IJAIR- Volume 7 Issue 9 (Sept 2018)

 


Sr/No/ Title Pdf
1 Land Use/Cover Mapping of Bheemili Beach Road, Visakhapatnam District, Andhra Pradesh using Geospatial techniques
B. Sridhar, Aditya Allamraju, Srinivas Elakurthi

Abstract: Aim: Quickly progressing geospatial technologies like Remote Sensing, Geographic Information Systems and Global Positioning System offer a proficient, convenient and advantageous methodology for mapping resulting from its wide area coverage; giving information about inaccessible areas and timely repetitive coverage of the same area. In the present study, the land use/cover mapping of Bheemili beach road, Visakhapatnam district in the province of Andhra Pradesh has been carried out on IRS-1D, LISS-III satellite image with standard visual interpretation strategies. The identified land use/cover features are beach, deciduous forest, single and double crop, fallow land, gullied land, marine sand dunes, non-perennial tank, perennial tank, plantation, reservoir, main river courses, rural and urban built-up land, scrub forest and un-irrigated land. Maximum area is covered by deciduous forest (26.63%) followed by scrub forest (15.07%), gullied land (13.26 %) and double crop (11.02%). The other land use/cover classes individually cover less than 10% of the Total Geographical Area.



Download
2 Title: “Use of GIS and Differential GPS in Mapping of Spatial Distribution Evidence for Outdoor Crime Scene: A Simulation Study”
Puleno Kennao, Dr. Deepak Lal, Karen Isha Sahu, Dr. Lav Kesharwani

Abstract: It is vital to envisage the location of the evidence to get an idea on how the crime took place and in what manner. Managing outdoor crime scenes with the application of conventional method can be a demanding job to achieve exclusively when the crime emerged in big space, where there is lack of reference points and tress being surrounded. In this research, two simulated outdoor crime scenes were created, where both manual tape measurement and DGPS unit was applied to see if the differential GPS offers an accurate and reliable alternative for mapping the scene over the baseline method. To develop a final digital map of the simulated outdoor scenes was utilized using Geographical Information System. The result indicates that the DGPS unit provides a consistent reading when compared to manual tape measurement giving an average reading difference of 0.06 cm and 0.13 cm. The study concluded through statistical analysis that DGPS unit can be a viable alternative for mapping the outdoor crime scenes.



Download
3 A STUDY ON AWARENESS OF STOCK MARKET AMONG THE INVESTORS
Aswathy Ramachandran

Abstract: Stock market is known as a pulse of economy or economic mirror, which reflects the economic conditions of a country. Investors are believed to be the backbone of the securities market. Stock market awareness comes under the broad concept of financial literacy. The main objective of this study is to recognize the impact of stock market awareness on their investment. Primary data was is collected from Convenience Sampling technique.



Download
4 Satra as a mean to Sanskritisation to Assamese Society
Bhaswati Das

Abstract: Satras plays a vital role in the life of Assamese society as well as in the formation of Assamese society. The Neo –Vaishnavism Movement, which was initiated by Srimanta Sankaradeva is the most significant socio-cultural and religious phenomenon during the medieval period. The Satra institution which is the most notable contribution of the Neo-Vaishnava movement is perhaps came to emergence at the hands of the great saints, Srimanta Sankardeva and Madhavadeva. For that Satra institution plays a very important role in Assamese society. Therefore, it is tried to analyze the origin and development of the Satra institution in Assam. The paper also aims to highlight the relationship between Satra and society. This paper also made an attempt to understand the role of Satra in the process of Sanskritisation in Assam.



