IJSER Volume 3, Issue 6, June 2012 Edition
IJSER Research Group https://www.ijser.org/forum/index.php Register for IJSER Research Forum      IJSER Xplore IJSER Xplore Research Paper Database

Pages   [1] [2] [3] [4] [5] [6]


Bee-Eating Birds (Coraciiformes: Meropidae) Reduce Virgin Honey Bee Queen Survival during Mating Flights and Foraging Activity of Honey Bees (Apis mellifera L.)[Full-Text[References]
Mahmoud Abdu AL-Samie Mohamed Ali and EL-Kazafy Abdou Taha

This study investigated bee-eating bird (Coraciiformes: Meropidae) predation on virgin honeybee queens in Saudi Arabia. The study also subsequently documented the effect of bird predation on colony strength, and foraging activity. Data were collected during 2011. The results indicated that bee-eating birds reduced flight survival. Eighty percent of 30 queens successfully mated when bee-eaters were not present in the apiary, when bee-eaters were present, only 46.67% of 30 queens successfully mated. Data also indicated no significant difference in the number of frames covered with adult bees in honey bee colonies during presence and absence of bee-eaters (6.3 and 6.8 frames of bees/colony, respectively) and frames of brood (3.0 and 2.8 frames of brood/colony, respectively. No significant difference was detected in the number of foraging honey bee workers gathering pollen from plant flowers when bee-eating birds were present or absent. This study also found that, bee-eating birds can affect the number of foragers gathering ground pollen and sugar syrup from dishes placed on distance (10, 75 and 150 meter) from the hives entrances.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Dynamic distance optionality based on GPS locator for optimization of resources while travelling[Full-Text[References]
Shivani Sharma, Meer Shizan Ali, Divya Gautam

The buzz word mobile phone keeps everyone awake, and yes why not, even on being a small hand device, it is having adaptability to exhibit numerous functionalities .Talking about present day scenario, the use of mobile phones is not just restricted as being a fastest mode of communication but way beyond it, one of its efficient use for the optimization of resources is being presented here. Making it compatible for the every day on going tourists,pedestrians is being look forward here ,in order to have an optimized usage of their resources. This handy application calculates the fare for the customers on the basis of the distance travelled by them, it protects them against the malfeasance by taxi drivers thus, they can no longer be cheated, it can be deployed in the Android phones or any other android supporting device, thereby this application makes use of Android technology version 2.3.3, and thus helps to eradicate the fraud being done on the customers.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

A Symmetric Steganography with Secret Sharing and PSNR Analysis for Image Steganography[Full-Text[References]
Ajit Singh and Upasana Jauhari

Data transmission across networks is a common practice as per the development of Internet and multimedia technologies that grows exponentially today. The paper presented here is concerned with the secret sharing of message by hiding it in an image using the most commonly used LSB (Least Significant Bit) technique and later the calculations has been done for the PSNR (Peak Signal to Noise Ratio) of image in MATLAB. Steganography aimed at hiding the data invisibly within any media (image, audio, and video) so that it should be unnoticeable to the unintended person. Here the message to be sent is first encrypt with a key which enhance the security of message to another level

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Hydromagnetic Thermal Instability of Hetrogeneous Incompressible Viscous Shear Flow[Full-Text[References]
Shivdeep Singh Patial, Arun Kumar Tomer, Gurpreet Kaur

In this paper, we discuss the effect of a uniform magnetic field applied in the direction of streaming on a steady, thermally, density stratified shear flow of a viscous, incompressible, perfect electrically conducting and heat conducting fluid confined between two non-deformable free horizontal boundaries which are maintained at constant temperatures. We also discuss the necessary condition of instability for R2 >0 and R3 <0 and obtained growth rate of unstable modes for R2>0 and R3 <0. Further, we have found out that growth rate of unstable modes for large wave numbers and Q<<1 and finally, we derived the sufficient condition of stability for non-oscillatory modes and also find bounds of nr for unstable modes

