IJAIR- Volume 5 Issue 2 (February 2016)


Sr/No/ Title Pdf
1 Experimental Response of Glass Reinforced Plastic Cylinders under Axial Compression Test

Abstract —This paper presents the results of buckling tests on laminated composite cylinders made from glass fibre reinforced plastic (GFRP). The laminates used are of type DF1400Õ consisting of woven glass fibre roving within a polyester resin matrix. In total, six cylinders constructed from two-ply laminates, in which the main variable is the laminate orientation, were tested under axial compression. The specimen details, experimental set-up and loading arrangements are described, and a detailed account of the test results is given. The results include thickness and imperfection mapping, and displacement, load and strain measurements. Use was made of an automated laser scanning system, which was developed for measuring the initial geometric imperfections as well as buckling deformations during various stages of loading. The results of this experimental study demonstrate the influence of laminate orientation on the buckling strength of composite cylinders, and provide detailed information necessary for analytical and design investigations.

2 A Review on “Influence of Extreme Temperature on Electricity Demand in Madhya Pradesh” (India)
Akanksha Dubey, Dr. A. K. Sharma

Abstract—The climate is defined as „thegeneral or average weather conditions of a certain region, including temperature, rainfall, and wind‟. The earth‟s climate is most affected by latitude, the tilt of the Earth's axis, the movements of the Earth's wind belts, and thedifference in temperatures of land and sea, and topography. Human activity, especially relating to actions relating to the depletion of the ozone layer, is also an important factor. Urban centers heavily depend upon electricity for their existence, with increase in temperature electricity demand for space cooling also increases. Climate Change induced temperature rise also affect electrical generation at power plants. Due to excessive cooling demand many cities in India has tooverdraw the electrical power from the grid, while the other not so important has to bear the power cuts due to increased demand by others.Urban areas are continuously growing larger creating huge demand of electricity for their smooth functioning; Rapid urbanization and improved lifestyle also adds further increase in the electrical demand of the city. This study attempts to improve upon an existing forecasting model indicating a quadratic Relationship between temperature and peak electricity demand whereby peak electricity loadincreases exponentially with increasing temperature based on previous analysis.

3 SQL-Injection A hazard to databases security via web application
Jagjit Kaur, Amrita, Mankiran

Abstract—Databases are the first target of the hackers. Weak authentication is one of biggest reason that for which we lose our confidential data. We usually share our sensitive information such as Debit/ credit card numbers, SSN etc without caring of the fact that when our system will interact in the internet through the WWW environment, huge amount of data is being created which may have user’s personal information. It may cause a break in the user’s privacy, if this data is fetched by any unauthorized party. Hence, the big question is that how can we ensure the database security against cyber-attacks. In recent times, SQL Injection attacks have emerged as a major threat to database security. SQL Injection Attack has been around for over a decade. It allows attackers to obtain unauthorized access at the back-end database to change the intended application-generated SQL queries. Such attacks target to databases through web frontend layer take advantage of flaws happens at user end. For the purpose of security, we have surveyed various SQL injection techniques which cause threat to database security. We will discuss various technical methods, terminologies used to handle these attacks.

4 Multiple Destination Map with Services
Prathemesh Bandbe, Shital Shetye, Manasi Jorkar, Ankita Surve

Abstract—The main objective of the web application MULTIPLE DESTINATION MAP AND SERVICES is to provide the users with the facility to input multiple destinations in a single tour. It enables the users to choose shortest path among its multiple given choices. In addition to this user will get the services that they need while travelling such as hospitals, mechanics, gas stations, accommodations etc. on one click. The web services provide the users with the add-on facility of saving and printing the map output as per the desired input by users. Even the users have the facility of sharing the map with the other users too so that it would be easy for them to make their route even much better and can even plan their return journey also. User friendly UI having Auto complete drop down location list, toggle destination buttons, quick buttons for various other features will make the use of b application very handy. As it’s an online Application it is developed using Google services API, PHP and JavaScript whereas Xampp database is used as a data warehouse.

5 Security Requirements and Mechanisms in Vehicular ADHOC Networks (VANET)
M.Newlin Rajkumar, M.Nithya, M.Krithika

Abstract—In recent years, Vehicles are becomes the more intellectual system which is operated with the help of radio communications. Thus the vehicles are formed the network for communications called as Vehicular Adhoc Network(VANET) which depends on Mobile Adhoc Network(MANET).However in Vehicular Adhoc Networks (VANET),the security will make an big issue, due to communication development, because of dynamically changing protocols, high mobility of vehicles and also high partitioned network. In this paper we address the security requirements of vehicles and needed mechanisms to avoid the threats and attacks in VANET.

