JCT - Volume 5 Issue 3 (March 2016)

 


Sr/No/ Title Pdf
1 Portable Camera-Based Assistive Text and Product Label Reading from Hand-Held Objects for Blind Persons
S.Nandhakumar, P.Premkumar, S.Loganathan

Abstract- A camera-based assistive text reading framework to help blind persons read text labels and product packaging from hand-held objects in their daily lives. To isolate the object from cluttered backgrounds or other surrounding objects in the camera view, we first propose an efficient and effective motion based method to define a region of interest (ROI) in the video by asking the user to shake the object. This method extracts moving object region by a mixture-of-Gaussians-based background subtraction method. In the extracted ROI, text localization and recognition are conducted to acquire text information. To automatically localize the text regions from the object ROI, we propose a novel text localization algorithm by learning gradient features of stroke orientations and distributions of edge pixels in an Ad boost model. Text characters in the localized text regions are then binaries and recognized by off-the-shelf optical character recognition software. The recognized text codes are output to blind users in speech. Performance of the proposed text localization algorithm is quantitatively evaluated on ICDAR- 2003 and ICDAR-2011 Robust Reading Datasets. Experimental results demonstrate that our algorithm achieves the state of the arts. The proof-of-concept prototype is also evaluated on a dataset collected using ten blind persons to evaluate the effectiveness of the system’s hardware. We explore user interface issues and assess robustness of the algorithm in extracting and reading text from different objects with complex backgrounds.

Download
2 Eradication of Mist and Dew from Ongoing Video and Images Using Shallow Rank Pattern and Carnal Interchange
A.Santhoshkumar, K.Vigneshkumar, K.Santhakumar

Abstract- The Video Deraining Algorithm (VDA) is used to eliminate drizzle, blizzard, hail and mist from a video sequence using temporal interaction and low-rank matrix fulfilment. If the drizzles are too small and move at the high rate it will affect the optical flow estimation between consecutive frames. To avoid these drizzles i.e rain and snow, an initial rain map is subtracting temporally deform frames from a current frame. After that, they decompose the initial rain map into basis vectors based on the sparse representation and classify those basis vectors into drizzle ones and outliers with a Support Vector Machine (SVM). Finally by excluding the outliers, the detected results will remove the drizzles by employing a low-rank matrix fulfillment technique. Thus the overall efficiency of VDA is recommend to high-fidelity video dedrizzling and improves the performance by removing the hail and dew drops in a video.

Download
3 Effect of Process Parameters on Weld Bead Geometry in Mig Welding
M. Ahira Grace, P. Jaganmohan Rao

Abstract- In this experimental study, an effort is made to find the effect of process parameters on bead geometry of in metal inert gas welding. In this experiment the wire feed rate, amplitude and welding speed taken as an input parameters. For each input parameters 3 levels are taken. L9 array experiments are designed to know the effect of process parameters on the weld bead geometry using by using DOE method. The output parameters height, width, penetration are taken as bead geometry. Main effect and interaction effect of process parameters on the output parameters are analyzed by parametric Analyses of Variance (ANOVA). And the mathematical models for all output parameters are developed using multiple regression analysis. It is observed from the studies that wire feed rate has maximum effect on bead geometry followed by welding and amplitude.

Download
4 Design of Development for Bitumen Pavement on Sub Grade Plastic Silt Behavior by Finite Element Method
Sanjeev Gill, Dr.D.K.Maharaj, Dr.Rajiv kumar

