INC-ALTS 2016 - International Conference on "Advances in Computing Logic,Technology and Sciences"

"INC-ALTS 2016 Conference Papers "


Cascading of Two QPSK Modulators for Improving Bandwidth & Gain[ ]


A QPSK Modulator has been designed to operate at X-band frequency and simulated using EESOF Software.The Modulator consists of 90ohybrid,BPSK Modulators in parallel,Wilkinson power combiner combine their outputs.The BPSK Modulator has been designed using a 90ohybrid coupler,beam lead PIN diodes for switching and Micro-strip radial stubs are used to achieve broad band.The measured phase and amplitude deviations are ±1oand ±0.15dB respectively,over 350-MHZ bandwidth.The phases can be improved with better approximation of PIN diode parameters during design.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Reduction of the THD in the Class F3 Amplifier System[ ]


This work deals with the modeling and the simulation of the closed loop controlled class F3 power amplifier. The commercial low frequency AC is converted into DC using an uncontrolled rectifier. The DC is converted into high frequency AC using class F3 amplifier. Open loop systems with and without EMI filter are simulated and the corresponding results are presented. The EMI filter is proposed at the input side to reduce the THD in the source current.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
QUARRY DUST FINE POWDER AS SUBSTITUTE FOR FINE AGGREGATES IN CONCRETE MIX[ ]


Large quantum of concrete is being used for construction industry all over the world. One of the essential ingredients of concrete is river sand in the form of fine aggregate. Now a day’s river erosion and other environmental issues have led to scarcity of river sand. Large scale depletion of river sand leads to environmental problems. Excessive sand mining is a threat to bridges, river banks and nearby structures. It also affects the adjoining structures and the uses that local people make use of the river. To overcome this problem, there is a need to find an alternative innovative and cost effective material. Quarry dust, a by-product obtained from crushing of coarse aggregates during quarrying activities has attained considerable attention to enhance the properties of concrete. This paper reports the experimental work conducted on the suitability of the quarry dust as inert material in concrete. This experimental study presents the variation of strength of concrete on replacing the sand by stone powder from 0% to 40% at an increment of 10%. The compressive strength of standard concrete cubes was found at 7, 14 and 28 days curing at room temperature. Design mix of M25 grade of concrete with replacement of 0%, 10%, 20%, 30% and 40% of quarry dust have been considered for laboratory analysis, in which slump test, compression test, split tensile test, and flexural strength of hardened concrete were found. The results have proved that replacement of sand by quarry dust satisfies the code provisions and can satisfactorily used in concrete. It was observed the results shown the positive changes and improvement in properties of conventional concrete due to the replacement of fine aggregate by quarry dust.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
An Analysis of the Current Challenges in Efficient Video Processing[ ]


Video in digital format is common in professional and home appliances. Video can be thought of as a sequence of image frames which may be complemented by audio information. An individual video has distinctive motion features, colour histograms, motion histograms, text features, audio features and objects present in its frames. Video processing systems involve a stream processing architecture in which video frames are processed one or more at a time. This type of processing is crucial in systems that have live video content where loading the entire set into the workspace is wasteful. . Thispaper takes a look at four distinctive video processing tasks namely Video Quality Improvement, Video Segmentation, Video Search and Retrieval, Video Summarization all of which are significant issues in nature. However these tasks do not have 100 % efficient solutions .In our paper we present an overview of the challenges that need to be tackled in this regard.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A SURVEY TAXONOMY ON TEXT MINING TECHNIQUES[ ]


In today's reality, the measure of put away data has been massively expanding step by step which is for the most part in the unstructured shape and can't be utilized for any handling to extricate helpful data, so a few methods, for example, rundown, grouping, bunching, data extraction and perception are accessible for the same which goes under the classification of text mining. Text Mining can be characterized as a procedure which is utilized to extricate intriguing data or learning from the text records. In this work, an exchange over structure of text mining with the methods as above with their professionals and cons furthermore uses of Text Mining is finished. Also, concise exchange of Text Mining advantages and restrictions has been displayed. Text mining is an extremely energizing examination range. The issue of text mining, i.e. finding helpful information from unstructured text, is drawing in expanding consideration.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Gainful And Secrecy Maintaining With Eirq Methods In Commercial Cloud[ ]


