JCT - Volume 5 Issue 1 (January 2016)


Sr/No/ Title Pdf
1 An Approach for Image Classification
Shruti Kulkarni

Abstract- Main key issue, here, is the choice of the methodology for the image segmentation. Different techniques are available to perform the image segmentation, but the prominent one from image classification point of view is the watershed transform, as presented work concern with the approach based on graph kernels. To develop the graph kernel, it is necessary to have the identification of the different regions of the image. To get the different regions from the image, the watershed transformation based image segmentation have to be performed. Later the next important thing is that the image classification. For this purpose the Support Vector Machine (SVM) is selected as the classifier. In view of the image classification, firstly, the image database of different classes is referred, to generate the attributes of the images in particular and that of the classes in general. These attributes consist of the feature based on the graph kernel which is obtained after performing the image segmentation using watershed transformation and the features for the whole image. In this way, the feature database for the particular classes is developed. Later, to identify the belongingness of the query image, once again the same attributes are extracted for the query image and then, query image feature and the feature database for the various classes is referred to classify the given query image. For this purpose the confusion matrix is evaluated through the SVM classifier. Experimentations are carried out with the five classes of images. Every class consists of 100 images. Obtained results are encouraging and motivating.

2 Non-Linear Programming for Induced Drafting Practices in Industries
Sandeep Kr Singh

Abstract- The selection of Induced Draft Fan (IDF) characteristics for percolation of gases in various industrial application areas is emphatically contingent upon the filtration rate, particle bed height and the granulatory characteristics of the particles in the system. The permeability of the medium is deterministic factor for selection of IDF capacity and attaining requisite mechanical and chemical properties during process. The present work circumscribes the study of various parameters along with their inter-dependency, using constraint multivariable non-linear optimization technique for the IDF with a typical example from steel industry. The study is first carried out for particle size upto 5 mm, to minimize the pressure drop across the fluidized bed by its optimization against the dependent variables. The investigation is further extended for the particle size upto 10 mm by analyzing the comparative information. The trend thus established, is also validated with the satisfactory fitness for all the considered operational parameters. A normalized dependency for the pressure drop and the shaft power requirement is also presented for the ease of IDF selection for multivariate operational requirements.

3 A Study On Perceptions Of Quality Of Work Life - With Special Reference To Academicians Working In Engineering Colleges With Special Reference To Coimbatore District

Abstract- ‘Quality of Work Life’ is re-emerging where employees are seeking out more meaning. QWL has different meanings for different people. While some consider it industrial democracy or co-determination with increased employee participation in the decision making process, for others, particularly managers and administrators, the term denotes improvement in the psychological aspects of work to improve productivity. Unions and workers interpret it as more equitable sharing of profits, job security and healthy and humane working conditions. Others view it as improving social relationships at workplace through autonomous workgroups. Finally, others take a broader view of changing the entire organizational climate by humanizing work, individualizing organizations and changing the structural and managerial systems. Hence, the present study focuses on the impact and perceptions about various attributes of quality of work life among academicians working in engineering colleges in Coimbatore District. There is a significant correlation found among all these contributing factors that have positive effect on the overall quality of work life of the academicians. Therefore, the researcher concludes that the impact and the perceptions towards various attributes of quality of work life among the academicians working in engineering colleges in Coimbatore District is found to be positive.

4 THBA: Efficient Approach For Recommender System
Monika khandelwal, Mukesh Kumar, Sitesh Sinha

Abstract- There are a huge scope of data mining and its technique in order to provide any kind of recommendation system using dataset generated by different resources every day. There are algorithms which make use of dataset content feature and content based query approach and find the best data rank for the further usage. Such as in the case of product selection and choosing of appropriate need user can make use of this algorithm application. Recently author [1] proposed such hybrid technique. In this paper our main contribution is enhancing the hybrid approach on providing more computational input parameter using which the accuracy of the computation is increasing, thus the better and optimized result is produced. Here our work proposed THBA (topical hybrid based algorithm) for the recommender system.