Abstract- In this paper axisymmetric finite element analysis has been done for bitumen pavements by varying parameters thickness of pavement, pressure and elastic modulus of subgrade to develop design charts. The asphalt concrete pavement and base course has been idealized as linear elastic material and the subgrade behavior (plastic silt) has been idealized as nonlinear material. The nonlinear behavior of the subgrade behavior (plastic silt) has been idealized by Drucker-Prager yield criterion. The asphalt concrete pavement, base course and subgrade have been discretized by four nodded isoperimetric finite elements. Four types of design charts have been developed. First type of design chart has been plotted between thickness of pavement and nodal deflections for various pressures for a particular elastic modulus of subgrade. Second type of design chart has been plotted between thickness of pavement and element stress for various pressures for a particular elastic modulus of subgrade. The third type of design chart has been plotted between thickness of pavement and nodal deflections for various elastic moduli of subgrade for a particular pressure. Fourth type of design chart has been plotted between thickness of pavement and element stress for various elastic moduli of subgrade for a particular pressure. Each of the design charts has three parameters. For any two parameters known, the third parameter can be obtained from the design chart. For any pressure the nodal deflection reduces with increase in pavement thickness. This reduction of nodal deflection increases with increase in pressure and is predominant at highest pressure. For any pressure the element stress reduces with increase in pavement thickness. This reduction of element stress increases with increase in pressure. For any elastic modulus of soil the nodal deflection reduces with increase in pavement thickness. For a particular elastic modulus of subgrade the element stress reduces with increase in pavement thickness.

Download
5 The Experimental Study on Flexible Pavement on Plastic Silt by Non Linear F.E.M
Sanjeev Gill, Dr.D.K.Maharaj, Dr.Rajiv kumar

Abstract- In this research axisymmetric finite element method has been carried out to study of flexible pavement on plastic silt. The asphalt concrete and the base course have been idealized as elastic material. The subgrade has been idealized as nonlinear material by Drucker-Prager yield criterion. The asphalt concrete, base course and subgrade have been discretized as four nodded isoperimetric finite elements. The nonlinear finite element equation has been solved by Full Newton Raphson Method. Based on finite element analysis pressure vs settlement curve; pressure vs nodal stress curve; pressure vs element stress curve have been obtained. Also the variation of nodal displacement and element stress with decreasing height has been obtained. The pressure vs settlement curve; pressure vs nodal stress curve; pressure vs element stress curve are nonlinear. For all pressure the element stress (Sigy) is more than the element stress (Sigx). For any pressure the nodal deflection is maximum at top and minimum at bottom. Upto certain height the element stress is almost zero for all pressures. After that height the element stress increases with increase in height. The element stress increases with increase in pressure. For any pressure, the nodal deflection is more for lower subgrade modulus than the higher subgrde modulus. The nonlinearity is more in subgrade with lower modulus than in subgrade with higher modulus. For a particular elastic modulus of subgrade the element stress reduces with increase in pavement thickness.

Download
6 Effect of Geometric Change on Performance of an Air Filter
Sudarshan T A, Rajesh A

Abstract- The paper focuses mainly on pressure drop of a car air intake manifold. This is analyzed through CFD software to increase the combustion efficiency of the engine. An initial design of air filter has been taken from the reference vehicle where the efficiency of the air filter data is below the optimum level. Therefore the geometry of the air intake manifold design is altered and the analysis is done by applying suitable boundary conditions. i.e. pressure, temperature and velocity of the air which flows through the air intake manifold. The altered design has been done through CAD software and further it is meshed by using ANSA software and the post processing is performed through CFD analysis for the above boundary conditions and the results are obtained by using STAR CCM+ software also these obtained results are compared with experimental data.

Download
7 Development of an Integrated System for Cam Profile Generation and Manufacturing using SLS Process
S. Pochaiah, L. Siva Rama Krishna, Rahul Pachori

