IJAIR- Volume 4 Issue 2 (February 2015)


Sr/No/ Title Pdf
1 Analysis and Improvement of Spectral Efficiency Using Modified Channel Shortening Filter in MISO OFDM System
Soumya vs, Prof. R. Rajkumar

Abstract —Orthogonal frequency division multiplexing is a flexible block modulation scheme used to reduce the computational cost of the receiver by using a cyclic prefix as a guard interval .The spectral efficiency depends on the cyclic prefix length in orthogonal frequency division multiplexing systems .The cyclic prefix length must be greater than or equal to the delay spread of the channel impulse response in order to avoid inter block interference and inter carrier interference. Spectral efficiency can be improved by using channel shortening filter in orthogonal frequency division multiplexing systems. MISO OFDM is used for the enhancement of spectral efficiency, since the MISO systems decreases complexity and noise at transmitter and receiver cost is also reduced. A channel shortening filter yields low spectral efficiency In order to improve the spectral efficiency, a modified channel shortening filter structure that exploits the null space and provides independent equivalent channels to the receiver has been used. The spectral efficiency of the modified channel shortening filter in MISO OFDM system has been improved by 20 to 40% when compared to channel shortening filter. The performance of modified channel shortening filter is better for the parameters such as spectral efficiency, Signal to noise ratio, block error rate, and channel gain.

2 Energy-efficient reliable routing using Caser protocol design for WSN
K.Anitta, Prof.P.Arulprakash

Abstract—A wireless sensor network (WSN) of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. Routing is another very challenging design issue for WSNs. A properly designed routing protocol should not only ensure high message delivery ratio and low energy consumption for message delivery, but also balance the entire sensor network energy consumption, and thereby extend the sensor network lifetime. It propose a novel secure and efficient Cost-Aware Secure Routing (CASER) protocol to address these two conflicting issues through two adjustable parameters: energy balance control (EBC) and probabilistic-based random walking. It discover that the energy consumption is severely disproportional to the uniform energy deployment for the given network topology, which greatly reduces the lifetime of the sensor networks. To solve this problem, It propose an efficient non-uniform energy deployment strategy to optimize the lifetime and message delivery ratio under the same energy resource and security requirement. For the non-uniform energy deployment, our analysis shows that It can increase the lifetime and the total number of messages that can be delivered by more than four times under the same assumption.

3 Prevention of Dos Attacks in Wireless Sensor Networks
M.Annapoorani, D.Kiruthika, V.Geethamani

Abstract—In wireless sensor networks attackers can inject unwanted messages through the nodes which are already being captured by attackers and they inject DOS attacks against reports. The attackers try to launch the false reports also. A number of filtering schemes to avoid these attacks have been introduced which cannot filter strongly. In our scheme each node consists of its own authentication key. Before sending the reports the key is forwarded to the the next node through which it has to send the message. The key generates a code .The message also generates a code. Both the codes are checked for similarity. If both codes are similar then the message is valid. The message is then forwarded to its destination. make use of Hill climbing approach to find the shortest path in which the reports can reach its destination. our scheme can provide strong filtering capacity and memory requirement is low. Our scheme can also remove the false reports ealier.In existing scheme only one path is available for the reports .In our scheme multipath is applicable.

4 A Control System Used to Improve Energy Production from Alternative Sources with DC/DC Integration using ANFIS
Bincy.B.Babu, N.R.Naharaj, Dr.S.S.Sivaraju

Abstract—Electricity is one the most essential needs for humans. Conversion of solar energy into electricity not only improves generation of electricity but also reduces pollution due to fossil fuels. Various renewable sources such as solar energy, wind energy etc are the sources of power generation. Solar Energy is a good choice for electric power generation. The Earth receives 174 petawatts (PW) of incoming solar radiation (insulation) at the upper atmosphere. About 30% is reflected back to space while the rest is absorbed by clouds, oceans and land masses. The solar energy is directly converted into electrical energy by solar PV module. The output power of a PV panel array depends on the PV voltage and weather conditions. The ratio between output power and cost, DC/DC converters are used to obtain maximum power from the PV panel array using MPPT.

5 Zigbee based Wireless Body Area Sensor Network for patient’s physiological parameter monitoring
Akash Chouksey, Soni Changlani, Prof. Saiyed Tazen Ali

Abstract-This paper describes the design of a wireless body sensor network based on zigbee technology(IEEE 802.15.4)) for monitoring of patients physiological parameter monitoring like ECG, Body Temperature, Heart Beat, Blood Pressure It is mainly used for collecting and transferring the various monitoring information about the patients in hospitals to doctors or in their homes. This application consists of Zigbee based network,\ and four types of sensors ECG, Body Temperature, Heart Beat, and Blood Pressure sensors.

