IJAIR- Volume 6 Issue 2 (February 2017)


Sr/No/ Title Pdf
1 Phenotypic Diversity of Acer ginnala (Aceraceae) Populations in Shanxi
Jing Li, Yiling Wang

Abstract — Acer ginnala is the important economic plant, of which gallic acid from leaf has significant anti-liver virus activity. To understand the phenotypic diversity, the systemic investigation on A. ginnala populations was carried out. 22 phenotypic traits for 154 individuals from 8 A. ginnala populations were analyzed to assess phenotypic variation and their relationship with environment. Variance analysis, nested analysis, correlation analysis and cluster analysis were used in this study. The present results showed that phenotypic traits were variation significantly different among these populations. The mean phenotypic differentiation coefficient among populations was 74.42%, which was far more than that of within populations with 25.58%. Phenotypic variation coefficient ranged from 1.33% to 27.49%, and the average value of variation coefficient of leaf, fruit, and seed were 18.25%, 13.13% and 7.09%, respectively. Principal component analysis showed the total of the first 4 principal components was 87.30% , the contribution rates was as follow: leaf rate > fruit rate > seed rate. Latitude was negative correlated to key fruit traits of A. ginnala, while slope and aspect were negative correlated to the leaf length and leaf width. 8 A. ginnala populations could be divided into three groups based on the cluster analysis. Understanding the phenotypic diversity of A. ginnala and their relationship with its geographical environment, it is most important to the further genetic diversity improvement and protecting.

2 Optimization of Heat Transfer Rate of Helical Fin-Tube Heat Exchanger with Different Fin Pitch using CFD Analysis
Ashok sahu, Anita Ahirwar, Ravi Vishwakarma

Abstract — The demand for effective and compact heat exchangers are continuously increasing in the automotive industry, refrigeration and air-conditioning applications has necessitated the use of various interrupted surfaces to augment air-side heat transfer. Fins are normally used to increase heat transfer coefficient and increasing efficiency of heat exchanger. We are using computational fluid dynamics (CFD) suitable software for analyse the heat transfer rate of heat exchanger with different boundary conditions, we can analyse easily all data as compared to experimental setup. And find out best feasible solution by CFD analysis. The objective of this study was to numerically simulate the heat transfer and flow characteristics for a helical fin-tube heat exchanger for different fin pitch (p) and different Reynolds no.(Re) using CFD analysis software Ansys FLUENT . The computational domain consists of air and copper pipe with external helical fins of copper material. The air inlet temperature are taken as constant & outlet air temperature , pressure drop , heat transfer coefficient , nusselt number , friction factor are calculated subsequently with respect to different Reynolds number. .In this study we numerically simulate the heat transfer rate of helical fin of helical fin-tube heat exchanger for different fin pitch (p) and different Reynolds no.(Re) using CFD analysis software Ansys FLUENT.

3 Optimal Solutions of Mean-Field Games Models & Applications
G.sasikala, Dr.S.Kumara ghuru

Abstract — Mean – field Games are studied by means of reference case applications. In this article, we provide reference case in two main reasons. One is simple for explicit resolution, based on Bellman functions are Quadratic and Stationary measures. Secondly, inspire of its simplicity, the case is rich enough in terms of more complex models that may not be as tractable as this one. The stability can be deal with explicitly using Hermit Polynomials.

4 Modification of A57-Strategic Bomber Aircraft
Hariramakrishnan.L, David.V, Rishi Kumar.S

Abstract — A57–Strategic bomber aircraft combines of unsymmetrical airfoil in cross section as well as with NACA 23012 1935 inverted airfoil to improve the performance of the vehicle .Compound delta wing is embedded to decrease shockwaves and reach transonic to supersonic (Mach no: 2.5). Five afterburning turbojet engines were installed between twin inward-tilted fins, providing up to 130,000kg of thrust. After a brief background on the development of the , A57 – strategic bomber aircraft And previous research ventures, we including forward swept wing (30degrees) to improve additional lift forces and also to reduce drag forces. In addition to that new install of forward swept wing to reduce wing tip vortices. Future work involves new inclusion of flaps in certain angle to permit additional lift force and also to easy take off at shorter distance itself. To attain specified work is designed by “CATIA” and analyzed by “CFD”.