6 Exploratory Analysis of Big Data Applications for Personalized Healthcare
Seshathiri D, Mohammed Abdullah A

Abstract—The notion that the purely phenomenological knowledge that we can extract by analyzing l a r g e amounts of data can be functional in healthcare seems to challenge the desire of VPH researchers to construct detailed mechanistic models for individual patients. But to carry out no model is ever entirely phenomenological or entirely mechanistic. We suggest in this arrangement paper that big data analytics can be successfully combined with VPH technologies to make robust and effective in silicon medicine solutions. In organize to do this, big data technologies must be further developed to cope with some precise requirements that emerge from this application. Such requirements are: working with sensitive data; analytics of multifaceted and heterogeneous data spaces, together with nontextual information; distributed data management under security and performance restraints; specialized analytics to integrate bioinformatics and systems biology information among clinical observations at tissue, organ and organisms levels; and specialized analytics to define the “physiological envelope” all through the day by day life of every patient. These domain-specific requirements suggest a call for for targeted funding, in which big data technologies designed for in silicon medicine becomes the research priority.

7 A Feedback Network Based High Step-Up Dc–Dc Converter for AC Photovoltaic Module Application
S.Lala Eswara Reddy, A.V.Suresh, O.V.S.Srinivasa Prasad

Abstract— Within the photovoltaic (PV) power-generation market, the ac PV module has shown obvious growth. However, a high voltage gain converter is essential for the module’s grid connection through a dc–ac inverter. This paper proposes a converter that employs a floating active switch to isolate energy from the PV panel when the ac module is OFF; this particular design protects installers and users from electrical hazards. Without extreme duty ratios and the numerous turns-ratios of a coupled inductor, this converter achieves a high step-up voltageconversion ratio; the leakage inductor energy of the coupled inductor is efficiently recycled to the load. These features explain the module’s high-efficiency performance. The detailed operating principles and steady-state analyses of continuous, discontinuous, and boundary conduction modes are described. A 15 V input voltage, 230 V output voltage, prototype circuit of the proposed converter has been implemented; its maximum efficiency is up to 95.3% and full-load efficiency is 92.3%.

8 A Study on Optimizing the Coupling Metric in Object Oriented Systems
J.Phani Prasad, Murlidher Mourya

Abstract—In the Object Oriented paradigm of systems, the design criteria is most important and it plays a vital role. With the incremental activity of Object Orientation the design scheme is becoming poor due to lack of concentration on design among larger systems. Also the interdependency between the classes (coupling) is increasing in this regard. Lot of research articles had been proposed up to now on coupling. In the present work we are taking a graph based model to show the importance of coupling by minimizing the coupling aspect to some extent.

9 Removal of High Density Impulse Noise using Efficient Median Filter for Digital Image
Prateek Agrawal, Prof. Dharmendra Sharma

Abstract—An Efficient Median Filter (EMF) algorithm for removal or enhancement of gray scale images are highly corrupted impulse noise is proposed in this paper. Noise in image are represent the pixel value 0’s and 255’s are ensures that black and white dot in image. In proposed algorithm take an image and select 3x3 size window and target or center pixel value check if its value is 0’s or 255’s then image is corrupted otherwise noise free image. If image is noisy and target pixels neighboring pixel value is between 0’s and 255’s then we replace pixel value with the median value and if target pixels neighboring pixel value is 0’s or 255’s then we replace pixel value with the mean value. Else increased the window size and again repeat this process until image is denoised. The proposed filter algorithm shows better simulation result as compare the existing algorithms. The simulation result shows better and efficient performance of PSNR and MSE and computation time.

10 Slope Failure Risk Assessment using FEM
Saiful Islam, Zarghaam Rizvi

Abstract—Finite element stability analysis of slope stability is carried out. Site investigation (SI) for Geological profile and laboratory testing are performed defining the soil conditions. The slope and the soil beneath are consist of firm to stiff embankment debris, salty clays, limestone’s and sandstones. The water table (WT) is observed not to vary too much and lies at the surface of the limestone/sandstone layer. The concept of sliding planes are defined and implemented in the FE analysis. For the considered WT conditions, residual friction angles φR = 11° and φR = 14° are respectively evaluated for minimum equilibrium condition. The measured values vary from φR = (9 – 13)°. On these conditions four different engineering measures such as a small embankment at toe, rows of cast-in-place piles, combination of anchors and pile are proposed are analyzed as a measure to stabilize the movement in the slope.

11 Implementation of Green House Environment Controlling and Monitoring System Based on Android Mobile Platform
A. S. Mali, V. V. Sutar, P. V. Sakharpe

Abstract—The embedded system we have proposed is real time controlling of the greenhouse parameter and monitoring using Android mobile through wireless network. The android mobile connected to the hardware using internet and GPRS shield. The green house environment parameters such as temperature, humidity, and moisture, light are monitored and controlled as per requirement. It has three sensors at input side and it has four devices at the output side to control the greenhouse parameters. The values of proposed green house environment parameters are represented graphically with latest value highlighted. These values are displayed on thingspeak.com website.

12 Efficient Method for Reducing ICI in OFDM Systems
Velisetti Haritha, Kanagala Sindhu, Durai Sarath , P. Gayathri

Abstract—Inter Carrier Interference (ICI) caused by the Carrier Frequency Offset (CFO) and Doppler shifts, highly disgrace the performance of OFDM system. For OFDM communication system which is a promising technique for high data rate transmission, the theoretical BER and CIR are difficult to obtain in presence of ICI. The BER of the received signals are very sensitive to Doppler shifts and frequency offsets (reasons of ICI). This paper presents an efficient and improved ICI Self-Cancellation technique. The proposed technique improves the system throughput and reduces the BER. The performance comparison results show that proposed technique has better BER and improved CIR than standard OFDM and existing sc scheme.