6 Lifelong personal health data and application software Via virtual machines in the cloud
R Vinoth, Dr. B. Geetha

Abstract -Day by day Technology has been developed the cloud computing provides platform for storage of data. It maintains Patients Personal Health Record (PHR) for an emerging patient centric model of health information. The patients Health report can be exchanged or shared third party using Cloud Computing Technology. The Unauthorized can access the data using Cryptographic Technique. The Commercial cloud servers are used store their medical records because it can be view by everyone, to assure the patients’ control over access to their own medical records. To achieve fine grained and scalable data access control for medical records stored in semi trusted servers using attribute based encryption (ABE) techniques. The personal health data of a patient can be provide high degree of security by exploiting multi-authority ABE for Multiple PHR owners and users

7 An Efficient Architecture in Clock Gating Using Wide Spread Adapting Technique
R.Kiruthika, Dr. T. Kavitha

Abstract-The Clock gating reduces dynamic power dissipation in synchronous circuits. A clock gating cell (CGC) is inserted, which covers an internal latch that filters out potential glitches from a block called as the gating function. Clock gating logic uses strong and weak matching process,they are two kinds of factor form matching.The strong matching seeks for the matches which are externally present in the factored forms and the weak matching identifies matches that are implicit in the logic and they are hard to discover. The problem in existing system involves a flip-flop architecture with higher power consumption, gate count and circuit size . Hence a modified Boolean function technique known as Wide Spread Adapting (WSA) clock gating technique is implemented. The weak and strong matching are done by WSA technique since they do not require separate algorithms as in existing system’s technique helps to reduce the clocking signal and the gate pattern. Thus the proposed method achieves reduced clock gating which also reduces delay, power, gate count and area.

8 Comparative Analysis of Mobility Aware Energy Efficient MAC Protocol for Wireless Sensor Networks
Mr. Ritesh A.Jadhav, Prof. N.B.Sambre

Abstract-Energy efficiency is an important requirement in designing MAC Layer in WSN. Besides that, the design must include fairness, low latency and scalability due to the dynamic topology changes in WSN environment. There is a lot more issues that must be considered when designing MAC layer such as signal loss in wireless channel, collision at the receiver’s end, resource constrain (energy, bandwidth, network topology), hidden node and exposed terminal problem. The existing technique in MAC layer are contention based and schedule based. Keywords: Mobile Sensor Network, MAC protocol, Performance Analysis, Energy Efficiency, Mobility Handling, TDMA, CSMA, RWP.

9 Analyze the Performance Optimization of FIR Filter Using Neural Network Algorithms
Alok Pandey, Santosh Sharma

Abstract-This paper presents the different design methods and techniques to optimize the FIR digital filters with the help of neural network. In this paper equiripple and Least squares design techniques are used to design the FIR digital filter. This paper describes the two different neural network algorithms for finding out the best validation performance on the basis of order and cutoff frequency. In this paper using FDA tool to design digital FIR filters of different order, and neural network tool box to compare different filters. The feed-forward algorithm provides the best validation performance as compared to cascade forward in case of Equiripple filter design. While in Least squares method cascade forward provides best validation performance as compared to feed-forward.

10 ZigBee Network Based System For Power Monitoring and Data Logging
Aruna Prabha V.S, D.Sam Devid Jero

Abstract─The power systems in this present day combine different modes of generation, transmission and conversion of the energy. There is no unique system of monitoring the power distribution and for the power failure detecting mechanism. The major issue facing is the continuous isolation required for the measuring equipments. A controlled power supply can be obtained by continuously monitoring the power supply by which to reduce the unwanted power consumption and detection of failure of electronic equipments. An optimal solution for this problem is proposed by designing a wireless system, which continuously monitors the power supply and the power usage. A low data rate ZigBee based wireless transceiver is used for the wireless communication. The suitability of ZigBee for the required communication link is that, ZigBee has major role in monitoring and direct load controlling for efficient power utilization. It covers enough area needed for communication and it works on low data rate with minimum power consumption. Transmission distances range from 10 to 100 meters line-of-sight, depending on power output and environmental characteristics. The proposed technique uses ZigBee network for monitoring the power supply and the data is stored on the server. Based on the data captured through the ZigBee network, a technique will be proposed as a protocol for the effective and efficient usage of power as per the requirement.

11 Digital watermarking scheme using Video watermark techniques
Ankita Amburle

Abstract -The effective purpose a watermark should adhere to a few requirements. In specific, it should be robust, and transparent. Due to the replicable nature of video many illegal copies of original videos can be produce. So its demand to deliver methods for preventing illegal copying. In this paper identifies a new digital watermarking approach for copyright protection of video based on wavelet transformation. Very first, the motion part of color video is detected by scene change analysis, and then applying 3D wavelet transformation over a detected motion part 10 sub hands of wavelet coefficients are obtained. Watermark is embedded into selected wavelet coefficients. In extraction step, the original video is not needed, namely, blind detection. The resultant watermarking scheme is used for public watermarking applications where the original video is not available for watermark extraction. The robustness of proposed method against various kinds of attacks such as median filtering, frame drop, frame averaging, frame swapping and there are lots of lossy compression including MPEG-4, MPEG-2, and H.264 shows the fidelity of our claim.

12 Image Encryption Method Using Permutation and Rubik’s Cube Principle for Images
Nilesh Tiwari, Urooz jabeen

Abstract-The primary goal of this paper is security management. This will provide authentication of users, and integrity, accuracy and safety of images which is traveling over internet. Moreover, an image-based data requires more effort during encryption and decryption. The Proposed Architecture for encryption and decryption of an image using suitable user defined key is developed with the same objective. In this paper, we introduce a new permutation technique based on the combination of image permutation and a new developed encryption algorithm called “Hyper Image Encryption Algorithm (HIEA)”. From the selected image we will binary value blocks, which will be rearrange into a permuted image using a permutation process, and then the generated image will be encrypted using the “Hyper Image Encryption Algorithm (HIEA)” algorithm.

