IJEA - Volume 5 Issue 11 (November2016)

 
























Sr/No/ Title Pdf
1 Mathematical Modeling and Analysis of Different Type of Fuel Injector in Scramjet Engine Using CFD Simulation in Fluent
Santosh Kumar Dixit, Rohit Kumar choudhary, Suresh Badholiya

Abstract-At Present the most promising propulsive systems, the scramjet engine has drawn the attention of many researchers. The two-dimensional coupled implicit NS equations, the standard k-ε turbulence model and the finite-rate/eddy-dissipation reaction model have been applied to numerically simulate the flow field of the hydrogen fuel scramjet combustor with a different type of fuel injector like single wall, double wall and Pylon structure is compare with the basis of Temperature, Pressure and velocity variation, Mass fraction of H2, O2 & H2O and total energy. The results obtained by CFD simulation shows that the numerical method used in this study is suitable to simulate the flow field of the scramjet combustor. At last we analyse the pylon type fuel injector and conclude that this type of injector give the best results as compare to other. Temperature is increased by almost 35% as compared to previous one. Pylon injector provides better mixing of air-fuel and complete combustion in efficient manner due to this energy is increased and emission is reduced. From this study we can conclude that Pylon type of injector may solve the recent problem of scramjet combustor in use and this analysis shows the solution regarding stabilized flow. From flow phenomenon we can see the stability of flow which is the major problem with planer strut injector as which provide limitation in Mach no of engine but may give continuous flow and combustion through the flight. The eddy generated in the pylon acts as a flame holder in the combustor, and it can prolong the residence time of the mixture in the supersonic flow.

Download
2 VMM System Power Saving Algorithm in Cloud
S.Dhasarathapandian, S.Saravanan

Abstract-This work uses the open source codes and PHP web programming to implement a resource management system with power saving method for virtaul machines. We propose a system integrated with open source software, such as KVM and Libvirt, to construct a virtual cloud management platform. This system can detect the status of cloud resources via SNMP, calculate the operation efficiency of the overall system, allocate virtual machines through the live migration technology, and turn off extra machines in the cloud to save energy. According to our proposed power saving method, we have constructed a power efficient virtualization management platform in the cloud. Our objective is to provide enterprises or end users with power saving private cloud solutions. In this work we also have built a web page to allow users to easily access and control the cloud virtualization resources, i.e., users can manage virtual machines and monitor the status of resources via the web interface. From analysis of the experimental results of live migration of virtual machines, this work demonstrates that efficient use of hardware resources is realized by the power saving method, and the aim of power saving for cloud computing is achieved.

Download
3 Web Service Recommendation System
N. Sasikala, P. Priyadharshini

Abstract-Recommending the pertinent web service to the client’s requirement is a challenge as numbers of similar services are available in the internet. Current web service recommendation systems provide the results based on service provider’s QoS details. No mechanism for real time computation at the client side. Taking average of different QoS values is not considered as an accurate one; therefore an effective QoS prediction mechanism is imperative. To address these issues the Enhanced Hybrid Collaborative Filtering approach has been introduces. The system consists of Pearson Correlation Coefficient and personalized similarity computation for identifying the similar users and items. For finding the missing values Top-K similar users and items are identified. For accurate prediction the confidence value for user based method and item based method are calculated and they are systematically combined.To increase the prediction accuracy, for each user and item, the set of most similar users and items are considered. To predict QoS values for active user weight values of user based approach, item based approach and mean value of web services’ QoS values are considered. Web services are recommended based on the prediction.

Download
4 Secure User Access Control in Remote Sensor Networks
Aishwarya R, S.Sathees Babu

Abstract-Remote Sensor Networks (WSNs) are one of the most moving and difficult research domain. The amazingly vulnerable nature of produced information makes security in these extraordinary systems as fundamental concern. In WSNs, security makes more extreme difficulties contrasted with the conventional systems. As attacks to any part of the hardware or software may gives the significant damages to these types of networks. In this paper, we develop a new protocol, named Accountable and Privacy-Enhanced Access Control (APAC) for providing security. APAC can implement severe access control. Hence the sensed information is only accessible by the authorized users. APAC offers complicated privacy protection for users. Misbehaving users or owners can be audited and identified. It does not depend on a trusted third party, and thus is more possible in practice. The possibility of the APAC is established by experiments on resource-limited smart phones and sensor platforms.

