IJAIR- Volume 5 Issue 6 (June 2016)


Sr/No/ Title Pdf
1 Process Variation: Performance Degradation Analysis Each New Technology
Neha Mishra, Shweta Agrawal, Prashant Badal

Abstract — Scaling is the primary engine for growth of VLSI industry in last few decades. The scaling improves all device parameters simultaneously which results in improved devices and systems. The scaling new has reached to sub-nanometer regime where other undesirable effects are coming into pictures. Process variations is deviation in devices parameter from their original value and becoming so severe that further scaling is not possible. The designs which are implemented without considering process variations fails to provide correct output. The modern devices not only demand high performance, energy efficient operation but also demand operation should be done accurately. The process variation making the device behaviour deterministic to probabilistic. Therefore, critical analysis is required for performing some signal processing accurately. This paper critically analyses different types of process variations. Further the process variations effect on the logic is also analysed.

2 Power Generation from Microbial Fuel Cell Using Microcontroller
M.Vennila, T.Rajamanikandan

Abstract — In this project, microbial fuel cell used to generate the power of 28.4w/cm2.The fuel cell contains:1)it is suitable for multilayer carbon anodes 2)The extension of the period of time it will hold the anode and cathode. The anode is used to restrict the hydrophobic and the paper based tanks are modeled by saturating and polymerizing photo resist through UV lithography and the catholyte current of 211A/cm2 was created. The multi anode MFC uses the power and current density raised by 5x and 3x also compare with single anode. This fuel cell is very simple to use and using the bio sensor even the sewage or soiled water in a pool become to operating the MFC and reap electricity.

3 Comparative Model for Secure Data Transmission in Military Networks
Srinath KS, Binesh Kumar Chaurasiya, Rajeev Kumar Das, Swati Verma, Sheela Rani CM

Abstract — In military network, the data transferred should not compromise the confidential information. During transmission in this network, the data is likely to suffer from issues like data breaches, data modification, insecure interface attack, malicious insider attack and data loss attacks performed by some unauthorized user. Cryptography is a promising solution to such issues. Under it, we have few basic techniques such as: IBE (Identity based encryption), ABE (Attribute based encryption) and CP-ABE (Cipher policy- attribute based encryption), which are being used from past few years. In this paper, we have compared IBE, ABE and CP-ABE model for their efficiency in providing high security in decentralized disruption-tolerant military network (DTN). We have implemented these three techniques to check effectiveness of securing the data. The comparison among the three techniques is quite helpful in considering the better and the efficient one. Based on their level of data security needed for a particular domain, the most suitable one can be selected.

4 Simulation study of Collaborative Attack on Wireless Mobile ADHOC Network with AODV Routing Protocol on MANET
Gurpreet Kaur, Deepinder Kaur Dhaliwal, Neha S

Abstract — This is a preliminary requirement of a communication among the cooperative nodes in a network is establishing by Manet. There is no need of any Infrastructure to Communicate in Mobile ADHOC. In this paper we can analyze the simulation results by applying the Black hole and wormhole attack as a collaborative attack on MANET using ADOC on demand distance vector (AODV) routing protocol in . we get the results what kind of impacts are drawn with or without collaborative attack on MANET and analyze the how much performance degrade and packet lose ratio and average end to end delay with or without collaborative attack .the simulation is carried on opnet and the simulation results are analyzed on various network performance matrices.

5 Simulation study of Sinkhole Attack with DSR Routing Protocol on MANET
Mandeep Kaur, Khushboo Bansal, Neha Soni

Abstract — Now a day Wireless Mobile Communication used in many applications such as military, defense etc. However this type of network have many constraint including less range of communication capability, insecure transmission channel , less consumption power which lead the system Vulnerable to many attacks . In this paper we can discuss that how the sinkhole attack degrade the performance of network. We also analyze the Simulation study of Sinkhole attack and discuss how by changing parameters performance of network will improve.

6 Analysis Of Flow Through Turbine Blade For Effective Cooling Using CFD
Bharath kumar s, Dr Maruthi B.H., Ravindra A R

Abstract — Gas turbine blade will be exposed to very high temperature due to that ever nine hundred hours of flying aircraft a blade must be changed which requires change of blade hence it is necessary for us to provide effective cooling by using bypass air from compressor will be drawn to cool the blade without effecting the efficiency of combustor. In this project an effective cooling has been provided by changing the shape of the cooling hole there by increasing surface area of cooling. By providing effective cooling of gas turbine blades life span of blade can be increased which results in effective cost saving. Here effective cooling has been provided by changing the shape of cooling holes and number of cooling holes. Since convective heat transfer depends on fluid property and shape of the domain. The number of cooling holes restricted to thirteen since more the number will decrease the strength of the blade and consumes more amount of air which in turn decreases the efficiency of combustor.

7 Thrust Augmentation by Analysis of Flow in Supersonic Nozzle using CFD
Girisha K L, Chandru B T, Matrthi B H, Ravindra A R

Abstract — Rocket propulsion depends on thrust, thrust interns depends on newton’s III law. In order to obtain thrust power in rocket, convergent divergent nozzle has been used. In order to obtain maximum velocities in convergent –divergent nozzle expansion takes place where Mach No. in the convergent nozzle has been subsonic and sonic and in divergent part it has been supersonic. In order to obtain maximum thrust geometry parameters(D/Do*) will be varied and analysis has been carried out. After optimizing, the required geometry further analysis has been carried out at different altitude. It has been shown that, a saturation pressure has been reached at a particular altitude, which is the main aim of this project. Again optimize geometry has been taken for analysis, where throat radius has been varied and it has shown that considerable amount of thrust has been increased. Modelling and Meshing has been done through ICME CFD, analysis carried out through CFX and result obtained through CFD POST..

8 Evaluation of Natural Frequency of Car Door with and without Damper using Experimental Method and Validate using Numerical Method
Neelappagowda Jagali, Chandru B. T, Dr.Maruthi B. H, Dr.Suresh P.M

Abstract — Up gradation of ride quality and comfortably of the vehicle is the most important for the passengers. These two things can be done by the reduction of vibration and by improving the fatigue life of the parts are concerned . noise can also be reduced with the reduction of vibration. Here in our project, the results as vibration of car door has to be generated by the two methods that is FEA and EMA and these results are compared. Primarily our project head towards the generation of vibration characteristics such as frequency, damping factors and modeling from FEA method. Where we model the door with the use of the software known as CATIA. Then this is extracted by HYPERMESH software for meshing the component. ABAQUS solver solves the mesh component with boundary conditions. The next stage is where we take the characteristics results of car door by the another method EMA where the use of FFT analyzer with the combination of ME Scope software is made. Then the comparison of these results of FEA and EMA plays an important role for the determination of vibration characteristics for the optimization.

