created the ability to defend the mode of action of the methanolic extract.

12 Transient Thermal Analysis Of A Diesel Engine Exhaust Valve
V Ramakrishna Reddy, R.Nava Sai Divya

Abstract-The valves used in the IC engines are of three types, Poppet or mushroom valve, Sleeve valve and Rotary valve. Of these three types, Poppet valve is most commonly used. Since both the inlet and exhaust valves are subjected to high temperatures of 1930°C to 2200°C during the power stroke, it is necessary that the materials of the valves should withstand these temperatures. The temperature at the inlet valve is less compared to exhaust valve. Thus the inlet valve is generally made of nickel chromium alloy steel and exhaust valve is made of silchrome steel. The aim of the project is to design an exhaust valve for a four wheeler diesel engine using theoretical calculations and 3D modelling is done in PRO-ENGINEER. Thermal analysis is to be done on the exhaust valve and analysis is done in ANSYS. Analysis will be conducted when the steady state condition is attained. Steady state condition is attained at 5000 cycles at the time of when valve is closed is 127.651 sec and valve is opened 127.659 sec. The material used for exhaust valve is EN52 steel. We are doing material optimization by doing analysis on material EN52. Static Modal analysis is also done on the exhaust valve to determine mode shapes of the valve for number of modes.

13 Electrical Vehicle With Reduced Voltage Induction Motor Drive Using MLI
Yarlagadda.Santha Kumari. D. Pomya

Abstract— This paper presents the design, analysis and implementation of a proposed combined three phase induction motor and its drive system to meet the demand of low-voltage electrical system for hybrid and electric cars, avoiding the high voltage human risks, expensive and complex requirements of the higher voltage insulation and power electronic devices. Development of Electric Vehicles (EVs) and Hybrid Electric Vehicles (HEVs) will offer many new opportunities and challenges to the power electronics industry, especially in the development of the main traction motor drive.Cascade H-bridge (CHB) multilevel inverter with minimum output harmonics for electric/hybrid electric vehicle applications is proposed in this paper. Switching angles of switch devices are determined by selective harmonic elimination technique. So, the effect of low order harmonics are reduced, as a result the efficiency of system has improved. Moreover, the number of DC voltage sources that used in the proposed inverter is less than conventional multilevel inverters that leads to reduce the inverter costs A conventional 220V 3-ph induction motor has been rewound in order to get the required 48V 3-ph motor. The simulation results are obtained using MATLAB/SIMULINK software.

14 Compare And Analysis Of Piston Ring In A Composition Of Al-Sic With Grey C.I Using Ansys
Sabareesan S, Prakash Kanna G

Abstract— In this work an attempt has been made to increase the reliability of piston using Al-Sic composites as an alternative material for the piston compression rings. The piston ring is one of the main components of an internal combustion engine. Its main purposes are to seal the combustion chamber of the engine. Elastic finite element models are used to calculate the stresses of piston ring. Try to change the piston ring material to reduce the wear, increasing the life time of the piston ring. Aluminium matrix composites are finding increased application in Automotive, Aircraft and Aerospace industries and hold the greatest promise for the future growth. The finite element analysis of the Al- Sic composite piston compression ring was done using Ansys software. The temperature, principal stress and principal strain distribution over the entire surface of the piston compression ring were obtained. The stresses were found to be well below the allowable stress for the Al-Sic composites.

15 A new Fuel Cell converter topology For Bidirectional Power Flow between the Electric Vehicle and DC or AC Grid
Sandhya.P, D.Pomya

Abstract— Electric vehicles (EVs) are needed in densely populated urban areas to reduce air pollution. Battery chargers are needed to supply dc voltage to charge the high-energy battery packs used in EVs. This paper presents a fuel cell powered integrated traction machine and converter topology that has bidirectional power flow capability between an electric vehicle and the dc or ac supply or grid. These operations are in addition to the vehicle traction mode of operation Desired features for EV battery chargers such as minimum volume, low cost, high efficiency, and high reliability are fully matched by means of the proposed solution. The concept has been analyzed with finite-element- coupled simulation with dynamic analysis software. The interleaving technique has been used with the inductors to share the current and reduce the converter switching stresses.

16 A Survey of Lowering the Error Floor of LDPC Codes Using Multi-Step Quantization
A.Sakira Parveen

Abstract—A multi-step scheme is proposed for the input quantization of message-passing decoders for low-density parity-check (LDPC) codes. The proposed scheme, which is applicable to both regular and irregular codes, lowers the error floor significantly at the cost of small increase in complexity, memory and latency.

17 A Survey of Low Voltage in a Circuit Using LDO Regulator

Abstract-A low-voltage low-dropout (LDO) regulator that converts an input of 1 V to an output of 0.85–0.5 V, with 90-nm CMOS technology is proposed. A simple symmetric operational transconductance amplifier is used as the error amplifier (EA), with a current splitting technique adopted to boost the gain. This also enhances the closed-loop bandwidth of the LDO regulator. In the rail-to-rail output stage of the EA, a power noise cancellation mechanism is formed, minimizing the size of the power MOS transistor. Furthermore, a fast responding transient accelerator is designed through the reuse of parts of the EA. These advantages allow the proposed LDO regulator to operate over a wide range of operating conditions while achieving 99.94% current efficiency, a 28-mV output variation for a 0–100 mA load transient, and a power supply rejection of roughly 50 dB over 0–100 kHz.

18 Analysis of Cyber-Physical System using FPGA-Based Plant-on-Chip Platform

Abstract— Digital control systems are traditionally designed independent of their implementation platform, assuming constant sensor sampling rates and processor response times. Applica-tions are deployed to processors that are shared amongst control and noncontrol tasks, to maximize resource utilization. This potentially overlooks that computing mechanisms meant for improving average CPU usage, such as cache, interrupts, and task management through schedulers, contribute to nondeterministic interference between tasks. This response time jitter can result in reduced system stability, motivating further study by both the controls and computing communities to maximize CPU utilization, while maintaining physical system stability needs. In this letter, we describe an field-programmable gate array (FPGA)- based embedded software platform coupled with a hardware plant emulator (as opposed to purely software-based simulations or hardware-in-the-loop setups) that forms a basis for safe and accu-rate analysis of cyber- physical systems. We model and analyze an inverted pendulum to demonstrate that our setup can provide a significantly more accurate representation of a real system.