13 Recent Trends For Physically Challenged People
Dr.M.Newlin Rajkumar, M.Lavanya, J.Juslin sega

Abstract—Neuro sky and sign language are used to communicate with the deaf and dumb people. It can resolve the obstacle among the physically challenged people. The aim of the project is to classify the signals based on electroencephalogram. In this project emotion and intention can communicate with human beings. If the frequency is matched it displayed on the LCD and the words automatically converted into audible signals.

14 #s*g-closed sets in Topological Spaces
V.R.Karuppayal, K.kamakshi

Abstract—This paper deals with a new class of sets namely #s*gα- closed sets in topological spaces and derive the properties of #s*gα-closed sets. Also we find the relationship between #s*gα- closed sets and the other existing sets. Moreover with the help of these sets, we introduce three new spaces, #s*gαTb spaces, αgTb spaces, sTb** spaces.

15 s*g - totally continuous functions in topological spaces
V.R.Karuppayal, N.Nandhini

Abstract—In this paper we introduced s*g - totally continuous functions and investigate their properties. Also we derive some basic properties of s*g - totally continuous functions and three new class s*g -T1, s*g-T2, s*g -T0.

16 A Review on “Performance Analysis of Thermal Power Plant for getting Maximum Efficiency”
Narendra Sahu, Prof. K.K.Jain, Dr. R. K. Dave

Abstract—About 70% of India's energy generation capacity is from fossil fuels, with coal accounting for 40% of India's total energy consumption followed by crude oil and natural gas at 24% and 6% respectively. India is largely dependent on fossil fuel imports to meet its energy demands by2030; India's dependence on energy imports is expected to exceed 53% of the country's total energy consumption. In 2009-10, the country imported 159.26 million tonnes of crude oil which amounts to 80% of its domestic crude oil consumption and 31% of the country's total imports are oil imports. The growth of electricity generation in India has been hindered by domestic coal shortages and as a consequence, India's coal imports for electricity generation increased by 22% in 2015. In view of this situation, the project seeks to increase output from the Power Stations (PS) in the process closing down on the power shortages now and in the future through effective and efficiency improvement. This paper presents a review of the methodology to evaluate the performance of coal based thermal power plant. The main aim of the study is to identify areas where energy losses are occurring and develop them for efficient and effective improvement in a thermal power station.

17 A Review on “Performance Analysis of Thermal Power Plant for getting Maximum Efficiency”
Narendra Sahu, Prof. K.K.Jain, Dr. R. K. Dave

Abstract—Sanjay Gandhi thermal power station, Birsinghpur is situated in the district of Umaria (M.P). The total Capacity of the plant is 1340MW (4X210MW+1X500MW). The purpose of the project is to assess the major power consumption by auxiliaries and suggesting cost saving alternatives in terms of energy saving. In this study the Energy audit of unit -3 along with Coal Handling Plant have been conducted for main auxiliaries of thermal power plant like Boiler, Turbine, Condenser vacuum system, Coal handling plant, performance evaluation of Air preheater, DM water consumption. Various parameters from Control room and Chemical wings has been taken and it was found that the efficiency of boiler is 87.51% which we can improve up to 89.63% by reducing dry flue gas losses. There is a lot of wastage of DM water in the plant, There is a huge amount of water passing in Boiler Feed Pump recirculation line, after carrying out the various calculation on Boiler Feed Pump, it is observed that the anticipated saving of approximately Rs. 27.30 Lakhs per year with an investment of Rs.5.0 Lakhs by replacement of valves. Motor Driven Boiler Feed Pump is the main power consuming auxiliaries in thermal power plant; it takes 3.5 MW per Boiler Feed Pump. We can replace Motor Driven Boiler Feed Pump by Turbo Driven Boiler Feed Pump and approximately we can save 2772 Lakhs per year with an investment of Rs. 1000 Lakhs. In Coal Handling Plant most of the motors (Conveyers and Crushers) are running under low load and a lot of power is wasting. Therefore by adopting some precautions and recommendations we can reduce the power consumption. The total anticipated saving will be 4108 Lakhs. per annum with an investment of Rs.2592 lakhs and payback period is 7.5 months. The study conducted clearly shows that the preventive maintenance, overhauling and re-assessment of operating conditions of aging plant imparts a major role in keeping a power plant an energy efficient utility.