13 Optimum safety message broadcasting Protocol for vehicular networks
S.Nishanthini, S.Alagumuthukrishnan, Dr. K. Geetha

Abstract—VANET Vehicular safety applications depend on the rapid and reliable dissemination of safety messages to vehicles at risk. In order to allow sufficient reaction time for emergency events in adverse driving and road conditions, disseminating safety messages over multi-hop vehicles is often needed. In addition, there are a number of technical challenges to consider in designing protocols for emergency applications, adaptation to VANET specific network environments, such as high mobility, severe channel fading, and a wide range of vehicle density, including extremely high nodedensity owing to rush-hour traffic in metropolitan areas, are another important aspect to consider. An Intelligent Optimized Link State Routing (OLSR) algorithm is proposed to deliver mission-critical life safety messages over target geocast regions. The coordination problem and Opportunistic packets relay selection is solved by the novel concept of Circle of Trust (COT), combining with MAC as Standard Wireless Access in Vehicular Environments (WAVE) which defines the range of reliable local neighbour knowledge collection over a broader target area efficiently and reliably. This OLSR technique results in better performance and Quality of Service than the existing protocols.

14 Design and Simulation of PV based Switched Boost Inverter for Grid connected System
K.Shivashanker, K.Alekhya ,K.VenkataNagaVikranth

Abstract— Introduction of reference frames in the analysis of electrical machines has turned out not only to be useful in their analysis but also has provided a powerful tool for the implementation of sophisticated control techniques. This application note gives an introduction to the theory of the most commonly used reference frames and provides routines that allow for easy conversion amongst them. Control of three-phase power converters in the synchronous reference frame is now a mature and well developed research topic. However, for singlephase converters, it is not as well-established as three-phase applications. So in this paper a single phase SRF theory is proposed for SBI.

15 Advancement In Wireless Communication
Vijaya bhandari, Updesh verma

Abstract—In this paper the information about the advancement in wireless communication is given and it is also given that when requirement of high speed of data rate is increases then how the technology changed because of number of users also increases with time. So it is a challenging work for the researchers to give a total satisfaction to their users with reliability. This paper gives you a knowledge about how different combination of different multiple access techniques and modulation with different receivers gives the satisfactory performance among the users.

16 Solving some theoretical distribution Problems by using c++ program
J.Sathyamalar, M.Vadivukkarasi

Abstract—In this paper we study the notions of Binomial, Poisson and Normal Distribution in statistical methods and also we introduce the C++ program in Binomial, Poisson and Normal Distribution problems.

17 Design and Evaluation of Hybrid Vector Routing Protocol in Wireless Sensor Networks
Manisha M. Magdum, P.P.Belagali

Abstract- These days’ ad hoc networks have found many applications. Multiple ad hoc routing protocols have been proposed, of which on-demand routing protocols are very popular because they are easy to realize and have no power and priority concept for data communication in routing.

18 Channel Estimation for Wimax System Based On Comb Type Pilot Arrangement in AWGN Channel
Pritam Shital Langde, Prof. N. B. Sambre

Abstract— WiMAX (Worldwide Interoperability for Microwave Access) is a wireless networking system which provides wireless broadband to fixed and mobile terminals. Channel estimation is an essential problem in WiMAX system. But still Performance evaluation with channel estimation is required because amplitude and phase shift causes error in wireless channel.[2] While considering the Channel estimation for Wimax system it is important that, A good choice of the pilot pattern should match the channel behavior both in time and frequency domains[1]so Pilot-aided channel estimation has been used. These Pilot Assisted estimation techniques are mainly classified with block type and comb type pilot arrangements. In this paper, the channel estimation of WiMAX system for comb type arrangement under AWGN channel conditions is discussed. Here, mainly two algorithms Least Square and Least Mean Square are tested with Linear and Spline interpolation. Simulation will be carried out using MATLAB as a testing environment. BER versus SNR curves are used for comparing the results.

19 Solving Multi Objective Fully Fuzzy Linear Programming Problem Using Ranking Function
A.Sahayasudha, P.Kanniammal

Abstract-In this paper we solve a multi objective fully fuzzy linear programming problems using trapezoidal fuzzy numbers are proposed. Then the fully fuzzy linear programming problem is solved by using Maleki and yager ranking function.

20 A keyword-Recognized Service Recommendation Method on Hadoop using Map Reduce for Big Data Applications
M Nandakumari1, R Suresh2

Abstract- This paper says about providing flexible recommendations to user Service recommendations system has become a powerful tool. Since the rapid growth of information in every sectors such as the amount of services, customers, online information etc., big data analysis problem has been raised in service recommendation system. So, Scalability and inefficiency problem arises in traditional recommender system while processing large amount of data. Moreover, some of the existing service recommendation systems give same ratings and rankings to services to users, but that doesn’t satisfy users’ preferences, there is a failure in providing personalized requirements to users. So, I propose a keyword-Recognized Service Recommendation Method to address the above challenges. By giving the recommendation list, the users are effectively recommended with appropriate services. Keywords are being used to indicate the users’ preference to generate recommendation with the adaptation of collaborative filtering algorithm. Finally, Hadoop using MapReduce is implemented to improve scalability and efficiency in big data environment.

21 Design of a ME Dipole Antenna in Planar Configuration using CRLH-TL implementation
U.Vinitha, Dr.M.Umaparvathi

Abstract-In recent years, dual polarized antenna plays a crucial role in antenna designs. Its attractive features such as high gain, wider bandwidth is responsible for creating a ME dipole antenna. Thus, the objective is to design a planar Magneto-Electric (ME) dipole antenna which is the combination of magnetic and electric dipoles, based on the composite right/left handed transmission lines (CRLH). The magneto-electric dipole antenna is excited by single differential feed and therefore it acts as a travelling wave antenna that enables the formation of Omni directional radiation pattern. This merged structure of dipole antenna has attracted considerable attention due to increased demand for multi functionality and switchable characteristics including wide bandwidth, low cross polarization and reduced side lobes and back lobes radiation, nearly the same E-plane and Hplane patterns, constant radiation pattern and steady antenna gain over the operating frequency range. The proposed ME dipole antenna based on CRLHTL gain is analyzed at different frequencies using FEKO simulator.