19 Design And Implementation Of Intelligent Household Led Lighting Systemfor Energy Efficiency
P.G Akila

Abstract-Reducing energy consumption and saving energy in wireless communications has attracted increasing attention recently. Electric appliances consume electricity when they are in standby mode and sometimes even in off-mode. Particularly, a light accounts for a great part of the total energy consumption. Due to architectural limitations, the existing light control system cannot be successfully applied to home and office buildings. Therefore, this paper proposes an intelligent household LED lighting system considering energy efficiency by utilizing multi sensors to control LED light using wireless communication technology.

20 On Eccentric Connectivity Index Of Subdivision-Related Graphs
A. Jayenthi, A. Kulandai therese

Abstract- The eccentric connectivity index based on degree and eccentricity of the vertices of a graph is a widely used graph invariant in mathematics. In this paper we present the explicit generalized expression for the eccentric connectivity index of the subdivision-related graph of some special graphs.

21 Design And Analysis Of An Easily Controlled Walking Robot Leg Mechanism
Koduru Sudhakar, R. Nava Sai Divya, P. Sudheer Rao

Abstract-In this paper, numerous walking and controlling machines and robots have been convened, designed and built in the last fifteen years to open new fields of application. Compared to wheeled vehicles walking machines show the advantage that they can act in highly unstructured terrain without having prepared this terrain in advance by streets or rails. In legged robots cross obstacles more easily; depend less on the surface conditions and quality and, in general, exhibit better adaptability. In this paper a numerical and experimental analyses of a pantograph-leg are presented. In particular, a suitable model of the sample leg has been analyzed and Kinematics and Dynamics have been solved. A parametric study has been also carried out in order to investigate the influence of some basic design parameters on its motion capabilities.

22 The Different Black Hole Detection Mechanism In MANET
Sahil Sharma, Rupinder Kaur Gurm

Abstract-A mobile Ad-Hoc network provide a survey of various security mechanism that has been proposed in Dynamic Source Routing(DSR) protocol against black hole attack which contain malicious nodes which replies the route request in the form of fresh route to the destination and then it drops all the receiving packets. In this paper, the proposed solution provide a secure route between the source and destination by identifying both single and cooperative black hole. The paper focus on network layer packet dropping attack like black hole/grey hole attack in DSR based manet.

23 A Review of ZigBee-UMTS Hybrid Networks

Abstract-A ZigBee Network is a low-cost and low-power wireless network based on the IEEE 802.15.4 standard, which allows wireless connectivity with limited power and relaxed throughput requirements. On the other hand, the Universal Mo-bile Telecommunications System (UMTS) is a third-generation cellular network that provides high-speed wireless traffic transfer to the Internet. This paper presents the design and implemen-tation of a novel integrated ZigBee and UMTS hybrid network in the Network Simulator (ns-2). In this hybrid network, we design a new Mobile Gateway to interconnect these two different sub-networks. With the hierarchical addressing and some special UMTS network discovering mechanisms, routing in the hybrid network, from the ZigBee network via the UMTS network to the wired network, is achieved. We also design a simulation platform to make it easier for protocol designers to design and evaluate new protocols in such a hybrid network.

24 Novel Color and Texture Features Based on Image Retrieval by Using Color-Histogram and Discrete Curvelet Transform
Sapthagiri.K, Veera Swamy.D

Abstract— CBIR is the best applicable Digital image processing techniques, it has been extensively used. In image retrieval the feature extraction is one of the best procedures used for interpretation and images indexes. An effective storage managing number of image collections are a difficult task in computer systems. There are many existing methods to overcome these problems. In this paper we are proposed combination of color histogram and Curvelet transform (DCT) in different color space based content based image retrieval by using both color and texture. In past the curvelet transform were used for image de-noising. Now we research on curvelet transform it can be used for the better retrieval results. The average normalized rank and probability to evaluate and compare the proposed method against different methods. The obtained result shows the better performance in different types of similarity measurements.

25 Fir Filter Design Based On Low Latency Systolic Montgomery Multiplier
R. Ambika

Abstract -In this paper the Finite Impulse Response (FIR) is designed using the montgomery multiplier. This multiplier is widely used in many cryptographic applications like RSA and elliptic curve cryptography. Here the multiplication is decomposed into number of independent units using an efficient algorithm to introduce the parallel processing. To reduce the latency a novel pre computed addition technique is followed. Since the Montgomery is a systolic multiplier it contains the features of regularity, modularity and unidirectional data flow and more suitable for VLSI design implementations. The important characteristic of this multiplier is it has an inbuilt truncation which compresses the LSB part and also consumes less area and power than existing designs. The proposed multiplier have clock cycle latency of (2N-1) where N=(m/L), m is the word size and L is the digit size.

26 Design And Implementation Of MOSFET using ITRS Road map
G. Sasi

Abstract—MOSFETs are used both as discrete devices and as active elements in digital and analog monolithic integrated circuits (ICs). In recent years, the device feature size of such circuits has been scaled down into the deep sub micrometer range. In this paper, a 90 nm NMOS in 3-D structure was designed and simulated to study its electrical characteristics using Visual TCAD with GENIUS simulator with ITRS guideline of 90nm device.

27 A New Methodology in Weapon Detection Using Advanced Sensor Technology and DIP
T.Sairam vamsi, M.Jagan Mohan Rao, S.Yallamandaiah

Abstract-We have recently witnessed the series of bomb blasts in Mumbai. Bombs went of in buses and underground stations. And killed many and left many injured. People think bomb blasts can’t be predicted before handled. Here we show you the technology which predicts the suicide bombers and explosion of weapons through IMAGE PROCESSING FOR CONCLEAD WEAPON DETECTION. The detection of weapons concealed underneath a person’s clothing is very much important to the improvement of the security of the general public as well as the safety of public assets like airports, buildings, and railway stations etc. Manual screening procedures for detecting concealed weapons such as handguns, knives, and explosives are common in controlled access settings like airports, entrances to sensitive buildings and public events. It is desirable sometimes to be able to detect concealed weapons from a standoff distance, especially when it is impossible to arrange the flow of people through a controlled procedure. In the present paper we describe the concepts of the technology ‘CONCEALEAD WEAPON DETECTION’ the sensor improvements, how the imaging takes place and the challenges. And we also describe techniques for simultaneous noise suppression, object enhancement of video data.