Abstract- CAM mechanisms are widely used in automatic machines because of their high speed, stability and reliability motion transmissions. Requirements for high performance of such machines are demand efficient methods for the design and manufacture of cams. Conventional methods of design and machining cam profile within a given accuracy are tedious and time consuming. Generally Simple Harmonic, Cycloidal, 3-4-5 polynomial and 4-5-6-7 polynomials are used for cam profile generations. Cycloidal motion has the smoothest motion among all of the basic curves, and therefore, it is suitable for high-speed applications. The paper work aims to development of an integrated system for cam profile generation and manufacturing using Selective Laser Sintering (SLS) process. The system is developed in three phases. In the first phase two types of cam profiles viz. Cycloidal and Bezier curves are generated. The corresponding coding is done in JAVA. The output obtained from the first phase is used as input for the second phase. In the second phase the 3D CAM profile model of the Cycloidal and Bezier curves are developing in CATIA. Then it is converted into STL file. The STL file obtained from the second phase is used as input for the third phase. In the third phase the Cycloidal and Bezier 3D CAM profile models are manufacturing using Selective Laser Sintering (SLS) Rapid Prototyping (RP) machine.

Download
8 Optimization of Single Pass Shell and Tube Heat Exchanger by Experimental Approach under Different Baffle Orientation
Deval Gumasta, Sushil Dixit

Abstract-In this study, the experimental analysis was performed on the shell & tube type heat exchanger containing segmental baffles at different orientations. In the current work four angular orientations (ɵ) 0˚, 15˚, 30˚ and 45˚ of the baffles were analyzed for the Reynolds number range 500-2000. It was observed that with increase of Reynolds number from 500 to 2000 at 0˚ angular orientation. There was increase in heat transfer rate and pressure drop. But when we increased the angle of orientation at particular reynold number, heat transfer rate increases upto 30˚ and after that it start decreases and pressure drop decreases continuously from 0˚ to 45˚.

Download
9 Usage of Iron Ore Tailing and Mining Over-Burden for Construction Purpose
Swetti Jha

Abstract- Mining is defined as all activities related to excavating rocks, stones, or minerals that can be sold at a profit. In a more general sense it also includes the subsequent extraction of valuable metals. The adsorption test conducted on cadmium with tailings as adsorbent showed a very good removal efficiency of 98 %. The co efficient of isotherms Amax and k and the value of n<1 shows the high affinity and favorable conditions for adsorption. Sieve analysis and shear strength test shows the tailing is not completely sandy. The concrete blocks prepared with tailings failed to achieve the expected strength since it contained some amount of clay and silt which hinders the solidification process and hydration of concrete. Addition of fly ash (acted as pozzolanic material increased the strength markedly since fly ash arrests alkali-aggregate reaction and it acts as a pozzolanic material in binding the aggregates with cement. This combination can be used for high strength concrete. Hence Usage of tailings and fly ash to construct concrete blocks proves to be economical.

Download
10 Effect of Different UML Diagrams to Evaluate the Size Metric for Different Software Projects
Preety Verma Dhaka, Dr. Kavita

Abstract- As we know that in Software Engineering, measuring the software is an important activity. For measuring the software appropriate metrics are needed. Using software metrics we are able to attain the various qualitative and quantitative aspects of software. Software Metrics are a unit of measurement to measure the software in terms of quality, size, efforts, efficiency, reliability, performance etc. Measures of specific attributes of the process, project and product are used to compute software metrics.

Download
11 EFatigue Indicators of Drivers by Using Non-Fatal Abetment Monitoring System
A.Sangeetha, A.Santhiya, K.Santhakumar

Abstract- Driver assistance system helps the driver in the driving process .Designed with a safe Human-Machine interface they should increase car safety and more generally road safety. Physiological signals including eye blinking, ECG, EEG measurement system requires the electrodes to be in contact wi th human skin. This system remotely detects the signals. The driver Attention monitoring system includes a camera placed on the steering column which is capable of eye tracking. If the driver is not paying attention to the road ahead and a dangerous situation is detected, the system will warn driver by warning sounds. Ul trasonic signals will avoid collision between vehicles moving front. Byusing delicate sensors, this system will able to detect ECG signals through cloth wi th no contact wi th skin. To decimate the signal noise, digital signal processing algorithms are used. The essential signals were further analyzed to evaluate the potential criterion for attentiveness and drowsiness determination.

