IJEA - Volume 5 Issue 10 (October2016)


Sr/No/ Title Pdf
1 Experimental study on strength of concrete by using Metakaolin
Shashikant Dewangan, Nidhi Gupta

Abstract-Concrete is that pourable mix of cement, water, sand, and gravel that hardens into a superstrong building material. Supplementary cementing materials (SCM) have become an integral part of concrete mix design. These may be naturally occurring materials, industrial wastes or, by products or the ones requiring less energy to manufacture. Some of the commonly used SCM are fly ash; silica fume (SF), GGBS, rice husk ash and metakaolin (MK), etc. metakaolin is obtained by the calcination of kaolinite. It is being used very commonly as pozzolanic material and has exhibited considerable influence in enhancing the mechanical and durability properties of concrete. In this paper, experimental study was carried out on M 50 grade of concrete. In this concrete cement was replaced by metakolin. In various percentages such as 5%, 10%, 15%, 20%, 25% concrete specimens containing metakaolin were studied for their compressive strength.

2 PAnalysis of strength on concrete by using MKC & OPC
Shashikant Dewangan, Nidhi Gupta

Abstract-Concrete is that pourable mix of cement, water, sand, and gravel that hardens into a superstrong building material. Supplementary cementing materials (SCM) have become an integral part of concrete mix design. These may be naturally occurring materials, industrial wastes or, by products or the ones requiring less energy to manufacture. Some of the commonly used SCM are fly ash, silica fume (SF), GGBS, rice husk ash and metakaolin (MK), etc. metakaolin is obtained by the calcination of kaolinite. It is being used very commonly as pozzolanic material and has exhibited considerable influence in enhancing the mechanical and durability properties of concrete. In this paper, experimental study was carried out on M 20 grade of concrete. In this concrete cement was replaced by metakolin in various percentages basis for better studied.

3 Performance on flexural strength of concrete with partial replacement of cement by ground granulated blast furnace and sand by quarry dust
Yogesh Soni, nidhi gupta

Abstract-Concrete is the most widely used construction material in civil engineering industry because of its high structural strength and stability. Cement and sand is a major constituent material of the concrete which produced by natural raw material like lime and silica and natural sand respectively. Once situation may occurs there will be no lime on earth production of cement also natural sand. This situation leads to think all people working in construction industry to do research work on cement replacing material and natural sand for use of it. The construction industry is constantly looking for supplementary cement and natural sand material with the objective of reducing the solid waste disposal problem. Ground granulated blast furnace slag (GGBS), quarry sand are the solid wastes generated by Industry. To overcome from this crisis, partial replacement of Cement with GGBS, natural sand with quarry sand (QS) can be an economic Alternative. The cubes are tested for compressive strengths. Ordinary Portland cement was partially replaced by GGBS of 0%, 30%, 40%,50% and natural sand replacement by QS 0%, 40%, 50%, 60%.

4 Privacy-Preserving Unrestricted Auditing For Protected Cloud Storage Using TPA
T.Naresh, K.L.Ganapathi Reddy

Abstract-With cloud storeroom, client is able to remotely store up their data as well as take pleasure in the on-demand high-class applications and services from a common group of configurable computing wherewithal, lacking the trouble of local information storage and protection. But, the reality that users no longer contain substantial possession of the outsourced data makes the data integrity protection in cloud computing a formidable task, especially for users with constrained computing resources. Furthermore, users should be able to just use the cloud storage as if it is local, without disturbing about the need to validate its reliability. Hence, enabling public audit ability for cloud storage is of critical importance so that users can resort to a third-party auditor (TPA) to test the uprightness of outsourced data and be worry free. To securely set up an effective TPA, the auditing procedure should carry in no fresh vulnerabilities toward user data privacy, and introduce no additional online burden to user. In this paper, we propose a secure cloud storage system supporting privacy-preserving public auditing.

5 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
M.Hema, M.Jayaki Ramudu

Abstract-Data sharing is an important functionality in cloud storage. In this manuscript, we show how to securely, efficiently, and flexiblyshare data with others in cloud storage. We expressnovel public-key cryptosystems that fabricate constant-size cipher texts such thatwellorganizeddelegations of decryption rights in favor of any set of cipher texts are possible. The novelty is that one can amassed any set of secret keys and formulate them as compact as a single key, but encircling the power of each and every key being aggregated. This compact aggregate key can be conveniently sent to others or be stored in asmart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We alsodescribe other application of our schemes. In exacting, our schemes give the first public-key patient-controlled encryption for flexiblehierarchy, which was yet to be known.