28 A Survey on Security and Performance of SOA via Event Exposure
G.Sasikala,A.Nirmal Kumar

Abstract- The Service-oriented applications are services usually collected from various organizations. The details of implementation on services are usually not visible to the service clients, so as to protect the business interests of service providers. This calls for a challenge when compared to white-box test service-oriented applications because it is difficult to determine accurately the test coverage of a service composition as a whole as well as the difficulty to design test cases effectively. This paper focuses on improving the performance of testing and to reduce the delay incurred during testing. To assure the reliability of an SOA application service, security is imposed only on the most critical services of SOA application.

29 A Survey On CAPTCHA As Graphical Passwords Overcomed By Virtual Passwords Schemes

Abstract—Passwords which are graphical are believed to be more secure than the textual passwords.Here the authentications are boring and complex for users. Moreover,the existing graphical passwords scheme are vulnerable to shoulders-shurfing and spyware.Even most of these alternate schemes have their own merits and demerits. Forinstance,cued-recall graphical passwords schemes are vulnerable to shoulder-surfing and intersection analysis attack is not prevented.So that, CAPTCHA as graphical passwords has been overcome by a virtual password scheme (deal with secret little function method and a code book technique) that acts as a proposal in this paper. And here by using virtual password scheme the passwords are in a differentiated manner including usability, security and Implementation considerations. Furthermore, a Hard AI problem supports the security primitives.

30 Design Of Heterogeneous Spectrometers In Radio Astronomy Using FPGA Based Scale Down Implementation
B.Rajeshwari, N.Ashok Kumar

Abstract—Radio Astronomy is non commercial, passive user of radio frequency Spectrum. It is also a branch of Fundamentals scientific research that provides us with the most useful dataon the origins of our universe. The recent and planned growth in radio communication systems presents a real threat to the future of radio astronomy as a viable sceintific discipline.

31 Independent Operation Of Two Three Phase Loads With Nine Switch Inverter
B.Shivashankar, P.Joel, D.Srikanth

Abstract—This paper proposes space vector modulation for nine switch inverter as dual output inverter .proposed technique compared with carrier based PWM technique and space vector modulation technique (SVM).SVM technique increases the sum modulation indices up to 15% in contrast with conventional scheme, in which the sum of modulation indices is equal or less than one. The extra high voltage available for a given input dc-voltage translates to higher torque. This paper introduces novel SVM technique with minimum semiconductor switching and reduced THD .Min semiconductor switching method reduces the cost of power devices and thermal heat effect ,this scheme will be advantages for high power applications .Where as reduce THD method minimize the total harmonic distortion .The performance of proposed SVM for nine switch inverter is verified by simulation .

32 A New PFC Rectifier for Air conditioner Applications
Tanneru Durga Prasad, N.Saida Rao

Abstract—With the widespread use of non-linear loads, such as variable speed drives (VSDs), power factor improvement has become more difficult. The presence of harmonic currents cause power capacitors to absorb them, as capacitor impedance is inversely proportional to frequency. The effects are overheating and increased dielectric stress of power capacitors, which result in their premature failure. These traditional approaches can also interact with harmonics, leading to harmonic amplifications at resonant frequency, which can damage the capacitors or components of the system. A new integrated three-level ac–dc converter is presented. The proposed converter integrates the operation of the boost power factor correction and the three-level dc–dc converter. The converter is made to operate with two independent controllers—an input controller that performs power factor correction and regulates the dc bus and an output controller that regulates the output voltage. The input controller prevents the dc-bus voltage from becoming excessive while still allowing a single-stage converter topology to be used. The paper explains the operation of the new converter in detail and discusses its features and a procedure for its proper design.

33 Performance Evaluation of DSR Protocol in MANET Using OPNET
Sahil Sharma, Rupinder Kaur Gurm

Abstract—MANET is the ad-hoc network that is a collection of mobile nodes in which it is needed that each node performs together. A node is called cooperative when it sends the data correctly to another node in a wireless network. In the mobille adhoc networks,the main role is played by the routting protocols in sequence to route the data from one mobile node to the other mobile node.But due to openness character of ad-hoc network, it is risk to face various kinds of attacks like black hole node attack etc .The ordinary used routing protocols in MANET are proactive, reactive and hybrid types but the reactive routing method is very trending method for the wireless network that supplies a scalable solution for network topologies used at a large scale. The routing protocols of MANET are not safe and hence resulted into the network in producing the malcious mobile nodes.There are different types of routing protocol avilable which have been recently focused to perform the secure routing in the networks. In this paper, For the identification of malicious nodes,DYNAMIC SOURCE ROUTING PROTOCOL(DSR) has been proposed to create a safe route between source and destination with the searching single and the cooprative black hole attack by enhencing the dsr routing protocol and we will also modifying the default value of the parimeters in an arrangement to improve the quality ofprotocol and prepare a enhenced DSR.

34 Visual Authentication And Security For Mobile Devices
M.Irish, B.Dharani Manogran

Abstract—This paper focuses on developing an efficient key agreement protocols for two and three handheld devices over a temporal confidential and authenticated channels. It simplifies previous unnecessary complications and reduces the bottleneck associated with running time human’s involvements. The Man-In-The-Middle (MITM) attack is the major threat for handheld devices to agree a session key in which they do not share any prior secret in advance, even if these devices are physically located in the same place. The Man-In-The-Middle (MITM) attack is the major threat for handheld devices to agree a session key in which they do not share any prior secret in advance, even if these devices are physically located in the same place. This work aims to improve the Bluetooth device transfer in pair devices using high security. Generates password in invisible patterns. To be used in the Visual Authentication protocol to implement and generate the selection random keys.

35 A Survey on Low Complexity Active Learning for Semi-Supervised Clustering of Large Data Sets
P.Gandhini, S.Venkatesh Babu

Abstract—The main objective of Semi-supervised clustering is improving cluster performance by user’s guidance in the form of pairwise constraints named as must-link and cannot-link. The classifier uses users feedback during learning phase of classification is referred as Active learning. The active learning has the problem of satisfying the must required and not required constraints for semi supervised clustering. Active learning is achieved in an iterative manner. The concept of neighborhood of different clusters is formed according to the pair wise constraints. Under this, classic uncertainty-based principle is used and proposes a novel approach for estimating the uncertainty to each data point. This paper evaluates on eight bench mark data sets and its result achieves consistent and substantial improvements over its competitors. An active learning in iterative manner requires repeated reclustering of the data with an incrementally growing constraint set. This provides computational complexity for large data sets. To address this problem, we introduce an incremental semi-supervised clustering method that updates the existing clustering solution based on the neighborhood assignment for the new point. A naive batch active learning approach also proposed to select the top k points for active learning instead of selecting all data for training.