22 An efficient concurrent access on cloud Database using secured BAAS

Abstract-In distributed database system, cloud services provide high availability and scalability, but they raise many concerns about data confidentiality. SecureDBaas guarantees data Confidentiality by allowing a cloud database server to execute concurrent SQL operations over encrypted data and the possibility of executing concurrent operations on encrypted data. It’s supporting geographically distributed clients to connect directly to an encrypted cloud database, and to execute concurrent and independent operations including those modifying the database structure. The proposed architecture has the further advantage of eliminating intermediate proxies that limit the elasticity, availability, and scalability properties that are intrinsic in cloud-based solutions. SecureDBaas that support the execution of concurrent and independent operations to the remote encrypted database from many geographically distributed clients. It is compatible with the most popular relational database servers, and it is applicable to different DBMS implementation. It provides guarantees to data confidentially by allowing a cloud database server to execute concurrent SQL operations over encrypted data.

23 Biogas technology – present status; Problems & future projections
Dr. S.S. Sooch, Er. Jasdeep Singh Saini, Er. Harpreet Singh

Abstract-The acute shortage of energy available from traditional sources has prompted intense and research activities in the field of alternate sources of energy especially from the renewable source like one such biomass, biogas etc. Potential source is the biogas generated through anaerobic digestion wastes like cattle sung, crop residues, etc. Anaerobic digestion, not only leaks to valuable energy in the form of methane but also enhances the fertilizer value of the waste. Additionally, it provides a safe, convenient, non-offensive and economical waste disposal method.

24 An energy efficient rp node selection to improve the Life time for wireless sensor networks
Medha Devan

Abstract— Data gathering mechanism for large scale wireless sensor networks by introducing mobility into the network. The sink mobility along a constrained path can improve the energy efficient in WSN. To address this challenge a proposed method is to form a hybrid moving pattern in which a mobile sink node only visits rendezvous points (RPs), as opposed to all nodes. Sensor nodes that are not RPs forward their sensed data via multi-hopping to the nearest RP node. Fundamental problem becomes computing a tour that visits all the RPs within a given delay bound. Identifying the optimal tour, however is an NP hard problem .To address this problem Weighted Rendezvous Planning (WRP) method is proposed whereby each sensor node is assigned a weight corresponding to its hop distance from the tour and the number of data packets that it forwards to the closest RP.WRP enables a mobile sink to retrieve all sensed data within a given deadline while conserving the energy expenditure of sensor nodes. More specifically, WRP reduces energy consumption and also increases the network lifetime as compared with existing methods.

25 A study of risk assessment and Management in construction
Sreedevi Das, M.Sivagami

Abstract -No construction project is risk free. Risk can be managed, minimized, shared, transferred or accepted. It cannot be ignored. Moreover, construction, it is held, is exposed to more risk and uncertainty than perhaps any other industry sector. An effective and efficient risk management approach requires a proper and systematic methodology and, more importantly, knowledge and experience. The record of the construction industry is not acceptable in terms of coping up with risks in projects. Risk management is a process which consists of identification of risks, assessment with qualitatively and quantitatively, response with a suitable method for handling risks, and then controls the risks by monitoring. This study proposes to apply the risk management technique which includes well. This paper aims to identify and analyse the risks associated with the development of construction projects.

26 Design of Area Optimised BCD Multiplier using VHDL
Parag shrivastava, Prof. Atulika shukla

Abstract—Decimal multiplication is one of the most frequent operations used by many financial, business and user-oriented applications but current implementations in FPGAs are very inefficient in terms of both area and latency when compared to binary multipliers. In this paper we present a new method for implementing BCD multiplication more efficiently than previous proposals in current FPGA devices with 6-input LUTs. In particular, a combinational implementation maps quite well into the slice structure of the Xilinx Virtex-5/Virtex-6 families and it is highly pipeline-able. The synthesis results for a Virtex-6 device indicate that our proposal outperforms the area and latency figures of previous implementations in FPGAs.

27 Using dynamic workloads for efficient Server provisioning approach with Decision making
S.Anna Suganthi, K.Karnavel

Abstract—Dynamic virtual server provisioning is critical to quality-of-service assurance for multitier Internet applications. In this paper, we address the important challenging problems. First, we propose an efficient server provisioning approach on multitier clusters based on an end-to-end resource allocation optimization model. It is to minimize the number of virtual servers allocated to the system while the average end-to-end response time guarantee is satisfied. Second, we design a modelindependent fuzzy controller for bounding an important performance metric, the 90th-percentile response time of requests flowing through the multitier architecture.

28 Efficient and Adaptive Video Sharing in the Clouds
Bashettywar Swetha, M Madhavi Latha, K Amarendranath, M Rakesh Chowdary, Sampath Siddam

Abstract—Wireless communication changes the world an extent. Communication over the social networks has been increased as the mobile usage getting more. Hence respective technologies and software’s also can be modulated. But incapability in integrating all these issues, finally poor service in the name of less performance. The better solutions for the mentioned issues are cloud technology. In this paper we attempted to develop a new mobile streaming framework called adaptive mobile video streaming increases the efficiency of social video sharing and also monitoring activities of users.

