IJEA - Volume 5 Issue 2 (February 2016)


Sr/No/ Title Pdf
1 Design and Development of GSM Based Vehicle Control System
Govinda. K, Gorla Hema Vishal

Abstract-Now-a-days almost all the people have their own automobiles. Accidents and threats are the most undesirable events happening all the time. Theft takes place mostly when the vehicle is parked and when driven through insecure areas. Effort has been made to construct an automobile location based system. So that, the system can send a message when a theft is in progress or when the car is stolen. A message is sent to the owner and he can locate the car band even can turn off the engine of the car. This is possible with the help of GSM modem. In addition to the theft control system, the proposed system also sends an appropriate message if an accident occurs. Air Bag System is used to sense the release of air bags during accident. Immediately a message will be sent to the police/emergency ambulance service for speedy action. This paper proposes a system, which has all the above mentioned properties and is also cost effective and reliable.

2 Methods of Estimating Ground water Recharge
Saiful Islam, Ram Karan Singh, Roohul Abad Khan

Abstract- Estimates of groundwater recharge constitute fundamental input for most approaches used to evaluate and manage groundwater resources. Most approaches for quantifying groundwater recharge measure recharge directly or indirectly over a limited area (point or small-basin scale) and for short periods of time. Estimation of recharge, by any method is normally subject to large uncertainties and errors. In this paper, various methods of estimating ground water recharge are outlined and critically reviewed with regard to their limitations.

3 L-Fuzzy Quotient ℓ-Group
K.sunderrajan, A.Senthilkumar, R.Muthuraj

Abstract- This paper contains some definitions and results of L-fuzzy quotient  -group and its generalized characteristics.

4 Concealing and Securing Data via Video Steganography: A Review
A.Hariram, D.Shailendrasan

Abstract- Steganography is the art of covering or hidden writing. The purpose of video steganography concerns with concealing data behind the videos. This survey analyzes on various recent video steganography techniques such as hash-LSB method, AES, RSA , Motion Vector. These techniques are used for enhancing data security.

5 Computational Study on Evaluation of Emissions for Non- Premixed Methanol Combustion
Nikita Gupta, Ashish Muchrikar, Pavan Shrivastava

Abstract- The purpose of this study is to seek out the proportion of NOx after the combustion of fossil fuels. From this study our main interest is which can facilitate to reduce the formation of air pollution and acidic rain and lots of alternative harmful effects. computational fluid dynamics may be a widely used tool in optimizing fossil fuel burners, for example, emission problems and also the method of combustion of fossil fuel to sight the NOX formation like mass fraction of NO, NO2 and N2O. In order to save lots of procedure time, the flow is sculptured with an axis-Symmetrical formulation in fluent Ansys 14.5. However with computational efforts calculating three-dimensional turbulent flames, there is necessity of simplified models in order to simulate the combustion reactions and the NOx formation. Hitherto, models explain thermal NO and prompt formation of NO, respectively, were applied in a post-processing step.

6 Numerical Simulation on Airfoil and Flat Louvers on the Air Duct Intake
Ruby Tiwari, Pavan Shrivastava

Abstract-Louver's configurations are assuming critical part in planning an air admission framework. On a gas turbine power plant application, this louver will divert the wind current way into the compressor and for the framework's interior cooling. Be that as it may, the shape and plan of the louvers will impact the execution of a gas turbine. Bothered wind current over the louvers might bring about weight drop of the admission air, which prompts lessening of the turbine work yield. In this examination we are going to research affect of width variation on Airfoils by using CFD code.

7 Comparative Study of Automobile Driveshaft Using Composite Materials by FEM
Hina Shrivastava, V.N. Bhartariya, Rahul Agrawal

Abstract-Use of advanced composites has resulted in remarkable achievements in many fields including aviation, marine and automobile engineering, medicine, prosthetics and sports, in terms of improved fatigue and corrosion resistances, high specific strength and specific modulus and reduction in energy requirements owing to reduction in weight. The main aim of this work is to validate the conventional results of steel driveshaft of automobiles with an appropriate composite driveshaft by the FEM.

8 Implementation of External Pacemaker for Elderly and Heart Patients Using Pic
P.Vignesh, M.Karkodan, B.Lakshadeep, M.MadhanKumar

Abstract-An increase in world population along with a significant aging portion is forcing rapid rises in healthcarecosts. The healthcare system is going through a transformation in which continuous monitoring of inhabitants is possible even without hospitalization. Now we are using advanced sensing systems to monitor the heart patients and provide first-aid to them in case of emergency. We now demonstrate the real time application in heart rate beat analyzing by heart rate monitor and ensure proper working of heart. This paper reviews the latest system of human sensors and pacemakers usage issues to be tackled and its challenges.