Download
12 Comparative Study In Between STATCOM and SSSC Subjected to Wind Energy System
Rakhi Jain, Nisheet Soni

Abstract- In energy transmission systems, effective equipments on power control are generally known as Flexible AC Transmission System (FACTS). In addition, the power electronics-based equipment, which are called power conditioners are use to solve power quality problems. Since the topologies of these equipments are similar to those used in FACTS equipment, power conditioners are also called Distribution FACTS (DFACTS). The principal operating modes and applications whichever one of equipment in transmission and distribution system (such as UPFC, and UPQC) will be discussed and compared. In this work FACTS based equipment are implemented and the comparative study has been done to underline the special features of each. The nonlinear load and complexity of control system in industrial processes have triggered the power quality problems in the distribution network. The major aim of power quality enhancing techniques is to maintain a specified voltage magnitude at a desired frequency for sensitive loads irrespective of the fault or conditions in the power distribution network. This is possible only by ensuring an uninterrupted flow of power at proper voltage and frequency levels. As a result of this, the need of custom power devices is felt.

Download
13 Demonstrating a Millimeter wave band DPSK Radio Over Fiber System and Minimizing Effects of Chromatic Dispersion
Gurbani, Prabhnoor Singh, Maninder Lal Singh

Abstract- A sub-carrier multiplexed differential phase shift keying using radio over fiber system for different channel frequencies that lie in the C-band is realized. Here, undoubtedly C-band is chosen for transmission because of its supremacy over other bands for minimizing signal attenuation in dB/km and increasing the range of transmission. In this work various dispersion compensation techniques like pre - compensation, post-compensation and fiber bragg grating component are taken into account in order to minimize the fiber chromatic dispersion which is seen in most of the radio frequency propagation systems. These techniques are compared in terms of Quality factor, RF received power and accumulated dispersion. Optisystem 11 is used as the software for designing the layout for our system.

Download
14 Re-Routing Based Hybrid ACO-PSO Based Routing Algorithm for MANETs
Harkirat Kaur, Shivani Sharma

Abstract- The main problem in constructing a MANET is usually providing just about every device to help keep up with the data and instructions required to suitably direct traffic. These systems can operate by themselves or might be connected on the larger Web. They may possibly contain just one or multiple and different transceivers among nodes. This ends up with a remarkably dynamic, autonomous topology. This paper deals with a re-routing based hybrid ACO-PSO based routing algorithm for MANET which is used for mobile multi-hop ad-hoc networks for boosting the performance of the existing protocol for mobile ad hoc network.

Download
15 Enhancing the Mapreduce Using Cache in Hadoop for Big Data Analytics
J. Janani, K. Kalaivani

Abstract-Hadoop is an open-source framework that supports the processing of massive volume of datasets in a distributed environment. Big data and hadoop are the catch-phrases for describing the storage and processing of huge amount of data, where zeta bytes of unstructured data and updates are constantly arriving, that cannot be mined efficiently by the traditional tools and methods. MapReduce is the first MapReducebased solution that efficiently supports incremental iterative computation, which is widely used in data mining applications. MapReduce utilizes key-value pair incremental processing rather than task level recomputation. In this paper, an extension to MapReduce using in-memory for mining big data has been proposed. Compared with the work of MapReduce , MapReduce using in-memory performs key-value pair level processing in map phase based on the mining results of iterative algorithms, cache the mapped data in the buffer that reduces the I/O workload of the reducer phase. Mapreduce using cache is enhanced in hadoop environment and uses the hadoop cache as a buffer to store the intermediate data. The evaluation of MapReduce task for the mobile datasets using the iterative algorithm and cache memory has been retrieved fast and executed in time.