29 A Study on the Construction and Arithmetic of Lemniscates Curves
Dr. S. Joseph Robin

Abstract—This paper studies the mathematics of lemniscates curve, whose most common form is the locus of points the product of whose distances from two fixed points (the foci) a distance 2a away is the constant a2, and explore the pairing based cryptography on this curve from theoretical and implementation point of view. In this regards, we first study the construction and arithmetic on lemniscates curve and then design a new cryptographic scheme.

30 A Novel Energy Efficient Adder Architecture for Image Processing Applications
Karshankant Sharma, Vijay Kumar Magraiya, Abhay Khedkar

Abstract—In the present era, ultra-high energy efficiency is required for all the battery operated devices due to increased functionality on the single chip. This high energy efficiency can be achieved by designing efficient arithmetic circuit that performs most of the processing within these cores. In this paper, we propose a novel adder architecture that improves the power and speed parameters simultaneously at the cost of minor loss in accuracy. The proposed adder can be efficiently utilized in the image video processing applications. In order to evaluate the efficacy of the proposed adder, proposed and existing adder architecture is implemented on MATLAB to evaluate error metrics and Tanner to evaluate design metrics. Simulation results shows that proposed adder significantly reduces power, area and delay at small loss in accuracy.

31 Ultra-low Power Approximate Adder Design Techniques for Mobile Applications
Karshankant Sharma,Vijay Kumar Magraiya, Meenakshi Mishra

Abstract—The rapidly increasing functionality on the portable gadgets requires ultra-low power designs. As user cannot tolerate with the rapid discharge of the mobile device rather can manage with small degraded quality. The ultra-low power designs can be achieved by designing efficient arithmetic circuit that performs most of the processing within these cores. We propose different approximate adder designs techniques that improve the power and speed parameters simultaneously at the cost of minor loss in accuracy. The proposed adder can be efficiently utilized in the image video processing applications. To evaluate the effectiveness of the proposed adders, all the designs are implemented on MATLAB to evaluate error metrics and Tanner to evaluate design metrics. Simulation results shows that proposed adder significantly reduces power, area and delay at small loss in accuracy.

32 FINAL REPORT:-Investigations on VoIP for a WiMAX Communication Network
Manjotinder Singh Grewal, Rupinder kaur Gurm

Abstract—Voice over internet protocol refers to the transmission of telephone traffic over IP-based networks. Voice transmission over internet is also called internet protocol (IP) telephony. IP telephony has gained wide popularity and has become an important services on the internet. The use of IP telephony became real due to the high bandwidth available on the internet and its low implementation cost. Digital form of communication has further led to its vital use. Due to above reasons, voice communications using the IP, is also called Voice over IP or VoIP, has become attractive. The simultaneous transport of voice and data over the internet has already been demonstrated using 3G networks. This paper presents the performance evaluation of a WiMAX network. In this paper only dynamic conditions for the application voice over IP has been considered.

33 To Extract the Maximum Power Using Utility-Interfaced Wind Turbine Model
N.Kavithamanir, D.Anuja, M.Madhu Sudha

Abstract—Maximum power extraction from wind energy system became an important research topic due to the increase in output energy by using this technique. Wind speed sensorless MPPT control has been a very active area of research. The WT is connected to the grid via back–toback PWM-VSC. The generator side controller and the grid side controller have been done in Simulink. The main function of the generator side controller is to track the maximum power from wind through controlling the rotational speed of the turbine using fuzzy logic controller. The fuzzy logic algorithm for the maximum output power of the grid-connected wind power generation system using a PMSG has been proposed and implemented above. The PMSG was controlled in indirect-vector field oriented control method and its speed reference was determined using fuzzy logic controller. A co-simulation (PSIM/Simulink) program has been proposed for WECS where PSIM contains the power circuit of the WECS and Matlab/Simulink has the control circuit of the system.

34 A novel approach for autonomous Vehicle with intelligent black box System
P.Prabakaran, S.Prabhakaran

Abstract—The main purpose of this project is to develop a prototype of the vehicle black box system (VBBS) that can be installed into any vehicle all over the world. The VBBS can contribute to constructing safer vehicles, improving the treatment of crash victims, helping insurance companies with their vehicle crash investigations, and enhancing road status in order to decrease the death rate. Advanced step to the concept of vehicle black-box in developing a comprehensive vehicle safety system which would not only record the video and audio, but also try to prevent a possible collision by limiting the speed of the vehicle in accident-prone areas. In case of an accident, the time and location is sent through GSM to a present number for immediate rescue and treatment. Wireless black box system using GSM and GPS tracking system is developed for monitor the accident. Keeping this idea in our mind, the proposing a system where vehicle itself intimates the concern emergency service for immediate reaction in case of accident or any emergency situation. After the accident, this wireless device will send mobile phone short massage indicating the position of vehicle by GSM and GPS system to family members, nearest police station and hospitals. Recently, black-box equipped vehicles are rapidly increasing despite its low cost, because the black-box images are used as evidence for making correct decisions on vehicles accidents. The Fuel level sensor is used for find out fuel theft and fuel fulfil in parking and petrol bunk areas.

35 Improving Network Lifetime Based On Gateway Relocation in Wireless Sensor Networks
A.Prasanth, P.Ganesh Kumar

Abstract—In Wireless Sensor Networks (WSN), sensor nodes deliver sensed data back to the gateway node through multi hopping. The sensor nodes that are close to the gateway node become heavily involved in packet forwarding and it spends more battery power than others. Therefore, these nodes will quickly drain out their battery energy and decrease the network lifetime of the WSN. To increase network lifetime of the WSN, the concept of gateway patrolling is launched. In this paper, we propose Zone Based Gateway Patrolling (ZBGP) for mobile gateway in WSNs. In ZBGP, gateway node is moved towards the area of the sensors that generates more number of data packets (heavily loaded zone). The simulation results show that patrolling the gateway node towards the most number of packets attains significant energy savings as compared to the static approach which helps to improve the life of the entire network.

