IJAIR- Volume 6 Issue 7 (July 2017)

 


Sr/No/ Title Pdf
1 Artificial Neural Network based PID Controller for Control of Dynamical Systems
PAVAN KUMAR KUSHWAH, PROF. ASHIS PATRA

Abstract—For control of various dynamical systems, an adaptive artificial neural network (ANN) based proportional integral derivative (PID) controller is developed. For linear time invariant processes, conventional PID controller is suitable but they have limitations when they are required to control the plants having high non linearity or their parameters are changing with the time. In order to find the parameters of PID controller, information regarding the dynamics of the plant is essential. Ir perturbation occurs in plant parameter(s) then PID controller may work only if these changes are not severe. But most plants are either non linear or their parameters changes with time and this demands for a use of more robust type of controller and ANN is a suitable candidate. To use the power of PID controller and ANN, ANN based PID controller is proposed in this paper. The benefit of this combination is that it utilizes the simplicity of PID controller mathematical formula and uses the ANN powerful capability to handle parameter variations and non linearity.

Download
2 YIELD and NUTRIENT UPTAKE of RAINFED PEARL MILLET (PENNICETUM GLAUCUM) as INFLUENCED by POST BIOMETHANATED SPENT WASH –A SUGARCANE DISTILLERY EFFLUENT
C.R.Palwe, A.L.Pharande

Abstract--Field trials were conducted on forty four farmer fields of three Tehsils of Ahmednagar District Maharashtra, to study the effect of post biomethanated spent wash application during kharif with pearl millet as test crop. Application of liquid post biomethanated effluent @ 75,000 liters per hectare prior to sowing of crops increased the grain and straw yield of rain fed pearl millet by 10 and 4 per cent respectively. The soil available N,P,and k was increased by 52,2.83 and 3.77 per cent over untreated plots respectively .The N, P and K uptake was increased by application of post biomethanated spent wash.

Download
3 Power Quality Improvement of Wind farm Connected with Grid Supply Using Intelligent Controlled UPQC
Sudhir Sharma, Shivani Mehta, Mukesh

Abstract— The emerging advancements in the modern electrical system has increased the consumption of the electrical power to a greater extent in the recent years than the few previous years. This increase in the demand of electrical power has encouraged the generation of electrical power by other non-conventional means like solar, wind, hydro, etc. These non-conventional sources of electrical power has enormous advantages over the conventional sources of electrical power but the quality of power coming from these non-conventional sources need to be monitored because of the fact that the input supply to these non- conventional power sources is never constant and varies continuously. These variations in the input supply of the sources along with the inverters and converters used in these electrical sources leads to the distortions and harmonics in the power system which deteriorates the power quality of the system. In this paper the power quality issue of the system consisting of a wind farm connected with the Grid network is studied and discussed. An effort has been made to improve the power quality of the system up to the desired level using an intelligent controlled Unified Power Quality Conditioner (UPQC). The performance of the intelligent controlled UPQC is compared with the conventional method of controlling i.e. Proportional Integral (PI) controlled UPQC and is found to have better results and improved performance. The results are verified using MATLAB/SIMULINK software.

Download
4 Socio-epidemiological Study of Visceral Leishmaniasis among Rural Community of East Champaran, Bihar
Navin Kumar, T.B. Singh, L. P. Meena

Abstract- Visceral Leishmaniasis (VL), also known as kala-azar. From 2004–2008 there were an estimated 200,000–400,000cases and 20,000–40,000 deaths per year globally. Bihar is the most impoverished, most densely populated, and most VL-endemic state in India, with 90% of the Indian VL cases reported there. To find out the contribution of socio-epidemiological factors on VL in the East Champaran, Bihar. A case-control study design was used. In this study 139 visceral leishmaniasis cases and 139 healthy controls were taken. Visceral Leishmaniasis was strongly associated with age group. 6-15 years of age group (odds ratio [2.363], 95% CI 0.826-6.886) has higher risk of VL. Educational status, Joint family, OBC caste, SC/ST caste, Semi-pucca houses, kutcha houses had higher risk of VL in the East Champaran but they were not significant. Unmarried group (odds ratio [OR] 1.788, 95% CI 1.081-2.962) and presence of domestic animals [OR] 1.763, 95% CI 1.025-3.037) were statistically significant on univariate analysis. In this case control study we identified several factors associated with VL. Improper drainage system and poor housing condition is a stronger factor; thus housing plans lunched by the government may positive affect for controlling of VL. In villages males were sleep outdoors and they were higher risk of VL. Use of mosquito nets should be used to prevent insect bite. Information, education and communication for the awareness of the community regarding prevention of VL should be carried out.