36 Facilitating Automatic Web Document Annotation Using Sessions
Prabhu G, Dr. Thiagarasu V

Abstract—Web database have become web-accessible through form-based search interfaces (i.e., search forms) that allow users to specify complex and precise queries to access the underlying database. Data are unstructured means which makes searching hard and traditional database querying impossible. Many Web pages (e.g. advertisements, weather reports, travel information and many others) contain an abundance of recognizable constants that together describe the essence of document content. In existing system document annotation is taken by CADS (Collaborative Adaptive Data Sharing platform) technique, that is client have annotated the document on creation time. In this paper, the problem of automatically extracting the keywords/metadata from web pages has been studied without any learning examples. An automatic annotation approach has been presented that extracts and aligns the data units on a result webpage. Then, for each webpage annotate from different aspects and summation the different annotations to predict a final annotation label for it. An annotation wrapper for the search site is without human intervention constructed and can be used to annotate new result pages from the same web database.

37 Evaluation Of Security In Android Anti-Malware Applications
R. Tamilarasi, B. Dharani Manoharan

Abstract—Mobile devices such as smart phones have gained great popularity in response to vast repositories of applications. Most of these applications are created by unknown developers who may not operate in the user’s best interests, leading to malware. Earlier work used DroidChameleon, the DroidChameleon is a systematic framework with various transformation techniques which is used to evaluate the anti-malware products. Those transformations are classified as trivial transformations, DSA-Detected by Static Analysis and NSA-Non-Detected by Static Analysis. However comprehensive evaluation using a much larger number of malware samples and anti-malware tools are not performed. To deal with this, the proposed system extends DroidChameleon with various detection techniques such as Taint tracing, sensitive API monitoring and Kernel-level monitoring for detecting malware in android. The proposed system is experimentally evaluated the anti-malware applications.

38 Power Quality Improvement by using UPQC Topology with Reduced DC-link Voltage Rating
K.rajkumar T., Ashok Kumar, Lokesh N

Abstract—The main aim of this paper is to improve, the power quality in the Facility side i.e. in Distribution side by the help of the Unified Power Quality Conditioner. The UPQC is a customer power device, which is used to mitigate the power quality problems. By the help of the UPQC, the various power quality concerns such as voltage sag, swell, harmonics can be eliminated. In our paper the modified, three phase four wire distribution is used to control the reactive power in the line. And also it uses, the both voltage source inverter which are connected in back to back manner with the help of reduced d. c. link capacitor.

39 FPGA Implementation Of Distributed Canny Edge Detector
B Madhu, Mr. Vijaykumar R. Urkude

Abstract—Edges represent the significant local changes in the intensity of an image. Image Edge detection significantly reduces the amount of data and filters out useless information, while preserving the important structural properties of an image. A distributed canny edge detection algorithm is used which results in the reduced memory requirements, decreased latency and increased throughput with no loss in the performance of the edge detection, when compared to that of the original Canny algorithm. An FPGA-based hardware architecture of the proposed algorithm is synthesized on Xilinx SPARTEN-3 EDK.

40 Simulation Of Bidirectional Buck Boost Dc-Dc Converter For Induction Motor Based Electric Vehicle Application
Mandadi Sagar Reddy, D. Pomya

Abstract—In this paper a universal Power Interface for all the above discussed type of vehicles. Basically, the proposed converter interfaces the energy storage device of the Electric Vehicle with the motor drive and the external charger. The proposed converter is capable of operating in all directions in buck or boost modes with a non inverted output voltage (positive output voltage with respect to the input) and bidirectional power flow. In extension to the work the proposed Power Interface is Fed to a Induction Motor Drive and the performance is analyzed.

41 Power Quality Improvement in Distribution System by Using DSTATCOM with Predictive ANN
K. Seetharamanjaneyulu, G.Nagaraju

Abstract— This paper presents a control algorithm based on enhanced phase-locked loop (EPLL) for distribution static compensator (DSTATCOM) to compensate reactive power, to provide load balancing, to eliminate harmonics, to correct power factor, and to regulate point of common coupling (PCC) voltages under linear and nonlinear loads. In this approach, an extraction of fundamental active and reactive power components of load current for the estimation of source currents includes a signal-processing algorithm based on the EPLL scheme. The proposed control algorithm is implemented using a digital signal processor. Test results on a developed DSTATCOM are presented to validate the proposed control algorithm for compensation of reactive power, load balancing, harmonics elimination, power factor correction, and zero voltage regulation at PCC. A DSTATCOM injects a current into the system to provide for the reactive component of the load current. The validity of proposed method and achievement of desired compensation are confirmed by the results of the simulation in MATLAB/ Simulink.

42 Adaptive Voltage Control Using Multiple Distributed Energy Resources with Fuzzy Controller
P.Nagarjuna, P.Ravi Kumar

Abstract-Distributed energy resources (DE) with power electronics interfaces and logic control using local measurements are capable of providing reactive power related to ancillary system services. In particular, local voltage regulation has drawn much attention in regards to power system reliability and voltage stability, especially from past major cascading outages. This dissertation addresses the challenges of controlling the DEs to regulate the local voltage in distribution systems. First, an adaptive voltage control method has been proposed to dynamically modify the control parameters of a single DE to respond to system changes such that the ideal response can be achieved. Then, control methods have been discussed in the case of multiple DEs regulating voltages considering the availability of communications among all the DEs. When communications are readily available, a method is proposed to directly calculate the needed adaptive change of the DE control parameters in order to achieve the ideal response. When there is no communication available, an approach to adaptively and incrementally adjust the control parameters based on the local voltage changes is proposed. Since the proposed adaptive voltage regulation method in the case of multiple Des without communication, has a high tolerance to real-time data shortage and can still provide good enough performance, it is more suitable for broad utility applications. The approach of multiple DEs with communication can be considered as a high-end solution, which gives faster and more precise results at a higher cost.