5 A Study On Perceptions Of Quality Of Work Life - With Special Reference To Academicians Working In Engineering Colleges With Special
Shefali Chourasia, Sapna Choudhry Jain

Abstract- As we know that in Software Engineering, measuring the software is an important activity. For measuring the software appropriate metrics are needed. Using software metrics we are able to attain the various qualitative and quantitative aspects of software. Software Metrics are a unit of measurement to measure the software in terms of quality, size, efforts, efficiency, reliability, performance etc. Measures of specific attributes of the process, project and product are used to compute software metrics.

6 Optimization and Performance of Human Activity Using Invariant Approach of Gabor Filter In Combination with HMM
Rajeev Shrivastava, Dr. Shachi Awasthi

Abstract- We present a biometric system performing identification of automatic human activity recognition. This system is based on gabor features extraction using gabor filter bank construction. For feature extraction the input image is convolved with gabor filter bank to select a set of informative and non-redundant gabor features. The extracted features are again subjected to discrete radon transform (drt) to extract a sequence of feature vectors from an image. The hmm (hidden markov model) is used for matching the input face image to the stored images. The hmm-based system developed in this paper matches the feature set (observation sequence) for a test image with an hmm of the claimed image, through viterbi alignment. A distance measure is obtained by calculating negative log likelihood .the purpose of this research is to develop a novel, accurate and efficient human activity verification system.

7 Performance Evaluation and Optimization of Power Quality by Implementing the FACTS System
Sanjay Shrivastava, Dr AK Sharma

Abstract- This paper discusses design and simulation of dynamic voltage restorer for improve power quality & reduce the harmonics distortion of sensitive load. Electronics devices are very sensitive load against harmonics. DVR proposed not only to improve PQ but also to reduce HD due to the presence of non-linear load. The DVR consists of injection transformer, filter, and ESS, VSI and control system. The basic function of injection transformer is to connect the DVR to the distribution network via the HV- wdg. In DVR LC filter can be achieved by eliminating the unwanted harmonics. The ESS can be suitable capacity. The ESS such as battery is responsible to supply energy in DC form. A VSI is a power electronics system consist of switching device which can generate a sinusoidal voltage. The disturbance is carried out with the help of d-q-0 method. Simulation results carried out by MATLAB verify the performance of the given method.

8 UML Profile for Modeling Quality of Service - A Review
Neha Garg, Sapna Choudhry Jain

Abstract- In today’s environment, the need, uses and applications of the mobile networks are increasing. Most of the data communications depend on these emerging technologies. Mobile computing systems have nonfunctional properties that differ from fixed distributed systems due to the radio and mobile terminal characteristics. The term mobile computing system is used when considering a system consists of: application, middleware, operating system (OS), mobile terminal, and mobile communication system. End-to-end quality of service (QoS) in mobile computing systems is therefore the combination of QoS characteristics and QoS mechanisms across the system.

9 Optimization of Diversified Images by Using Discrete Wavelet Transform
Parth Ghosh, Mohammad Suhel

Abstract- In the following paper the author has proposed an algorithm based on Discrete Wavelet Transform to enhance the low contrast image. This algorithm is based on thresholding, mean, minimum, maximum and standard deviation only. In this noise is added repeatedly, and also utilize the well known histogram technique of image processing. Easy to implement in any generalized image is an advantage of this proposed algorithm. To verify the utility of this algorithm, this is applied to low contrast standard Lena image and other real life images.

10 Implementation of QoS for Adaptive Multimedia in Wireless/ Mobile Network-A Review
Gurwinder Pal Kaur, Dr.Kavita

Abstract- Most of the data communications depend on these emerging technologies. Mobile computing systems have nonfunctional properties that differ from fixed distributed systems due to the radio and mobile terminal characteristics. The term mobile computing system is used when considering a system consists of: application, middleware, operating system (OS), mobile terminal, and mobile communication system. End-to-end quality of service (QoS) in mobile computing systems is therefore the combination of QoS characteristics and QoS mechanisms across the system.