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Hash Based Data Text Fusion in Speech Signal Algorithm[Full-Text[References]
Miss. Divya Sharma

in this paper, Blind Source Separation technique for the security of the key after steganography has been implemented on the speech signal. Most steganography techniques are easily available online. In these techniques the security of the key is not particularly important therefore the security of the hidden message is jeopardized. I have proposed a new system in which we will be implementing contemporary spread spectrum technique steganography. The contemporary spread spectrum technique hiding text behind the speech signal which will be spread across the frequency domain randomly. In Spread Spectrum (SS) technique the information to be hidden is spread widely across the speech signal. For this we need to find those values for speech signal which have the minimum difference value when compared with ASCII value of information which is to be hidden. These location with the minimum value will be used to hide the secret message behind them. This system will generate a key which is meant to be sending along with the speech signal in which text file has been hidden. To ensure the safety of the key and the integrity of the hidden message we will apply Blind Source Separation on the key. Blind Source Separation will act as an encryption method. Blind Source Separation is the process in which we create segments and there sub segments which we will be mixing in a random order and finally concatenating this mixed sequence into one. The key can no longer be used by an eavesdropper for extract the hidden information. This key can be widely distributed across the Internet. The stego signal is imperceptible, transparent, and robust while the key is safe against any kind of attacks and can no longer be used by malicious sources for extracting or remove the hidden information.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Design Consideration of Dual Threshold Logic for High Performance and Ultralow Power Carry Look-Ahead Adder[Full-Text[References]
Senthil Sivakumar M, Banupriya M

This paper presents the design of high performance and ultralow power 8-bit carry-look-ahead adder circuits using two-phase modified dual-threshold voltage (dual-VT) domino logic method with the feed through logic concept. The proposed concepts are provides lower delay and dynamic power consumption; due to these two advantages it perform better in high fan-out and high switching frequencies. The FTL logic functions can be cascaded in a domino-logic without a need for the intervening inverters. The PMOS high threshold VT keeper increases the circuit speed and reduces the average power consumption. In addition NMOS switch added for avoiding charge sharing problem in pre-charging mode. The additions of two 8-bit binary operands are executed in two cycles. It found that, the circuit is suitable for long adders; the dynamic power consumption is also drastically reduced by more than 50% by the measurement results. This proposed CLA method reducing power (50%) and propagation time delay (around 20%).

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

A Performance Analysis of TORA, AODV and DSR Routing Protocols in MANET using NS2[Full-Text[References]
G.Pragadeeswaran, A.Sureshkumar

A Mobile Ad-hoc Network (MANET) is a multi hop wireless network formed by a group of mobile nodes that have wireless capabilities. MANET is a collection of wireless nodes that dynamically create a wireless network among them without any infrastructure. Nodes of these networks functions as a routers which discovers and maintains the routes to other nodes in the network. In such networks, nodes are able to move and synchronize with their neighbors. Due to mobility, connections in the network can change dynamically and nodes can be added and removed at any time. In this paper, we are going to compare Mobile Ad-Hoc network routing protocols TORA, AODV and DSR using network simulator NS2.34. We have compared the performance of three protocols together and individually too. The performance matrix includes PDR (Packet Delivery Ratio), Throughput, End to End Delay, Routing overhead. We are comparing the performance of routing protocols when packet size changes, when time interval between packet sending changes, when mobility of nodes changes.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Effect of Partial Replacement of Cement By Fly Ash, Rice Husk Ash With Using Steel Fiber In Concrete[Full-Text[References]
R. S. Deotale, S. H. Sathawane, A.R. Narde