5 Design and Performance Analysis of LCL Filter in Grid Interconnected System
Kandur Prashanth Kumar, Rosaiah Mudigondla

Abstract — Aiming at the problem of filtering in the grid-connected inverters, the mathematics models for LCL filter are established. The values of capacitances and inductances are calculated by analyzing the related constraint conditions for the main parameters of LCL filter. There are two ways to increase the value of damping resistor of the filter capacitor. The impacts on the stability and filtering property, in both ways, are analyzed. The use of power converters is very important in maximizing the power transfer from renewable energy sources such as wind, solar, or even a hydrogen-based fuel cell to the utility grid. An LCL filter is often used to interconnect an inverter to the utility grid in order to filter the harmonics produced by the inverter. Although there is an extensive amount of literature available describing LCL filters, there has been a gap in providing a systematic design methodology. Furthermore, there has been a lack of a state-space mathematical modeling approach that considers practical cases of delta- and wye-connected capacitors showing their effects on possible grounding alternatives. This project describes a design methodology of an LCL filter for grid-interconnected inverters along with a comprehensive study of how to mitigate harmonics.

6 A Perception of novel Features Selection method for Face Recognition using linguistic techniques

Abstract — The way people describe the facial features using quite commonly encountered descriptors such as “long nose”, “small eyes” and also allude to their feelings according to a specific person like “seems to be nice”, may be utilized to enhance automatic face recognition systems. The faces are represented using a set of key points; and then a matching algorithm is applied to find the similar faces in the test data using a few training faces. To address this aspect, one can engage the linguistic descriptors and the linguistic modeling. A face recognition approach using the SIFT features has been proposed in that finding the subset of those features, which are more useful for face recognition, will lead to better results for the face recognition problem.

7 Analysis on the effect of change in dimension of capacitive load resonant frequency of PIFA
Yashoda Ben, Zohaib Hasan

Abstract — This paper presents a planar inverted F-antenna which works on 900 MHz and 1800 MHz This paper analyses the changes in resonant frequency with the change in dimension of capacitive loading slot. It is observed that there is an apparent shift in the resonant frequency when the length of the slot is changed. As shown in fig. 1 the designed antenna is about the dimension of a standard mobile phone. Largest dimension of the antenna is 40 mm 80 mm. The patch is 8 mm above the ground plane. Dimension of the patch is 20mm x 40 mm. The substrate used is air (dielectric constant=1.0006). The design and simulations are done by using HFSS.

8 Design High Speed and Area Optimised dual Key Encryption using VHDL: A Review
Neelam Soni, Shivam Solanki

Abstract — Arrange Security and double key cryptography in rapid systems requests for particular equipment to coordinate with the quick system. These equipment outlines are being created utilizing reconfigurable FPGA innovation to bolster mass calculation. In the cryptographic module, Dual key International Data Encryption Algorithm (IDEA), a symmetric key piece figure is been planned as the calculation for execution. The plan objective is to build the information encryption rate i.e. the throughput to a significant esteem so that the plan can be utilized as a cryptographic processor in fast system applications. Every one of the plans are coded utilizing HDL dialect VHDL and are integrated utilizing Xilinx ISE 9.2i for confirming their usefulness and working. Vertex IV ace FPGA is picked as the objective stage gadget for acknowledgment of the proposed plan. Our work is chiefly in view of outlining a proficient engineering (IP) for a cryptographic module for secure information trafficking and a system interruption identification framework for a rapid system. The entire outlines are coded utilizing VHDL dialect and are confirmed utilizing Xilinx-ISE test system for checking their usefulness.

9 Designing of Digital PID Controller for blood glucose level of Diabetic patient by using various tuning methods
Rishabh Jain, ShwetaAgrawal, Rohit Sharma

Abstract — The aim of this paper is to design the digital PID controller for injecting insulin externally to the diabetic patient for maintaining the healthy blood glucose level. We have designed PID controllers using various tuning rules for examining the best performance in terms of different time response parameters like Overshoot, Settling time & rise time etc. Various tuning methods used for designing PID in this paper are Ziegler Nichols method and IPDT method. An approximate mathematical modelling of blood glucose level is also done. Finally the designed conventional PID controller is converted into digital PID controller.