18 Fault Detection and Classification in Transmission Lines: An ANFIS Approach
Noopur Pandey, PROF. Arti Bhandakkar

Abstract—An overhead transmission line is one of the main components in electric power system. The transmission line is exposed to different types of faults such as phase-to-earth fault, two-phase-to-earth fault, phase to-phase fault, three phase fault. The fault detection and classification for the transmission line is an important issue since identifying accurate fault detection can facilitate repairing the damage and restoring the transmission line rapidly. The time needed to detect the fault will affect the quality of the power delivery. Therefore, accurate fault detection on the line is an important requirement for a permanent fault. This paper presents an application of ANFIS approach for automated fault disturbance detection and classification in transmission lines using measured data from one terminal of the transmission line. The ANFIS design and implementation are aimed at high-speed processing which can provide selection real-time detection and classification of faults. The Training and Testing of ANFIS is done using MATLAB version7, R2010a.

19 Virtual Mobile System
Sameer Chauhan, Sankalp Narayan

Abstract—In general paradigm today, it can be safe to say that the current mobile systems are huge consumers of an overwhelming amount of resources, both physical and virtual. The functioning happens such that, known to many, Mobile devices use RAM (random access memory) in Gigabytes, which consumes internet in large amounts. While downloading large files in multiple copies, a high possibility of threats to the already stored data can be created as a repercussion of the same may lead to wastage of storage space and wasting CPU timings through large processing power with low consumption. However the entire idea of a Virtual based system has evolved from this very fact that as more number of applications and mobile apps are evolving with the days, there is an increasing usage of electronic gadgets. To lessen the utilization of unnecessary contraptions and gadgets, we have attempted to build up a thought which will permit the client to customize the equipment and programming prerequisites as indicated by ones' own particular needs or utility. This paper explains the way how the virtual mobile system will mitigate the problem of undue amount of resource wastage and would save the production of increasing number of gadgets these days. It will also help to build future ready devices. This is a Cloud based planning which centralises, manages, operates and allocates all the resources on demand. In a nutshell, it can be understood that this paper helps to develop a smarter user friendly way of building a device which can replace numerous present day devices into a single universal component unit. It is aimed to create this device supporting all current day applications as well as those in the upcoming times. It will ensure saving excessive amount of electronics used in building RAM, GPU, CPU and help save tremendous amount of internet usage as no multiple copies are generated by using manageable storage. Additionally, cost reduction has been one of the major drivers into building such a virtual based system; as it ensures availability of all the resources to every individual at the minimal average costs which would otherwise have been relatively very expensive to use.

20 A Novel Multiple Non Visible and Data Publishing with Provable Distance-Based Mining
K. Mowcika, S.P.Santhoshkumar, V.Anuradha, G.Mariya Lavanya Sangeetha

Abstract—Data exchange and data publishing are becoming an inherent part of business and academic practices. Data owners, nonetheless, also need to maintain the principal rights over the datasets that they share, which in many cases have been obtained after expensive and laborious procedures. This project presents a rightprotection mechanism that can provide detectable evidence for the legal ownership of a shared dataset, without compromising its usability under a wide range of machine learning, mining, and search operations. The algorithms also preserve important properties of the dataset, which are important for mining operations, and so guarantee both right protection and utility preservation. The project considers a right-protection scheme based on watermarking. Watermarking may distort the original distance graph. The proposed watermarking methodology preserves important distance relationships, such as: the Nearest Neighbors (NN) of each object and the Minimum Spanning Tree (MST) of the original dataset. It proves fundamental lower and upper bounds on the distance between objects post-watermarking. The application is designed using NET BEAN 6.8 as front end. The coding language used is Java 6.0. MS-SQL Server 2000 is used as back end database.

21 CSR and Rural Sanitation (Swachh Bharat) in India
Dr. M. Ignatius, Prof. Freek Cronjé, Ms. Suzanne Reyneke

Abstract—According to the WHO and UNICEF (2013) in terms of human well-being and development, health and sanitation are very important aspects for every human being. The shortage of toilets and drainage systems in India are very relevant in this regard. Promoting and protecting the community is not only the government’s job but also requires the involvement of every citizen of India, particularly the corporations. Corporate Social Responsibility (CSR) is not charity work; rather, it should be purely based on the developmental oriented. CSR shares profits with all the stakeholders in a task oriented manner. In this regard, Swachh Bharat Abiyan was launched by the Prime Minister of India Shri Narendra Modi on Gandhi’s 145th birth anniversary on the 2nd of October 2014. Government believes that corporations can join hands with them in order to help implement the Swachh Bharat Abiyan, and therefore, CSR can play a vital role in achieving the “Clean India” mission. In order to carry out this research work, the researchers adopted a descriptive research design, and selected 25 respondents for this study using the simple random sampling lottery method. The data was collected by utilising a selfprepared Interview schedule. The study revealed the important role of CSR programmes in rural sanitation.

22 Gray Hole Attack on TORA Routing Protocol with IMEP
Amandeep Gautam, Jasdeep Singh

Abstract—The Temporary Ordered Routing Protocol (TORA) is a distributed routing algorithm that provides loop free routes from the source to destination. Internet MANET Encapsulation Protocol (IMEP) is used in TORA to avoid collision during packet transmission. In this paper, we will study about Impact of IMEP on TORA Routing Protocol and how gray hole attack will be implement on TORA Routing protocol and also will study its parameters.