9 Noise and Vibration Analysis of Car Floor Using FEA and Experimental Method (FFT)
Arun S K, Aravind K. U., Maruthi B H, Chandru B T

Abstract — This project includes the comparison of the results obtained by the experimental model analysis and finite element model analysis of an automotive car floor. Here, it is concerned with the improvement of fatigue life of the car floor component and to improve the ride quality by increasing passengers comfort ability under the study condition. The main objective of the project is that the vibration characteristics such as frequencies, mode shapes and damping factors of an automotive car floor are determined and compared using FEM and FFT analyser techniques. First, the car floor geometry is modelled by using CATIA software and then it is meshed by using the HYPERMESH software. This meshed model is analysed under the free-free condition by using the ABACUS solver. We will get the results such as frequencies and mode shapes. Second, once again the results such as frequencies, mode shapes and damping factors are taken by the experimental analysis through FFT analyser. Third, the vibration can be optimized by changing the natural frequencies of the system of the automotive car floor by adding damper. With the damper the free – free analysis of the model is conducted to get the result like frequencies, mode shapes and damping factors, with both FEM and FFT analyser methods. Finally the results obtained by both the conditions are compared and then validated.

NeAnand L Talawar, Dr Maruti B H, H.V Harish

Abstract — Diffuser is the important feature of turbo machinery, which is used for the efficient conversion of kinetic energy into pressure energy. Among the various types of diffusers, least attention has been given to diffusers because of the number of geometric parameters that needed to be considered. The geometric limitations in aircraft applications where the diffusers need to be specially designed so as to achieve maximum pressure recovery within the shortest possible length led to the development of diffusers. Diffuser model of ratio 1:4, 1:6 and 1:10 has been chosen for analysis whichever gives better pressure recovery that model will be optimized. ICEM CFD is used for modelling and meshing and CFX is used for analysis. Results has been obtained in post CFD.

11 Crime and Criminal Information System
Sphurti Vitthalrao Atram, Prof. V.N.Dhage

Abstract — There has been an enormous increase in the crime in the recent past. Crime deterrence has become an upheaval task. The cops in their role to catch criminals are required to remain convincingly ahead in the eternal race between law breakers and law enforcers. One of the key concerns of the law enforcers is how to enhance investigative effectiveness of the police. There is need for user interactive interfaces based on current technologies to give them the much needed edge and fulfill the new emerging responsibilities of the police. The paper highlights the existing systems used by Indian police as e-governance initiatives and also proposes an interactive query based interface as crime analysis tool to assist police in their activities. The proposed interface is used to extract useful information from the vast crime database maintained by National Crime Record Bureau (NCRB) and find crime hot spots using crime data mining techniques such as clustering etc. The effectiveness of the proposed interface has been illustrated on Indian crime records. An interactive interface as crime analysis tool has been designed for this purpose.

12 Analysis of predominance of physical anthropometric variables and playing ability among university women basketball players
M.Sathya, A.Mehaboobjan

Abstract — The purpose of the study was to investigate the relationship between physical anthropometric Variables and basketball playing ability among University Women basketball players. The study was conducted on 100 women basketball players from Tamilnadu, who participated in the inter university basketball tournament and their age ranges from 18- 25 years. The investigator analysed the relationship between basketball playing ability with physical, anthropometric variables. The study concluded that there was a significant relationship between criterion and independent variables.

13 Geotechnical Behaviour of Stabilised Soil Using Iron Ore Mine Tailing
Rishu Jain, Prof. A. K. Singhai

Abstract — The term soil stabilization means to alter and modify one or more properties of soil to improve the engineering characteristics and performance of a soil. Soil stabilization is the oldest and popular method of ground improvement. Stabilization of soil using cement and lime are well known. But very few researchers had tried the Iron ore mine tailing (an industrial waste) for stabilizing the soil. Many problems arise from the industrial development. One of them is the proper and effective disposal of its waste. Generally, industrial waste causes many serious environment problems. Therefore, utilization of industrial waste in construction industry is the best way to dispose it. Using industrial waste in construction industry is beneficial in many ways such as disposal of waste, saving biodiversities, increasing soil properties like strength, reduce permeability, etc., preserve the natural soil and making economic structures. In the present investigation, industrial by-product Iron ore mine tailing were utilized to enhance the various properties of soil. The evaluation involves the determination of the various properties of soil i.e. Particle size distribution, consistency limits, Optimum moisture content, Maximum dry density and soaked CBR were determined for the samples in its natural state as well as when mixed with varying proportion of IRON ORE mine tailing from 3 to 15% at interval of 3%.

14 Expert System: A Requirement for Educational Development in Jammu and Kashmir
Deep Kumar Bangotra

Abstract — The use of expert system as a tool in teaching and learning process in Jammu and Kashmir’s educational system is very much desirable because of its tough terrain, unpredictable weather and difficult topography as it will facilitate teaching learning process. The shift from traditional chalk and talk approach towards Computer Assisted Learning (CAI) in our classrooms is welcome innovation but the use of expert system which is an integral part of the CAI has not been fully utilized. An expert system is a well known application of artificial intelligence which is sub field of computer science. An expert system is designed to enhance the availability of knowledge required in educational system. In developed nations, expert system is very useful in teaching courses such as engineering, mathematics, earth sciences, distance tutorial lesions and etc. Jammu and Kashmir cannot afford to leave behind in the adoption of CAI in teaching and learning. Expert system has lot of benefits especially to the students, trainers and the educational institutions. This paper suggests that effective introduction of expert system in teaching and learning process in Jammu and Kashmir to be adopted as its advantages over traditional chalk-talk method is innumerable.

15 Identification of Heterotic Crosses for Water Use Efficiency Traits and Yield in Relation to Moisture Stress Tolerance in Groundnut
K. John, P. Raghava Reddy

Abstract — Estimates of relative heterosis, heterobeltiosis and standard heterosis were obtained for twenty four crosses generated through L x T analysis for water use efficiency traits and yield. The crosses viz., Narayani x Dharani with high relative heterosis and standard parent heterosis and Prasuna x TCGS-1416 with high better parent heterosis for pod yield per plant also expressed positive mid-parent, better parent and standard parent heterosis for root length. The other promising crosses exhibited high significant positive mid-parent, better parent and standard parent heterosis for certain attributes viz., Prasuna x Dharani for SPAD chlorophyll meter reading at 40 days after sowing, TAG-24 x TMV-2 for SPAD chlorophyll meter reading at 60 days after sowing, TAG-24 x Dharani for relative water content at 40 days after sowing, K-6 x ICGV- 91114 for relative water content at 60 days after sowing and Greeshma x TCGS-1416 for harvest index. TAG -24 x ICGV-91114showed significant negative heterosis for specific leaf area at 60 days after sowing. These hybrids offer best possibilities of future exploitation for development of high yielding moisture stress tolerant groundnut genotypes.