Download
5 Survey on Clustering and Classification of Cotton Fiber Quality
E.Iswarya, K.Manivannan

Abstract-Precise detail of cotton fiber quality is a colossal support for turning factories to purchase cotton as indicated by least necessities. Cotton tests from three cotton developing districts of Uganda were described for quality parameters utilizing the High Volume Instrument (HVI).Cotton yellowness and short fiber file are found to represent a significant part of the inconstancy in cotton fiber quality. At 5% essentialness level, the most noteworthy relationship (0.73) is found between short fiber record and yellowness. In light of Cotton Outlook's reality grouping and USDA Standards, the cotton under test was esteemed of high and uniform quality, falling amongst middling and good middling evaluations.

Download
6 Exploiting Energy Efficacy in Multiple Access Channels by Packet Dropping and Transmitter Buffering
Prasath, S.Devi

Abstract-Quality of service (QoS) for a network is characterized in terms of various parameters specifying packet delay and loss tolerance requirements for the application. The unpredictable nature of the wireless channel demands for application of certain mechanisms to meet the QoS requirements. Traditionally, medium access control (MAC) and network layers perform these tasks. However, these mechanisms do not take (fading) channel conditions into account. In this paper, we investigate the problem using cross layer techniques where information flow and join t optimization of higher and physical layer is permitted. We propose a scheduling scheme to optimize the energy consumption of a multiuser multi-access system such that QoS constraint s in terms of packet loss are fulfilled while the system is able to maximize the advantages emerging from multiuser diversity. Specifically, this work focuses on modeling and analyzing th e effects of packet buffering capabilities of the transmitter on the system energy for a packet loss tolerant application. We discuss low complexity schemes which show comparable performance to the proposed scheme. The numerical evaluation reveals useful insights about the coupling effects of different QoS parameters on the system energy consumption and validates our analytical results.

Download
7 A Choatic Map Based Password Authentication Scheme for Telecare Medicine Information System
T.Janani, Dr.P.Gokulakrishnan

Abstract-Telecare Medicine Information System(TMIS) is a compelling innovation in which patients can stay at their home and can get recommendations for therapeutic treatment through the web. The goal of TMIS is to give information security, protection and client verification for getting to therapeutic information. This paper reports the results of survey of Telecare Medicine Information System regarding the importance of various techniques to prevent the security vulnerabilities. Confirmation, security, patient's privacy protection and information privacy are critical for patient or specialists getting to Electronic Medical Records (EMR). The secret key based confirmation plans give effective and scalable solutions for remote client confirmation. In this context, various plans have been proposed to accomplish these objectives. However, these plans are vulnerable to different assaults. Also, they are neither effective nor easy to use. This paper investigate significant commitment in this field and talks about their upsides and downsides.

Download
8 Information Security Mechanism for Cloud Storage System
A Eugin Lauro Britto, N.Uma Maheswari

Abstract-In this paper, we propose a two-factor data security protection mechanism with factor revocability for cloud storage system. Our system allows a sender to send an encrypted message to a receiver through a cloud storage server. The sender only needs to know the identity of the receiver but no other information (such as its public key or its certificate). The receiver needs to possess two things in order to decrypt the cipher text. The first thing is his/her secret key stored in the computer. The second thing is a unique personal security device which connects to the computer. It is impossible to decrypt the cipher text without either piece. More importantly, once the security device is stolen or lost, this device is revoked. It cannot be used to decrypt any cipher text. This can be done by the cloud server which will immediately execute some algorithms to change the existing cipher text to be un-decryptable by this device. This process is completely transparent to the sender. Furthermore, the cloud server cannot decrypt any cipher text at any time. The security and efficiency analysis show that our system is not only secure but also practical.