43 A New Method For Image Steganography Using Rsa Algorithm
Rajkumar Yadav

Abstract-The aim of proposed scheme is to make a more secure and robust method of information exchange so that confidential and private data must be protected against attacks and illegal access. To order to achieve the required robustness and security cryptography and steganography is combined. Image is taken as a cover medium for steganography and RSA algorithm is used for encryption. In this proposed method advanced LSB bit manipulation method is used for embedding the message in the image file and the message is itself encrypted using the RSA encryption method. For embedding the text in image file firstly both the text and image file are converted into binary equivalent and then text is encrypted using RSA. The encrypted text is then embedded into the image file using the advanced LSB algorithm. At the receiver side, embedded image file must be selected to extract the message .After selecting the file and advanced LSB method is applied to extract the encrypted message and this message is decrypted using the RSA algorithm. A comparison is made between the original image file and the embedded one to indicate that less distortion even after changing the LSB bit of original file and for this PSNR, RMSE is calculated. PSNR and RMSE value indicates imperceptibility and transparency is evaluated by comparing the graph of image file before and after steganography.

44 A Novel Hierarchical Algorithm for Document Clustering
Nanimela Kamakshi, A Srinivasan, Dr.M.Giri

Abstract-All clustering methods have to assume some cluster relationship among the data objects that they are applied on. Similarity between a pair of objects can be defined either explicitly or implicitly. In this paper, we introduce a novel multi-viewpoint based similarity measure and two related clustering methods. The major difference between a traditional dissimilarity/similarity measure and ours is that the former uses only a single viewpoint, which is the origin, while the latter utilizes many different viewpoints, which are objects assumed to not be in the same cluster with the two objects being measured. Using multiple viewpoints, more informative assessment of similarity could be achieved. Theoretical analysis and empirical study are conducted to support this claim. Two criterion functions for document clustering are proposed based on this new measure. We compare them with several well -known clustering algorithms that use other popular similarity measures on various document collections to verify the advantages of our proposal.

45 Speed Optimized 2D DCT Implementation for High Compression Rate Applications
K.Santhosh Kumar, B.N. Srinivasa Rao

Abstract-Multimedia applications, and in particular the encoding and decoding of standard image and video formats, are usually a typical target for Systems on Chip (SoC). The bi-dimensional Discrete Cosine Transformation (2D-DCT) is a commonly used frequency transformation in graphic compression algorithms. Many hardware implementations, adopting disparate algorithms, have been proposed for Field Programmable Gate Arrays (FPGA). These designs focus either on performance or area, and often do not succeed in balancing the two aspects. This paper presents two high performance FPGA architectures for the 2D DCT computation for Ultra High Definition video coding systems. Both architectures use Distributed Arithmetic to perform the necessary multiplications instead of traditional multipliers. The first architecture uses 105 clock cycles to transform an 8x8 block and reaches a rate of up to 206 samples per second at a 338.5 MHz frequency, while the second one requires 65 cycles for each 8x8 block and achieves a rate equal to 252 samples per second at 256 MHz’s Both architectures have been implemented using VHDL. Virtex7 FPGA of Xilinx has been used for the realization of both implementations.

46 Overview Of Proactive Routing Protocols In Mobile Ad-Hoc Networks
Vaibhav Kumar, AbhishekKumar

Abstract-The Mobile ad hoc network [MANET] is a distributed network where mobile nodes are connected together by wireless link without any infrastructure like base station, fixed link, routers, and centralized servers. A routing protocol is used to find best path between mobile nodes to established communication within the networks. Route between the mobile nodes should be distinguished and maintain with a minimum of overhead & bandwidth consumption. This paper presents performance evaluation of proactive routing protocols i.e. DSDV, OLSR & WRP based on some parameters.

47 Modeling And Finite Element Analysis Of Pressure Vessel Shell With Radial Openings
Ch.Vasantha Lakshmi, A.V.Ramana Rao, G.Satish, M.Suryanarayana

Abstract-It is to conduct stress analysis of a pressure vessel shell at the radial openings on the surface. The radial openings are not avoided from the surface of shell due to various piping attachments. Hence the stress analysis of shell and its ultimate failure under internal pressure beyond elastic limit is an appropriate scenario. The plastic zone appearing in vicinity of internal surface of cylinder propagates more fastly along radial openings side. When cylinder is unloaded it will cause reverse plasticity. Therefore it is proposed to obtain numerical solution using Finite Element analysis of cylindrical shell to obtain the displacement & radial stress distribution. In the work the stress analysis of pressure vessel shells with different pressure conditions is conducted Elastic analysis of uniform cylindrical shell with radial openings is found by Finite element method. It is observed that there are several factors which influence stress intensity factors. The Finite element analysis is conducted using Solid Edge. The results are presented in form of graphs and tables.

48 Impact of soccer specific conditioning On selected fitness elements of men Soccer players
K.Nandhakumar, M.Rajashekaran, K.Sivakumar, S.Rathinakamalan

Abstract- The study was designed to investigate the impact of Soccer specific conditioning on selected fitness elements on men soccer players. Thirty men football players who participated in the university of Madras zone inter collegiate tournaments were selected as subjects and segregated into two groups of fifteen subjects each as experimental group and control group following random procedure. The experimental group underwent soccer conditioning over a period of twelve weeks where as control group did not participate in any of the training except their regular play. Speed, Agility and flexibility were assessed before and after the experimental period by using 40yard sprint, T- test and sit and reach tests respectively. ANCOVA was used to analyze the collected data. The results of this study showed that there was a significant difference between experimental group and control group on speed, agility and flexibility.

49 A New Approach For Digital Watermarking In Rgb Images
Rajkumar Yadav

Abstract-The goal of proposed work is to improve the robustness of watermarked image. The watermark is embedded into original image. The original image and watermarked image is required for extraction of digital watermark. The method of digital watermarking in frequency domain is analyzed and verified on RGB images. Also a comparison is performed between PSNR values of watermarked image in frequency domain.

50 Use Rank Of Matrix In Steganography For Securing Gps And Gis Data
Rajkumar Yadav

Abstract-Today’s world is the world of fast communication. Everyone wants concrete, valuable and precious information in very less time. GIS and GPS are such kind of systems which provides valuable information in very less time for various types of applications like whether forecasting , agriculture etc. GIS and GPS take data from various sources and after processing that data they provide valuable information which can be used in various applications. If the data that these systems will process is altered by some intruder then the user will get wrong information and no information about anything is always better than wrong information. So, there is demanding need to secure the data on which GIS and GPS systems will work. In this paper, we showed that how we can secure the data for these systems using steganography.