16 Noise and Vibration Analysis of Car Hood Using FEA and Experimental Method
Santhosha H.V., Chandru B. T, Dr.Maruthi B. H, Dr.Suresh P.M

Abstract — Up degree of ride quality and comfertebility of the vehicle is the most essential for the travellers. These two things should be possible by the lessening of vibration and by enhancing the weariness life of the parts are concerned. Commotion can likewise be diminished with the decrease of vibration. Here in our task, the outcomes as vibration of auto entryway must be produced by the 2 techniques that are FEA and EMA and these outcomes are looked at. Basically our task head towards the era of vibration attributes, for example, recurrence, damping variables and displaying from FEA technique. Where we display the entryway with the utilization of the product known as CATIA. At that point this is removed by HYPERMESH programming for cross section the part. ABAQUS solver tackles the cross section part with limit conditions. The following stage is the place we take the attributes aftereffects of auto entryway by the strategy EMA where the utilization of FFT analyzer with the mix of ME Scope programming is made. At that point the correlation of these consequences of FEA and EMA assumes an essential part for the determination of vibration attributes for the enhancement.

17 A Secure Private Cloud Computing Based Framework for Big Data Information Management of Smart Grid
Baskaran, K.Sathyaseelan, Dr.N.Chitra devi

Abstract —Managing and processing big data are the problematic now a days. During the distributed processing handling the big data were very important factor that plays vital role. This paper deals with the bigdata in the field of distributed processing associated with smart grid in the cloud computing. Providing security is an feature in this paper. All the concepts are implemented in real time through the web services.

18 Monitoring Maize Plant Irrigation System using ARM Microcontroller LPC2148 with Wireless Sensor Network
T.Gayathri, K.Boomidevi, S.Ragul

Abstract — In this project, the implementation of proposed system for monitoring the growing status of the corn plant continuously and intimate the status to the agriculturist using Wireless Sensor Network (WSN). The upsurge increase in the technological and scientific innovation makes advancement in agricultural field. But in practice, cultivator faces too much effort in the farmland. This project makes eases the work of the farmer in cultivated land through the usage of different kind of sensors. The temperature sensor will find the intensity of heat present in the air. The humidity sensor will find the humidity level of the air. The soil moisture sensor will compute the moisture level in the soil, if the level decreases, then it automatically switches ON the DC motor. PH sensor will find the PH level in the soil. All the particulars of farmland are sending to the farmer through Global System for Mobile communication (GSM) and revel in the Liquid Crystal Display (LCD) screen. The temperature sensor will find the intensity of heat present in the soil. With this less cost and energy utilization, WSN is a hopeful method for harvesting the corn crop and also improves the quality of the corn crop and reduces the usage of pesticides, thereby increasing the overall profits for the farmers.

19 Anarchy to Data Security- 3D Password: A Review
Rahul Lohiya, R. K. Gupta

Abstract — Password, one of the effective and easy solutions recommended today for securing the highly confidential data. Though there are many efficiently implementations performed for password strength. The strength may range from simple password combination of alphanumeric and special characters to finger prints and face recognition techniques. But these methods have not been proven as the adequate resolution to the problem. In this regard, 3-D password has come out as one of the best solution for the password strength. The 3-D password is a multifactor authentication scheme, though customized according to user choice is a combination of textual passwords, graphical passwords and various types of biometrics into a 3-D virtual environment.

20 Evaluation of drug release kinetics from salbutamol sulphateTrasdermal patches using Hydroxy propyl methyl cellulose
Nidhi Saini, Babita, Rakesh Kumar, Neelam Kumari, Rakesh Kumar

Abstract — The objective of the present research work was to formulate transdermal patches of Salbutamol sulphate using Hydroxy propyl methyl cellulose(HPMC) as release controlling factor and to evaluate drug release mechanism from polymer (HPMC) as per various release kinetic models.

21 Design and Experimental Analysis of Electromagnetic Suspension System
Naik Akash Tukaram, Shivraj J, Maruthi B.H, Naresh Rathod

Abstract — Vehicle suspension systems have been extensively explored in the past decades, contributing to ride comfort, handling and safety improvements. The new generation of powertrain and propulsion systems, as a new trend in modern vehicles, poses significant challenges to suspension system design. Consequently, novel suspension concepts are required, not only to improve the vehicle’s dynamic performance, but also to enhance the fuel economy by utilizing regeneration functions. However, the development of new-generation suspension systems necessitates advanced suspension components, such as springs and dampers. The ultimate goal of this project is to conduct feasibility study of the development of electromagnetic dampers for automotive suspension system applications. The proposed electromagnetic damper has energy harvesting capability. Unlike commercial passive/semiactive dampers that convert the vibration kinetic energy into heat, the dissipated energy in electromagnetic dampers can be regenerated as useful electrical energy.

22 Performance Analysis Of Multilevel Inverter Fed Three Phase Induction Motor Drive
Kunal P. More

Abstract — Cascaded multilevel inverters synthesize a mediumvoltage output based on a series connection of power cells which use standard low-voltage component. This characteristic give permission one to achieve high-quality output voltages and input currents and also outstanding availability due to their intrinsic component more than enough. Due to these features, the cascaded multilevel inverter has been recognized as an important alternative in the medium-voltage inverter market. This paper presents a survey of different geometric properties, control techniques used by these type inverters. Regenerative properties are also discussed. Applications where the mentioned features play a key role are shown. Finally, future developments

23 The Role of Internet Banking In Nigeria Banking Sector
Ilo S.F, Igbajar Abraham, Okoroji Uchechi Hope

Abstract — Despite the presence of many banks, long queues of customers waiting to pay in or withdraw cash are still a common sight in banking halls. These factor contributes to customers frustrations in the banking sector. The problems does not only limit to the customers but also to the staffs, because he/she has to attend to many customers and balance the account, after work ours they have the bulky work of putting every transactions in order, and this most times leads to leaving office late at night, constituting other security risk. This paper presents the benefits of internet banking in the banking industries, this new technology enables people to bank from their home or offices at their comfort zone. These are done online, either from a home or office computer or our Web-enabled smartphone.

24 A Theoretical Approach to Design “A Fingerprint based Attendance System”
Vijay K. Chauhan, Gyanesh Savita, Jitendra Managre, Chintan Patel

Abstract — To provide high security to fingerprint based attendance system through random number. Authentication plays a very critical role in securityrelated applications like attendance system. There are a number of methods and techniques for accomplishing this key process. In this regard, biometrics is gaining increasing attention these days. Security systems, having realized the value of biometrics, use biometrics for two basic purposes: to verify or identify users. Every organization whether it be an educational institution or business organization, it has to maintain a proper record of attendance of students or employees for effective functioning of organization. Designing a better attendance management system, for students, so that records are maintained with ease and accuracy. This would improve accuracy of attendance records because it will remove all the hassles of roll calling and will save valuable time of the students as well as teachers. Image processing and fingerprint recognition are very advanced today in terms of technology. It was our responsibility to improve fingerprint identification system. We decreased matching time by partitioning the database to one-tenth and improved matching using key based one to many matching.