In the ancient period, construction work was mostly carried out with help of mudstone from industry. Fly ash is a by-product of burned coal from power station and rice husk ash is the by -product of burned rice husk at higher temperature from paper plant artificial fibers are commonly used nowadays in order to improve the mechanical properties of concrete. Especially Synthetic (Polypropylene, polyester etc.,) glass, nylon, asbestos, carbon and steel fibers used in concrete caused good results to improve numerous concrete properties. Considerable efforts are being taken worldwide to utilise natural waste and bye -product as supplementary cementing materials to improve the properties of cement concrete. Rice husk ash (RHA) and Fly ash (FA) with using Steel fiber is such materials. RHA is bye-product of paddy industry. Rice husk ash is a highly reactive pozzolanic material produced by controlled burning of rice husk. FA is finely divided produced by coal-fired power station. Fly ash possesses pozzolonic properties similar to naturally occurring pozzolonic material. The detailed experimental investigation is doing to study the effect of partial replacement of cement by FA, RHA with using Steel fiber in concrete. In this paper started proportion form 30% FA and 0% RHA mix together in concrete by replacement of cement ,last proportion taken 15% FA and 15% RHA, with gradual increase of RHA by 2.5% and simultaneously gradual decrease of FA by 2.5% and to improve the strength of concrete steel fibers were added and fiber volume fraction was 0%, 0.25%, 0.5%, 0.75% and 1.0% in volume basis in the proportion of 10% RHA and 20% FA. The purpose of this research is to study the effects of steel fibers on the workability, compressive strength, flexural tensile strength, splitting tensile strengths, Acid resistant test , durability study of fly ash and rice husk ash in concrete.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Using Continuous Feature Selection Metrics to Suppress the Class Imbalance Problem[Full-Text[References]
J. Briso Becky Bell, P. Ganesh Kumar

The class imbalance problem is a serious problem in machine learning that makes the classifier perform suboptimal during data classification. Among the many competent approaches, feature selection is well suited for suppressing the class imbalance problem. In this paper four continuous feature selection metrics namely Pearson Correlation Coefficient (PCC), Signal to Noise Ratio (S2N), Feature Assessment by Sliding Threshold (FAST) and Feature Assessment by Information Retrieval (FAIR) are developed for producing feature sub sets from a small sample datasets and are then evaluated using Support Vector Machine (SVM) classifier. Various Cancer datasets available in the National Center for Bioinformatics (NCBI) are used in the experiments. Simulation results using these datasets show that the proposed system selects highly relative features and has high classification accuracy. Statistical analysis of the test result shows that among the four continuous feature selection metrics, the FAST metric shows relatively better result than the others.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Self-structuring in Laser-Blow-off Plasma Plume[Full-Text[References]
Rajneesh Kumar

This paper presents theoretical understanding of the experimentally observed oscillatory structures in the laser-blow-off (LBO) plasma plume. Oscillatory structures are formed without external sources (magnetic field, ambient gas, laser fluence, etc). Ablation mechanism of multi-component LiF-C (Lithium fluoride with carbon) thin film by laser-blow-off technique indicates that hydrodynamic instability (RT and KH) can grow during the melting process due to the different density and velocity of core plasma and surrounding materials (vaporized Li, F and C). It seems that instability grows with time and appears in the trailing portion of the plume. There is a sharp pressure gradient between front portion (first plasma) and trailing por-tion of plasma plume at the time of melt-through. Pressure gradient is the source of perturbation while negative differential conductance can be consi-dered at the interface of plume front (high temperature) and trailing of plume (low temperature) during the free expansion of plume. This study invokes that hydrodynamic instability may be the source of self-structuring in LBO plasmas.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Genetic Algorithm for optimizing load distribution on Video on Demand Servers[Full-Text[References]
Yadav Aruna, Kumar Sanjeev

As internet usage is increasing day by day web services are expanding very fast. Video on demand servers have heavy web traffic .To speed up the growth of web traffic the concept of load balancer was introduced. The role of load balancer is to distribute the tasks among the web servers efficiently. The most popular algorithms used for distributing the load are: FCFS, Genetic, Randomized and Heuristic algorithms. Performance of algorithms is calculated on the basis of makespan and average resource utilization. Genetic algorithm is giving better result over other server selecton techniques. Genetic algorithm gave lower makespan and higher resource utilization.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Use of Fly Ash in High Grade Ready Mixed Concrete [Full-Text[References]
Amol P. Titarmare, Asst. Prof. R.S.Deotale

