IJEA - Volume 3 Issue 7 (July 2014)

 


Sr/No/ Title Pdf
1 Finite Element Analysis of Human Tibia Bone
Namrata Phate, Raji Nareliya, Amrita Francis, Veerendra Kumar

Abstract- Finite Element Method (FEM) is the basic representation of the model with respect to finite elements, and performing the analysis on the meshed model is called the Finite Element Analysis. In the current investigation, the three-dimensional models of the human left proximal tibia bone of three different age group patients are generated by using Computed Tomography (CT) data, created meshing to all these models because it helps to calculate the results at any points within the model and to get quick and accurate results of analysis. Therefore, FE analysis is used to predict the behavior of the human left tibia bone throughout including the different characteristics like physical properties, mechanical properties, and loading conditions. Here, Finite Element Analysis is provided to determine the developed stresses and deformation under the same physiological loading of the tibia bone, and these analyzed evaluations may provide a great knowledge to the orthopedic surgeons in the bone transplant and subject-specific fracture risk mechanism for further studies.

Download
2 Application Of Automatic Control System For Quality Enhancement-A Case Study
Prof.R.D.Patil, Prof.A.P.Shrotri,Prof.D.P.Patil, Mr.A.R.Dandekar

Abstract:- In today’s competitive environment every organization is busy in improvement of product quality and implementation of new quality standards. ISO certification, TS certification is the some global quality standards. However these standards are developed to establish the quality oriented culture within the organization. But quality of product depends on various technical factors also, such as manufacturing process of product, design of product, precise machinery etc.Our study explains that how the quality of product can be improved by using modern technology like Automatic control system.

Download
3 Bipolar Fuzzy Normal HX Subgroup
R. Muthuraj, M.Sridharan

Abstract— In this paper, we introduce the new algebraic structure of a bipolar fuzzy normal HX group and prove some properties of this new concept. We also discuss some results of bipolar fuzzy normal HX subgroups under homomorphism and anti homomorphism. We define level subset of a bipolar fuzzy normal HX subgroup and discuss some of its properties. Characterizations of level subsets of a bipolar fuzzy normal HX subgroup of a HX group are given.

Download
4 Audio steganography by Spread Spectrum and Calculate PSNR
Rupanshi

Abstract-. Steganography is the science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes if there is any hidden message. Most of the research done before in this area is focussed on images, audios, and videos. This paper discusses the calculation and comparison of different data hiding technique for example echo hiding, LSB coding etc. by Spread Spectrum method. Spread Spectrum method is often used to send hidden message through radio waves. This message is transmitted through noise-like wave. There are many techniques to build steganographic communication channel [1]. In this work, the spread spectrum techniques are used and then the subliminal information will be distributed by all spectral components on the cover digital audio signal. In this case, some pseudorandom sequence independent of the digital audio signal (cover signal) and of the subliminal information data sequence must be used. In both ends of the communication channel, the pseudo noise sequences must be the same sequence and they must be synchronized. The PSNR is most commonly used as a measure of quality of reconstruction of lossy compression codec’s (e.g., for image compression). The signal in this case is the original data, and the noise is the error introduced by compression. When comparing compression codec’s it is used as an approximation to human perception of reconstruction quality, therefore in some cases one reconstruction may appear to be closer to the original than another, even though it has a lower PSNR (a higher PSNR would normally indicate that the reconstruction is of higher quality).

Download
5 Customizing AOSP ON ARM, MIPS, X86 Platforms
Ramya P, Priyadarshini V, Sai Ram Vamsi T

Abstract: Android Open Source Project (AOSP) introduced especially for mobile phones is based on Linux kernel. AOSP is developed mainly for smart phones by Google. As Android is open source there is a great interest in customizing Android for different embedded platforms IP phones, set-top boxes, car dashboards etc. The advantage of making Android available to different platforms is that an application developed for one device could easily be made available for another platform with minimal modifications to BSPs. In the last few years, ARM platform is the ideal for designing a new product. Apart from ARM AOSP is now migrated to other SoCs. This paper discusses the general steps involved in porting AOSP onto ARM, MIPS, x86 hardware platforms.

Download
6 Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm
Ravula Prasanna Kumar, Sk. Jani Basha, Panduri.Bujji Babu

Abstract:- Quality of data is a major problem in high dimensional and modern databases. Especially in data entry forms present the initial and arguable an efficient opportunity for identifying and mitigating the errors, but there are many methods and researches which are conducted in order to improve the data quality during the entry of data into the forms. In this paper we propose an end to end system for designing of forms, entry and providing the quality assurance to the data during the submission of forms. This system learns a probabilistic model over the question of the form. At every step of the form entry this model is implemented to provide the better quality assurance compare with the earlier methodologies. Before the entry, it induces and identifies a form layout that captures the important data values of a form. Before entry, it induces a form layout that captures the most important data values of a form instance as quickly as possible and reduces the complexity of error-prone questions. During entry, it dynamically adapts the form to the values being entered by providing real-time interface feedback, reasking questions with dubious responses, and simplifying questions by reformulating them. After entry, it revisits question responses that it deems likely to have been entered incorrectly by reasking the question or a reformulation thereof. We evaluate these components of USHER using two real-world data sets. Our results demonstrate that USHER can improve data quality considerably at a reduced cost when compared to current practice. The problem of efficiently and securely broadcasting to a remote cooperative group occurs in many newly emerging networks. A major challenge in devising such systems is to overcome the obstacles of the potentially limited communication from the group to the sender, the unavailability of a fully trusted key generation center, and the dynamics of the sender. The existing key management paradigms cannot deal with these challenges effectively. In this paper, we circumvent these obstacles and close this gap by proposing a novel key management paradigm. The new paradigm is a hybrid of traditional broadcast encryption and group key agreement. In such a system, each member maintains a single public/secret key pair. Upon seeing the public keys of the members, a remote sender can securely broadcast to any intended subgroup chosen in an ad hoc way. Following this model, we instantiate a scheme that is proven secure in the standard model.
Download