Download
9 Extracting Potential High Utility Item sets from Uncertain Databases
C.Niveditha, R.Karthikeyan

Abstract-Frequent pattern mining is one of the emerging issues in Data Mining. From a large database, if user wants to extract useful information, mining is necessary. Utility mining is the process of retrieving the information based on user interest. Utility refers to profit, Quantity, probability values. Many algorithms such as Apriori, Frequent pattern growth, utility mining were used for extracting useful information from precise Databases such as Transactional database. It comes interesting while considering uncertain databases because they might change from time to time. Mining frequent pattern from uncertain databases results in more number of candidate generation. There were many algorithms proposed for mining frequent pattern directly once the transactions are done. The work proposed in this paper is to stream the transactions based on the interval before mining. Data stream mining is a rising exploration theme in the information mining field. Here, before mining frequent pattern, the databases are streamed to mine effectively. Finding continuous itemsets is a standout amongst the most imperative undertakings in Data stream mining with wide applications like online e-business and web click-stream investigation. The important high utility itemsets are extracted once the streaming is done. The mining performance will be improved effectively.

Download
10 A Survey on Blur Kernel Estimations to Identify the Number Plate Images for Fast Moving Vehicles
G.Karthikeyan, S.K.Somasundaram

Abstract-About 80% of accidents were happened because of Over Speed Vehicles not following the traffic rules. The Over Speed vehicles and theft vehicles can be monitored using a well defined vehicle monitoring system may be with a surveillance camera. Extracting license plate from vehicles is more difficult, because the snapshot of over speed vehicles captured by surveillance camera is frequently blurred due to the fast motion. The license plates are extracted by matching local features with Principal Visual Word Discovery and Label affirmation is one of the framework is used for vehicle conspicuous verification methodologies. Based on the survey, deblurring of fast moving vehicle images are not efficiently done due to weak assumptions of sparse representation coefficient with kernel parameter which is often uncovered and more exploited.

Download
11 Client Preference Learning for Social Recommendation System
P.Sukanya, D.Shanthi

Abstract-A recommender system is a computer based intelligent technique. It manages information overload. It is a system which provides recommendations to a user. The main goal of the recommendation system which generate suggestions about new items. It predicts items that a user may be interested in. Choosing among so many options in proving challenges for consumers. In general two types of Recommender system such as personalized, non-personalized services. The recommendation generation which includes content-based filtering, collaborative-based filtering, knowledge-based filtering techniques. By concluding the proposed approach that may upgrade the nature of recommender system.

Download
12 Preserving the Privacy in a Blind Turing Machine on Vertically Partitioned Database using Association Rule Mining
M.Rajasekaran, M.S.Thanabal

Abstract-Privacy preserving is one of the major issues in data mining for any kind of data owners. Nowadays, Privacy issues in data mining have been increased enormously when internet is booming with social media, ecommerce, forums, blogs, etc. Because of privacy problems, the confidential information collected from the users are used in unethical way that leads to major issue in preserving security. Hence, retaining Privacy in data mining is a research area. Disclosing little information about their sensitive data to other data owners and third parties are the major issues. To make it efficient, here Turing machine concept is introduced to improve efficiency and improve privacy. We address the issue of security protecting information mining. In particular, we consider a situation in which two gatherings owning classified databases wish to run an information mining calculation on the union of their databases, without uncovering any pointless data. Our work is propelled by the need to both secure special data and empower its utilization for research or different purposes. The above issue is a particular case of secure multi-party calculation and accordingly, can be understood utilizing known nonexclusive conventions. Be that as it may, information mining calculations are normally unpredictable and, besides, the info for the most part comprises of huge information sets. The bland conventions in such a case are of no pragmatic utilize and along these lines more productive conventions are required.

Download
13 Semi-Automated Detection Mapping Of Surges Degree Using Streamlining Techniques
E.Mehuva, N.Uma Maheswari

Abstract-Surges are among the most exhausting common failure around the world. In surge disaster administration programs, surge mapping is an underlying stride. This examination proposes an effective procedure to perceive and outline territories by utilizing TerraSAR-X symbolism. Initial, a TerraSAR-X satellite picture was caught amid a surge occasion in Kuala Terengganu, Malaysia, to delineate immersed territories. Multispectral Landsat symbolism was then used to recognize water bodies preceding the flooding. In manufactured gap radar (SAR) symbolism, the water bodies and surge areas show up in dark; along these lines, both articles were delegated one. To overcome this disadvantage, the class of the water bodies was separated from the Landsat picture and after that subtracted from that separated from the TerraSAR-X picture. The rest of the water bodies spoke to the overflowed areas. Protest arranged characterization and Taguchi strategy were executed for both pictures. The Landsat pictures were ordered into three classes, to be specific, urban, vegetation, also, water bodies. By complexity, just water bodies were extricated from the TerraSAR-X picture. The characterization comes about were then assessed utilizing a disarray lattice. To look at the effectiveness of the proposed technique, iterative self-sorting out information examination system (ISODATA) arrangement strategy was connected on TerraSAR-X in the wake of utilizing the division procedure amid protest oriented–rule-based technique, and the outcomes were looked at. The overwhelmed areas were perceived and mapped by subtracting the two classes of water bodies from these pictures.The fruitful creation of a solid and exact surge stock guide affirmed the productivity of the philosophy. In this manner, the proposed strategy can help analysts and organizers in actualizing and speeding up surge stock mapping.