23 Rapid Modified To Order in Road Network Using Customer Point of Interest
M. Anbu, R. Kanniyarasu, S.P. Santhoshkumar, V. Anuradha

Abstract—We present a combined structure for dealing with exact point-of-interest (POI) queries in dynamic continental road networks within interactive applications. We show that partition-based algorithms developed for point-to-point shortest path computations can be naturally extended to handle augmented queries such as finding the closest cafe or the best place of work to stop on the way home, always position POIs according to a user-defined cost function. Our solution allows different trade-offs between indexing effort (time and space) and query time. Our most flexible variant allows the road network to change regularly (to account for travel information or modified cost functions) and the set of POIs to be specified at query time. Even in this fully dynamic scenario, our key is fast enough for interactive applications on continental road networks.

24 Effect of machining parameters in wire-electrical discharge turning process: A review
Gajanan M Naik, S. Narendranath

Abstract—The Wire Electrical Discharge Turning (WEDT) supports to generate cylindrical part, which is hard and difficult to machine materials under conventional machining operation. WEDT process is a one of the prominent machining process to develop a turned object for specific industrial applications. This literature review, reviews the effect of machining parameters, such as power, time-off, voltage, servo, wire speed, wire tension, and work piece rotational speed factors on the MRR, Surface integrity, Roundness and published microstructures of carbide, brass parts and high tensile steel are investigated by using Scanning Electron Microscope (SEM) to observe crater, heat affected zone, recast layer and bubble formation on the turned surface. It is essential to optimize the process parameters and to increase machinability, productivity.

25 Circumstantial Analysis of Preferred Teaching Styles (A Case Study of Computer University, Loikaw)
Nang Nwe Nwe Soe, April Thet Su, Poe Ei Phyu, Hlaing Htake Khaung Tin

Abstract—This Computer studies is a very important subject in our country because of its numerous and widespread application in addressing individual, organizational and societal problems. The research work examined the effect of attitudes on performance of teachers in Computer University (Loikaw) in Kayah State, Myanmar. Teachers’ preference to a particular or multiple teaching styles from certain inherent and external conditions that influence their choice. The descriptive research approach was used with a sample size of 16 teachers from computer university, Loikaw, Kayah State, Myanmar. This paper embarks on a circumstantial analysis of preferred teaching styles used by computer teachers. The research instrument that was used in the study was the questionnaire for the teachers in the computer university. Therefore research articles relevant to our topic were reviewed to find answers to our research questions. Based on the findings of this study, recommendations were made. The university should organize seminars to upgrade and update teachers’ knowledge.

26 Analysis of Potential Evapotranspiration of different Cities of Kingdom of Saudi Arabia
Saiful Islam, Dr Ram Karan Singh, Roohul Abad Khan, Mohd Danish

Abstract—Potential evapotranspiration (PET) is an important index of hydrologic budgets at different spatial scales and is a critical variable for understanding regional biological processes. It is often an important variable in estimating actual evapotranspiration (AET) in rainfall-runoff and ecosystem modelling. The Present work deals with Computation of Potential Evapotranspiration under different climatic conditions in Saudi Arabia using Temperature based empirical equation- Thornthwaite method. Weather data for Riyadh representing arid climate, Jeddah representing humid climate and Abha representing moderate climate were analyzed. These data contained Mean Temperature and heat index. The result shows that Jeddah has highest evapotranspiration rate per year because of humid climate followed by Riyadh which is having arid climate and the least value is found for Abha city due to moderate climate

27 Decentralized plan-free phonological based service composition using access point in mobile networks
R.Latha, M.Kavitha

Abstract— The inability of phonological similarity and phonological nearness service leads to epoch engrossing while elucidation and the dope to the neighboring bud may leads to splintering erstwhile. The portiere elucidation is lacking in their hauling of information. This paper we introduce the multiple client application to avoid the defeat of bud using Access point (Hub). The objective of the concept is to using the access point to funnel and inherit with neighboring bud. By using the access point, the bud can funnel without any defeat and no epoch engrossing. Dissemination of bud with the neighboring bud may lack in funnel and inheriting, so the access point will be helps to respond swiftly and with many clients at a single time.

28 Secure Data Retrieval through Open Control in Critical Machine Network
Latha.R, Sarathkumar.S

Abstract— Technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution to the access control issues. However, the problem of applying CPABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities. In this paper, we propose a secure data retrieval scheme using CP-ABE for decentralized DTNs where multiple key authorities manage their attributes independently. We demonstrate how to apply the proposed mechanism too securely and efficiently manage the confidential data distributed in the disruption-tolerant military network.

29 Privacy-Preserving Using Multi- Keyword Search over Encrypted Big Data Storage
R.Latha, V.Tamilarasi

Abstract—Security is a prime concern for any service that provides big data storage. The data of an individual should remain confidential and should be accessed only by any authenticated person. The required features are obtained by introducing a new technique for providing big data storage i.e. a privacypreserving multi keyword search over encrypted big data storage. In this technique the latest proposal of “Coordinate matching” i.e., “as matching keys as prospective”, is a well-organized similarity evaluate among such multi-keyword semantics to refine the consequence relevance, and has been generally worn in the plaintext Information recovery (IR) community. However, how to be appropriate it in the encrypted cloud data hunt system remains a very difficult task because of inherent protection and privacy obstacles, including various strict necessities like the information privacy, the index privacy, the keyword privacy with multi storage and multi sharing mechanisms.