11 Implementation of QoS for Adaptive Multimedia in Wireless/ Mobile Network
Gurwinder Pal Kaur, Dr.Kavita

Abstract- One of the best known QoS specification techniques is QML (Quality Modeling Language), which has been proposed in this paper. However, QML is focused on the specification of application layer QoS properties whereas in wireless systems it is also important to explicitly deal with hardware layer properties. Therefore this work carries the hardware specifications in QML as well so that the complete wireless system can be specified. From the readings of the existing system, following QML specifications has been created for both case studies for the different mobile computing parameters.

12 Implementation of Microstrip Patch Antennas for Mutual Coupling Using Electromagnetic Band-Gap Structure
Rachana Shandilya, Asmit Kumar Soni

Abstract- Communication between humans was first by sound through voice. With the desire for slightly more distance communication came, devices such as drums, then, visual methods such as signal flags and smoke signals were used. The main objective of this work is to propose equilateral triangular micro strip patch antenna with Electromagnetic Bandgap Structure and Superstrate. A considerable improvement in bandwidth is observed in antennas having mushroom like EBG patterns and superstrate. Hence, we are able to improve the low bandwidth problem of a patch antenna.

13 A Review on Data Collection Techniques in Wireless Sensor Networks

Abstract- Data collection is a fundamental task in wireless sensor networks. Due to the constraints in communication bandwidth and energy budget data collection is a wise choice in many applications. In object tracking applications, an object is often detected by sensor nodes in multiple clusters, leading to redundant data transmissions through multiple paths from the cluster heads to the data sink. Due to minimum no of sensor nodes, it is valuable to reduce the amount of data transmission so that the average sensor lifetime is reduced. The main goal of data gathering algorithms is to gather and aggregate data in an energy efficient manner so that network lifetime is enhanced. This paper describes a review on data collection techniques in wireless sensor networks. We also studied advantages and disadvantages of each method and the comparison of each method with different constraints such as amount of gathered packets, energy efficiency, network lifetime etc.

14 Product Analysis Suppo rt For Customers Using Association Rule Mining
Prof. Aruna Varanasi, Shaik Khasim Saheb, Prof.T V Narayana Rao

Abstract- As the technology is rapidly growing mining the data is always plays a vital role. The Data Mining technology is still going to be expanded in much number of disciplines. Data Mining is commercially used in large number of applications. It occupies a major role in many of business aspects. If we see the applications of data mining evident it was everywhere like marketing, banking, healthcare, insurance, real-time industries, environmental, geographical, remote sensing, scientific, and in academic purposes also it has its own importance. Always it is used to make smart decisions for the business purposes in order to improve their growth in the business. On the other hand it is also helpful for customers. In that aspect we contribute this paper especially for customers to make a good decision. Huge number of products are coming into the market and going out. The customer can’t expect the right product always; sometimes the product may be going to be failed within a short period of time. Upon consideration of all those things we came up with a a paper in such we In this paper we proposed architecture based on transactional data chosen from different data sources. We observed two factors whether to purchase a product or not based on association rule mining which is a popular domain of Data Mining. This implementation would suggest the customers to make a smart decision.

15 Performance Analysis of Optical Interleave Division Multiple Access Using Solitons
Surendra Kr Sriwas, M K Shukla, R Asthana, J P Saini

Abstract- In this paper, we investigated a technique to establish optical fibre interleave division multiple access communication system for long distance and high capacity using Solitons. Group Velocity Dispersion (GVD) causes most pulses to broaden in time as they propagate through an optical fibre. however , a particular pulse shape known as Solitons takes advantage of nonlinear effects in silica, particularly self phase modulation (SPM) resulting from the Kerr nonlinearity, to overcome the pulsebroadening effects of GVD. Interleave Division Multiple Access is a multiple access technique that employs user specific interleavers for distinguishing the signals from different users. This is different from conventional code division multiple access schemes in which different signature sequences are used to distinguish users.