Download
14 Leaf Identification and Disease Classification in Grape Plant: A Survey
J.Divya Jenifer, J.Benadict Raja

Abstract-Plant leaf disease identification is developing field in India as agribusiness is essential segment in Economy and Social life. At the point when Plants are influenced by the diseases, it influences the generation and economy of the nation. To finding out which illness influence the plants, the agriculturist contact the master for the arrangement. The master gives the counsel in light of its learning and data yet some of the time looking for the master guidance is tedious, costly and might be not exact. So to take care of this issue, Image processing methods gives the exact and quick arrangement. This study examines the leaf disease identification in leaf images acquired from camera. The aim of this study is to survey and categorize the leaf disease identification techniques and methodologies. Here this overview paper gives different recognition and characterization procedures. There are numerous effective discovery methods like Artificial Neural Network, Probabilistic Neural Network, Genetic algorithm, Back propagation neural network and Support vector machine (SVM).

Download
15 Friend Recommendation using Support Vector Machine and Multiparty Access Control by Voting System
Shanmugapriya K, Dhanalakshmi K

Abstract-The Social Network is a network consists of people with social interactions and personal relationships. Social Network is considered to be dedicated website or other sources which makes the people to communicate with each other by sharing their information, messages, images comments, etc. Friend recommendation is one of the primary function in the social networks like Facebook, Messenger, Linkedin, Instagram, Facebook messenger, Qzone, Wechat, etc. Friend recommendation is send to people only if they are our friends or they are mutual friends. This does not make interest of the user and friends circle are limited and there is no privacy for the data residing outside the user spaces. To overcome this problem and to predict the interest of the user Multiparty Access Control (MPAC) and Support Vector Machine (SVM) are used respectively.

Download
16 A Survey on Key Management Techniques in Ad Hoc Network
S.P.Lavanya, S.Pushpalatha

Abstract-Mobile Ad hoc Network (MANET) is a selforganizing wireless network for mobile devices. It does not require any fixed infrastructure to be configured which makes it more suitable to be used in environments that require on-the-fly setup. The goal of this work is to give a security to keeping up the mystery of steering data in view of the irregularity plot in MANET. The current work is set up with a mystery regular haphazardness between two or numerous gadget in a system dwell at the course of correspondence security. One of the critical and testing issues in impromptu systems is the advancement of a productive steering convention to worry about throughput, directing disappointments, bundle overhead, control utilization. A Key Establishment in light of Randomness reaped from the source courses in a MANET utilizing the Dynamic source Routing. The key Establishment depends on the course revelation period of an impromptu system utilizing the Dynamic Source Routing Protocol Trust based plan for securing Dynamic Source Routing Protocol in MANET utilizing declaration renouncement. The hubs can be assessed with the directing ways as per some chose elements, for example, hub notoriety and distinguish data before sending the information through these courses. This calculation will be assessed utilizing Network Simulator (NS-2).

Download
17 A Study on Applications of Big Data in Healthcare Sectors Predictions
N.Suganya, T.Hemalatha

Abstract-Big data in healthcare is distributed with large and varied source of meaningful dataset that are complex for healthcare providers to process and are interpreted using existing tool. It is driven by continuing need to make the health services more efficient and sustainable to increase the requirement for gearing up the delivery of health services towards prevention, early intervention and optimal management. The lack of large population based health dataset act as one of the greatest obstacles in understanding the reasons of health-shocks according to their situations and its effects in developing countries. The objective of this work is to develop a framework for processing health care data using Hadoop with Map reduce programming in the given data set. The data set is collected from a rural hospital that provides major health care services in the local district. In addition, the proposed solution can perform analysis using hive and other tools. By obtaining the real-time health care dataset from the hospital, a parallel processing framework with data analytics tool incorporated, implementation is proposed, that processes this dataset using Fuzzy rule summarization technique. The Analysis tools are used to give statistical reports which can aid easy prediction for health care applications which comprises of a High performance computing (HPC) framework with large dataset for processing health care applications. The prediction model can help the health care department to allocate resources based on the needs thereby it can aid to cut down on administrative cost.