30 Conflict Free Packet Scheduling For Underwater Communication
R.Latha, E.Semmalar

Abstract—This concept has the multiparty crisis of sachet preparation and self-localization in an underwater auditory antenna system with arbitrarily scattered nodes. In packet scheduling, we should concentrate to diminish the localization instance; we consider two package transmission schemes explicitly a clash-free of charge scheme (CFS), and a conflicttolerant scheme (CTS). The mandatory localization moment is formulate for these schemes, and in the course of systematic domino effect and statistical examples and implementation are revealed to be reliant on the conditions. When the sachet period is diminutive (as per the result in the localization package), in the service region is huge (above 3 km in at any rate one aspect), and the typical prospect of packet-thrashing is not lock to zero, the conflict-liberal scheme is originate to involve a minimum localization instance. Simultaneously its accomplishment intricacy is inferior to that of the conflict-free scheme, because in CTS, the anchor works autonomously. CTS consume to some extent more force to composition for package collision, but it is exposed to afford a better localization precision.

31 Multiple Transmission Techniques With Defective Cell And Other Cell CSI
Senthilmurugan.J, Janani.K.T, Diviya.R

Abstract—CoMP transmission for LTE-Advanced systems promises improved throughput and coverage performance, especially for cell edge users. The concert of CoMP systems heavily depends on the feedback feature and channel imperfections. The collision of quantized and deferred channel state information (CSI) on the standard feasible rate of joint transmission (JT) and coordinated beam forming (CBF) systems. CSI originate closed-form terminology and precise approximations on the estimated sum rate of CoMP systems with deficient CSI assuming small-scale Rayleigh fading, path loss attenuation, and other-cell interference (OCI).Multiple users are additional sensitive to CSI imperfections than single-user JT and Coordinated multipoint or cooperative MIMO is one of the capable concepts to progress cell edge user data rate and spectral efficiency. Interference can be subjugated or mitigated by assistance between sectors or different sites. Multimode transmission system that switches among CoMP schemes to exploit the addition rate. Finally, Multimode transmission (MMT) policy, which enables us to identify which CoMP scheme provides the largest throughput in each system operating regime, depending on the normal SNR, feedback bits amount of the delay on CSI, as well for instance on the number of antennas and users served. This scheme adaptively switches among different CoMP transmission modes to maximize the sum rate. Since different path loss attenuation is considered for the users and OCI is included in the model, several performance metrics cannot be derived in closed form. Use a moment matching technique to approximate the interference distribution, which is given by the weighted sum of chi-squared random variables, by a Gamma distribution.

32 Segmentation of unsupervised multispectral satellite imaginary using mean shift, minimum spanning tree and watershed based clustering techniques
J.Senthil Murugan, A.Kavithhamani, M.keerthana

Abstract—An unsubstantiated density centered subdivision; merging an altered mean-shift (MS) and an original tinniest traddling tree (TST) based gathering method of the slightest bit detected satellite metaphors has stayed projected in this communication. The image is first preprocessed by an adapted variety of the typical MS created dissection which conserves the necessary discontinuities contemporary in the twin and assurances completed separation in the productivity. An adjacent neighbor based technique for approximating the bandwidth of the grain mass estimator (GME) and a original closure condition have been unified into the customary MS. Since the segmented sections as bulges in a squat equal article interplanetary, a TST is assembled. An unsubstantiated method to collection a presumed MST has also been devised here. This type of amalgam dissection procedure which collections the sections its place of twin pixels diminishes importantly the compassion to sound and augments the complete dissection presentation. The dominance of the projected method has been investigated on a great set of multispectral metaphors and associated with some well-known fusion segmentation representations.

33 Access Point Diversity Using Seamless Internet Access for Moving Vehicles
M.Nishanthi, S.Sivakumar

Abstract—The cellular networks have been proven to be insufficient for the surging amount of data from Internet-enabled mobile devices. Due to the explosive growth of the subscriber number and the mobile data, cellular networks are suffering overload, and the users are experiencing service quality degradation. In this project implement seamless and efficient WIFIbased Internet access from moving vehicles. In our implementation, a group of aps are employed to communicate with a client (called “AP diversity”), and the transmission succeeds if any AP in the group accomplishes the delivery with the client (called “opportunistic transmission”). Such AP diversity and opportunistic transmission are exploited to overcome the high packet loss rate, which is achieved by configuring all the aps with the same MAC and IP addresses. With such a configuration, a client gets a graceful illusion that only one (“virtual”) AP exists, and will always be associated with this “virtual” AP. Uplink communications, when the client transmits a packet to the virtual AP, actually multiple aps within its transmission range are able to receive it. seamless in the sense that any user can use it and maintain his workspace, including all existing network connections without manual configuration and with minimal network overhead. In downlink, a packet destined for a client is first pushed to a group of APs through multicast. This AP group is maintained dynamically to follow the moving client.