36 Message Filtering System
Sandip Bankar, D.K.Chitre

Abstract—One fundamental issue in today On-line Social Networks (OSNs) is to give users the ability to control the messages posted on their own private space to avoid that unwanted content is displayed. Up to now OSNs provide little support to this requirement. To fill the gap, in this paper, we are going to propose a system allowing OSN users to have a direct control on the messages posted on their walls. This is achieved through a flexible rule-based system, that will allow users to customize the filtering criteria to be applied to their walls, and a Machine Learning based soft classifier automatically labelling messages in support of content-based filtering.

37 Implementation of personal data assistant System for defence persons using Microcontroller
P.Santhosh Kumar, V.Arun Kumar

Abstract—In Military and Industry persons working in harsh conditions. In embedded system there having some possible source to monitoring the person in harsh conditions. They use PDA (personal data assistant) for collecting the information. It takes the information about their working condition in harsh environments. It not likes that easy one. So they choose the embedded. In that CPU, LCD touch screen and wireless communication module, GPS, barcode laser scanner and interfaces etc….In that also some disadvantages having major thing that monitoring the military person's Parameters. Using Advances military jacket .Peltier is used to control temperature level and Corresponding Measurements are displayed. Peltier is nothing but thermoelectric cooling. It creates a heat flux between the junctions of two different types of materials. A Peltier cooler, heater, or thermoelectric heat pump is a solid-state active heat pump which transfers heat from one side of the device to the other, with consumption of electrical energy, depending on the direction of the current. Thermoelectric coolers operate by the Peltier effect (which also goes by the more general name thermoelectric effect). The device has two sides, and when DC current flows through the device, it brings heat from one side to the other, so that one side gets cooler while the other gets hotter. The "hot" side is attached to a heat sink so that it remains at ambient temperature, while the cool side goes below room temperature. In some applications, multiple coolers can be cascaded together for lower temperature. Using this Repeated or continuous observations of the personnel’s life supporting functions and save the person in High robust condition.

38 Channel Utilization and performance comparison between TCP and TCP Reno Protocol in 802.11 MAC Standard
Shevaani Goyal

Abstract—This paper explores the comparison between the TCP protocol and the TCP Reno protocol, particularly focusing on their performance pertaining to the data transmission in the wireless networks. Further apart from the basic comparison between these two protocols, this paper also aims at highlighting the performance of TCP and TCP Reno when deployed in the common conditions and specifications on the same network scenario by using channelization approach. In this network scenario, the node automatically searches an appropriate channel for data transmission that minimizes the interference and congestion.

39 Role Based Access Control Using Description Logic
Nagajothi.P, Suganyasree.K

Abstract—Among the sources of data semantic interoperability is achieved using Semantic models. Semantic models combine the data and information that it relates two or more domains. The confidential information that need to be secured from the user while providing the knowledge based on the request is made even more difficult as the user may be able to apply logic and reasoning to infer confidential information from the knowledge being provided. Through an inference policy engine the individuals in the OWL database are propagated in which an authorization security model enforced on a semantic model’s entities is proposed. A TBox family provide TBox access control and ABox label-based access control for facts in the domain knowledge the effects of access control are reported experiments to evaluate reasoning and modularization. The access control is proposed by using the information which helps the inheritance of relation of individual for the data and information.

40 An Experimental Investigation on Effect of Recycled Aggregate and Stone Dust on Concrete
Sumit Sachan, Vikas Srivastava, V.C.Agarwal

Abstract—In present experiment on PPC concrete is to find the appropriate proportion at which stone dust & recycled aggregate partially replace the fine and course aggregate respectively in PPC concrete gives the hardened concrete properties. The percentage of stone dust partial replacement of fine aggregate in PPC concrete are 0%,10% and recycled aggregate partial replacement of course aggregate in PPC concrete are 0%,50%,60%,70%. M25 grade of concrete is used for conducting different strength test on PCC concrete. The different concrete tests are compressive strength test on 100x100x100mm cube and split tensile test on cylinder of dia. 150mm and height 150mm. From the experimental studies, it is found that 60% of quarry dust and 10% of recycled aggregate are the valuable proportion for the hardened concrete properties. All specimens were tested after curing age 7 days & 28 days. Strength properties of the treated and untreated coarse aggregate were compared. The results indicated that the compressive and split tensile strength of recycle aggregate is found to be less than the natural aggregate.