Download
18 Automatic Image Annotation Techniques for Different Application
S.Arthy, D.Shanthi

Abstract-Image Annotation and Retrieval (IR) is one of the most challenging and fastest growing research areas in the field of multimedia technology. Manual image annotation is tedious, difficult and costly. Automatic image annotation and retrieval is a predominant research zone in computer science. It is concerned with the capacity of images and assigning meaningful keywords to it. There are a few techniques produced for efficient automatic image annotation which utilizes different advancement systems. Image retrieval is a method for seeking images in vast databases. It is concerned with the technique of searching and retrieving images from a collection of image databases. This paper is to show the survey study done on different applications for Image annotation and retrieval.

Download
19 Breath Disorder Classification With Instructive Features For M Health Applications
V.Shanmathi, S.Jeyanthi

Abstract-Respiratory turmoil is an exceedingly pervasive condition connected with numerous unfavorable wellbeing issues. As the present method for finding are prominent and illsuited for ongoing m-wellbeing applications, we investigate an advantageous and minimal effort programmed approach that utilizations wearable MEMS sensor innovation.The proposed frame Respiration Disorders Classification with Informative Features for m-Health Applications work presents the utilization of movement sensors to distinguish the adjustments in the foremost back width of the mid-section divider amid breathing capacity and additionally extricating the enlightening respiratory components to be utilized for breathing issue grouping. A broad assessments are given on six surely understood classifiers with novel element extraction procedures to recognize among eight distinctive neurotic breathing examples. The impacts of the quantity of sensors, sensor situation and in addition highlight choice on the arrangement execution are talked about. The test comes about led with 10 subjects demonstrate the best precision rates by Support Vector Machine (SVM) and Decision Tree Bagging (DTB) with all elements and after element determination, correspondingly. Besides, a paired arrangement is proposed for recognizing sound individuals and patients with breath issues .The diverse appraisals of characterization parameters are given by measuring the exactness, affectability, specificity, F1-score and Mathew Correlation Coefficient (MCC). The exactness rates above 98% recommend unrivaled execution of DTB in paired acknowledgment upheld by the proposed new elements.

Download
20 A Survey on Data Analytics Framework of Child Healthcare
N.Tharani, S.Pushpalatha

Abstract-With the expanding volumes of data accumulated for medicinal dataset, physicians have been put on increasing pressure for making sophisticated analytical decisions which exploit the various types of data together. This strategy of growing dataset is arising and gaining momentum in several application domains in the business community as Data Analytics. This work mainly to propose the analysis of nutrition deficiency for children using predictive analysis. In this work, machine learning techniques such as classification and prediction which provides a appropriate results for the medical dataset. The results of these techniques are used to improve the nutrition level of public health with the help of government healthcare services.

Download
21 Detection of Security Issues in Cloud-Based E-Learning Systems
Anu Lavanya N, M Buvana

Abstract-Cloud computing is an emerging technology in every field nowadays. Cloud computing is an internet based computing that share the data to computer and others devices on demand. E-learning is a process of learning the course from online. The Word ‘E’ represents electronic learning the learners can learn from different physical location. Cloud based E-learning is the sub division of cloud computing on educational field for E-learning system. Cloud based Elearning is the enhancement of traditional E-learning architecture. In cloud computing security is a major issue. DROWN attack occur in E-learning portal while accessing more website. We proposed a technique called Elliptic curve cryptography (ECC) to overcome the DROWN attack.