34 Small Finding Mechanisms to Track Your Belongings
M.Sakthivel, P. Saravanan, M.Pandian

Abstract—Objective: Present a real-time way established on Bluetooth for pursuing mechanisms to retain your belongings safe. Methods: The incentive of this discover is for all kind of people who losing their belongings, can trail their items by employing Bluetooth- Pursuing mechanism that is PROTAG ELITE. Findings: The Bluetooth- Pursuing mechanism that is PROTAG ELITE is utilized to trail each kind of your belongings. PROTAG ELITE is a sleek and slender trust card sized Bluetooth- Pursuing mechanism that automatically alerts you whenever you are out of the enumerated harmless zone. You can set the distance settings facilely via Wi-Fi networks. Just slide this into your purse (or) wallet and be on your way. It uses Bluetooth low power knowledge that run on both IOS and Android periods and its USB chargeable battery can last 18 months. Improvements: The drawbacks are decreased in this counseled system. Finally, examination aftermath displayed that the counseled method provides 99% pursuing of your belongings.

35 Review on MRI Brain Tumor Classification Using SVM Classifier
Aparna M. Nichat, S. A. Ladhake

Abstract—The field of medical imaging gains its importance with increase in the need of automated and efficient diagnosis in a short period of time. MRI is the most important technique, in detecting the brain tumor. In this paper data mining methods are used for classification of MRI images. A new hybrid technique based on the support vector machine (SVM) and modified fuzzy c-means for brain tumor classification is discussed. The purposed algorithm is a combination of support vector machine (SVM) and modified fuzzy c-means, a hybrid technique for prediction of brain tumor. In this algorithm the first stage is noise reduction using Median Filtering. Modified fuzzy c-means (FCM) clustering is used for the segmentation of the image to detect the suspicious region in brain MRI image. Texture based features such as GLCM(Gray Level Co-occurrence Matrix)features is used for extraction of feature from the brain image, after which SVM technique is applied to classify the brain MRI images, which provide accurate and more effective result for classification of brain MRI images.

36 Path Planning in Indoor and Known Environment using BAPSO Algorithm
Mukesh Kumar Nandanwar, Dr. Rekh Ram Janghel, Dr. A.S. Zadagaonkar

Abstract—The path planning through BAPSO algorithm in indoor and known environments is a novel approach for robotic path planning. The BAPSO is a hybrid (BAT and PSO) algorithm. The main challenges of robotics are its automation and detection capability and the preliminary step of achieving these is through optimized path establishment, formation, flocking, and rendezvous, synchronizing and covering. Robotic Path Planning is one of the main problems that deal with computation of a collision-free path for the given robot, along with the given map on which it operates. Path establishment is possible only when the environment is known and the targets location is estimated. This work focuses on Path planning problem of coordinated multi-agents, target tracking and reaching in the indoor and known environment through obstacles avoidance. We are also showing the comparative results for this algorithm with other state of the art techniques. Parameters that asses these algorithms are no of node visit (move) and time elapsed (time).

37 Role of Advanced Building Façade System Considering Sustanaibility & Renewabale energy Practices: Analyzing the need of sustainibility with Technology
Ar. Farhat Ali

Abstract—The External building facade plays an essential role in saving or consuming energy, depending on the type of the covering and design. Architects and engineers have to study many concerns when working with facade designs, including ecofriendly issues, aesthetic presence, and inhabitant luxury, and view; these aspects make the façade a sustainable component. The purpose of this paper is to review the current practice and development of the sustainable features for façade system and to explore its role in the improvement of energy performance in buildings thru renewable energy techniques. Another important factor is the rising global stress to reduce carbon footprint and concerns for creating sustainable environments, where an effort are being construct innovative solutions and emerging trends in tall building designs for environmental sustainability. This paper discusses environmental sustainability in various buildings with special reference to the application of renewable energy technologies. This article presents an innovative façade system designed to increase the thermal comfort inside building. Renewable energy and considering sustainable aspects might reduce the load of various mechanical energy sources.

38 Impact of circular strength training with tapering on selected physical and performance variables Among handball players
S. Rameshkumar, Dr.R. Jayachandran

Abstract—The purpose of the study was to find out the impact of circular strength training with tapering on selected physical and performance variables namely grip strength, maximum strength, core strength, Explosive power, Flexibility among male handball players. To achieve the purpose of the study twenty eight male handball players have been randomly selected from various colleges in the state of Tamil Nadu, India. The age of subjects were ranged from 18 to 25 years. The subjects had past experience of at least three years in handball and only who those represented their respective college teams were taken as subjects. A series of physical tests was carried out on each participant. grip strength assessed by grip dynamometer, maximum strength assessed by1RM test, core strength assessed by plank test, Explosive power assessed by Seated Medicine Ball Throw, flexibility assessed by sit and reach and performance variables assessed by judges rating. The subjects were randomly assigned into two groups of fourteen each, such as experimental and control groups. The experimental group participated in the circular strength training with tapering for 3 days a week, one session per day and for 8 weeks each session lasted 45 minutes. The control group maintained their daily routine activities and no special training was given. The subjects of the two groups were tested on selected variables prior and immediately after the training period. The collected data were analyzed statistically through analysis of covariance (ANCOVA) to find out the significance difference, if any between the groups. The 0.05 level of confidence was fixed to test the level of significance difference, if any between groups. The results of the study showed that there was significant differences exist between circular strength training with tapering group and control group. And also circular strength training with tapering group showed significant improvement on grip strength, maximum strength, core strength, explosive power, flexibility and performance compared to control group.