The utilization of fly ash in concrete as partial replacement of cement is gaining immense importance today, mainly on account of the improvements in the long- term durability of concrete combined with ecological benefits. Technological improvements in thermal power plant operations and fly ash collection systems have resulted in improving the consistency of fly ash. To study the effect of partial replacement of cement by fly ash, studies have been conducted on M50 grade concrete mixes with 450 kg/cum cementitious material at 5%,10%,15%,20%, 25%, 30% replacement levels. Numerous tests are performed on wet concrete such as workability tests such as compaction factor test and slump test. The tests on hardened concrete are destructive test while the destructive test includes Compressive test on concrete cube for size (150 x 150 x 150) mm, Flexural strength on concrete beam (100 x 100 x500) and Split tensile strength on concrete cylinder (150 mm ø x 300mm) as per IS: 516 - 1959, IS: 5816 - 1999 and IS: 516 - 1959 respectively.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Object Oriented Steganography based on Biometric and Spread Spectrum[Full-Text[References]
Meena, Danvir Mandal

Today major part of communication goes through internet and this communication needs to be secret and protected against malicious attacks. Steganography is the art and science of invisible communication. It not only keeps the contents of a message secret, but also the existence of message secret. There exist many different steganography techniques having different strong and weak points. In this paper steganography is based on biometric feature i.e. secret data is embedded in skin tone regions of an image. Secret data is hidden by tracing skin pixels in one of the high frequency sub band of DWT of the cover image . To enhance the high security feature secret images are dispersed within each band using a pseudo random sequence and a session key. This combined approach of using skin pixels and spread spectrum for embedding the secret images provides a high degree of security. The stego-image generated is of acceptable level of imperceptibility and distortion compared to the cover image.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Fingerprint Detection Applying Discrete Wavelet Transform on ROI[Full-Text[References]
Mahbubul Alam, Sarnali Basak and Md. Imdadul Islam

In this paper, a DWT based approach is proposed for verification of fingerprint in criminal investigation. The image of original fingerprint is first enhanced then thinning scheme is applied on it to select the better part of the image which is nomenclature as region of interest (ROI). Then DWT is applied on each row of the image recursively until getting a single point for each row. Finally DWT is again applied on the column vector recursively until getting a vector of four points which is used for verification of fingerprint. Similar work is done previously except the selection of ROI. The combined scheme of ROI and DWT approach of the project work provides better result of previous works.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

A Solution to Control Suicide in the Domestic Violence using Combined Disjoint Block Fuzzy Cognitive Maps (CDBFCM)[Full-Text[References]
A. Victor Devadoss, A. Felix, M. Clement Joe Anand

Suicide is one of the leading causes of death in the world. An imperative reason for suicide is happening in the Domestic Violence using Combined Disjoint Block Fuzzy Cognitive Maps (CDBFCM). This method is introduced by W.B. Vasantha Kandasamy and A. Victor Devadoss, is analyzed in this paper. The Combined Disjoint Block FCM is defined in this method becomes effective when the number of concepts can be grouped and are in large numbers. In this paper we analyzed the problems and find out the major reason for suicide in the domestic violence using neutrosophic tool. This paper has five sections. First section gives the information about development of Fuzzy Cognitive Maps and Suicide in Domestic Violence. Second Section gives preliminaries of Fuzzy Cognitive maps and Combined Disjoint Block Fuzzy Cognitive Maps. In Section three, we explain method of determining the hidden pattern. In the fourth section, we give the concepts of problem. Final section gives the conclusion based on our study.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

A Novel Graph Based Framework to build Multi Label Text Classifier[Full-Text[References]
S.C.Dharmadhikari, Maya Ingle, Parag Kulkarni

Text document is multifaceted object and associated with many properties such as multi labeledness. Under this a single text document can inherently belongs to more than one category simultaneously. Traditional single label and multi class text classification paradigms cannot efficiently classify such multifaceted text corpus. Through our paper we are proposing a graph based frame work for Multi Label Text Classification paradigm. Representing text documents in the form of graph vertices rather than the vector representation like Bag of Words allows pre-computing and storing of necessary information. It also models the relationship between text documents and class labels. We are using semi supervised learning technique in our proposed approach for effectively utilizing labeled and unlabeled data for classification .Our proposed approach promises better classification accuracy and handling of complexity. Our proposed framework is elaborated on the basis of standard dataset such as Enron, Slashdot, Bibtex and Reuters.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Reconfigurable VLSI architecture for FFT computation[Full-Text[References]
S.Sreenath Kashyap