Download
5 ADVANCED ENCRYPTION STANDARD MODES OF OPERATION USING VITAL INFROMATION FOR DRIP RECOVERY WITH CLAIM
Mr. S.P.SANTHOSHKUMAR,Mr. M. PRAVEENKUMAR,Mr. T. GOWDHAMAN#3

Abstract - Side Channel Attacks (SCA) are attacks that are based on Side Channel Information. Side channel information is information that can be retrieved from the encryption device that is neither the plaintext to be encrypted nor the cipher text resulting from the encryption process. The real threat of SCA lies in the ability to mount attacks over small parts of the key and to collective information over different encryptions. The threat of SCA can be dissatisfied by changing the secret key at every run. Indeed, many contributions in the domain of leakage resilient cryptography tried to achieve this goal. In this paper, we propose a generic framework of lightweight key updating that can protect the current cryptographic standards and evaluate the minimum requirements for heuristic SCA-security and timing attack.Then, we propose a complete solution to protect the implementation of any standard mode of Advanced Encryption Standard (AES) using vital information for drip recovery with claim.

Download
6 Design of an Improved Positive Output Super-Lift LUO Converter using Drift Free Technique for Photovoltaic Applications Integrated with Single Phase Grid Connected Photo Voltaic System (GCPS)
Babul Kumar, S. Amirtharaj

Abstract: An audio watermark is a unique electronic identifier embedded in an audio signal, typically used to identify ownership of copyright. This thesis considers desired properties and possible applications of audio watermarking algorithms. This thesis describes the different methods involves in process of audio watermarking also it describe the available methods developed by researchers for audio watermarking. This thesis also describes the problems associate with audio watermarking and problems in available work. Proposed work is a new method of audio watermark hiding inside another bigger cover standard audio cover. The method includes ‘harr’ wavelet based DWT decomposition of frequencies hence the audio samples of watermark gets hidden only those parts of cover audio where human ears are less sensible according to HAS. Proposed method also includes the SVD decomposition which is required for making our method robust against the various communication of processing attacks like compression, filtering, fading or noise addition. Proposed work is also using the concept of angular modulation which initially modifies the audio watermark in to provide extra security and also extra robustness in communication. The design is been develop on MATLAB 2013b version and verification of design o the same.

Download
7 A STUDY ON MIST AND MALACHI ALGORITHM FOR ACCOUNT RECOVERY PROCESS IN CLOUD COMPUTING
R.ABINAYA, DR.T.RAMAPRABHA

ABSTRACT-Cloud computing is emerging as a new thing and many of the organizations are moving towards the cloud but lacking due to security reasons. Security is one of the major issues which reduces the growth of cloud computing and complications with data privacy and data protection continue to plague the market. The security algorithms introduced in this paper, the MIST and Malachi are two new algorithms to protect user data through account security. In the MIST algorithm, when a user logs in for the very first time, they are prompted with three questions and for each of those, they can choose very specific multiple choice answers. After the user provides answers to all given questions, a cloud system is using the MIST algorithm for password recovery.Malachi is a developing algorithm which takes an entirely different approach to account security. Instead of using click-based interfaces like the MIST, Malachi relies entirely on typed user input.

Download
8 PERFORMANCE ASSESSMENT OF MATERIAL PROVIDER’S ORGANIZATION UNDER GREY-MULTI-OBJECTIVE OPTIMIZATION ON THE BASIS OF SIMPLE RATIO ANALYSIS TECHNIQUE ACH
Nagesh Chandra Sahu, Nitin Shukla

ABSTRACT-Green-economic-lean’ measurement is the holistic chain which stresses on strengthens the means of implementation and regeneration of the manufacturing system of each firm globally. In last decade, each firm has begun to establish the production with rapid rate in compensating the high demand of goods with rich-quality of service level. In order to respond these matters, firm perceived the necessity to balance their production chain of organization. In the presented research work, the authors proposed a DSS, consist of module ‘green-economic-lean’ and grey--to evaluate the performance of stuff providers. Proposed DSS can make decision under incomplete information of committee of decision makers (DMs)l) against vague practices. This is core novelty of this paper.