39 Enhancing the Performance of Identification System Based on Score Level Fusion
Subhash V.Thul, Anurag Rishishwar, Bhagwat Kakde

Abstract—Biometric recognition, or simply biometrics, refers to the use of distinctive anatomical and behavioural characteristics or identifiers (e.g., fingerprints, face, iris, voice, hand geometry) for automatically recognizing a person. In unimodal biometric systems the recognition accuracy has to contend with a variety of problems such as background noise, noisy data, non-universality, spoof attacks, intra-class variations, inter-class similarities or distinctiveness, interoperability issues. In this paper a multimodal biometric system that integrates multiple traits of an individual for recognition has been described, which is able to alleviate the problems faced by unimodal biometric system while improving recognition performance. A multimodal biometric system can be developed by combining iris and face at match score level using simple sum rule. The match scores are normalized by min-max normalization. The identification and verification by this system is much more reliable and precise than the individual biometric systems.

40 Text Mining: Technique, Tools & Mining Process
Shravan Kumar, Naazish Rahim

Abstract—Text mining is a burgeoning new field that attempts to glean meaningful information from natural language text. It may be loosely characterized as the process of analyzing text to extract information that is useful for particular purposes. Compared with the kind of data stored in databases, text is unstructured, amorphous, and difficult to deal with algorithmically. Nevertheless, in modern culture, text is the most common vehicle for the formal exchange of information. The field of text mining usually deals with texts whose function is the communication of factual information or opinions, and the motivation for trying to extract information from such text automatically is compelling—even if success is only partial. Four years ago, Hearst [Hearst, 1999] wrote that the nascent field of “text data mining” had “a name and a fair amount of hype, but as yet almost no practitioners.” It seems that even the name is unclear: the phrase “text mining” appears 17 times as often as “text data mining” on the Web, according to a popular search engine (and “data mining” occurs 500 times as often).

41 Queue Length Based CSMA/CA Algorithm for Corn Using Channel Allocation Algorithm
Latha.R, Sathishkumar.G

Abstract—CSMA-type random access algorithms can achieve maximum possible throughput in wireless networks. Cognitive Radio Networks allow unlicensed users access licensed spectrum opportunistically without disrupting primary user (PU) communication. Developing a distributed implementation can fully utilize the spectrum opportunities for secondary users (SUs) have so far remained elusive. We are proposing a new algorithm channel allocation algorithm. The proposed algorithm achieves the full SU capacity region while adapting to channel availability dynamics caused by unknown Primary User (PU) activity. Extensive simulation results provided to illustrate the efficacy of the algorithm.

42 Resource Allocation Management System for Interference Mitigation in Femtocell Networks
Latha.R, Sivaramakrishnan.S

Abstract—One of the helpful techniques of improving the coverage and enhancing the capacity and resource allocation in cellular wireless networks is to reduce the cell size and transmission distances. The concept of deploying femtocells over macro cell has recently concerned growing interests in academic circles, industry, and consistency forums. Various technical challenges towards group deployment of femtocells have been address in recent creative writing. Interference mitigation femtocell and macro cell is considered to be one of the major challenges in femtocell networks because femtocells share the same permitted frequency spectrum with macrocell the different state-of-the-art approaches for interference and resource management in orthogonal frequencydivision multiple access (OFDMA)-based femtocell networks. We develop a local searching algorithm and pareto optimal matching algorithm for using the project.

43 Design and analysis of luo converter based DMPPT and CPG for solar PV system
R.Tamilvendan, A.Balasubramaniyan

Abstract—There is increasing urgent energy issues day by day, that’s why the world attaches great importance to begin the development of new energy and related technology. At present, large scale photo-voltaic power generation and scale of renewable energy has become parts of development strategy, meanwhile it is the way to guide the development of photo-voltaic industry. However, because of its own characteristics different from conventional powergeneration grid connected PV power station and its security, stability, reliable operation become new challenges which power grid and PV power plant need to face. This review paper proposes a new power control concept for grid-connected photovoltaic (PV) inverters. The new control strategy is based on combination of a constant power generation (CPG) control with a distributed maximum power point tracking control (DMPPT) depending on the instantaneous available power from the PV panels. The essence of this concept lies in the selection of an appropriate power limit for the CPG control to achieve an improved thermal performance and an increased utilization factor of PV inverters. Ultimate objective is to cater for a higher penetration level of PV systems with intermittent nature.