25 Performance of Groundnut Genotypes under Millet Based Intercropping Systems in Sudan Savanna of Nigeria
K. T. Aliyu, H. A. Ajeigbe, I. B. Mohammed

Abstract — Spatial arrangement of crops is critical in determining the growth and yield of lower crops in intercropping. The productivity of two spatial arrangements of pearl millet-groundnut intercrops was studied in the Sudan savanna of Nigeria during 2014 rainy season at Wasai (5ˈN, 08o62ˈE) in Minjibir of Kano state, and Rahama (11o40ˈN, 09o20ˈE) in Dutse of Jigawa state. The treatments were two millet varieties (Dankaranjo and SuperSosat), two intercropping systems (2:2 and 2:4; reflecting millet to groundnut row) and four groundnut genotypes (SAMNUT 21, SAMNUT 22, SAMNUT 23 and SAMNUT 24). The experiment was laid out in split-split plot design with four replications. Among the groundnut genotypes, pod yield was greater at 2:4 system at Minjibir, while SAMNUT 23 and SAMNUT 24 were significantly (P<0.05) better than SAMNUT 21 and SAMNUT 22, SAMNUT 21 was best in terms of pod yield (480 Kg ha- 1) at Dutse followed by SAMNUT 22 and SAMNUT 23 and least was SAMNUT 24 (293 Kg ha-1). Higher haulm yields were produced by SAMNUT 21 and SAMNUT 22 at both locations followed by SAMNUT 23 and SAMNUT 24 which had similar haulm yields at Minjibir.

26 Designing of Sequential Circuits using Reversible Logic Gates
Preeti Chandrakar, Aparna Karwal

Abstract — Reversible logic has become one of the most promising research areas in the past few decades and has found its application in several technologies; such as low power CMOS , nanotechnology and optical computing. The main purpose of designing reversible logic is to decrease quantum cost, depth of the circuits and the number of garbage outputs. Flip flop is the building block of the sequential circuits. Since the output of a sequential circuit depends not only on the present inputs but also on the past input conditions, the construction of sequential element using reversible logic gates is quite complex than that of combinational circuits. This paper represents the design and simulation result of reversible D flip flop, Ring counter, Johnson counter and LFSR.

27 Life time enhancement scheduling in WSNs
Meenakshi, Anuj Aggarwal

Abstract — It is an emerging technology that shows various applications both for public and military purpose. In order to operate these applications successfully, it is necessary to maintain the transmission of data. Wireless Sensor Networks (WSNs) consist of small nodes with sensing, computation, and wireless communications capabilities. Many routing, power management, and data dissemination protocols have been specifically designed for WSNs where energy awareness is an essential design issue. In this paper, we present an energy efficient scheduling of nodes in wireless sensor networks. Scheduling is done among the nearby nodes because it's well known that the nodes lying in the vicinity of each other i.e. the nearby nodes whose inter distance is too much small will sense the same data from the field the nodes are deployed in. So scheduling is done among the nearby nodes so as to increase the lifetime of network by saving the energy used in transmitting the redundant data from the nearby nodes.

28 Overview of Pipelining Computing
Simmi Bagga, Satinder Kaur

Abstract — Pipelining is one form of embedding parallelism or concurrency in a computer system. It refers to a segmentation of a computational process into several sub processes which are executed by dedicated autonomous units. In this paper, will discuss about the Pipelining computing and its various type and described the classification of pipelining. We also described various classifications of pipelining on the basis of Level of processing, Pipeline configuration and Type of instruction and data and how these types helps in effective computing. This paper also explains how pipeline allows multiple instructions to be processed at the same time.

29 Experimental Study of Cost Impact by use of Fly Ash Based Concrete & Conventional Concrete with Balanced Score Card Technique for construction Infrastructure
Tele Sushma S., Dr. R.C.Pathak

Abstract — Concrete is the most important universal construction material. Due to changing construction techniques, materials & global warming impact due to manufacturing of cement, so there is need to use some other materials which may change the properties of concrete. Fly ash the most widely used supplementary cementitious mineral which is a by product of the combustion of pulverized coal in electric power generating plants are also known as mineral admixtures have been used with cements for many years. In India the production of fly ash is crosses more than 300 million in the year 2017. Fly ash is classified as class F & class C. Fly ash &Silica fume now viewed as cement replacement material and in some area it is usually replaced by much smaller quantity of cement weight for making bricks, in road pavement, light weight aggregate. It reduces heat of hydration, water demand &improves workability & compressive strength.This paper aims at studying the availability and use of fly ash in various proportions, which can be used in many residential & commercial buildings. The research paper indicates that fly ash based PCC of grade M10 & RCC of grade M20 can be used to reduce the cost of construction and has the potential to minimize the overall cost of construction. Balance score card technique can also be applied for improving the performance, customer satisfaction, quality for high performance concrete in major construction. In this experimental study Concrete mix of grade M20 & M10 which are designed as per the Indian standard code IS-10262-1982 by adding fly ash 10%, 15%, 20%, 30%, 40%, 50% by wt of cement in concrete.. Concrete cubes of size 150mm X 150mm X 150 mm are casted and tested for having compressive strength at 7 days,14 days & 28 days. Also fly ash based cement mortor are prepared of grade M10 of size 70.7mmx70.7 mmx 70.7 mm. Compressive strength of all specimen is taken at 7 days, 14 days,28 days & the results are compared with that of conventional concrete.

30 Process Improvement through Root Cause Analysis In Assembly Shop of Manufacturing Unit
Vijayashri.Nagaral, Divakar HN, Mohanram M

Abstract — Root-cause identification for quality and productivity related problems are key issues for manufacturing processes. It has been a very challenging engineering problem particularly in a multistage manufacturing, where maximum number of processes andactivities are performed. However, it may also be implemented with ease in each and every individual set up and activities in any manufacturing process. Process improvement is series of action taken to identify, analyze and improve existing processes within an organization. Continuous improvement in productivity can only be realized by means of systematic analyses and optimization of production processes, reduce defect cost, repair cost. A successful continuous improvement program is one where in the operational defects are eliminated at the root cause level and are prevented from reoccurring. In present work an attempt is made to identify the areas of process improvement. Selection of problem and Analysis of problem has to be done. Possible root cause is analyzed by cause & effect diagram. Validation of each cause under man, machine, material, method is done is done to find the actual root cause of problem. Further root cause analysis is done by why – why analysis. The implementation of solution increased production as decrease in lead time. Customer fulfilment tends to motivate business partner. Non value added activity such as sorting, repair, rewash has been eliminated. Lean manufacturing system can be applied to any area in need of improvement. Kaizen and Poke Yoke are aimed at producing more and more value with less and less wastes, attaining better working environment. Kaizen is used extensively in product, process and production development. Continuous improvement in product quality and productivity can only be realized by means of systematic analyses and optimization of production processes, intends to increase productivity and efficiency.

31 The Keeper Design for Dynamic Logic Circuits Using Different Techniques
Irshad Khan, Sunil Shah

Abstract — The increasing variability in device leakage has made the design of keepers for wide OR structures a challenging task. The conventional feedback keepers (CONV) can no longer improve the performance of wide dynamic gates for the future technologies. In this paper, we propose an adaptive keeper technique called rate sensing keeper (RSK) that enables faster switching and tracks the variation across different process corners. The problems of contention current and process tracking have been two different paradigms in the design of dynamic logic circuits. The existing keeper techniques address one of them while sacrificing the other. However the proposed Rate Sensing Keeper technique provides reduced contention and better process tracking for a given noise robustness with less overhead in area, power and delay. The technique also allows for a larger pulldown width that can be used in complex register files. The design has been implemented using UMC 130nm Mixed Mode/RF CMOS Process in cadence Spectre RF Simulator.We show that the RSK technique gives superior performance compared to the other alternatives such as Conditional Keeper (CKP) and current mirror-based keeper (LCR).