16 Performance Analysis of a Hybrid Information Sharing System Designed by Humans Networks
Y.Hari Krishna, B.Bangaru Naidu

Abstract- As the current world is running through mobile devices for communication between each other, a lot of internet usage is also increased in order to process the data. Now a day’s mobiles devices plays a very vital role in each and every human life, as there was increase in population day to day the usage of mobile devices also increased to a high extent. As the mobile users access the internet for processing their activities through mobiles there was a lot of problems that occur during their communication. If any of the intermediate nodes becomes in active while data is been transferred the remaining nodes cant able to take the data of previous node and carry to the destination automatically. This will lead to a major problem called as Data Loss or Attack. So in this paper we have implemented a hybrid network which was created by human that enable the information sharing between mobile devices through direct inter device communication also known as HHUNET.In this we have design a B-SUB network for inter-driven information sharing between HHUNET nodes. By conducting various experiments on this HHUNET, we finally came to a conclusion that this is the first time to implement such a HHUNET and it is very efficient and useful for almost all mobile users for data communication.

17 Design and Analysis of a Novel Selective Boundary Cut Algorithm over a LAN Network
Rajasekhar Cheeli, A. Hari Kumar

Abstract-A computer network or data network is defined as a telecommunications network which allows computers to exchange data. In computer networks, networked computing devices exchange data with each other along network links . Generally networks are classified into various types based on the usage and type of configuration. Client-Server network is one among the various types of networks, where a client will always sends a request and server will always generates a response. During the communication between each and every nodes in the network the data is mainly divided into packets of equal sizes. However during communication there may be occur some cuts between nodes like edge cut or node cut, this mainly happens due to inactiveness of some intermediate nodes. If any node during the communication becomes inactive it will lead to a network cut between the consecutive nodes which may sometimes leads to edge cut. As the decision tree based algorithms are very efficient in identifying the cuts they are sometimes involve complicated heuristics for determining the fields and the number of cuts. So in this paper we have implemented a novel packet classification algorithm using boundary cutting is proposed where the proposed algorithm is able to find out the cuts that occur during the data communication between nodes.

18 A Novel Cipher Text Policy Attribute Based Encryption Algorithm for a Secure Data Retrieval in Military Networks
Vema Lakshmi Prasanna, CH. K. Rupesh Kumar

Abstract- Now a day’s wireless sensor networks have achieved maximum user attention towards their usage. Mobile Adhoc Networks are the devices which are always self-configuration nodes connected without any wires. Generally in manets each and every device has a chance to move from one location to other location independently without having any restriction. Almost all military officials use Manets as main source or medium in order to have communication at the time of battlefields or hostile regions. As this Manets are used by lot of military officials, still there were some problems that arise while using Manets like intermittent network connectivity and frequent network partitions. To avoid the problem of intermittent network connectivity, almost each and every military official are preferred with a new type of network called as Disruption Tolerant Network (DTN). By using this DTN, the soldiers can communicate with each other and access the confidential data or commands without having any intervention between their communication.Eventhough a lot of mobile users are taking DTN technology as advantage they still face some challenging issues like authorization and secure data retrieval. Inorder to solve this challenging issues we use an advanced cryptography algorithm like Attribute Based Encryption with Cipher Text Policy. Also we have used the Identity Based Encryption algorithm in order to encrypt the data which is stored in storage node by the sender and here we use secret key encryption for generating the keys dynamically by the server. By conducting various experiments on this proposed ABE over Cipher text policy on Military networks we finally came to a conclusion that this proposed system is more secure in keeping data confidentially in the disruption-tolerant military network.