Parallel-prefix adders (also known as carry tree adders) are known to have the best Performance in VLSI designs. The Design of the three types of carry-tree adders namely Kogge-Stone, sparse Kogge-Stone, and spanning carry look ahead adder is done and compares them to the simple Ripple Carry Adder (RCA) . These designs of varied bit-widths were implemented on a Xilinx Spartan 3E FPGA and Dealy measurements were made with XILINX. The carry-tree adders are expected to have a speed advantage over the RCA as bit widths approach in higher bit widths.An Efficient FFT algorithm is designed. The adder which exhibits less delay is used is repaced in the Adder module of FFT.Thsi FFt can be implemented in the high speed DSP applications.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Fuzzy Based Chaotic and Logistic Method for Digital Watermarking Systems[Full-Text[References]
G.Rosline Nesa kumari, L.Sumalatha, Dr.V.Vijayakumar

To overcome the weak robustness problem of embedding the watermark in the spatial domain and to provide high authentication, security and robustness, the present paper proposed a novel watermarking scheme called Fuzzy based Chaotic and Logistic (FCL) method with three steps. In the step one, the proposed FCL method modifies the original image into transform domain and identifies the pixel location to insert the watermark bits in the difference values between the original image and its reference image based on a novel Fuzzy Logic (FL) method. In the second step, the selected bit positions of step one are shuffled using Arnold cat map, to achieve outspreading of orbits over the entire space, for further authentication and security. In step three logistic maps is used, on step two shuffled pixels, to determine the bit positions of host image for watermark embedding. The experimental results indicate the efficacy of the proposed FCL method when compared with the various other methods.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Recognition of Multi-Pose Face In Colour Images Using Gabor Filters Based On SVM Concept[Full-Text[References]
V Santhosh Kumar, A. Nageshwar Rao, S Anand Kumar, T Santosh Kumar

Human face recognition plays an important role in applications such as video surveillance, human computer interface, and face image database management. This paper presents an improved face recognition method for multi-pose face recognition in color images, which addresses the problems of illumination and poses variation. At first, color multi-pose faces image features were extracted based on Gabor wavelets with different orientations and scales filters, then the mean and standard deviation of the filtering image output are computed as features for face recognition. In addition these features were fed up into support vector machine (SVM) for face recognition over a wide range of facial variations in the color, position, scale, orientation, 3D, pose, and expression in images from stereo-pair database.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Efficient Health Monitoring System using Sensor Networks[Full-Text[References]
K.Ramesh, S.V.Aswin Kumer

A special purpose sensor network designed to operate autonomously to connect various medical sensors placed on the human body. Introduction of effective medical monitoring & other applications will offer flexibilities and cost saving options to both health care professionals and patients. In this system, we effectively monitors the patients physiological status such as ECG, Temperature, systole, diastole, Heartbeat, flex, Accelerometer and successfully processed in the transmitter kit, which is attached in the patients body.In this system, describes how effective transmission of data from the transmitter kit to the receiver which is located in the hospital server.In addition to that we are tracking the patient's location continuously and make emergency rescue operation.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

An Optimized Decision for Opportunistic Main-tenance or Event-Driven Maintenance of Industrial System[Full-Text[References]
Aashish khaira, Amit Kumar Jain

Opportunistic maintenance or event driven maintenance gives the maintenance staff an opportunity to replace or repair those items, which are found to be defective or need replacement in the immediate future, during the maintenance of a machine or component. This research paper presents an intelligent decision making method of how to decide whether a particular component requires opportunistic maintenance or not, and if so how cost effective this opportunity-based maintenance will be when compared to a probable future grounding. In this paper we are discussing opportunistic maintenance as an alternate strategy for maintenance along with steps for implementing it then finally looking at the challenges posed for doing opportunity maintenance.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Seismic Evaluation of Existing Reinforced Concrete Building[Full-Text[References]
Dinesh J.Sabu, Dr. P.S. Pajgade