32 Adaptive Keeper Design for Dynamic Logic Circuits Using Rate Sensing Technique
Irshad Khan, Sunil Shah

Abstract — The increasing variability in device leakage has made the design of keepers for wide OR structures a challenging task. The conventional feedback keepers (CONV) can no longer improve the performance of wide dynamic gates for the future technologies. In this paper, we propose an adaptive keeper technique called rate sensing keeper (RSK) that enables faster switching and tracks the variation across different process corners. It can switch upto 1.9 faster (for 20 legs) than CONV and can scale upto 32 legs as against 20 legs for CONV in a 130- nm 1.2-V process. The delay tracking is within 8% across the different process corners. The problems of contention current and process tracking have been two different paradigms in the design of dynamic logic circuits. The existing keeper techniques address one of them while sacrificing the other. However the proposed Rate Sensing Keeper technique provides reduced contention and better process tracking for a given noise robustness with less overhead in area, power and delay. The technique also allows for a larger pulldown width that can be used in complex register files. The design has been implemented using UMC 130nm Mixed Mode/RF CMOS Process in cadence Spectre RF Simulator. We show that the RSK technique gives superior performance compared to the other alternatives such as Conditional Keeper (CKP) and current mirror-based keeper (LCR).

33 Modified Gaussian Noise De-Noising using UDWT / DWT
ShikhaSoni, Shadhama Pragi

Abstract — In this work we have proposed an image De-noising method of noisy image using Undecimated Discrete Wavelet Transform (UDWT). The proposed method based on the concept of wavelet thresholding by using Undecimated wavelet transform. The performance of image de-noising of noisy image is shown in terms of Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE )& is compared with Discrete Wavelet Transform (DWT). The performance of calculated result shows improvement in terms of Mean Square Error and Peak Signal to Noise Ratio. Experimental results on several test images like ‘Lena’ by using proposed method shows that this method yields significantly superior image quality and better Peak Signal to Noise Ratio (PSNR). Here, to prove the efficiency of this method in image denoising, we have compared this with various denoising methods like wiener filter, Average filter, VisuShrink and BayesShrink, HMT etc.

34 Review on Denoising techniques for AWGN corrupted image
Shikha Soni, Shadhama Pragi

Abstract — Visual information transfer in the form of digital images becomes a vast method of communication in the modern scenario, but the image obtained after transmission is many a times corrupted with noise. The received image requires some processing before it can be used. Image denoising includes the manipulation of the image data to produce a visually high quality image. In this paper a review of some existing denoising algorithms, such as filtering approach; wavelet based approach and their comparative study has been done. Different noise models including additive and multiplicative types are discussed. It includes Gaussian noise, salt and pepper noise, speckle noise and Brownian noise. Selection of the denoising algorithm is application dependent. Hence, it is necessary to have knowledge about the noise present in the image so that one can opt the appropriate denoising algorithm. The filtering approach seems to be a better choice when the image is corrupted with salt and pepper noise. The wavelet based approach finds applications in denoising images corrupted with Gaussian noise. In this paper denoising techniques for AWGN corrupted image has been mainly focused.

35 A Survey On Finger Print Identification
Pavan Yadav, Pankaj Sahu, Shailesh Khaparkar

Abstract — Authentication and validation of an individual is done with the help of various factors like signature, user-ids and passwords, palm, fingerprint, face, voice, heart-beat, iris, etc. The fingerprint technique is advantageous for such recognition as compared to other techniques. This paper is a brief review in the field of fingerprint identification. The aim of this paper is to review various latest minutiae based, correlation based and other global, local methods for fingerprint matching and status of success of concurrent methods.

36 Finger Print Identification Using DWT by Real Minutiae Extraction
Pavan Yadav, Pankaj Sahu, Shailesh Khaparkar

Abstract — Fingerprint is a biometric that provides secure process to authenticate a person due to its permanent feature and uniqueness that stay behind throughout human life. It has been in used for more than 100 years as a result of its achievability, reliability, accuracy, and acceptability. Although there exist many algorithms for fingerprint authentication, there is still a need to close the gap of accurateness. Among the algorithm of fingerprint methods are minutiae matching and pattern matching method. A minutiae matching is widely used for fingerprint recognition and can be classified as ridge ending and ridge bifurcation. In this paper the minutiae extraction method was improved by combining it with image enhancement that includes noise reduction, smoothing, contrast stretching, histogram equalization, wavelet transform and edge enhancement. For the image preprocessing steps, we have used histogram equalization followed by wavelet Transform to do the image enhancement and then image binerization is done by locally adaptive threshold method. This method presented a satisfactorily performance.

37 A Survey on Various Edge Detection Techniques
Ajay Bari, Pankaj Sahu, Shailesh Khaparkar

Abstract — Edge detection is an important step in digital image processing and is mainly used in the application of feature extraction. One major application of edge detection is in the field of medical image processing. Edge detection is basically the process of detection of those regions in the image where there is an abrupt change in the brightness of the image. In this paper, various edge detection methods are described and compared.

38 Development of Aluminium Metal Matrix Composite for Automobile Components
S.Sounderarajan, G.Balakrishnan

Abstract — Composite material is a combination of two or more materials, differing in from on a macro scale. Now a days the composite materials occupy the place of conventional materials. In the composite materials the metal matrix composites is a new trend in manufacturing of composites. The metal matrix composite having two main phases. One is matrix phase, another one is reinforcement phase. The metal matrix phase is aluminum 6061, the reinforcement phase is flaks of EN19 of 3%, 6%, 9% weight. That flaks like a short fibers. This metal matrix composite material is manufacturing by stir casting process. A reaction between aluminum and iron was anticipated to result in strengthening phase forming in the material. The attractiveness of aluminum is that it is relatively low cost, light weight metal that can be heat treated to fairly high strength levels and it is one of the most easily fabricated high performance materials, which usually correlates with lower costs. The mechanical properties like tensile strength, hardness, percentage of elongation will be carried out.

39 Analysis of Biodiesel using Pongamia oil with Nano Additives
Musthafa.H , Rajesh.G.C

Abstract — The energy demand is increasing every day in the global market. The fuel prices of petrol, diesel are high and make pollution to the environment. These sources are non-renewable. Hence we need in alternative source of energy. The possible alternative sources are biodiesel, bio alcohol, fuel cells, batteries, hydrogen and LPG. Among these biodiesel is a good alternative to diesel because it is extracted from vegetable oil and animal fats. There are many vegetable oils like olive oil, coconut oil, linseed oil, olive oil, soya bean oil and sunflower oil. Among this cottonseed oil have high oil content which can be used for biodiesel production. The main problem in the use of cottonseed oil is high viscosity, high flash point and high fatty acids. The biodiesel conversion is not easily obtained in single step process due to high fatty acids and gums in oil. The methodology used for biodiesel production is two step transesterification processes. The fuel properties of B100 are not near to diesel properties. The biodiesel properties are enhanced by adding Nature based additives in fuel. The calorific value, flash point, fire point and viscosity are enhanced for B50, B100+0.5A and B50+0.5A.The BTE is enhancedfor B50, B100+0.5A and B50+0.5A when compared to B100 and B50. The combustion results show that ignition delay and cylinder peak pressure are reduced. The emission result shows that the percentages of emissions are reduced for mixture of additives in biodiesel.