Download
5 A HIGH SECURITY APPROACH WITH FAST INDEXING OVER CLOUD STORAGE
Varsha Sadhwani 1, Dr. Vasima Khan 2

Abstract: Cloud platform enable storage and accessing of data which is stored in it. It helps storage of data in such a manner that can be access using accessibility enabled algorithm with use of efficient parameter. Cloud computing comes with the multiple usability such as scalability, security features and other optimal of computation. Many approaches for the cloud storage, access and security architecture has been proposed. The limitations are with both one side which is storage or accessing and enabling security in between them. In this paper, an advance approach which combines such factor and provides efficient storage as well as accessing mechanism. A curve cryptography based security is also enabled to make use of user’s data in authentic manner. The algorithm is executed using the Java platform library and outperform using the computation time, computation cost as comparison parameter. Thus the efficiency of algorithm is improved and can be used over real time cloud platform.



Download
6 BIOMETRIC ATTENDENCE MACHINE USING ARM7
CH. RAJENDRA PRASAD1, S. Pothalaiah2

Abstract: This project proposes and implements a simple, secured, efficient and low cost biometric electronic voting machine using ARM7 microcontroller. An electronic voting system is a voting system in which the voter’s and voting data is recorded, stored and processed digitally. The proposed system consists of controller hardware and software. The hardware is implemented with ARM7 microcontroller along with FIM3030 finger-print module. A touch screen is used to select the candidate by simply touching on it. GSM module is used to send the message to the election unit if any unauthorized person involve in voting. The software code is developed in KEIL u Vision development environment for interfacing the ARM processor with finger-print module, touch screen and GSM. The proposed system gives the best solution for minimizing the time taken for identifying the voter. The design implemented in the biometric electronic voting machine is portable, flexible and with minimum power consumption. The designed system is user-friendly, easily adaptable and cost-effective. Further, the designed system has simple architecture, fast response time and scope for further expansion.



Download
7 Technological adoption behavior of sugarcane cultivators in flood affected area
Bhingardeve S. D. 1, V. J Tarde 2 and D.P. Deshmukh3

Abstract: The study was undertaken in year 2014-2015 indicates that all the sugarcane cultivators were completely adopted the practices like soil, mature sugarcane sets of 9-11 month age. All sugarcane cultivators obtained sometimes information from their relatives followed by friends. There were complete adoption of recommended practices like ridges and furrows method of planting as well as irrigation method, application of FYM, broadcasting method fertigation, fertilizer application. Lack of tolerant variety of sugarcane and unavailability of sugarcane sets in time due to failure of transportation facility in flood was the constraints faced by all sugarcane cultivators. The constraint like adsali season is not possible.



Download
8 Impact analysis of university released variety of Sugarcane on socio-economic status of farmers
S.D. Bhingardeve 1, D.P.Deshmukh 2and B. T. Kolgane 3

Abstract: A survey conducted on impact of advanced varieties of sugarcane shows that both the year of study, Majority (72.50 per cent) of respondents fulfill their fund requirement from Primary Agri. Credit Society and 97.50 per cent of respondents were obtaining short term loan for crop. For cultivar of Co-8014 and Coc-671 adoption gap was 100 per cent where almost all cultivars has 100 per cent adoption gap due to no adoption of suru seasons Majority of respondents were belonged below Rs. 2,00,000/- in the year 2010-2011 (73.33 per cent) and 2015-16 (48.33 per cent). Majority (89.17 per cent) of respondents obtained sugarcane yield below 150 t/ha



Download
9 A Study on the Level of Awareness regarding Sexual Harassment amongst Girls
Dr. Bhawana Sharma, Harshita Jain, Nisha Moolchandani

Abstract: Sexual harassment has become synonymous with sexual terririosm which outlines a system where males are controlling and tyrannizing women . Now a days it is becoming a significant issue at gloebl level. Thus, need is arises to study on the level of awareness which is spreading around the nation to oversome the problem.The purpose of this research paper is to investigate the current status of sexual harassment. The research orbits around the molestation and abusement due to sexuality of a person. This research takes an in depth view of the sexual harassment today and provides current knowledge on the subject . It mainly talks about the mal treartment . This paper also provides some useful measures to respond towards these cases as with every unwanted physical touch a woman’s imagination changes into horrible images. Sexual harassment is more worse than murder as victim dies throughout the period she lives.