The recent earthquakes have exposed the vulnerability of the existing reinforced concrete buildings in India. The Bhuj earthquake (2001) saw a great deal of damage to multi-storey buildings in the urban area of Gujarat. This has posed a serious threat to the many existing Indian RC buildings which are designed mainly for gravity loads. The need for evaluating the seismic adequacy of the existing structures has come into focus following the damage and collapse of numerous concrete structures during recent earthquakes. In order to carry out seismic evaluation, a simplified procedure for evaluation is highly in need for a country like India which is prone to earthquakes. It is important to estimate the response of buildings under earthquakes from the viewpoint of life reservation and risk management. The Response Spectrum analysis procedure is applied for the evaluation of existing design of a reinforced concrete bare frame, frame with infill and frame with infill and soil effect. In order to examine the performance of these models, the Response Spectrum analysis for seismic evaluation of existing buildings is performed. After performing the analysis reinforcement required in each format is determined and retrofitting is suggested accordingly. Different retrofitting method are studied in this work. Also it is concluded that the effect of infill plays very crucial role in seismic evaluation of existing RC buildings.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

DDoS Attack's Simulation Using Legitimate and Attack Real Data Sets[Full-Text[References]
Jaswinder Singh, Krishan Kumar, Monika Sachdeva, Navjot Sidhu

In this day and age, the internet is the new resource tool for the masses. It has changed the way we live in society and the way people interact with each other. There are about nine hundred million people, who are using internet now a day. They can use the internet to communicate with each other from all over the world, business can do their work over the internet, and students can take online classes and many more. Therefore, the availability of internet is very critical for the socio economic growth of the society. Distributed Denial of Service (DDoS) is one of the major threats for the current Internet because of its ability to create a huge volume of malicious data. As a result of it services of internet are severely degraded. One of the biggest challenges before researchers is to find the details of such attacks because due to damaging reputation issues, most of the commercial sites do not even disclose that they were blitzed by such attacks. In this project work, we have used the real time attack and legitimate traces in order to perform the simulation of DDoS attacks. We have simulated the network topology and attach the real time traces with the topology. The impact of attack is measured in terms of metrics such as throughput and percentage link utilization.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Local Government - A Place where Human Rights are realized[Full-Text[References]
Agni Aliu, Memet Memeti, Agron Rustemi

Local self government is one of the most important contemporary areas along with: Information technology, bussines admin-istration and protection of living environment. The importance of local self government can be seen of its own definition, which means, limited territory, with certain number of residents, who held that in order directly or through their representatives to realize the needs with local character.So, local government is a form of governance of local institutions that means own citizen governance, by avoiding surveillance administrative tutorine connecting local affairs.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Literature Review of Image Compression Algorithm[Full-Text[References]
Padmaja.V.K, Dr. B. Chandrasekhar

In this research work, a literature review was conducted to assess the progress made in the field of image compression effects on the face recognition. The DCT algorithms were considered for the review and their application was limited only to JPEG compression. In this review, progress was made in the DCT algorithms of a single image, and a series images from a video, namely 2D DCT and 3D DCT respectively, along with several other algorithms in the application of face recognition were discussed in detail.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Removal Efficiency of Physico-Chemical Parameters and Heavy Metals Using Some Natural Materials and Industrial Wastes[Full-Text[References]
Niharika Malviya, Sujata Deo, Farhin Inam

The search of efficient methods for the treatment industrial wastewater of motivated the use of economically viable waste and natural materials. Consequently attempts have been made to assess the feasibility of using red mud, fly ash, activated carbon, china clay, montmorillonite, used tea leaves, etc for the waste water treatment. Adsorption on red mud, china clay, montmerillonite, fly ash and used tea leaves has been found to improve the quality of water by reducing the values of the necessary parameters (physico-chemical as well as heavy metals). Maximum removal efficiency has been demonstratred by using activated carbon.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Fuzzy Layered Approach for Maintainability Evaluation of Object Oriented Software System[Full-Text[References]
Sanjay Kumar Dubey, Neha Goel, Prof. (Dr.) Ajay Rana

A large number of software products enter the maintenance phase due to the growing application of information systems. Software maintenance is the modification of a software product after delivery to correct faults and improve its overall performance and quality. Easily maintainable software saves large costs and effort involved in developing the software. Hence maintainability assessment is an essential component of software development life cycle. Its measurement is possible only by quantifying the sub-characteristics affecting software maintainability. This paper develops a comprehensive model to evaluate the maintainability of object-oriented software system based on fuzzy layered approach. The evaluation result is objective and provides a guideline to design a software product with high maintainability.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