41 Life satisfaction among working women In relation to their self empowerment And level of education

Abstract—This study was conducted to evaluate Life satisfaction among working women in relation to their self-empowerment and level of education. The objectives of the study was to study life satisfaction among working women, to study self-empowerment among working women, to find out significant difference in life satisfaction of graduate and post graduate working women, to find out significant difference in selfempowerment of graduate and post graduate working women and other objectives of the study were to find out difference in life satisfaction of graduate and post graduate working women having high selfempowerment, to find out difference in life satisfaction of graduate and post graduate working women having low self-empowerment. Another objective of the study was to find out relationship between life satisfaction and self-empowerment of graduate working women, to find out relationship between life satisfaction and selfempowerment of post graduate working women. Descriptive survey method was used in this study to obtain pertinent and precise information. The sample of the study included 150 working women selected by using simple random sampling from the district of Jalandhar. The sample was comprised of seventy five graduate and seventy five post graduate working women. The tools used in this study were Life satisfaction scale by Rotter’s and Self-empowerment scale by Tashi Choden. For the purpose of drawing out the result the investigator used statistical techniques like t-test, mean, standard deviation, and correlation. It is concluded that there exists significant difference in life satisfaction of graduate and post graduate working women, there exists significant difference in self-empowerment of graduate and post graduate working women, there exists significant difference in life satisfaction of graduate and post graduate working women having high self-empowerment and no working women were found under low self-empowerment within selected sample. There exists no significant relationship between life satisfaction and self-empowerment of post graduate working women, and there exists significant relationship between life satisfaction and self-empowerment of graduate working women.

42 Simulation of PV based Switched Boost Inverter for Grid connected System
D.Venkatesh, M.Kondalu

Abstract—Introduction of reference frames in the analysis of electrical machines has turned out not only to be useful in their analysis but also has provided a powerful tool for the implementation of sophisticated control techniques. This application note gives an introduction to the theory of the most commonly used reference frames and provides routines that allow for easy conversion amongst them. Control of three-phase power converters in the synchronous reference frame is now a mature and well developed research topic. However, for singlephase converters, it is not as well-established as three-phase applications. So in this paper a single phase SRF theory is proposed for SBI. The SBI can produce an ac output voltage that is either greater or less than the available dc input voltage. Also, the SBI exhibits better electromagnetic interference noise immunity when compared to the VSI, which enables compact design of the power converter. These features make the SBI suitable for dc nanogrid applications. This paper also presents a dq synchronous reference- frame-based controller for SBI, which regulates both dc and ac bus voltages of the nanogrid to their respective reference values under steady state as well as under dynamic load variation in the nanogrid. The simulation results are obtained using MATLAB/SIMULINK software.

43 Implementation of an automatic Defribillator for cardiac Patients
P.Vignesh, T.jayakumar

Abstract—The telemedicine system is an emerging area in the world. The major concepts of the telemedicine systems are providing the diagnosis system for all patients without moving them from their place to clinical areas. This paper presents an automatic defibrillator system specialized for cardiac patients and monitoring their heart beat in an android device by the help of Bluetooth technology. This paper is most suitable for the cardiac patients who are in the remote areas. The proposed system consists of five subsystems namely, (i) Electrocardiogram (ECG) acquisition system, (ii) Heart Rate (HR) acquisition system, (iii) Processing of ECG and HR signals, (iv) Defibrillator control unit, (v) Monitoring unit. It emphasizes the hardware realization of embedded diagnostic system, analyses the collection process of ECG and HR, comparison of ECG and HR, controlling of defibrillator under the coordination of Peripheral Interface Controller (PIC) microcontroller. The defibrillator will be controlled directly by the PIC microcontroller. Here a Bluetooth module is added with the hardware which can be connected with Android devices for monitoring the process continuously even by the patients too.

44 Review on Clustering Techniques
Kodhai, Ashtalakshmi

Abstract—Data mining is extracting information or facts from large quantities of information. Nowadays it is a growing tool by current business which is used to convert the given data into statistical form. This method is widely used in fraud detection, marketing and pattern recognition. Clustering is one of the practices in data mining task which involves creating groups of objects that are similar, and those that are dissimilar. This paper gives an overview of clustering techniques such as hierarchical clustering, density based and K-means clustering. It describes different methodology, approaches and parameters which are used in clustering techniques. The main objective of this paper is to gather more concepts and techniques used in clustering methods.

45 Efficient method for solar energy harvesting & storage Using thin film carbon- nano tubes
S.Karthikeyan, M.Mano

Abstract—This paper will gives a thorough insight of this relatively revolutionizing and satisfying solution of energy harvesting and storage through carbon nanotube by using thin film technology. In today‟s world one of the major problems faced by almost all the countries around the world is energy crisis. Although there are several ways of producing electrical energy from the available sources of energy, still it is not sufficient to satisfy the energy need of the world completely. From the most commonly available source of energy (solar energy), electrical energy has been produced using some traditional techniques, which is of the range of very few units of energy. Let us replace this conventional technique with most emerging method of solar energy conversion method using infrared solar nano cells integrated with carbon nano tubes for efficient storage of those converted energy. One of the most possible methods of using this nano cells is in the form of nano paints. Nano cells which has the capability to convert even small amount of incident light into electrical energy rather than requiring certain range of intensity. This technique replaces the bulky structure of conventional solar panels because of the size of nano cells. This paper also includes the efficient storage using carbon nano tubes in the form of super capacitors and paper batteries. This paper is aimed at understanding and analysing the implementation of infrared solar nano cells, its properties, characteristics and its potential in practical application .This paper is also aims at highlighting the construction and practical implementation paper batteries and super capacitors.

46 Result for Energy Efficient Scheduling in Green Cloud Computing
Manveer Singh, Jasmeet Singh Gurm

Abstract—The growth of Cloud at the time, when change in the climatic conditions and reductions in emissions for the energy use is a huge concern. As the demand of the cloud increases, energy requirements for the same have also been increasing. For all of the content like videos, pictures and other data to be delivered to us in real time must be stored somewhere so that it must be available at instantaneous access. Now, this huge data is stored at data center, which provides huge storage facilities consuming incredible amount of energy leading to increased operational cost, which not only declines the profit of Cloud providers, but also leads to high carbon emissions which is unfriendly to environment. So, solutions are required which are energy efficient to minimize the impact of Cloud computing on the environment. Green cloud computing is one of the solution to this problem which aims at increasing the energy efficiency during the products lifetime, promoting the recyclability of defunct products and reducing the use of hazardous products. So, aim of this research is to introduce a crossbreed scheduling algorithm which is energy efficient and to compare the results with the three scheduling algorithms which are (FCFS, Round Robin, and Priority). The simulation will take place in .Net environment which would be deployed over cloud network namely Window’s Azure.