6 Sheltered Dependable Deduplication in Hybrid Cloud Craft
P.ratna Kumari, Mohammed Alisha

Abstract-Data deduplication is one of very important technique for removing duplicate copies of repeating data, and broadly used in cloud storage to diminish the amount of storage space and remain bandwidth. To save from harm the privacy of sensitive data while sustaining deduplication, the convergent encryption technique has been proposed to encrypt the data before outsourcing. To protect data security, this manuscript addresses the problem of authorized data deduplication. Different from traditional deduplication systems, the differential privileges of users are further considered in duplicate check besides the data itself. We also present several new deduplication constructions supporting authorized duplicate check in hybrid cloud architecture. Security analysis demonstrates that our scheme is secure in terms of the definitions specified in the proposed security model. As a proof of concept, we implement a prototype of our proposed authorized duplicate check scheme and conduct tested experiments using our prototype. We show that our proposed authorized reproduction check scheme incurs minimal overhead compared to usual operations..

7 Identification of Brain Tumors in MRI Image with Various Signals & Image Processing Methods: A Review
Astha vishwakarma , Prof. Silky Pareyani

Abstract-MRI images obtained from head of body it basically magnetic field, radio waves & a computer to produce detailed pictures of brain, this images are understandable by doctors & should be observe with no mistake a small observation mistake may leads a fatal problems & wrong prescription, many researcher are keen to develop a smart MRI reader that may isolate normal brain image & brain with tumor with 100% accuracy & also exactly tells us size & accurate location of brain tumors, methods developed to achieve this are good enough however as said nothing is perfect there is always a chance to enhance. Available procedure use MATLAB or similar software tools to read & identify tumors in brains & available methods use methods such as histogram, mean filters, DWT & thresholding.

8 A New Wavelet Based Huffman Coding (WHC) Lossless Image Compression method with high CR
Purn Chandra Jha, Amit Mishra

Abstract-Image compression deals with reducing the size of image which is performed with the help of transforms. In this paper we have taken the Input image and applied proposed wavelet based Huffman coding (WHC) techniques for image compression and has compared the result with the popular DWT image compression. WHC provided better result as far as properties like RMS error, image intensity and execution time is concerned. Now a days wavelet theory based technique has emerged in different signal and image processing application including speech, image processing and computer vision. In particular WHC is of interest for the analysis of non-stationary signals. In the WHC at high frequencies short windows and at low frequencies long windows are used. Since discrete wavelet is essentially sub band–coding system, sub band coders have been quit successful in speech and image compression. It is clear that proposed WHC has potential application in compression problem, Compression is used about everywhere. Images are very important documents nowadays; to work with them in some applications they need to be compressed, more or less depending on the purpose of the application. There are various algorithms that performs this compression in different ways; some are lossless and keep the same information as the original image, some others loss information when compressing the image. In this paper I have been working with Huffman lossless compression algorithms for different gray scale images. I have seen how well the different format work for each of the images. The compression ratio (CR) and peak signal to noise ratio (PSNR) are obtained for different images.

9 Classification Of Seizure Signal Using Undulated Global And Local Features- A Brain Computer Interface
VibeethaKeertthana V.S,Sadish Kumar S.T

Abstract- A classification of seizure signal using undulated global and local features- A Brain Computer Interface (BCI). A digital image processing method is to be used in. In machine learning, multiple kernel learning- support vector machines (MKL-SVMs, also Multi Kernel Learning - support vector networks]) are supervised learning models with associated learning algorithms that analyze data used for classification and regression analysis. The clustering algorithm which provides an improvement to the support vector machines is called support vector clustering and is often used in industrial applications either when data is not labeled or when only some data is labeled as a preprocessing for a classification pass. Epilepsy is characterized by a long-term risk of recurrent seizures. These seizures may present in several ways depending on the part of the brain involved and the person's age.

10 Wireless Vibration Power Generation Monitor System
Shivam Malviya and Vinay Pathak

Abstract- In recent years, energy Vibration using piezoelectric materials has become a very popular research topic. We are using new technique for vibration power generate wireless to monitor any where output check for this system Various device sizes and structures have been tested, but it is difficult to compare power measurements as device fabrication and experimental methods vary from paper to paper. In an effort to standardize comparisons in spite of these changing parameters, the dependence of generator power output on device dimensions has been investigated. comparatively little work has been done using aluminum nitride (AlN). This project utilizes AlN due to its ease in processing and potential for on-chip integration. By operating at a MEMS scale, the benefit is that arrays of piezo generators can be placed on the same die. With the process advantages of. An existing piezoelectric cantilever was used to verify the theoretical predictions of resonant frequency and static deflections under applied voltage. These predictions agreed quite closely with the observed results. However, no measurable electrical response could be found while exciting the beam with an electromagnetic shaker device. A similar experiment was performed using an AFM to directly excite the beam, but again the electrical response was difficult to characterize. While the results of the experiments were not optimal, the difficulty in measuring the electrical response of the beam demonstrates the design challenges involved with energy harvesting on a small scale. Piezoelectric generators rely on resonance to generate useful quantities of power, and power output is highly sensitive to the frequency of the physical vibrations applied. While generators of this type could be useful if targeted to a specific application if the frequency of environmental vibrations is known, a more versatile approach would use a different design to reduce the frequency sensitivity.