Download
10 A Model Based Approach of Interaction Measures for Multivariable Processes
V. V. Yerande#1, B.B.Musmade#2

Abstract: In this paper a normalized interaction measure or Gramian-Hankel interaction mea-sure for stable multivariable systems is summarized. The normalized interaction measure is a dynamic extension of Gramians and Hankel norm of the single-input-single-output (SISO) elementary subsystems built from the original multivariable system. In fact, the success of controller design depends on the input output pairings as it decides the structure and e effectiveness of the controller. Several examples, for which the proposed loop pairing criteria gives comparatively useful interaction measure over existing techniques are employed to show its effectiveness.



Download
11 A Survey : Sybil Attack Detection And Prevention Approach Over Network
1Swamil Soni, 2Prof. Damodar Tiwari

Abstract: VANET is a special type of mobile adhoc network which is specially working towards vehicle entity and its moving knowledge. In such entity and moving scenario further various attack and problems get arise due to multiple interaction in nature. In this paper Sybil user which participate in the network and try to jam peer network through which a processing can get stop or not able to transfer the data via network is presented. This paper contains survey of previous techniques which used in Sybil detection and prevention over VANET. The existing technique associate with the paper makes use of a technique which uses to communicate in between the available vehicle in the network. In the existing paper author proposed a model which make use of technique name “Dynamic certificate generation technique”, which help in making system secure in such a manner in which a Sybil user detection and further prevention optimization is performed over network.



Download
12 AN OPTIMAL CTM BASE APPROACH FOR SOCIAL VIOLANCE ANALYSIS OVER LDA
Priyanka Usrate, Prof. Damodar Tiwari

Abstract: In current scenario social media and other online applications provides an easy and fast way to communicate to the others. But some radical organizations use these mediums to spread wrong perception among the society and to recruit peoples for terrorist and violent extremist activities .these organizations use these mediums to recruit youth to conduct their terrorist movements. A CTM based technique is presented which provides better detection for such posts which are used for online cyber recruitment by the radical organizations or terrorist groups. A result analysis for the proposed technique is presented in IV Result Analysis section which shows that CTM based technique provides better results as compare to the existing techniques.



Download
13 LAND SURFACE TEMPRATURE ESTIMATION FOR CHITRAKOOT DISTRICT FROM LANDSAT 8 IMAGES
Rajni Singh, Shashikant Tripathi

Abstract: The Land Surface Temperature (LST) can be states as radiative skin temperature of ground. The Land Surface Temperature (LST) depends on the albedo, soil moisture; the vegetation cover and. LST is very much important for the several types of studies as climate change, global warming, site suitability and urban land change detection studies. LST is widely uses as mixture of vegetation and bare soil temperatures. Because both the vegetation and bear soil respond rapidly to changes in incoming solar radiation due to cloud cover and aerosol load modifications, and the results are LST displays quick variations too. In this study the LST has been estimated with respect to top of atmospheric radiance, brightness temperature and the Land Surface Emissivity (LSE) is retrieved band 10 thermal bands. Normalized Difference Vegetation Index (NDVI) values determined from the Red and Near Infrared bands.



Download
14 To Study the Elemental Concentrations in Selected Medicinal Plants by EDXRF Technique
S. Jyothsna, G. Manjula, A. S. Nageswara Rao

Abstract: Energy Dispersive X-ray Fluorescence (EDXRF) technique was one of the most powerful and quick multi elemental analyses with high sensitivity has been used to detect characterized for trace elements. To determine the trace elemental concentration in selected medicinal plants namely, Eclipta prostrate, Acalypha indica, Andrographis paniculata, Datura metal, Alstonia scholarisis, Aloe vera and Acacia catechu which are traditionally used by the natives of the Telangana State. From the present study, thirteen elements (P, S, Cl, K, Ca, Mn, Fe, Cu, Zn, Se, Br, Rb and Sr) and their elemental concentrations were determined in these plant samples. In this we are found to contain significant amount of the S, Fe, Cu, Mn and Rb, which can used to a new standard of prescribing the dosage of herbal drugs prepared from the plant material to integrate their medicinal values in the modern system of the medicines. It is hoped that, this elemental data will be a useful lead for phytochemists and pharmacologists for further study.