47 Result on the Analysis of Different Cloud Servers on the Basis of Sophisticated Job Scheduling Approach
Karan Sood, Jasmeet Singh Gurm

Abstract—As the cloud computing environment is getting a huge platform to work on and in the upcoming years, cloud would be a name which would be used by common people for their data storage and other works which they do right now on their local servers. In such a case as the energy conservation is a major concern these days, we need to look up that which cloud platform would be better for the future use which is energy efficient and faster than the other cloud platforms. In this paper, proposed work is based on the use of three clouds like Windows Azure, Go daddy and Marttalk cloud for checking of the energy efficiency. The simulation is taken place in the .NET environment.

48 An ergonomic method of credentiality of Various requests from emergency vehicle Using batch request authentication Algorithm
S.Silambarasan, M.Maheswari, K.Rejini, D.Rajini Girinath

Abstract—VANET is a form of Mobile Ad-Hoc Network which provides communication between vehicles and road-side base stations. The aim is to provide safety, traffic management, and infotainment services. The security of VANET is in concern state from early time. VANETs face several security threats and there are a number of attacks that can lead to human life loss. Existing VANET systems used detection algorithm to detect the attacks at the verification time in which delay overhead occurred. Batch authenticated and key agreement scheme is used to authenticate multiple requests sent from different vehicles. Yet it does not provide any priority to the requests from emergency vehicles and a malicious vehicle can send a false message by spoofing the identity of valid vehicles to other vehicles leading to Sybil attack. Batch Request Authentication Algorithm (BRAA) is used to classify the requests obtained from multiple vehicles in order to provide immediate response to emergency vehicles with less time delay. This system also to prevent Sybil attack by restricting timestamps provided by RSU at an early stage itself.

49 Optimization of carboxymethylcellulase Production via submerged fermentation from a Newely isolated strain of bacillus subtilis subsp. Inaquosorum
Amita Sharma, Rupinder Tewari, Sanjeev Kumar Soni

Abstract—Fossil fuels reserves are depleting at an alarming rate which has developed a grim situation globally drawing the attention of scientific world. The rising costs of fuels have shifted the concerns to exploit renewable sources for production of value added chemicals. Worldwide research is going on to utilize the natural cellulosic biomass efficiently as it is considered as a virtually inexhaustible source of raw material to develop novel processes and products. But main obstacle in the path of success is high cost of enzymes necessitating the need to develop economically profitable processes. Cellulases are drawing the attention of the scientific world by virtue of their immense potential in lignocellulosic biomass utilization. The need for isolation of novel microorganisms from diverse habitats is imperative as they provide a platform for genetic modifications. In the present study, a novel strain of cellulose degrading bacteria was isolated from soil and identified as B. subtilis subsp. inaquosorum. Optimization studies were performed to enhance carboxymethylcellulase production. Maximum CMCase (1.4 IU/ml) activity was observed at 30ºC, 150 rpm after 72 hrs using wheat bran as carbon source.

50 New VLSI Architecture for Audio Compression Using Parallel Computation
Suganthi S, Thiruveni M

Abstract—In this paper, we propose a new very large scale integration (VLSI) algorithm for a 2N-length discrete Hartley transform (DHT) that can be efficiently implemented on a highly modular and parallel VLSI architecture. In the existing system the conventional discrete Hartley transformation is used. In that system has more number of multipliers which leads to more cost and high complexity in VLSI Architectures. To overcome this demerit, New Discrete Hartley transformation is going to be proposed. The proposed DHT components can be separated as even and odd components and the computation can be done parallely.The DHT algorithm can be efficiently split on several parallel parts that can be executed concomitantly. The proposed DHT architecture is well-matched for the sub expression sharing technique. Sub expression technique is used when one data is multiplied with many constants or sum of product. So it reduces the number of multiplications which in turn reduce the hardware complexity, delay and cost.

51 Assessment of Service Quality: A survey study in Bank ofAbyssinia Alula Abanega Branch, Mekelle, Ethiopia
Yassin Ibrahim, Adem Mohammed

Abstract—This study is conducted to assess the service quality of Bank of Abyssinia Alula Abanega branch using SERVQUAL model dimensions. The data are obtained from both primary and secondary data sources. The primary data was collected with questionnaire distributed to a sample of 99 customers based on non-probability sampling method, convenience sampling. The secondary data sources are statistical reports and consolidated customers' opinion about the SERVQUAL dimensions. The survey data collected from respondents was analyzed using gap score and descriptive statistics for all dimensions of SERVQUAL model and finally the overall service quality level of the bank is determined. The findings from the overall service quality shows that the majority of respondents were dissatisfied with the service quality of the bank since the gap scores for all dimensions were negative (i.e. customers expectation is higher than their perception about the actual service of the bank). Finally, the result of this study implies that management of the bank should focus on understanding the needs, wants, perceptions, and preferences of customers and provide quality service to enhance the level of customer satisfaction. In addition the bank should develop technical as well as human skill of its frontline employees and tellers through continuous training schemes.