40 Design and analysis of varios adders using m.g.d.i. Technique
Ankita Shrivastava, Abhishek Singh

Abstract — Adders are significant component in digital systems because of their widespread use in other basic digital operations such as subtraction, multiplication and division. Hence, improving performance of the digital adder would extensively advance the execution of binary operations inside a circuit compromised of such blocks. In the present work, 8- bit adder topology like ripple carry adder(RCA), carry save adder(CSaA), carry look ahead adder(CLA) & carry increment adder(CIA) has been designed using the MGDI(Modified Gate Diffusion Input) technique. This technique gives better results in terms of power, delay and area when compared to the conventional CMOS technique. The simulation has been done at 65nm technology using DSCH tool and the layout has been designed using Microwind.

41 Design and Verification of BERT with New Proposed MIMO Encoder using FPGA
Pragati Soni, Prof.Mohit Khilwani

Abstract — These paper represent a generalization of Space-Time Codes from orthogonal designs. Particularly, we show in this work, that not only the Alamouti-scheme which was useful only for OSTBC for two transmit antennas, but also its generalized version achieves capacity in the case of one receive antenna. The drafted codes are then analyzed with respect to the bit error rate performance and the spectral efficiency with optimal as well as suboptimal receiver structures. In the second part of this work the combination of Space-Time Codes with conventional channel coding techniques is considered. New OSTBC is presented and the performance of Space-Time Codes with iterative algorithms for soft-input-soft-outputdecoding is analyzed and optimized with the help of Xilinx Integrated Simulation Environment, the coding part is done in VHDL and the synthesis of work is been develop on Xilinx 12.2. the obtain results are been compared with base works and found better.

42 ECG signal Noise removal technique with new Thresholding and adaptive filter
Preeti rai, Prof. Prajaynt Pathak

Abstract — Electrocardiogram signals are one for biomedical signals, which reflects electrical activity for heart. ECG signals are widely studied & applied in clinic.ECG signals is obtained by recording produced by an electrocardiographic device & collected by skin electrodes placed at designated locations on body. ECG signal is defined by six peaks & valleys, which are traditionally labeled P, R, Q, S, T & U. Aim for thesis is to remove noise inside the ECG signal & to calculate parameters just to signal like signal to noise ratio (SNR) & root means square error (RMSE). In this technique, when we decompose a data set using wavelet, we use filters that act as averaging filters & others that produce details. few for resulting wavelet coefficients corresponds to detail in data set. If details are small, they might be omitted without substantially affecting main features for data set. Then thresholding is used to set to zero all coefficients that are less than particular threshold. These coefficients are used in an inverse wavelet transformation to reconstruct data set. Hence with help for WT noise is removed from ECG signal.

43 Modified DMC based Enhanced Memory Reliability against MCUs
Vandna Gohar, Kamal Niwaria

Abstract — Nowadays, an increase in the application of semiconductor memories has made it possible to port a huge amount of data within a small space due to the advanced semiconductor memory manufacturing technology. On the other end, an increasing use of wireless application devices has increased the amount of energy radiations in the global environment. When a sufficient amount of energy waves strike with the electrons of the semiconductor surface, they might cause a change in the conducting state of the semiconductor switching elements. Also, an effect of these transient energy particles may cause an upset in the information present in the semiconductor memory. When the application of the semiconductor de vice is critically linked to any loss then such upsets are required to be avoided by a suitable method. Many packaging techniques are available that effectively protect the memory data from low energy radiations and transients. However, a particular packaging provides protection from an specific or a limited variations caused by the radiations. This paper focus on the FPGA based design and simulation of Decimal Matrix Code (DMC) that can correct all single-bit and sets of multiple bit errors that might occur in semiconductor memories due to high energy environmental radiations.

44 A Review on Low Leakage Techniques for VLSI Circuits
Vivek Bansal

Abstract — In today’s battery powered era, to reduce power is the basic aim in the mind of designers. Power dissipation is an important issue in VLSI circuits. Various techniques are adopted at various levels of abstraction to reduce power consumption and hence to improve the overall circuit performance. In this paper we discuss various low power reduction techniques and find out the best suitable technique.

45 Studies On Genetic Parameters For Yield And Yield Attributes In Groundnut (Arachis Hypogaea L.)
K. John, P. Raghava Reddy

Abstract — High GCV and PCV values were observed for number of secondary branches per plant. Moderate GCV observed for number of well-filled and mature pods per plant. Moderate values of GCV and PCV were recorded for kernel yield per plant. Moderate GCV and high PCV values were observed for pod yield per plant. Heritability values ranged from 15.41 per cent (Plant height) to 98.21 per cent (Number of primary branches per plant). High heritability and high GAM was recorded for number of primary branches per plant number of secondary branches per plant, number of well-filled and mature pods per plant kernel yield per plant and pod yield per plant indicating the importance of additive gene effects, selection for such characters may be rewarding.

46 A Review Paper on Steganography
Kirti, Kamaldeep Joshi

Abstract — Steganograhy sends message by concealing it so that intruder can’t detect the presence of message. It is an art of hiding information in digital media. It ensures that communication between two parties remains secure, their communication should be undetectable. As this era is of internet, secure communication is very difficult to achieve. S o, to achieve this in this paper an overview of steganography and various techniques are discussed. In modern era various new techniques came in existence. There are two types of the steganography one spatial and other is frequency domain. This paper concerned about spatial domain and some part of frequency is also explained.

47 On The Regional Location of Zeros of a Polynomial
M.H.Gulzar, B.A.Zargar, M.A.Mir

Abstract — The purpose of this paper is to present some extensions and generalizations of recently proved results in connection with the Enestrom-Kakeya Theorem.