51 Study of Image Edge Detection: A Review
Shashi Mishra, Prof. Bharti Chourasia

Abstract-For object detection Edge detection is important part of image processing. So it becomes extremely important to have a good Knowledge of edge detection algorithms. An edge is the real or imagined line that marks the limit and divides of plane, object or appearance from other places or things. This means that if the edges in an image can be identified accurately, all of the objects can be located and basic properties can be measured. In this paper we discuses a classification of most important and mostly used edge detection algorithms, namely Sobel, Robert, Prewitt, Laplacian of Gaussian, Canny. The advantages and disadvantages dealt in individual study. Its application area is very wide i.e. from astronomy to photography, medicine to war.

52 Optimization Studies On Friction Drilling
Syed Kwaja Moinuddin, Dr. E. Venugopal Goud

Abstract-Friction drilling is Chipless drilling method which uses the frictional heat developed between a rotating conical tool and the workpiece to soften and penetrate the work-material and obtained a hole in a Aluminium hollow channel material and at the result a bush formation takes place. In this, Experimental trials effect the friction drilling input parameters viz. Spindle speed, feed and conical angle on the responses on w/p viz. dimensional error and surface roughness of the bush. Tool material as HSS and workpiece material as AA6063 Aluminium hallow channel which have 2mm thickness. The effects of Conical angles (CA), feed rate (FR), and spindle speed (SS) on the two quality characteristics, surface roughness (SR) and dimensional error (DE) were also measured and recorded. Conducting the experimental trials, the analysis procedure followed by DESIGN EXPERT V8 software. It was investigated that generated surface roughness, Dimensional error according to spindle speeds, feed rates and conical angles. Response Surface Method (RSM) has been used to develop an empirical model for the responses in terms of drilling parameters.

53 A Survey on an Efficient Bayesian Similarity Based Face Image Annotation Model for Weakly Labeled Web Facial Images
Tini Vasanth, A.Nirmal Kumar

Abstract-This paper proposes a novel effective approach of Unsupervised label refinement (URL) for exploiting the top list of most similar web facial images and their weak labels retrieved from World Wide Web (WWW).Duplicate names can be a practical issue in real-life scenarios.To tackle this problem I propose Bayesian framework which measures the similarity of different names by defined it as maximum a posteriori (MAP) estimation for single person annotation.To further improve the performance of further annotation contextual features are extracted with GIST feature to improve the identification of normal persons other than celebrities.

54 A New Converter for Dc Motor Applications with Power Factor Correction
R.Ramanjan Prasad, N.Srikanth

Abstract-Generally non-linear loads are the main source of harmonics. This paper presents one new control scheme to compensate the harmonic current generated by the diode rectifier so as to achieve a power factor nearer to unity and regulate the DC-bus voltage. This scheme uses one PFC Boost Converter which is connected in shunt with the diode rectifier to compensate the harmonic current drawn by the single phase diode rectifier. The line current command is derived from a dc link voltage regulator and an output power estimator. The hysteresis current controller is used to track the line current command. In absence of diode rectifier (Non-linear Load), the PFC boost converter draws purely sinusoidal current from source. In presence of diode rectifier the PFC boost converter draws current in such a way that the total current drawn from source becomes purely sinusoidal. Merits of the proposed converters include higher power density, simpler control strategy, less harmonic control contents, nearly unity power factor and unidirectional power flow. Optional principle, design analysis and conditions achieving for the proposed converters are described.

55 Analysis of Multilevel Inverter topology with a reversing-voltage Concept
N. Devipriya, G Madhusagarbabu

Abstract-Multi level inverter is used in applications that need high voltage and high current. The topologies of multilevel inverter have several advantages such as lower THD, lower EMI generation, better output waveform and higher efficiency for a given quality of output waveform. The main feature of multilevel inverter is the ability to reduce the voltage stress on each power device due to the utilization of multilevel on the DC bus. However, it has some disadvantages such as increased number of components, complex pulse width modulation control method, and voltage-balancing problem. In this paper, a topology with a reversing-voltage component is proposed to improve the multilevel performance by compensating the disadvantages mentioned. This topology compared to existing inverters requires fewer components (particularly in higher levels) and requires fewer carrier signals and gate drives. Therefore, the overall cost and complexity are greatly reduced particularly for higher output voltage levels. Finally, the paper includes simulation results of RVMLI fed Single phase Induction Motor using In-phase Disposition (IPD) PWM technique.

56 A Survey On Creative Data Packet Forwarding System in Wireless Network
Deepak Gupta , Shreya Jain

Abstract-in the previous years , we have seen the fast development of wireless communication technologies and a wireless network play a major role of the wireless communication Wireless network is a collection of wireless nodes without any accessible network infrastructure or centralized organization. Mobile Ad Hoc Network (MANET) is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized administrator also the wireless nodes that can dynamically form a network to exchange information without using any existing fixed network infrastructure. And it’s an autonomous system in which mobile hosts connected by wireless links are free to be dynamically and some time act as routers at the same time.. To avoid being identified, attackers generally recruit multiple accomplices to dilute attack traffic thickness of each attack source, and use the address spoofing procedure to challenge the hit tracing. In this paper, we present a complete exploration of the safe and sound data broadcasting technique for Wireless network.

57 A Review On Security & Energy Efficiency In Routing Protocols In MANETs
Abhishek Kumar, Sachin Kumar

Abstract-In this paper, the objective is to present a review of security & energy efficiency in routing protocols in adhoc networks. In MANETs, the mobile nodes are connected through a wireless medium forming rapidly changing topologies. Due to dynamic behaviour of the MANETs as well as limited range of transmissions, the attackers can attack easily to the networks. So, when designer implement a routing protocols, the security and energy efficiency is the first priority for the designer. In this paper, we discuss routing protocol and challenges and also discuss security & energy efficient routing algorithms for MANETs.