Download
22 Image Enhancement of Real Life Application Along with Traditional Images using Stochastic Resonance
Parth Ghosh, Mohammad Suhel

Abstract- Nonlinear stochastic resonance systems have been successfully used for one-dimensional signal processing, based on the concept of parameter-tuning stochastic resonance. Paper here presents a new algorithm for improvement of image enhancement of real life application along with traditional images using stochastic resonance (SR). This algorithm is applicable to wide range of low contrast images, a beauty of proposed technique. The proposed algorithm is used histogram equalization, two levels thresholding, mean and standard deviation of images. The novel stochastic resonance (SR) based techniques enhances the information without introducing any artifacts and spots in the images. This paper presented mathematical background with proper justification of SR for image enhancement. SR is a phenomenon wherein addition of random noise of optimum intensity to a weak noisy signal and passing through a non-linearity enhances output peak signal-tonoise ratio (PSNR). This SR based methods are introduced for enhancement of very low contrast images. Initialization with studied the detail about the Wavelet Transform and inverse Wavelet Transform the most widely used technique in image processing.

Download
23 Single phase transformer less inverter with High efficiency and reliability for Grid connected PV systems
Banoth.Prasad, Eslavath.Nageshwarrao, Vankudoth.Hathiram

Abstract-Generally PV inverter with transformer is having efficiency around 92%–94% only. To overcome these problems, transformer less PV system is introduced. It is smaller, lighter, cheaper and higher in efficiency. However, dangerous leakage current will flow between PV array and the grid due to the stray capacitance. There are different types of configurations available for transformer less inverters like H5, H6, HERIC, oH5, and Dual paralleled buck inverter. But each configuration is suffering from its own disadvantages like high conduction losses, shootthrough issues of switches, dead-time requirements at zero crossing instants of grid voltage to avoid grid shoot-through faults and MOSFET reverse recovery issues. The main objective of the proposed transformer less inverter is to address two key issues: One key issue for a transformer less inverter is that it is necessary to achieve high efficiency compared to other existing inverter topologies. Another key issue is that the inverter configuration should not have any shoot-through issues for higher reliability.

Download
24 Implementation of different islanding Detection Techniques for DG system
Banoth.Prasad, Eslavath.Nageshwarrao, Vankudoth.Hathiram

Abstract-This paper discuss about the different islanding detection methods used for anti-islanding protection in EPS. Anti-islanding methods are generally classified as passive, active, hybrid and communication based methods. Active methods are more preferred, passive methods are much simpler, communication based methods have perfect performance whereas hybrid methods is a combination of both active and passive methods and have improved performance. Here the advantages and disadvantages of different methods are compared and discussed. In case of a stable island formation, there is a small periodic frequency deviation owing to the small value of the periodic reference current, and the frequency deviation is so small that it falls inside the non detection zone (NDZ) of the frequency relay. The main advantage of the proposed algorithm is that it detects the stable island formation but without forcing the island to lose its stable operation.

Download
25 Implementation of Pitch Control Technique for Stand-Alone Wind Energy Conversion System
Banoth .Prasad, Eslavath.Nageshwarrao, Vankudoth.Hathiram

Abstract-Some of the conventional sources of energies like thermal energy is produced from the fossil fuel coal which are depleting and is only limited to 2030. Renewable sources of energies are Solar, Wind, Biomass, etc hold bright prospect for the future. Wind industry has made rapid strides in the recent years. In order to ensure continuous supply of power suitable storage technology is used as backup. In this paper, the sustainability of a 4- kW hybrid of wind and battery system is investigated for meeting the requirements of a 3- kW stand-alone dc load representing a base telecom station. A charge controller for battery bank based on turbine maximum power point tracking and battery state of charge is developed to ensure controlled charging and discharging of battery. The mechanical safety of the WECS is assured by means of pitch control technique. Both the control schemes are integrated and the efficacy is validated by testing it with various load and wind profiles in MATLAB/SIMULNIK.

Download
26 Power Quality Improvement using Control Algorithm Based Dynamic Voltage Restorer with BSES
Eslavath.Nageshwarrao, Banoth.Prasad, Vankudoth.Hathiram

Abstract-Dynamic Voltage Restorer (DVR), which is one of the most efficient and effective modern custom power devices used in power distribution networks. A new control algorithm for the DVR is proposed in this paper to regulate the load terminal voltage during sag, swell in the voltage at the point of common coupling (PCC). This new control algorithm is based on synchronous reference frame theory (SRF) along with PI controller is used for the generation of reference voltages for a dynamic voltage restorer (DVR). These voltages, when injected in series with a distribution feeder by a voltage source inverter (VSI) with PWM control, can regulate the voltage at the load terminals against any power quality problem in the source side. It first analyzes the power circuit of the system in order to come up with appropriate control limitations and control targets for the compensation voltage control through the DVR. The control of the DVR is implemented through derived reference load terminal voltages. The proposed control scheme is simple to design. Simulation results carried out by MATLAB with its Simulink and Sim Power System (SPS) toolboxes to verify the performance of the proposed method.