10 Effect of Additives on the Physicochemical Properties of Fried Groundnut Oil
Edet W. Nsi, Emmanuel J. Ukpong, Aniekan E. Akpakpan, Edidiong E.Ikpe

Abstract — Fried groundnut oil was obtained from a commercial chin-chin seller. The same product (king’s oil) was bought from a commercial market in Uyo, Akwa Ibom State. Air dried additives (orange peels) were cut into chips, different quantity were added to the fried oil and heated to 60oC for 10min. The additive was filtered from the fried oil. The fresh oil, fried oil and fried oil + additive were characterized using standard methods. The results revealed the heating/frying of oil affects the physicochemical properties of oil. The results also revealed that most of the chemical properties of the oil that were altered by frying were restored by the addition of additive. However the groundnut oil that is presently discarded as waste after frying for several time can be utilized in the production of some industrial products like soap, shaving cream and margarine and can also be re-use for cooking, if suitable additive such as orange peels which is eco- friendly, cheep and readily available is added to it.

11 Qualitative Analysis of Oil Palm (Elaeis Guineensis) Bunch Refuse Ashes
E. E. Ikpe, I. E. Willie, E. W NSI, E. E. Emmanuel

Abstract — The qualitative analysis carried out on the Elaeis guineensis fruit Bunch refuse ashes showed the presence of nitrogen, sulphur and chlorine as the major elemental constituents. The study also proves that the material contains Nitrogenous basic compounds. Thus primary aromatic anime is very prominent as the material undergoes diazotization and coupling reaction to form dye. Also the above assertions were based on the test, observation and deductions derived from literature and laboratory work which include Alkalinity test, solubility test, elemental and functional group analysis.

12 Cipher text multi level encryption using cloud computing
Vidya.G, G.Saradhambal

Abstract — In this paper, we are discussed about the fulfilment of Data Leakage in Malicious Environment. A data distributor has given the actual data to a set of allegedly trusted agents. Some of the data are leaked. The distributor must evaluate the possibility of the crevice data and should identify data should came from one or more agents, as opposed to having been individually gathered by other means.so, we proposed a data collection strategies to improve the probability of identifying crevices. These method do not built on alterations of the released data. In some cases, we can use some “realistic but fake” data records to improve the detecting crevices and identifying the guilty party. While sending data through the network, some illegal users access the data. The proper security should be provided while sending the useful data over the network. Now a days, the usage of smartphones has been increased. Using some applications in smartphones, the third party can access the data easily, due to this the confidentiality must be affected.to avoid this kind of data leakage we propose the data lineage mechanism. We give fake information to the guilty agent. We develop and analyse the novel accountable data transfer protocol between two entities within a maliciousenvironment by building upon oblivious transfer, robust watermarking and signature primitives. Finally, we apply our framework in the important data leakage scenario and social network, to evaluate the practicality. In general, our lineage framework for data transfer, to be a key step towards achieving accountability by design.

13 Efficient multikeyword search results verification on encrypted outsourced data
B.Abarna, A.Divya

Abstract — With the advent of cloud computing becomes ubiquitous, more and more data owners are annoyed to outsource their data to cloud servers for great expediency and condensed cost in data management. The shielding data privacy, sensitive data have to be encrypted before outsourcing, which performs conventional data exploitation based on keyword based document retrieval. The majority of existing techniques are focusing on multi-keyword fuzzy search, converting the keyword into bigram set that will be increases the Euclidean distance and the vectors are be hardly ever threshold in the same bit. A keyword transformation based on unigram, it will be reduce the Euclidean distance between the misspelled keyword and correct keyword. Based on this schema, a deterrent based method, multiple data owner are exchange the data will be verifying into the cloud server and user will give a secret information and construction the secret verification data buffer. Finally, with though analysis and extensive experiments, our schema is practically efficient and then achieve high accuracy.

14 Light Weight Security Protocol in IOV Network for RSU –Internet of Vehicles
J. Bhuvaneswari

Abstract — A Roadside Unit (RSU) cloud and Vehicular cloud are the operational backbone of the vehicle grid in the Internet of Vehicles (IoV). The architecture of the proposed RSU cloud consists of traditional and specialized RSUs used Software Defined Networking (SDN) to dynamically instantiate , repeat and, or migrate services. The detailed reconfiguration overhead analysis will present to reduce the reconfiguration which is costly for service providers. VANET is a technology which provide safety and comfort to devices in vehicular environments. Emerging applications and services, however require a computing and networking models which demand new network for VANET with encryption of data and provide malicious attack from the third party.

15 Equalization Model for Image Enhancement with Histogram Based Analysis on Gamma Correction
D.Karthiga, D.Ragu Raman

Abstract — With the growth of technologies and the popularity of imaging devices, billions of digital images are created every day. Because of destructive environment, the quality of the image is affected. To overcome this defect image enhancement technique is needed. This technique is used to enhance the image’s quality. Many previous studies proved that contrast enhancement techniques are efficient to clean up the unwanted noises and enhance the image’s brightness and control it. In this work, we combine both grey balancing and contrast enrichment to achieve the good tone even as preserving contrast of an image using linearity and non-linearity functions of histogram transform.

