JCT - Volume 3 Issue 6 (June 2014)

 


Sr/No/ Title Pdf
1 Mall Maps – A new approach for generating and Using indoor mapping techniques
Prof. Surekha Kohle

Abstract— This paper presents an idea of generating indoor maps for malls in a newer and innovative way tackling different kind of situations or problems that arise due to some or other reasons when going to malls for shopping. I’ve tried to look at the problem in a different way and come up with a conceptual solution in the forms of maps. These maps are meant to be generated dynamically by employing different technological advancements in the field of data mining, routing and map generations. The paper discusses the problems and their possible solutions in detail.

2 Water Audit: A Case Study Of Water Supply Scheme Of Shrivardhan
Amol A.Kulkarni, Avinash A. Patil, Balasaheb B. Patil

Abstract- A water audit determines the amount of water lost from a water supply system and the cost of this loss to the utility. It will quantify Unaccounted for Water (UFW) and Non- Revenue Water (NRW). Water audits balance the amount produced with the amount billed and account for the remaining water (loss). Comprehensive audits can give the utility a detailed profile of the water supply system and water users, allowing easier management of resources and improved reliability. It is an important step towards water conservation and, if linked with a leak detection plan, can save the utility a significant amount of money and time.

3 Waste To Energy By Incineration
Avinash A. Patil, Amol A.Kulkarni, Balasaheb B. Patil

Abstract— Incineration is the main waste-to-energy form of treatment. It is a treatment technology involving destruction of solid waste by controlled burning at high temperatures. It is accompanied by the release of heat. This heat from combustion can be converted into energy. Incineration is a high-quality treatment for Municipal Solid Waste (MSW), very useful in big or crowded cities, because it reduces the quantity and volume of waste to be land filled. It can be localised in an urbanised zone, and offers the opportunity of recovering energy. However, it should be taken into account that the economic investment needed is high. The environmental conditions of the incineration process must be very precise to make it environmentally safe. The larger portion of the investment required is due to environmental measures such as emissions control. When choosing incineration as an alternative, the following issues should be considered: volume/quantity of waste produced, heat of combustion of waste, site location, dimensions of the facility, operation and maintenance costs and investment.

4 Analysis and Synthesis of Secure Image Using Stegnography,Cryptographyand WatermarkingTechniques
Rupesh Gupta, Dr.Tanupreet Singh

Abstract–In today’s world lots of data security and data hiding algorithms have been developed to overcome the security issues which mostly arise in last decade; which is the key motivation for our research work. In this paper named “Stegnography& Cryptography with Watermarking Techniques are used” we have designed a system that will make a normal user to securely transfer text messages by hiding them in a digital image file using the local characteristics within an image. This paper is a combination of Stegnography and cryptography algorithms with watermarking; which provides a strong pillar for its security. While image processing perceivable distortion occurs and to limit this a system is proposed which hides data with in an image. This research paper has an advantage because the hidden text is in the form of images; which are not obvious text information carriers over other information security paper
5 Novel Average Filter as a Feature Reduction Technique for Gabor Filter for Face Recognition
Richa Khyalia, Shubhra Saxena, Shubhlakshmi Agarwal

Abstract–Face Recognition is used widely for human identification. The research issue in the face recognition is to improve recognition rate by improving the preprocessing of data sets, improving the feature extraction method and using the best classifier for face recognition. High dimension and high redundancy are a problem issue for Gabor filter. Dimension and redundancy are reduced through a filter technique. Sampling filter is a problem of not reducing features in an optimum way. In the proposed Gabor feature extraction technique, the Gabor features are filtered using proposed average sampling filter and obtained optimum features for face data set.
6 A Review on Lane Detection In Vehicular Ad-hoc Network
Amandeep Kaur, Dr. Tanupreet Singh

Abstract–Now- a- days, the traffic security has become more significant. Lane detection plays a vital role on highways to avoid accidents most of the problems are resulted from the disruption and weakness of the driver. Therefore, an organization that could provide a warning to drivers of a risk has a great potential to save a large number of lives. Systems that are designed to help the driver in its driving procedure are known as advanced driver assistance systems (ADAS). Lane departure system is also a part of this category. This paper gives an overview on lane detection. This system has a goal to detect the lane marks and to advise the driver in case the vehicle has a tendency to leave the lane.
7 Clustering protocols for wireless sensor Networks: a review
Manoj Kumar, Dr.Tanupreet Singh

Abstract–Over the years there has growing demand for wireless sensor networks (WSN) due to their use in wide variety of applications like military surveillance, environmental monitoring, disaster management, medical and health but their utilization is hindered owing to limited energy resources of sensor nodes, due to this that large part of research is focused on the need for energy efficient protocols with a aim to increase the life time of sensor nodes and hence sensor network. Clustering protocols are compelling due to their competence regarding energy conservation, data aggregation etc. In this paper we present a review of some of widely used clustering protocols in WSNs.
8 Evaluation of the adhoc on demand distance vector routing protocol for Hybrid nodes
Reema Sharma, Dr.Tanupreet Singh

Abstract–Ad-hoc network is decentralized type of wireless network; it is composed of collection of independent node, usually connected by data rate Radio frequency (RF). Transmitting video and high bandwidth application is challenging with RF.In this paper we proposed a routing protocol called AODVH .which is used for high bandwidth communication and for rescue operation in a disaster area. In AODVH using high bandwidth free space optical (FSO) and RF links. Ad-hoc network is decentralized type of wireless network, it is composed of collection of independent node, usually connected by data rate Radio frequency (RE) Transmitting video and high bandwidth application is challenging with RF.In this paper we proposed a routing protocol called AODVH .which is used for high bandwidth communication and for rescue operation in a disaster area. In AODVH using high bandwidth free space optical (FSO) and RF links. FSO is the primary link and RF as backup we case of failure. In this paper we evaluate the performance of AODVH using ns-2 simulation and composed with other three ad-hoc routing protocol. Our better in terms of pocket loss, packet delivery ratio and throughput when compare to with other three protocol.