Download
16 Troop Ability for Identifying Compulsive Occasion in Crowded Surroundings
Srinivasan.M, Suresh.G, Ranjitkumar.S

Abstract-This paper focuses on detecting and localizing anomalous occasions in videos of crowded scenes, i.e., divergences from a dominant pattern. Both motion and appearance information are considered, so as to robustly distinguish different kinds of anomalies, for a wide range of scenarios. A newly introduced concept based on troop theory, histograms of oriented troops (HOS), is applied to capture the dynamics of crowded environments. HOS, together with the well - known histograms of oriented gradients, are combined to build a descriptor that effectively characterizes each scene. These appearance and motion features are only extracted within spatiotemporal volumes of moving pixels to ensure robustness to local noise, increase accuracy in the detection of local, non-dominant anomalies, and achieve a lower computational cost. Experiments on benchmark data sets containing various situations with human crowds, as well as on traffic data, led to results that surpassed the current state of the art (SoA), confirming the method’s efficacy and generality. Finally, the experiments show that our approach achieves significantly higher accuracy, especially for pixel-level occasion detection compared to SoA methods, at a low computational cost.

Download
17 A Survey : An Approach for semantic-Synaptic Web Entropy
Ramkaran Lovewanshi, Pankaj Kumar Sahu, Mrs. Pranjal Tivari

Abstract-Semantic web mining and Synaptic web entropy mining is an important and recent research area today where number of technique presented in order to mine the web crawl efficiently and to find the web page rank of various data available in the web, in the present paper which is taken by us for the further research is the hybrid approach where the entropy is calculated based on the semantic-synaptic based approach and the important role of the entropy required today to monitor the todays web fluctuation and various stages of multiple portals and web data available today , here as the authors of the paper mentioned about the scope of the entropy monitoring ,we assume it to be a great way to make it better to experience and query search for the extracted data and entropy monitoring, we have monitored a paper Line – up approach which is efficient and determined to visualized the ranking data and optimize according to the user requirement and monitored the data efficiently, here we would like to further enhance research work on analyzing and using the entropy data as input and to use them in Line up technique to visualize and to optimize according to the user requirement in the web entropy visualization.

Download
18 Energy Aware Routing In Wireless Sensor Network: A Survey
Priyanka soni, Rajiv Mishra

Abstract-Wireless sensor network contain different architecture and algorithms [1], considering different network topologies, results demonstrate that the proposed resource allocation and flow selection algorithms provide notable performance gains with small optimality gaps at a low computational cost. Now, whether the WSNs are starting to become a reality in this world, but there are some limitations such as change in topology randomly, restrictions in power, limited computational resources like power, error-prone medium, energy efficiency. Now-a-days, most of researchers are using their skills mostly on designing issue of energy awareness routing approaches. Thus, energy consumption is an important limitation of WSN which demands researcher’s skills to get a way in reducing the energy consumptions by sensor nodes used in WSN. In this paper, survey is done on different routing protocols based on clustering used for wireless sensor networks along with comparison and advantages and disadvantages of them.

Download
19 A Comparative Study of Behaviour of Structural Parameters Subjected to Lateral Forces by Shear Walls and Bracing Systems using Software
Dr. M.N. Bajad, Ravindra B. Gogawale

Abstract-In General, the structure in high seismic areas may be susceptible to the severe damage. Along with gravity load structure has to withstand to lateral load which can de velop high stresses. Now a day, shear wall in R.C. structure and steel bracings in steel structure are most popular system to resist lateral load due to earthquake, wind, etc. Shear wall and Steel bracing systems are most widely used in medium to high rise buildings to provide stiffness, strength and energy dissipation required to resist lateral load imposed by earthquakes and wind. The shear wall is one of the best lateral load resisting systems which is widely used in construction industry but use of bracing will be the viable solution for enhancing earthquake resistance. So there is a need of precise and exact modelling and analysis using software to interpret relation between brace frame parameters and structural behaviour with respect to conventional lateral load resisting frame. There are various software’s used for analysis of different type of lateral load resisting system such as, E-TABS, STAAD-PRO, SAP etc. In this paper comparative study of behaviour of structural parameters like displacement and shear forces subjected to lateral loads by changing the positions of shear walls and bracing systems has been discussed with their effective locations and their probable effects on the different structural parameters using ETABS software.