9 Performance Evaluation of Hierarchical Routing Protocol to Increase life time of the Wireless Sensor Networks
S.Ravikumar, D Sreenivasa Rao

Abstract-Wireless sensor networks major challenging issue is energy because sensors have limited energy source. The wireless sensor nodes must have effective utilization of energy resources requires energy efficient routing protocol. In wireless sensor networks cluster based routing protocols are suitable in terms of energy efficiency. Wireless sensor networks (WSNs) consist of small nodes with sensing, computation and communications capabilities. Recent advances in wireless sensor networks have led to many new routing protocols specifically designed for sensor networks where energy awareness is an essential design issue. Most of the attention has been given to the routing protocols since they might differ depending on the application and network architecture. In this paper to evaluate the performance of two hierarchical routing protocols Low-Energy Adaptive Clustering Hierarchy (LEACH) and Power-Efficient Gathering in Sensor Information System (PEGASIS) in terms of system lifetime, energy consumption and alive nodes. The simulation result has been carried out using ns 2.34 network simulator.

10 A Perceptive Profitable Approach for Powerful Resource Allocation in Cloud Services
Manigandan.S.K, Karthikeyan.S

Abstract-Cloud computing become a new age technology that has got huge potentials in enterprises and markets. Clouds can make it possible access applications and associated data from anywhere. Companies are able to rent resources from cloud for storage and other computational for their infrastructure cost can be reduced significantly. Further use of the company-wide admission to applications, based on pay as-you-go model. There is no need for getting licenses for individual products. The major pitfall in cloud computing is connected to optimizing resources being allocated. Because of uniqueness of the model, resource provision is performed with the objective of minimizing costs associated with it. The other challenges of resource allocation are meeting user demands and application requirements. Various resource allocation strategies and challenges are discussed. It is believed that paper would benefit both cloud users and researchers in overcoming the challenges faced. Cloud computing provide resources into different types of virtual machine (VM) instances that are allocated to users for explicit period of time. The allocation of VM instances to users is usually determined through fixed-price allocation mechanisms cannot guarantee an economically efficient allocation and the maximization of cloud provider’s revenue. A better to use combinatorial action-based source allocation mechanism. The economic theory; when the auction costs are low, as is the case in the context cloud computing, auctions especially efficient over the fixedprice markets because products are matched to customers having highest valuation. The existing combinatorial auction based VM allocation mechanisms do not take account user’s demand when making provisioning decisions, that is, they assume that VM instances are statically provisioned.

11 M- Privacy Collaborative Data Publishing
Senthil Murugan.J, Dhanasekar.R, Elumalai.D

Abstract-We consider the collaborative data publishing problem for anonymizing horizontally partitioned data at multiple data providers. We consider a new type of “insider attack” by colluding data providers who may use their own data records (a subset of the overall data) in addition to the external background knowledge to infer the data records contributed by other data providers. The paper addresses this new threat and makes several contributions. First, we introduce the notion of mprivacy, which guarantees that the anonymized data satisfies a given privacy constraint against any group of up to m colluding data providers. Second, we present heuristic algorithms exploiting the equivalence group monotonicity of privacy constraints and adaptive ordering techniques for efficiently checking m-privacy given a set of records. Finally, we present a data provider-aware anonymization algorithm with adaptive m-privacy checking strategies to ensure high utility and mprivacy of anonymized data with efficiency. Experiments on real-life datasets suggest that our approach achieves better or comparable utility and efficiency than existing and baseline algorithms while providing m-privacy guarantee.

12 Physical Machine Resource Management In Clouds:A Mechanism Design Approach
Manigandan.S.K, Thirumoorthi.K

Abstract-The problems of physical machine resource management in cloud considering multiple types of physical machines and resources. It formulates this problem in an auction-based setting and design optimal and approximate strategy-proof mechanism that solve it. This is proposed mechanisms consist of a winner determination algorithm that selects the users, the provisions of the virtual machines (VMs) to physical machines (PMs), and allocates them to the selected users; and a payment function that determine the amount of each selected user needs to pay to the cloud provider. We prove that our proposed approximate winner determinate algorithm satisfied the loserindependent property, making the approximate mechanisms robust against strategic user who tries to manipulate the system by changing other users’ allocations. We show that our proposed mechanisms are strategy-proof; the users do not have incentives to lie about their requested bundles of VM instances and their valuations. In addition of our proposed mechanisms are in alignment with green cloud computing strategies in which physical machines can be power on or off to save energy. Our theoretical analysis shows this proposed approximation mechanism has been an approximation ratio of 3:1 We perform extensive experiments in order to investigate the performance of proposed approximation mechanism compared to that of the optimal mechanism.

13 Travelling Fine Grained Device Rental Using Cloud Computing
Manigandan.S.K, Vasudevan.K

Abstract-Cloud computing has been rising in the latest year. Numerous institution and organizations are using it for diverse purpose. Cloud can utilize for software development, or replace our office infrastructure with available on cloud on pay-as-you-use basis. These potential generate very good expectations for IT industry but there are little challenges that need to be overcome. These challenges are dissimilar from those of current technologies. This is come from diverse background like network protection issues, authorized issues, encryption technology challenges and privacy issues. User of cloud would guess all its services to be consistent and secure from attacks. This is should also meet SLA perfectly. Cloud based storage space services is dissimilar from other services available. It is used for online storage of data cloud computing based storage services and its components .Try to find out the benefits those services provide and challenges that they are facing and also analyzed the latest development occurrence in this field and future trends in technology.