Download
27 Design of IUPQC Controller to improve the Power Quality for Distribution power system
Vankudoth.Hathiram, Banoth.Prasad, Eslavath.Nageshwarrao

Abstract-In this an improved Unified Power Quality Conditioner (iUPQC), for power factor compensation, voltage and current harmonics compensation, voltage sag and swell compensation, grid side bus voltage regulation and load bus voltage regulation for the combinations of linear and nonlinear loads. The iUPQC will work as both STATCOM and conventional UPQC compensation, at the grid side and at the load side respectively. The iUPQC controller composes of PLL and PWM controller which is used for generating reference signal for shunt converter and also the Proportional Integral Derivative controller (PID) which is used for generating reference signal for series converter.

Download
28 Optimization of Small Scale Enterprises by Using Full Factorial Design
Bandana Tripathi, Amol Talanker

Abstract-The small-scale sector has emerged as the most dynamic and vibrant sector in recent times. Small and medium enterprises worldwide and small-scale sector in India is the backbone of economy. The developing countries like India realized the importance of this sector and gave encouragement for its growth through various incentives, subsidies, and reservation of items exclusively for this sector. Due to this, the small-scale industrial sector in India currently contributes about 40% of the industrial production, 35% of total exports and provides employment to over 18.6 million persons. On the other hand, these facilities have molded the mindset of entrepreneurs to work under the protected economical environment with very little attention to productivity improvement, R & D, innovation etc., thus resulting in sickness to industrial ventures in this sector. It is a fact that SSI Sector has not been developed to its fullest potential. The sector is facing number of problems, which have impeded the development of this sector. The sickness in this sector is widespread, and is growing at a fast rate, resulting in huge loss at different levels. It is because of this reason that the units in this sector were operating in sheltered markets and majority of them has paid little attention to technology up-gradation, quality improvement and cost reduction during last several decades. Due to the regime of quotas, control and licensing, industrial units have been set up with sole aim of making windfall gains, irrespective of the fact that individual is quality conscious or not. This has resulted in large number of units being sick with little scope for any improvement in future. The changing economic environment due to liberalization, privatization, and globalization has posed certain challenges and has provided opportunities to the Small-Scale Industrial (SSI) Sector. The challenges are in the form of increased competition, shorter life cycle of products as well as technology, reduced protection due to lower tariffs, and market determined rate of interest. On the other hand, the opportunities have come in the form of access to better technology, availability of a variety of raw materials and components, impetus to quality, efficiency, and opportunities to restructure and diversify. To face these challenges and grab the opportunities, an entrepreneur has to adopt innovative product process, productivity improvement techniques, and effective technology management for sustainability of the unit. Here the innovative approach will be the remedy for an entrepreneur for sustainability.

Download
29 Image Enhancement by Using Discrete Wavelet Transform
Neha Agrawal, Pradeep Tripathi

Abstract-This paper presents a new approach to enhancing feature extraction for low-quality fingerprint images by adding noise to the original signal. Feature extraction often fails for low-quality fingerprint images obtained from excessively dry or wet fingers. In nonlinear signal processing systems, a moderate amount of noise can help amplify a faint signal while excessive amounts of noise can degrade the signal. To verify the utility of this algorithm, this is applied to low contrast standard Lena image and other real life images.

Download
30 Performance Evaluation of Low Power Arithmetic and Logical unit (ALU) using Novel Full Adder and Pass Transistor logic based Multiplexer Transform
Shalini Tiwari, Neha Verma

Abstract-An optimized compensation strategy for two-stage CMOS OTA has been proposed for a high frequency OPAMP design. Here, the slew rate and bandwidth has been increased by employing thin and long transistors into the design at output stage and wide transistors in input stage. These two techniques are able to increase the gain up to a great extent by increasing the output resistance and input trans conductance respectively. There is a slight increase in static power dissipation of proposed architecture, but, the overall advantage of increased slew rate and gain bandwidth product which is very important parameter of communication so it compensates for this limitation.

Download