Download
9 APPRAISING VALUE OF MATERIAL PROVIDER’S ORGANIZATION UNDER GREY-REFERENCE POINT APPROACH
Nagesh Chandra Sahu, Nitin Shukla

ABSTRACT-Utilization of grey sets theory in multi practices decision making model to benchmark material provider’s under integrated approach help for decision making. Environmental-economic-waste minimization measurement is the complex chain for each manufacturing system of each firm. In the presented research work, the authors proposed a DSS, consist of module ‘Environmentaleconomic-waste minimization practices’ and greyReference Point Approach to evaluate the performance of stuff providers. Proposed DSS can make decision under incomplete information of committee of professionals (P) against vague practices.

Download
10 DESIGN OF DWT-SVD BASED AUDIO WATERMARKING USING ANGLE QUANTIZATION.
Divya chadar

ABSTRACT-An audio watermark is a unique electronic identifier embedded in an audio signal, typically used to identify ownership of copyright. This thesis considers desired properties and possible applications of audio watermarking algorithms. This thesis describes the different methods involves in process of audio watermarking also it describe the available methods developed by researchers for audio watermarking. This thesis also describes the problems associate with audio watermarking and problems in available work. Proposed work is a new method of audio watermark hiding inside another bigger cover standard audio cover. The method includes ‘harr’ wavelet based DWT decomposition of frequencies hence the audio samples of watermark gets hidden only those parts of cover audio where human ears are less sensible according to HAS. Proposed method also includes the SVD decomposition which is required for making our method robust against the various communication of processing attacks like compression, filtering, fading or noise addition. Proposed work is also using the concept of angular modulation which initially modifies the audio watermark in to provide extra security and also extra robustness in communication. The design is been develop on MATLAB 2013b version and verification of design o the same.

Download
11 DESIGN AND VERIFICATION OF UNIQUE KEY BASED SUDOKU FOR STEGANOGRAPHY IN IMAGES .
Ragya Kori

ABSTRACT-This work intends to give an overview of image steganography, its uses & techniques. Paper work is an implementation of Image Steganography of same plaintext, the implementation of a system that design of unique Sudoku generation for Sudoku based data hiding and high security is the main concern of this paper. The system is based on a hybrid algorithm that applies the techniques of Sudoku and steganography to offer different security features to images transmitted between entities in internet. Based on the proposed algorithm, the authenticity and integrity of the transmitted images can be verified either in the spatial domain or in the encrypted domain or in both domains. The work is implemented on MATLAB design and simulation tool. Paper work uses modified Sudoku based data protection and SNR is very high in present paper work.

Download
12 A SURVEY ON: HASH TAG RECOMMENDATION SYSTEM BASED ON SEMANTIC TF-IDF
Priyanka Shrivastava, Shailendra Gupta ,Pankaj Richhariya

ABSTRACT-Semantic measure and algorithm among the text generated in various social media platform plays a major role while automated data generation. Twitter is a social media platform where a large number of tweets and data generate in every hour where as the similarity major text concern is important factor. Various example such as #friend, #frd puts a similar message but unable to identify as similar text with similarity major system. In existing research author discussed various related technique to measure it such as Shortest path, Wu & Palmer, Lin, JiangConrath, Resnik, Lesk, LeacockChodorow, and HirstStOnge. In base paper algorithm TF-IDF based approach is given which is described as best among available approach in recommendation system. The algorithm further does not find similarity in between hash tags, while it exhibit similarity measure only in between tweets. Thus enhancement of existing work is going to generate an algorithm extension to exhibit similarity measure in between Hash tags occurrence in tweets, which make more reliable and accessible in micro blogging system.

Download
13 A SURVEY: TOEKN CARRIED DATA MONITORING OVER BUSINESS FRAMEWORK.
Ansh Mishra, Shailendra Gupta ,Pankaj Richhariya

ABSTRACT-In this era, large amount of the information in form of digital information is made available in digital form. For many years, people have held the hypothesis that using phrases for are a presentation of document and topic should perform better than terms. In this synopsis here investigate this fact with considering several states of art data mining methods that give satisfactory results to improve the effectiveness of the pattern. In the current base, the paper author has taken technique which makes use of signing data with token data technique which further use for their operation monitoring over the different level. They have worked with complete data lifecycle associated with a token from its production to consumption. The token carried data and their monitoring framework makes use of its state detection and operation. The approach token-log-based process discovery algorithm is utilized in the system to monitoring its activity. A further enhancement of technique stated as in variable related detail mining over the data