58 A High-Speed Clockless Serial Link Transceiver
B Venkata Sai Ravi Teja Yadav

Abstract-We present a high-speed, clockless, serial link transceiver for inter-chip communication in asynchronous VLSI systems. Serial link transceivers achieve high off-chip data rates by using multiplexing transmitters and de-multiplexing receivers that interface parallel on-chip data paths with high-speed, serial off-chip buses. While syn-chronous transceivers commonly use multi-phase clocks to control the data multiplexing and demultiplexing, our clock-less transceiver uses a token-ring architecture that elim-inates complex clock generation and synchronization cir-cuitry. Furthermore, our clockless receiver dynamically self-adjusts its sampling rate to match the bit rate of the transmitter. Our SPICE simulations report that in a 0.18-m CMOS technology this transceiver design operates at up to 3-Gb/s and dissipates 77 mW of power with a 1.8-V supply voltage.

59 Dynamic Cross Correlation Matching Algorithm for Digital Video Leakage Detection on Web
Pari Ramalingam

Abstract-Due to the increased reach of internet, streaming delivery of videos over web is gaining more popularity. One of the major challenges in distribution of video over web is the leakage of video to the external network in the form of redistribution. Peer to Peer (P2P) streaming software is commonly used for the re-distribution of videos over web. Hence the protection of video stream from unauthorized use and duplication is critical for video streaming services. Dynamic Cross Correlation Matching Algorithm compares the traffic pattern from the video streaming server with the traffic pattern from the authorized user who is suspected for re-distribution. It uses a dynamic decision threshold to compare two different video streams.

60 A CFD Based Study Of Film Cooling Relevant To Gas Turbine Combustor
Y. Manjunath Reddy, P.Lakshmi Reddy, G. Sivaramakrishna, Vimala Narayanan

Abstract-New age gas turbine engines are targeted to operate at increased turbine inlet temperatures to attain higher thrusts and this is making the combustor liners to operate at temperatures beyond the permissible metal temperatures from metallurgical point of view. This is necessitating the combustor designers to develop several advanced cooling techniques. Film cooling has been the traditional and most widely used cooling technique for gas turbine combustor liners. Most of the research on film cooling of combustor liners is experimental in nature and several correlations were developed towards understanding this. Of late, Computational Fluid Dynamic (CFD) studies of film cooling have met with varying degrees of success. In this present work, CFD analysis of film cooling process has been studied using Fluent. Initially, code validation studies have been conducted by analyzing the flow on a flat plate and in a film cooling setup using the data published in literature. Subsequently, CFD analysis of a cooling ring test setup designed and developed by GTRE has been carried out. Several parametric CFD studies were also carried out to study the effect of hole diameter, hot gas temperature and coolant flow rate on the film cooling performance.

61 Design of ZVS Half-Bridge Series Resonant Inverter with Improved Efficiency for Induction Heating Applications
P. Saikrishna , T. Kavitha

Abstract-Nowadays, the induction heating market is continuously growing due to its benefits including precise output power control, high efficiency, reduced heating times, and cleanness. The maximum output power and efficiency are achieved at the resonant frequency, and if the switching frequency is increased the output power will get reduced. As a consequence, in these converters, the efficiency is also reduced in the low-medium output power range appliances. Most of the circuit structures in large capacity devices were adapted with Full-bridge structures in Inverter. Because of the high power density and the reduced cooling capabilities, efficiency becomes critical in this application. In this study, a half-bridge series resonant inverter driven by a variable -frequency was implemented in an inductive heating-facility in which the circuit was adapted Resonant- Transition in Zero-Voltage-Switching (ZVS). The proposed variable frequency duty cycle (VFDC) control is intended to improve the efficiency in the medium and low output power levels because of the decreased switching frequencies. This paper presents a new Design circuit topology and its digital control scheme for a ZVS Half-Bridge Series Resonant Inverter circuit with improved efficiency for Domestic induction heating appliances. The proposed circuit is implemented and simulated by using MATLAB software.

62 A Comparative Study of competitive state anxiety among team sport and individual sport players at Delhi University
Dr. Kavita Sharma

Abstract-Dealing with competitive state anxiety is a main task for coaches because players and sport teams could not perform when they are under stress. The researcher in the present study aimed towards comparing the Cognitive anxiety, somatic anxiety and self confidence between the female team game and individual game players. The statistical population used in this study contained team sports (Kho-Kho, basketball and Kabaddi) and individual sports (taekwondo, athletics and Judo) in Daulat ram college at University of Delhi. Samples were female players who had competed in the intercollegiate competition. The total number of subjects was 120 female players (60 Team Sports & 60 Individual Sports). The age of the subjects ranged between 17-21 years, state Competitive Anxiety Inventory (CSAI-2) for individual and team game players were administered to the subjects within 30 minutes prior to the start of the competition, each questionnaire took approximately 5 minutes to complete. The collected data was analyzed by computing descriptive statistics followed by one way analysis of variance, a significant difference for the cognitive and somatic anxiety as the values are found to be 5.872 and 4.982 respectively, which are significant at 0.05 level, whereas no significant difference is found for the self confidence.

63 Power Quality Improvement Of Fuzzy Based Predictive Control Apf
Naveen Kumar.M, R.Ramanjan Prasad

Abstract-Even many techniques proposed the Modeling and designing of the PV Cell and its interface to the grid, it suffers from many controlling problems due the nonlinear characteristics of the Load. This paper presents a fuzzy logic control for controlling the dc voltage in predictive control scheme. The Four-Leg voltage source inverter is used to inject power. The inverter can thus be utilized as: 1) power converter to inject power generated from RES to the grid, and 2) shunt APF to compensate current unbalance, load current harmonics, load reactive power demand and load neutral current. All of these functions may be accomplished either individually or simultaneously. With such a control, the combination of grid-interfacing inverter and the 3-phase 4-wire linear/non-linear unbalanced load at point of common coupling appears as balanced linear load to the grid. This new control concept is demonstrated with extensive MATLAB/Simulink simulation studies.

64 Analysis And Fatigue Life Estimation Of Allluminium 2024 Plate With Different Stress Levels
Prasanna Medar, Imarn Ali M.R

Abstract-A number of analytical and numerical techniques are available for the two dimensional study of stress concentration around the hole(s) and notches in isotropic and orthotropic plates subjected to in-plane or transverse loading conditions. The influence of the structural dimension D/A (where D is hole diameter and A is plate width) ratio upon stress concentration factor for different cases is studied in the present work but plate with center hole is created and adjacent small holes created but diameter is varied and distance between one hole to another is also varied so finally study the stress concentration around the holes using ANSYS software. work is to investigates how part geometry can influence the maximum stress found at critical points for a rectangular plate with a large hole in the center and changing the adjacent small hole diameters to see the effects on the magnitude of the maximum stress and understand how this influences the stress concentration factor. The symmetry of this condition will be used to make the analysis simpler by dividing the part into quarters and finally estimating the fatigue life of the plate with varied parameters.