Download
15 NOTE ON TOTALLY REGULAR FUZZY DIGRAPHS
KR.BALASUBRAMANIAN, N.ARUL PANDIYAN

Abstract: In this paper, we discussed totally regular fuzzy digraphs and properties of totally regular fuzzy digraphs. The concepts of the total degree of a vertex in fuzzy digraphs formed by the operation union is terms of the total degree of vertices in the given fuzzy digraphs for some particular cases are obtained some properties of regular fuzzy digraphs are studied and they are examined for totally regular fuzzy digraphs.



Download
16 Influence of Diabetic Education Programme in improving the Knowledge Attitude and Practice (KAP) of Diabetic Patients
SHAMYA.K, PREMA.L

Abstract: Positive Knowledge, Attitude and Practice (KAP) are important for diabetic patients. Aim: To assess the influence of Diabetic Education Programmes (DEP) in improving the KAP of diabetics. Methods: A study on DEP was conducted among 50 diabetic patients in Calicut districts of North Kerala. Prior to DEP, a questionnaire with KAP statements was distributed among all diabetic participants and the knowledge testing questionnaire was again repeated immediately after the programme. Dichotomous scales were used to assess the knowledge and practice level questions and 5-point grading scale was used to assess attitude questions. After one month and third-month, KAP scores were again retested. Results: Among the four stages of assessment, retention of knowledge was high immediately after the DEP and it continued after 1 month, however retention level decreased gradually after 3 months. DEP made slight changes in the daily practice of patients, but failed to change the attitude of the patients Conclusion-. The retention level of KAP dwindled with time. So continuous education with regular follow-up program is essential to control diabetes.



Download
17 An Analysis of Minimum Support Price in Tuning the Life of Farmer
Dr.C. Umamaheswari.

Abstract: Minimum Support Price (MSP) is a part of India’s agriculture price policy. The Minimum Support Price for various crops is announced by the central government at the beginning of every crop seasons on the recommendations of CACP. The most important aim of the Minimum Support Price policy is to save the Indian farmers from making distress sales. Minimum Support Price is announced currently for 24 crops including cereals, pulses, oilseeds and cash crops. The Swaminathan commission had recommended several path –breaking measure to resolve the agrarian distress in India.



Download
18 MULTIPLE CONSTANT MULTIPLICATION TECHNIQUE FOR CONFIGURABLE FINITE IMPULSE RESPONSE FILTER DESIGN
Trapti Chodoker, Rajeev Thakur and Puran Gour

Abstract:This paper highlights the design of finite impulse response(FIR) filter with the help of an evolutionary optimization technique, particularly multiple constant multiplication. The Finite Impulse Response (FIR) Filter is that the necessary part for comingupwith associate economical digital signal process system. Transpose kind finite impulse response (FIR) filter is of course a pipelined structure that supports the multiple constant multiplications (MCM) technique however direct form FIR filter structure doesn’t support MCM technique. The MCM is more practical in Transpose form once the common operand is multiple with the set of constant coefficient that cut back the procedure delay. The implementation of MCM technique is simpler in fixed coefficient Transpose form FIR filter however complicated in configurable coefficient. For this purpose, the coefficient of the filter are encoded by Canonical Signed Digit (CSD). FIR filter supported canonical signed digits illustration of coefficient so as to attenuate the power consumption and quick implementation of the filter Performance of the proposed filter has been analyzed in terms of its area, power and speed. The look of FIR filter is planned to implement using Xilinx tool.