Download
20 Hybrid algorithms for Secure Encrypted Data Hiding Technique: A Survey
Naveen Jain, Kailash Patidar, Narendra Sharma

Abstract-The data security and its authenticity is an important area of research, where the daily real time world scenario demands a secure and authentic communication in between different agencies. Data protection and sharing using latest trend is always a research of study. Different authors in papers described a hybrid approach which take combination of encryption and then perform hiding it before transmission, thus an intruder required to break encryption and steganography policy to grab the original data. In this paper our contribution is to survey different available technique with support such combination and their impact on security. Also the work illustrate the further enhancement can be done to obtain maximum security of data over the communication message.

Download
21 Detection of Face Spoofing Activities in Face Recognition and Verification System
D. Gowthami, T. Venipriya

Abstract-Face Recognition and Verification system is the alternative and recently emerging method in biometric technique in order to provide high level security to the system or the organization. Spoofing is the act of masquerading as a valid user by falsifying data to gain an illegitimate access. Printed photo, mimic mask, video replay are some of the commonly used methods for spoofing. In this paper, we propose a real time ant spoofing measure in order to detect the liveness of the face. The proposed feature is developed using the spherical harmonic representation of the face texture-mapped onto a sphere. The texture map itself is generated by back-projecting the multi-view video data. Video plays an important role in this scenario. It provides an automatic and efficient way for feature extraction. The Viola Jones algorithm and Kanade-Lucas-Tomasi algorithm are used for face spoofing detection by measuring the difference between the live and fake faces. The proposed anti -spoofing measure provides efficient security to the biometric systems. The Experimental results on various datasets like NUAA, Replay attack and Morpho show that the proposed method is effective for face spoofing detection when compared with previous approaches.

Download
22 Enhanced Cloud Performance and Security via Data Fragmentation Replication and Encryption
V.Nila, S.Manikandan

Abstract-Cloud security refers to the set of procedures, processes and standards designed to provide information security assurance in a cloud computing environment. The data outsourced to public cloud must be unsecured give rise to security concerns. The security strategies must also use for data file or document etc. In this paper we propose these data fragmentation multiple encryption technique. In this technique must be provide high level security for document. This technique performed to common data is divided in to multiple fragment, the fragmented data are encrypted on the set of nodes. The fragmented data’s are arranged based on distance node measure technique. We ensure controlled and fragmented data’s are encrypted only for improve security. In this multiple encryption technique overcome the existing cryptography methodology.

Download
23 A Novel Approach of Providing Privacy for the Cloud Data by Using Group Key Mechanism
Midathana Rajeswari, A.V.D.N.Murthy, Ramesh Challagundla

Abstract-Now a day’s cloud computing has achieved a lot of users attention for storing and retrieving their valuable data to and from server. This is mainly because of reason like all MNC and IT companies. Generally this is formed by interconnecting a large number of systems connected all together for remote servers hosted on internet to store, access, retrive data from remote machines not from local machines. As the cloud server has the capability to store a lot of valuable data on its memory block, a lot of users can connect with the centralized location to access, retrieve and modify the data which is stored on the cloud server. The major problem in the current cloud is there is no security for the cloud data in the current days because the cloud users will form as a group to access the data at the beginning and once if the user change from one group to other it is very tedicious to manage the accounts. As the users frequently change from one group to other, it is very difficult to maintain the updated keys for the remaining users in order to access the data which is stored on multi owner cloud. So in this paper, we have implemented a novel secure multiowner data sharing scheme, named Mona, for dynamic groups management in the cloud. By leveraging group signature and dynamic broadcast encryption techniques, any cloud user can anonymously share data with others. Here in the proposed system we made the scheme independent of number of users who revoked during the data sharing. So by conducting various experiments on our proposed system we finally came to an conclusion that this proposed system is best in providing security for the data sharing over multiple owners who reside in multi groups.

Download