16 Secure data transmission in cloud computing with trusted third party using encryption/decryption technique
S.Kavipriya, D.Jaya Kumar

Abstract — Off-site data storage is a one of the application into the cloud that relieves the customers from focusing on data storage system. However the outsourcing data to a third-party organizational control entail serious security concerns. Data leakage may occur due to attack by other users and machines in the cloud. Since it involves multiple steps in encryption and decryption it will takes more time. To proposed some of the data security for cloud environment for trusted third party and then data security will be provides (a) key management (b) access control, and (c) file assured deletion. It provides variety of services over internet such as, software, hardware, data storage and infrastructure. We use multiple key managers, each hosting one share of key. Multiple key managers avoid single point of malfunction for the cryptographic keys.

17 Efficient Similarity Search in Web Player
M.Nandhini, P.Divya

Abstract — Similarity search is promising criteria in data mining technique which returns matching data . To improve the similarity search, The proposed to use top-k query matching algorithm which involves getting multiple input from the user and produce better similarity search over the data. According to our algorithm it gives three kind of results based on similarity such as exactly matched, almost matched and moderately matched to the typed query. Moreover we can view any kind of data through the application such as audio, video ,pdf and other text format data’s. And more important it gives suggestions based on similarity. This project’s some other skin texture and rest of the portions are explained in below contents.

18 A Novel Keyword Based Query Search Technique Using Ontology Process
J.Ramya, R.Vimala

Abstract — Natural Language Processing (NLP) is an ontology-assisted way of programming in terms of natural language sentences, eg, English. A structured documents with content, sections, subsections for explanations of sentences forms NLP document that is actually a computer program. The objective of the paper is to reduce the response time of server using natural language processing for multiple news article data. The proposed system is an ontology supported information retrieval system. The first step involved in this system is creation of ontology structure. This ontology system paves a way to find real-time data to its particular domain. Using the ontology structure user information are segregated according to their domains. The aim of the work is, a natural language processing system which is capable of sorting user data automatically by ontology in order to reduce response time while search using a keyword.

19 Smart Way Tracking To Identify Individuals Location Using Android System with GPS
P. Subha priya, p. Rekha, d. Srimathi, s. Harishavardhini

Abstract — As the technology grows, every device becomes portable where mobile plays the vital role in it. It has several applications developed for the favor of user facility. Among that, we also have an application in which with the help of GPS it is possible to track the selected destination of user. The concept of using GPS satellite has spread its roots in the field of location management. We present a new approach of using GPS in order to spot an individual’s location if they are missed in case of any organizational tour or outdoor visit through a smart location tracker application deployed in Android Operating System. It has several benefits where one can monitor the children’s continuously without any manual effort.

20 Detection and prevention of packets through receiver based multicast algorithm in Manet
R.Shekinah Jaya Backyavathy, R.Parthiban

Abstract — VANET is a developing technology to achieve inter-vehicle communications, which improves the road safety, alert messages, accessing and sharing information’s and entertainment. Vehicular Adhoc Networks (VANETs) is from mobile Adhoc Networks (MANETs) is a challenging approach for the intelligent transportation system (ITS). The design of routing protocols in VANET is important and necessary issue for support the smart ITS. Even though rich literature in adhoc network exists, the scale, availability of realistic traffic data and vehicle equipment’s inspire the researchers to study the unique characteristics of VANET. The aim of the paper is to compare the characterization and existing routing protocols of VANET.

21 Dual Encryption Scheme with Owner & User Control over Cloud Data
Suriya A

Abstract — Cloud is playing an important role in the recent years. Cloud computing is the delivery of computing services over the network. We can store and process data using cloud. The data should be encrypted and stored in the cloud for the security purpose. Due to lack of security, the attackers or intruders may hack the data which is stored in the cloud .In the existing system, the encrypted text key is maintained by either cloud administrator or file owner. The proposed method uses dual encryption scheme, so as to give more data security. In this concept, one key is handled by the file owner and another key by the administrator. Here, attribute based AES (Advanced Encryption Standard) algorithm is used to encrypt and decrypt the data. User can access data in cloud using the encryption key; the key will be changed automatically once the access is over.