65 PV Fed Inverter/Converter Circuit With Dual-Mode Control For Ev/Hev Applications
K. Sheshu kumar, S.V.Sindhusha, Ravali

Abstract-In recent years, renewable energy sources such as photovoltaic (PV), wind, fuel cell, etc gain importance due to the limitations of conventional energy sources. Renewable energy sources play an important role in rural areas where the power transmission from conventional energy sources is difficult. Other advantages of renewable energy sources are clean, light and does not pollute atmosphere. Hybrid electric vehicles (HEVs) powered by electric machines and an internal combustion engine (ICE) are a promising mean of reducing emissions and fuel consumption without compromising vehicle functionality and driving performances. The proposed integrated circuit allows the permanent magnet synchronous motor to operate in motor mode or acts as boost inductors of the boost converter, and thereby boosting the output torque coupled to the same transmission system or dc-link voltage of the inverter connected to the output of the integrated circuit. Electric Motors, those are used for EV propulsion must have high efficiency for maximum utilization of the energy from batteries and/or fuel cells. A new control technique for the proposed integrated circuit under boost converter mode is proposed to increase the efficiency. Since the light load performance is in recent focus of interest, appropriate algorithms to improve light load efficiency were implemented. The proposed control technique is to use interleaved control to significantly reduce the current ripple and thereby reducing the losses and thermal stress under heavy-load condition. When pv fed inverter/converter circuit is operated for single input under closed loop, multiple outputs are obtained.

66 Interleaved Single- Stage Pfc Ac-Dc Converter For Asynchronous Motor
Srikanth.D, Ravali, S.V. Sindhusha

Abstract-A new interleaved single-stage ac–dc converter is proposed in this paper to reduce line current harmonics while achieving power factor correction (PFC). The proposed rectifier can produce input currents that do not have dead band regions with high PFC, operate with a continuous output current, and minimize the input electromagnetic interference filter size. In this paper, the operation of the new converter is explained, its features and design are discussed in results, and its operation is confirmed with experimental results obtained from a prototype and the performance of asynchronous motor is tested.

67 A Comparative Study Of Different Cloud Servers On The Basis Job Scheduling Approach
Karan Sood , Jasmeet Singh Gurm

Abstract-Cloud computing is the technology in which sharing of resources or communication takes place over the internet through clouds. Cloud computing allows to communicate between clients and providers without the need of installation. It has been found that today large number of companies is adopting the cloud technology to gain the profit in less cost. But sometimes due to high usage of systems problem of load balancing occurs. Load balancing is what it means balancing the work between all the systems, in which some systems has less work, so that throughput can be enhanced. In the proposed work, we will achieve good load balancing via use of FCFS and Priority algorithm. The whole simulation has been taken place in .NET environment. Also in the end it will be evaluated which one performs better in load balancing.

68 Energy Consumption by various Job Scheduling Approaches
Manveer Singh , Jasmeet Singh Gurm

Abstract-Data centers are the core part of any cloud computing services. These are used to store huge amount of data, like Google, Amazon, Yahoo and eBay are operating such huge datacenters around the world. Today, a typical datacenter with 1000 racks need 10 Megawatt of power to operate, which results in higher operational cost. The main issue that exists in today’s era is energy consumption. There is a strong need to manage energy consumption across IT sector. In the proposed work, energy consumption is reduced by the use of FCFS and Priority based algorithm on the basis of jobs executed. The results and experiments are evaluated in .NET environment.

69 Power Quality Enhancement By Using D-Statcom In Distribution Networks
Pratibha Bamankar, Anil Chaudhary, C.Veeresh

Abstract-A Power quality problem is an occurrence manifested as a nonstandard voltage, current or frequency that results in a failure or a mis-operation of end user equipments. Utility distribution networks, sensitive industrial loads and critical commercial operations suffer from various types of steps in this direction. The present work is to identify the prominent concerns in this area and hence the measures that can enhance the quality of the power are recommended. This paper presents the enhancement of voltage sags/swell; harmonic distortion and low injects a current into the system to mitigate the voltage sags/swell. to improve harmonic distortion and low power factor. The simulations were performed using MATLAB SIMULINK version R2009b.

70 Path Loss Models for Suburban Areas of Dehradun using Anfisedit Tool
Ujjawal Bahuguna, Bhagirathi Pradhan, Govind Sati

Abstract-Path loss is the reduction in power density of electromagnetic wave as it propagates through the space. The purpose of this paper is to propose the path loss with the field measurement model and represent them in a convenient form of fuzzy logic modeling. This paper proposes method to predict path loss of base station in cellular mobile communication system using fuzzy logic. The propagation medium is classified in to several well-established propagation environments defined as a fuzzy set such as free space, flat area terrain, light structures terrain, heavy structures terrain, and village terrain. A unique mean path loss exponent (n) is assigned to each propagation environment, which is established by means of the experimental. Fuzzy logic is used to determine “n” number for an unknown environment, which will be obtained using linguistic rules that provide a fine-tuning of the known propagation environments. HATA model is been used for the present analysis.

71 A Study of MAC Layer Protocols for Congestion Control in VANETs
Nancy Sharma, Tanu Preet Singh

Abstract-VANETs that aims to provide safety, comfort have emerged as a powerful technology and a standard of communication among vehicles. Congestion control is a challenging issue in VANETs which can degrade the network performance. In this paper survey and analysis of recently developed VER-MAC, a MAC layer protocol for congestion detection and control in VANETs is presented. A MAC protocol for efficient broadcast service is of great importance to support high priority safety applications. This protocol allows nodes to broadcast safety packets twice during both the control channel and service channel interval that increases the broadcast reliability. This protocol uses 2-D Markov chain model to analyze the performance of both IEEE 1609.4 and VER-MAC. This survey exposes the advantages and weaknesses of existing congestion control algorithm. Finally, numbers of parameters are selected for comparison and analysis with existing protocol VER-MAC.