48 Design and Analysis of Full Lift Relief Valve
Naresh Rathod, Punith Gowda.K, Maruthi B.H, Naik Akash Tukaram

Abstract — Full-lift relief valve is designed to overcome with a continuous problem was facing in the imported valve failure frequently, that is material & workmanship of supplier. We have faced one critical problem damage on the body of brass material. To avoid the damage of brass body, Spraying systems India PVT Ltd, was taken up for this assignment for the develop of Full-lift relief valve complete stainless steel & manufactured aesthetic & ergonomically designed and this valve we can use our own system to avoid depend on the imported valves from Germen & other abroad countries. The advantages of Full-lift relief valve are • high efficiency • good lifetime of wear parts • low maintenance costs • maintenance friendly design

49 A Novel technique for Detection of Edges in Images
Ajay Bari, Pankaj Sahu, Shailesh Khaparkar

Abstract — The areas of this work are in digital image process and telecommunication engineering, which are very wide fields. This work is intended to implement the edge detection for digital image, so that it may be carried out to a big contour identification of an image. Edge detection is one of the most fundamental operations in image processing and computer vision. It is defined as the process of locating the boundaries of objects or textures depicted in an image. Knowing the positions of these boundaries is critical in the process of image enhancement, recognition, restoration and compression. The edges of image are considered to be most important image attributes that provide valuable information for human image perception. The data of edge detection is very large, so the speed of image processing is a difficult problem. The conventional edge detection algorithms are highly sensitive to noise, time consuming & computationally complex. A high performance edge detection algorithm is proposed based on the segmentation properties such as similarity & discontinuity. In the similarity method, an image is divided into sub-parts which are similar to a set of established criteria. The method for discontinuity is to split up the image on the basis of sudden variations in intensity. In some of the traditional edge detectors, we may get thick edges or thin edges based on the calculation. Using Canny edge detector, we can very well get the thin boundaries of the object but the computational procedure is very difficult. In the proposed algorithm, we are calculating the similarity measure by using the formula S=P/No. If the ratio of S<=1 we get the thin edges or otherwise we get very thick edges. Experimental results indicate that the proposed edge detection algorithm achieves better performance than the conventional methods. Moreover, it is time efficient method & has a low computational complexity. Keywords: Edge, Edge Detection, Image Processing.

50 A Survey on Zigbee IEEE 802.15.4 Technology
Ashee Jain, Rashika Gupta

Abstract — The low-power IEEE 802.15.4 standard digital radios for the wireless personal area networks in embedded applications requiring low data rates and low power consumption. ZigBee's current focuses to define a universal - purpose, inexpensive, self-organizing, mesh network that can be used for industrial control, embedded sensing, the medical data collection, smoke and the intruder warning, building automation, home automation. The resulting network will use very small amounts of power so individual devices might run for a year or two using the originally installed battery. The radio design has been used by ZigBee has been carefully optimized for low cost in large scale production. It has the few analog stages and uses digital circuits wherever possible. Even after the radios are cheap, the ZigBee ability Process involves a full validation of the requirements of the physical layer. An uncertified physical layer that malfunctions could cripple the Battery lifespan of other devices on a Zigbee Network. Where other protocols could mask poor sensitivity or other esoteric problems in a fade compensation response, ZigBee radios have very unique engineering constraints: they are both power and bandwidth constrained. In this research paper, we have investigated the advancement and technology of Zigbee.

51 A Review on Channel Estimation in OFDM Mobile Wireless Channel
Ankita Soni, Rashika Gupta

Abstract — Error free transmission is one of the main aims in wireless communications. With the increase in multimedia application, large amount of data is being transmitted over wireless communications. Due to the channel fading and the Doppler shifts caused by user mobility, a common problem in wireless systems, additional technologies are needed to combat multipath propagation fading and Doppler shifts. Time-variant channel estimation is one such crucial technique used to improve the performance of the modern wireless systems with Doppler spread and multipath spread. Channel estimation is done by estimating the time-varying channel frequency response for the OFDM symbols. . The Least Square (LS) method is used for channel estimation technique using the block type pilot sequences. Time-variant channel estimation using pilot Sequences technique is a useful channel estimation technique in mobile wireless communication for accurately estimating transmitted information. The main advantage of pilot sequence is allowing more accurate representation of high mobility mobile wireless channels with low complexity. The main goal is to test the recently proposed method, time-variant channel estimation using pilot sequence.

52 Performance Evaluation of 802.11 MAC Protocol with QoS Differentiation for Real-Time Control
L. Jagadeesh Naik, E. Sravani, Dr Venkata Ramanaiah, Dr K Soundarajan

Abstract — IEEE 802.11 provides several medium access control (MAC) schemes to regulate the control and sharing of the medium access. These MAC schemes provide good real-time quality of service (QoS) under light traffic; they have severe problems when applied to real-time control systems with periodic traffic, particularly under congested network conditions. They either introduce a long delay or assign all periodic traffic flows to the same traffic class without any deadline differentiation. The simulation was carried out using NS 2 network simulator the performance parameter compare with existing protocol.

53 Analysis of Maximum Loading Point with the Help of SVC, STATCOM in Six Bus Power System
Priyanka raghuwanshi, Prashant raghuwanshi

Abstract — The power consumption in per capita is increase due increase the population, so fulfil this energy demand or maintain the voltage stability FACT devices are introduce. In this paper represent the maximum power transfer at different loading condition with the help of PV curve for this analysis SVC, and STATCOM are used or compare for best performance in six bus system. This analysis has done in MATLAB SIMUATION.

54 Evaluation of Drug Release Kinetics from Mouth Dissolving Cinnarizine Tablets using Mixture of Natural and Synthetic Superdisintegrant
Babita, Nidhi Saini, Pankaj, Rakesh kumar, Neelam Kumari, Rakesh Kumar

Abstract — The aim of current study is to evaluate the drug release kinetics from Mouth dissolving Cinnarizine tablets using natural and synthetic i.e superdisintegrant Lepidium Sativum seed mucilage and sodium starch glycolate . Computer-aided optimization technique, using a central composite design (CCD), was employed to investigate the effect of independent variable i.e., amount of lepidium sativum seed mucilage and amount of sodium starch glycolate on the various response variables viz., disintegration time, wetting time, water absorption ratio and cumulative percentage drug release (12 min).

55 Energy Survey in WSNs
Meenakshi, Anuj Aggarwal

Abstract — Wireless sensor network (WSN) technology is promising and is therefore gaining popularity day by day in a wide area of di fferent applications. The WSN nodes operates on battery power which is often deployed in a rough physical environment; changing the batteries is therefore a complicated task, as some networks may consists of hundreds to thousands of nodes. Such large physically distributed networks increase the di fficulty of changing batteries and makes recharging almost impossible during operations. This problem has forced node, network and system developers to make changes in the basic WSN architecture to minimize the energy consumption es pecially of the nodes in order make the network and overall system application more energy efficient. Recently the IEEE 802.15.4 standard was developed for low data-rate application which needed to last for longer duration by consuming relatively less energy. One of the challenging topics in wireless communication techniques to be used for WSN applications is energy efficiency. The life time of a wireless sensor node depends on available energy sources and its overall energy consumption. Further, increasing the capacity of batteries is not possible due to the small size requirement of the nodes.

56 A Comprehensive Mechanism for Intrusion Detection and Prevention
Aastha goswami, Deepak Singh Rajput

Abstract — Intrusion Detection System is classified on the basis of the source of Data and Model of Intrusion. Anomaly in the Anomaly based Intrusion Detection System can be detected using various Anomaly detection techniques. Dimension Reduction can be done using Principle Component Analysis. Support Vector Machine can be used to specify the classifier construction problem. Intrusion Detection systems offer techniques for modelling and recognising normal and abusive system behaviour. Such methodologies include: statistical models, immune system approaches, protocol verification, file and taint checking, neural networks, white listing, expression matching, state transition analysis, dedicated languages, genetic algorithms and burglar alarms. This research describes these techniques including an IDS architectural outline and an analysis of IDS probe techniques finishing with a summary of associated technologies by using OSSEC. In this, OSSEC is used for detection and indicating the malicious activities trying to perform on server by different nodes in the network. After identifying these malicious nodes, prevention system is used for prevent server from these malicious nodes. The activity monitoring is done by log based analysis. Thus, security mechanisms to ensure its secure adoption are in demand. One security mechanism is intrusion detection and prevention systems (IDPS).