A Survey On Software Reliability Assessment By Using Different Machine Learning Techniques[Full-Text[References]
Bonthu Kotaiah , Dr. R.A. Khan

Software reliability is a special aspect of reliability engineering. System reliability, by definition, includes all parts of the system, including hardware, software, supporting infrastructure (including critical external interfaces), operators and procedures. Software reliability is a key part in software quality. The study of software reliability can be categorized into three parts: modeling, measurement and improvement. Software reliability modeling has matured to the point that meaningful results can be obtained by applying suitable models to the problem. There are many models exist, but no single model can capture a necessary amount of the software characteristics. Assumptions and abstractions must be made to simplify the problem. There is no single model that is universal to all the situations. Software reliability measurement is naive. In this paper, we propose various machine learning approaches or techniques for the assessment of software reliability such as fuzzy approach, neuro-fuzzy approach, artificial neural network approach, genetic algorithm approach, Bayesian classification approach, support vector machine (SVM) approach, Self-organizing map approach. Also, In this paper we investigate the performance of some of the well known machine learning techniques in predicting software reliability.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Benefits by Design and installation to protect your Electrical System by using MCCB/MCB's with back up protection by HRC fuses[Full-Text[References]
Rahul Sharma

In commercial and Industrial buildings the causes of fire occurred mostly due to electrical short circuits. Because at present MCB/MCCB's are used without any back up or protection. And at the time of fluctuation in voltage both MCB/MCCB may fail. But they can be modified and developed to become more reliable on their usage by giving the more back up facility. At the time installation, a trial can be taken to ensure the stability and capacity.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

A Comparative Second Law Analysis of Microchannel Evaporator with R-134A & R-22 Refrigerants[Full-Text[References]
Suhel Khan, Dr.Suwarna Torgal

In this paper second law analysis is applied to study the thermodynamic losses caused by heat transfer between finite temperature difference, and pressure drop for the fluid inside microchannel evaporator which is employed for power elec-tronics cooling. A general expression for second law efficiency is obtained by considering control volume around microchannel evaporator. The conservation equation for mass and energy along with entropy balance are applied in microchannel. Inside the microchannel analytical/empirical correlations are used for friction factor, inlet and exit losses. With the help of expression a comparative study is performed with two different refrigerants viz. R-134A and R-22 on different designs of microchannels to obtain the best design. A parametric study is also performed to show the effects of different parameters on the overall performance of microchannel evaporator

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Modal analysis of an optical wave-guide having curvilinear square- shape cross-section[Full-Text[References]
Sandeep K. Nigam, A.K.Srivastava, S.P. Singh

In this contribution the modal analysis of a new type of non-conventional optical waveguide having curvilinear square shape cross-section is carried out. Dispersion curves of the waveguide are also obtained. The characteristic equations have been derived by using Goell's point matching method (GPMM) under weak-guidance approximation. The dispersion curves are also interpreted in two different cases. It has been observed that dielectric waveguide has more number of modes in comparison to metallic waveguide.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Back propagation Algorithm: An Artificial Neural Network Approach for Pattern Recognition [Full-Text[References]
Dr. Rama Kishore, Mrs.Taranjit Kaur

The concept of pattern recognition refers to classification of data patterns and distinguishing them into predefined set of classes. There are various methods for recognizing patterns studied under this paper. The objective of this review paper is to summarize the methods used in various stages of a pattern recognition system and identify the best suitable technique with its advantages over other techniques to recognize the complex patterns along with other real-life applications.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Novel Defense Scheme for Static and Dynamic Wireless Mess Network[Full-Text[References]
Jasmine David, Roopa Jayasingh

In this paper we considered the security implication of using high-throughput metrics in multicast protocols in wireless mesh networks. In particular, we identified metric manipulation attacks that can inflict significant damage on the network. We overcome the attacks with our novel defense scheme, Rate-Guard that combines measurement-based attack detection and accusation-based reaction. We demonstrate through analysis and experiments that our defense is effective against the identified attacks, resilient to malicious exploitations and imposes a small overhead.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Pages   [1] [2] [3] [4] [5] [6]