Download
19 Studies of Hippuric Acid Crystals Doped With Mercury Chloride
J. VELINS STANLY, C. MUTHU KRISHNAN, P. SELVA RAJAN

Abstract: This study has been undertaken to investigate the growth and studies of mercury chloride doped hippuric acid (MCHA) crystal. The growth of single crystals of MCHA was carried out by slow evaporation solution growth technique at room temperature. For comparison purpose, undoped hippuric aicd crystals have also been grown by solution method. The XRD study reveals that MCHA crystal has orthorhombic crystal system. The functional groups of the grown MCHA crystal have been found out by FTIR spectral method. Hardness and work hardening coefficient of the samples were determined by measuring the average indentation length for various applied loads. The dielectric parameters like dielectric constant, dielectric loss factor and AC conductivity of the samples were evaluated at different frequencies and temperatures. The SHG efficiency of the mercury chloride doped hippuric acid crystal was measured by Kurtz-Perry powder technique and the results were discussed.



Download
20 A Study on Triangular Graceful Graphs
S.P.RESHMA

Abstract: A graph G with p vertices and q edges is said to be triangular graceful if there is an injective function  : V(G) → X = {0,1,2,…T q }, where T q is the q th triangular number. Define the function  * : E(G) → {1,2,…T q } such that  * (u,v) = |  (u) -  (v)| for all edges (u,v). I  *(E(G)) is a sequence of distinct consecutive triangular numbers say {T 1 ,T 2 ,..,T q } then the function  is said to be triangular. In this paper we prove the following graphs S+(n,m), Generalized Butane graph, n – Centipede union Pn, Fork graph are triangular graceful graphs.



Download
21 A Survey on Remotely Monitoring the Vehicle Parameter through IoT Protocol
Ruchi Dronawat , Upasana Shrivastava

Abstract:By using the Internet of Things Technology can greatly enhance the performance, monitoring and maintenance of the vehicle. In this paper analysis is based on the Implementation of new cost effective methodology based on IoT to monitor vehicle health remotely for performance evaluation. This will facilitate preventive maintenance, fault detection, historical analysis of the vehicle in addition to real time monitoring. In this paper we review the different vehicle parameters via remote monitoring system. In this paper analysis system take care of the safety by different parameter heating, avoiding engine damaging, drinking alcohol to find the status of the driver & vehicle location.



Download
22 A NOVEL LUNG NODULE DETECTION TECHNIQUE FOR LUNG CANCER IN CT IMAGES
M.Mary Adline Priya, Dr.S.Joseph Jawhar

Abstract: Lung cancer represents one of the main causes of death among all the possible diseases, being the leading cause of death among all the different cancers. From all the imaging modality, computed tomography is one of the most sensitive and adequate imaging technique to identify malignant nodules due to its image quality, resolution and level of detail. Accurate lung nodule segmentation from computed tomography (CT) images is of great importance for image-driven lung cancer analysis.



Download
23 Application of ‘Mohand’ Transform in Cryptography
P. Senthil Kumar, V. Sandhya , S. Sindhuja , A. Viswanathan

Abstract: Cryptography involves creating written or generated codes that allow information to be kept secret. It is the science of using mathematics to encrypt and decrypt data (message).This paper aims to encrypt and decrypt a message by using a new integral transform “Mohand” transform and congruence modulo operator.



Download
24 Battery based Intrusion Detection for Mobile Using Rule based Data Mining Approach
Aparna Sen , Dr.Sanjeev Sharma

Abstract: Smartphones are important part of life today, where we use it for personal and professional purpose. Mobile applications make availability of different concepts to make it user friendly environment. Android is a popular platform which is open source and adopted by people. While dealing with a large structured platform to run a mobile application. There are area where the chances of finding anomaly which may harm the user device or its data. Thus a proper analysis of such incoming and outgoing entity is needed. Many technique to detect such is presented like behavior based, signature based detection etc. still a lacking in covering all anomaly properties. Battery is the internal entity which harms devices. In this paper a battery based rule mining EEHAD approach is presented for anomaly malware detection. The experiment performed on multiple android devices with set of application anomaly signature dataset. The output observed result shows the efficient of proposed work.



Download