57 Enhancement of Coefficient of Performance by Analysis of Flow through Vapour Compression Refrigeration Cycle using CFD
Shrikrishna Bhat, Gunesh Ravanikar, Dr. Matrthi B H, Ravindra A R

Abstract — To Improve the Coefficient of Performance (COP), it is required to diminish the Compressor Work and build the Refrigerating Effect. Test examination on vapor pressure refrigeration (VCR) framework with R134A (Tetra Fluro Ethane) refrigerant was done and their outcomes were recorded. The impacts of the fundamental parameters of execution examination are mass stream rate of refrigerant, suction weight of compressor, conveyance weight of compressor, temperature of evaporator and condenser. The outcomes from vapor pressure refrigerant plant was taken where the variables like suction weight of compressor, conveyance weight of compressor ,temperature of evaporator and condenser were noted and coefficient of execution (COP) was figured. The outcomes got will be accepted through CFD recreation. Further Passive strategy has been embraced for evaporator and diffuser has been presented in the middle of compressor and condenser so control contribution to the compressor has been diminished there by upgrading COP. The upgrade will be done through CFD recreation; Modeling and lattice will be done in ICEMCFD, examination in CFX and post results in CFD POST.

58 Techniques For Determine Economic Load Dispatch Problem Using Particle Swarm Optimization
Sudha Chaudhary, Anil kumar

Abstract — Economic load dispatch (ELD) is the method of allocating generation within all available generating units in such a way the it fulfill the load demand and satisfied constraints to minimized total generation cost of the thermal power plant. Economic load dispatch is a common task in operational planning of power system that require is to be optimized. This paper presents overview of most reliable and very effective particle swarm optimization technique for economic load dispatch. These results have been shown for ELD of three and six unit test systems or generator systems with and without losses. All the final results obtained using PSO will compare with conventional quadratic programming techniques and found to be most convenient.

59 Economic Load Dispatch Using Particle Swarm Optimization with Quadratic Cost Function
Sudha Chaudhary

Abstract — This paper presents the solution of economic load dispatch problem with quadratic cost function by using Particle Swarm Optimization (PSO). PSO technique is useful at solving optimization problems with both single and multiple objective functions with non-convex, discontinuous, noisy and non-differentiable solution. The method’s capability of solving economic dispatch problem in power system is tested and validated on the Nigerian Grid System. The results show that PSO has the ability of minimizing cost of productions in power system operations.

60 Design And Analysis Of Split Blade Technology In Wind Turbine Industry
Madhu R, Rudresh M, Dr Maruthi B H, Yashavanth kumar T

Abstract — Transportation of long turbine blades from one place to another is a difficult process. Hence a feasibility study of split blade technique of wind turbine blade was taken from structural standpoint through finite element analysis. Initially, a non-segmented blade is modelled and its structural behaviour is evaluated to serve as reference. The resonant, static bending and buckling tests are simulated in accordance with IEC61400-23 standard for comparison purpose. The non-segmented test blade is separated at suitable location based on trade off studies. The developed blade model is analysed for its structural response through simulation.

61 A review of different scheduling algorithm in cloud Computing architecture
Avinash Verma, Saurabh Sharma

Abstract — Load Balancing is essential for efficient operations in distributed environments. As Cloud Computing is growing rapidly and clients are demanding more services and better results, load balancing for the Cloud has become a very interesting and important research area. Many algorithms were suggested to provide efficient mechanisms and algorithms for assigning the client's requests to available Cloud nodes. These approaches aim to enhance the overall performance of the Cloud and provide the user more satisfying and efficient services. In this paper, we investigate the different algorithms proposed to resolve the issue of load balancing and task scheduling in Cloud Computing. We discuss and compare these algorithms to provide an overview of the latest approaches in the field.

62 Vibration and Buckling Analysis of Cracked Composite Beam
Koneti. Maheshwari, Vallepu Vishnu vardhan

Abstract — Cracks in structural members lead to local changes in their stiffness and consequently their static and dynamic behavior is altered. The influence of cracks on dynamic characteristics like natural frequencies, modes of vibration of structures has been the subject of many investigations. However studies related to behavior of composite cracked structures subject to in-plane loads are scarce in literature. Present work deals with the vibration and buckling analysis of a cantilever beam made from graphite fiber reinforced polyimide with a transverse one-edge non-propagating open crack using the finite element method. The undamaged parts of the beam are modeled by beam finite elements with three nodes and three degrees of freedom at the node. An “overall additional flexibility matrix” is added to the flexibility matrix of the corresponding non - cracked composite beam element to obtain the total flexibility matrix, and therefore the stiffness matrix in line with previous studies. The vibration of cracked composite beam is computed using the present formulation and is compared with the previous results. The effects of various parameters like crack location, crack depth, volume fraction of fibers and fibers orientations upon the changes of the natural frequencies of the beam are studied. It is found that, presence of crack in a beam decreases the natural frequency which is more pronounced when the crack is near the fixed support and the crack depth is more. The natural frequency of the cracked beam is found to be maximum at about 45% of volume fraction of fibers and the frequency for any depth of crack increases with the increase of angle of fibers. The static buckling load of a cracked composite beam is found to be decreasing with the presence of a crack and the decrease is more severe with increase in crack depth for any location of the crack. Furthermore, the buckling load of the beam decreased with increase in angle of the fibers and is maximum at 0 degree orientation.

63 Comparative Study of ECG Signal using IIR Filter
Surendra Dandotiya

Abstract — This paper is the study for like infinite impulse response (IIR) filter for IIR filtered ECG signal. Filter is Butterworth, Chebyshev Type-1 , Chebyshew Type-2, Eliptic filter is used. This paper represent direct design of IIR filters which minimizes delay without changing the magnitude response. Mean, standard deviation, variance value find out the filtering samples. After adding noise in the samples and effect on noise on signal and change the find and compare it.

64 Design and Implementation of Ripple Carry Adder
P.G Akila

Abstract — In this paper design of a 4-bit ripple carry adder is proposed using a novel CMOS 3T XNOR full adder cell. The number of transistors used in adder is less than conventional adder. The conventional full adder is compared with the ripple carry adder in terms of power and area. The design is implemented using Tanner schematic editor. The optimized layout of the ripple carry adder is designed using Tanner Layout Suite. A 3T XNOR gate cell is proposed which is used in 8T full adder. The proposed design remarkably reduces power consumption hence power-delay product (PDP) over various input voltages and frequencies, energy efficient applications. All simulations have been performed on 45nm standard model on Tanner EDA tool.