11 Transformer Fault Detection Based on GSM Modem and Track location
Shivangi and Vinay Pathak

Abstract- Transformer electricity losses during transmission and distribution are extremely high due to which many problems are faced such as varying voltage levels, change in the load current etc. This has been experienced due to the varying electrical consumption and power theft. Also these give rise to fault in power transmission line network and so it is necessary to implement fault detection system in transmission line network. The fault detection system is implemented for three phase electrical distribution system. A practical prototype system can be implemented for Transformer fault detection in power system and also the system is successfully designed using 8-bit Microcontroller which allows the detection of faults. Continuous monitoring of the parameters such as voltage, current and energy consumed is done using data logging system on the PC screen through hyper terminal. There is a Master Slave communication using RS 485 protocol. Communication between Master and Microcontroller is done via RS 232. Comparison of energy units between Master and Slave is done. If difference between the Master and Slave energy units is found, wireless technology GSM (global system for mobile communication) & GPS (global position system) is used to send SMS to a responsible person. Introduction of the mobile communication technology GSM and Microcontroller-based RTU (remote terminal unit) i.e. Master- Slave communication is provided in the thesis. This RTU functions as fault detection when abnormality or emergency happens. Also wireless mobile communication technology i.e. GSM is used simultaneously to send message to a responsible person.

12 Signal Integrity Analysis of High-speed PCB
Rachit Nema, Abhishek Singh

Abstract- In the following paper we do analyses of a signal which transmit from output port of a circuit to input port of the circuit. Here we want to check and improve the signal quality of a defined architecture using the tool Hyperlynx SI v9.2. Hyperlynx is simulation based software by mentor graphics which includes tools for pre-layout as well as post-layout signal integrity, crosstalk, and EMI (Electromagnetic Interference) analysis, for high speed signals to very high speed signals having range up to multi-GHz.

13 Design Of Asynchronous Serial Communication Interface in FPGA
Raj Gaurav, Abhishek Singh

Abstract- An Asynchronous serial communication interface in FPGA has drafted in this paper, utilized for data communication. The objective of this work is to establish data communication in avionics control architecture. In this project work, First of all, I have implemented the UART registers, then I do for baud calculation for the UART clock frequency of 18.432 MHz . There are also implementation of transmitter and its FIFO control, receiver and its FIFO control, sampling of input signal at receiver that is vote logic. I have implement each property of UART protocol including baud rate, start bit, parity bit & stop bit, these are implemented through software, which is Verilog HDL. FPGA is selected as the development platform, using the Verilog HDL to design timing logic of UART, UART registers and control logic of transceiver .The simulation result ensure that the module works stable, meets the reliability, functional and general requirements. My work is done through the Micro semi Company’s ProASIC3E series FPGA chip; simulation results indicate that it satisfies protocol requirements. In this paper I am implement the Asynchronous serial communication interface on FPGA chip, which is A3PE3000-2 FG 896 I of Micro semi Company, by use of Microsemi Libero soc v11.6 tool and Modelsim SE 10.0b tool. I used Microsemi Libero soc v11.6 tool for verilog HDL coding and Modelsim SE 10.0b tool for simulation. These apparatus are used for simulation and implementation of Asynchronous SCI on FPGA chip. The implementation is done on FPGA chip by the help of Flash pro, which is sub tool for Microsemi tool.

14 An Adaptive Low Power Dissipating Clock Distribution Network
N.Dhivya, R.Murugasami

Abstract- The level of integration of chips has been varied in last decades from SSI to VLSI .In this CMOS technology has attained a highest position in modern system design but each have a disadvantage in something likewise CMOS have a high power consumption and Clock distribution has become an multiplying intense problem for VLSI designs, devouring an expanding division of assets, for example, wiring, power, and plan time. Power consumption of up to 40% - 50% has been reported on clock distribution. Therefore number of solutions is present to rectify clock distribution but in this paper gives a detailed knowledge about low-voltage/swing clock distributions performances and compared the proposed LSDFF cell with the conventional FSDFF cell. These techniques using the flip-flops to distribute clock signal to entire circuit, so that there is a decrement in power consumption without affecting the circuit performance.