Download
14 SURVEY: DATA INTEGRITY AND SECURE STORAGE OVER CLOUD
Akansha Shrivasava, Dr. Varsha Sharma

ABSTRACT-Data storage and its integrity monitoring is a high level task in cloud computing platform, where multiple files with heavy size are stored and further there is chance to find attack from different entities. In the scenario where the security check-up is not possible manually, integrity verification technique works where the data can be break into blocks and then further blocks can get security and further a integrity verification can be perform using hashing algorithm. In this paper our objective is to survey such techniques which claims as the best security and integrity checksum level technique to provide data security assured. The paper further investigated the drawback of various existing technique in this field.

Download
15 Photosynthesis and Carbon Isotope Discrimination (∆13C) in Cassava (Manihot esculenta) Grown under Natural shade of Coconut Plantation
Krishnaprasad B.T, Savitha A, Bindumadhava,. and Krishnamurthy K.S

ABSTRACT--Cassava (Manihot esculenta) is an important food crop in developing country. Due to non availability of land, famers are forced to grow the shade sensitive crops like cassava under the canopy of plantation crops. In this study the effect of natural shade on three genotypes of cassava with respect to their morphological and physiological changes were examined. Three genotypes showed considerable changes in plant height, leaf number, stomatal number, Net Assimilation Rate (NAR) and photosynthetic rates in response to shade. Decrease in photosynthetic rate resulted in high internal CO2 concentration which in turn lead to high carbon isotope discrimination (Δ13C) under shade. Use of Δ13C as an indicator of photosynthetic efficiency under shade is discussed.

Download
16 Multiple Aggregator scheme for the Multimedia content extraction and utilization
Ashwini Narkhede, Hitesh Gupta

ABSTRACT--Content aggregation and multimedia data analysis takes a huge part today. While working with multiple data format and data identity, its integrity there are few components need to be extracted and monitored via different available medium. Various feature and data extraction performed by different type of aggregator technically. Current scenario make use of single aggregator and perform with number of content available for the extraction, it cause lot of execution time and thus low performance with the required dimensions. In this paper a work algorithm which is based on the multiple aggregators performed on single set of data or multiple data is performed. The experiment conducted on the locally stored dataset as well as online content available dataset. Which is executed by both the aggregator methods and further workbench is designed using Java API. The execution result was monitored and it is observed as the proposed algorithm outperforms at best compare to existing protocol.

Download
17 Relation between Torsion and Normal Curvature of a geodesic on a developable
Ashu Vij

ABSTRACT--A developable surface is the surface generated by one-parameter family of planes. As there are three planes namely the osculating plane, the normal plane and the rectifying plane of a moving trihedral on any given space curve and equation of these planes contain only one parameter usually the arc length 's' so envelopes of these planes are developable surfaces. A geodesic on a developable surface (rectifying developable) is the line of shortest distance on the developable. In this paper, a relation between torsion and curvature of a geodesic on a developable surface is obtained mainly using Euler's Theorem and some other basic concepts of differential geometry.

Download
18 CLOUD LOAD BALANCING AND DATA SHARING APPROACH OVER MULTIPLE VIRTUAL MACHINE
Tripti Shrivastava, Raj Kumar Paul

ABSTRACT--Cloud Environment is work on internet based computing environment. Variety of users, use this environment as per their requirements. Cloud computing and data store provide the mechanism to understand and accessibility to third party storage system. Enterprises utilize the environment of the cloud in various provided service model such as SaaS, PaaS, and IaaS and cloud available usable models (private, Public, hybrid, and community). Cloud data security and its usage over the different component, its accessibility, its sharing over the components make use of data center, third party access and other provided components. There are often components which make use of security concept, data workload sharing & balancing approach over the given paradigm. There are data workload sharing & balancing approach is also given which make use of resources in proper manner. Data workload sharing & balancing technique make use of existing resources in such a way that it takes distribution accordingly. Current provided and working dissertation works on the comparison of the performance of existing Round Robin and Throttle data workload sharing & balancing with proposed load sharing given algorithm. To optimize and measure over the performance of any algorithm in virtual environment comparison parameters which are like throughput, response computation time and waiting time are considered.

Download