15 An Optimization Technique for Reducing Data Deduplication in Hybrid Cloud Craft
K.Swetha Priya, Kolla Eswar

Abstract- This paper exposes that reducing the duplicate copies of repeating data in the cloud known as Data Deduplication, and broadly used in cloud storage to diminish the amount of storage space and remain bandwidth. Data deduplication eliminates duplicate copies of same files may be existed in Cloud, in that case only one copy is maintained and replacing the other copies with the original copy. To protect the privacy of sensitive data while sustaining deduplication, security algorithm is proposed for data security. We implement a prototype of our proposed authorized duplicate check scheme and conduct testbed experiments using our prototype. It shows, our proposed authorized reproduction check scheme incurs minimal overhead compared to usual operations.

16 Energy Efficient Based Connected Coverage Algorithms For Industrial Application In Wireless Sensor Network
C.Saranya, Dr.P.Kalyanasundharam

Abstract- In industrial environments, the coverage area of sensor nodes and the link connectivity may affected by external noise, co-channel interface, multipath propagation and data loss. The implementation of the wireless sensor technology in industry is used to monitor and control the industrial process. In the existing method they only deal with the sensor monitoring and the life time of network is poor. Our proposed method is to analysis the characteristics of four different energy efficient connected coverage algorithms: Communication Weighted Greedy Cover (CWGC), Optimized Connected Coverage Heuristic (OCCH), Overlapped Target and Connected Coverage (OCCH) and Adjustable Range Set Cover(ARSC). These algorithms shows the detailed comparison in terms of coverage time, network life time, energy consumption and dead node ratio. The detailed analysis of these algorithms is used to maximize the coverage and network connectivity of IWAN’s. The aim of the project is to provide IWSNs designers with useful insights to choose an appropriate coverage strategy and achieve expected performance indicators in different industrial applications.

17 Kernel Estimation for Blurred License Plate Images from Fast Moving Vehicles
Sinduja C, Manickam T

Abstract- A kernel estimation for blurred license plate images from fast moving vehicles. A digital image processing method is based on sparse representation to identify the blurred images from the license plate for fast moving vehicles. The detection of fast moving vehicle is an important part in Intelligent Transportation System. A new method for detecting vehicles, which violate rules in real time traffic scenario. The length of the motion kernel with Radon transform in Fourier domain which handles large motion blur even when the license plate is unrecognizable by human. It is used to identify the vehicles which crosses the speed limit and also it is useful in hit and run accidents. Experiment results show that this method can improve the efficiency of the moving vehicles license plate detection without blur greatly.

18 Fuzzy Controller Based Active Power Filter for Renewable Energy Systems
Radhika.K, I.Rahul, N.Netaji Gandhi

Abstract- The application of a four-leg voltage-source inverter allows the compensation of current harmonic components, as well as unbalanced current generated by single-phase nonlinear loads. An active power filter implemented with a four-leg voltage-source inverter using a predictive control scheme is presented A detailed simple mathematical model of the active power filter, including the effect of the equivalent power system impedance, is derived and used to design the predictive control algorithm. The compensation performance of the proposed active power filter and the associated control scheme under steady state and transient operating conditions is demonstrated through simulations and experimental results.

19 Improving Efficiency of Switched Capacitor Cell by using Multiple Inductor Energy Storage System
V.Priyanka, N.Nethaji Gandhi, I.Rahul

Abstract- In this a novel high step-up dc–converter with coupled-inductor and voltage-double circuits is proposed. To integrate the advantages of the high voltage gain of a switched-capacitor (SC) converter and excellent output regulation of a switching-mode dc–dc converter, a method of combining the two types of convert-ers is proposed in this paper. The basic idea is that when the switch is turned on, the inductor is charged, and the capacitors are connected in series to supply the load, and when the switch is turned off, the inductor releases energy to charge multiple capacitors in parallel, whose voltages are controlled by a pulse width modulation technique. Thus, a high voltage gain of the dc–dc converter can be obtained with good regulation. Based on this principle, a series of new topologies are derived, and the operating principles and voltage gains of the proposed converters are analyzed. Finally, the design of the proposed converter is given, and the experiment results are provided to verify the theoretical analysis. The converter achieves high stepup voltage gain with appropriate duty ratio and low voltage stress on the power switches. Also, the energy stored in the leakage inductor of the coupled inductor can be recycled to the output. The operating principles and the steady-state analyses of the proposed converter are discussed in detail. Finally, a prototype circuit of the proposed converter is implemented in the laboratory to verify the performance of the proposed converter.