Cloud computing emerges as a evolutionary trend in area of information technology and miscellaneous networking. Due to less efficient allocation resources in a gainful cloud environment, a user can suffer a certain degree of delay while acquiring information from the cloud to reduce costs. In this paper, we focused on two basic issues in such an environment: search secrecy and maintaining. We first come across a secret searching scheme that was originally proposed by Ostrovsky. Their private keyword based retrieval scheme allows a user to retrieve files of interest from un-trusted servers in leakage of any information. The main flaw is because of processing of all the queries from different users, it will cause a heavy querying overhead aimed on the cloud and thus goes against the or iginal intent of gainful. In this paper, we present three efficient information retrieval for ranked query (EIRQ) schemes to reduce querying overhead aimed on the cloud. In EIRQ, enquires are classified into multiple ranks, where a higher ranked query can recover a higher percentage of similar files on user demand. A user can retrieve files on demand by choosing enquires of different ranks. This feature is useful when the user only needs a small subset of files from large number of similar files. This system introduces retrieval of files with low bandwidth and low computational and communication cost. Under different parameter settings, broad evaluations have been conducted on both rational models and on a real cloud environment, in order to examine the efficacy of our schemes.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
FLOW CALIBRATION USING PLC AND SCADA[ ]


This paper focuses on a new step in calibration of flow sensors in industries. Manual calibration requires a lot of labour and human resource. This also requires a lot of hard work and patience as the person has to note each and every value at different times by taking readings manually. The person has to take in account the values being given by the sensors and that of the pump or dry block calibrator. In case the reading goes critical suitable corrections have to be made to save the equipment from any damage. Managing all these equipment and taking care of them if they are damaged is a tough task. This paper uses the technology to increase the efficiency and decrease the labour required for the process by introducing automated calibration of sensors.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
SUGGESTING SUCCESSFUL CRT QUALITIES[ ]


A pedestrian trainer tells, a good trainer explains, a better-quality trainer demonstrates but a great trainer will inspire the fresher and can change the ultimate school environment as a training ground. Key player has become important because the managers are responsible for day to day operations and can inspire, influence, lead and drive the team towards the goal. Recruiters are looking for kingpin fresher who can deliver an extraordinary outcome to identify, attract, maintain campus recruitments, corporate relations CRT team has to focus on recruiters hiring strategy. Ultimate schools ought to focus on persuading kingpin skills but surprisingly academic curriculums are not focusing on it. Fixing a curriculum, making list of soft skills and CRT sessions will not make a good enough for their overall structure work in matching the industry. Final schools have to combine their regular curriculum along with the culture of training the career planning goals. This will empower the fresher to manage higher potentials to explore different career paths. Our detailed analysis will help the CRT teams of finishing schools as a tool to guide ten traits and the importance of training professional development for their fresher by combining the most required skills expected by the recruiters.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
THE REDREC TECHNOLOGY -Converting thoughts to visuals using infrared and recording them[ ]


Having infrared being used in scanning the brain activities for unusual happenings and also been lately used for data transfers called the redtacton. We also have the latest technology of reading and recording human thoughts using functional MRI scanner done by the Japanese which is in the beginning stage. It is a good technology though, yet we can’t use it for everyone and everything and may take a long time and power consumption and many side effects when over exposed. This technology we introduced combines the redtacton technology and the fMRI thought recording technology into one which we called the “REDREC technology”.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
DESIGN OF ULTRA LOW POWER SYSTEMS BASED ON ADAPTIVE VOLTAGE OVER SCALING[ ]


This paper proposes a design methodology for voltage overscaling (VOS) of ultra-low-power systems. This paper first proposes a probabilistic model of the timing error rate for basic arithmetic units and validates it using both simulations and silicon measurements of multipliers in 65-nm CMOS.The model is then applied to a modified K-best decoder that employs error tolerance to reveal the potential of the framework. With simple modifications and timing error detection-only circuitry, the conventional K-best decoder improves its error tolerance in child node expansion modules by up to 30% with less than 0.4-dB SNR degradation.With this error tolerance, the supply voltage can be over scaled by 12.1%, leading to 22.5% energy savings.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Texture Analysis of Liver Tumor from Abdominal Computed Tomography in Computer Aided Diagnostic System[ ]


This paper proposes an automatic computer aided diagnostic system (CAD) for detection of liver diseases like hepatoma and hemangioma from Abdominal Computed tomography (CT) images. Liver and Lesion is segmented using gray level methods and clustering. Histogram analyzer is used to fix the threshold and morphological operation is used for post processing. Rules are applied to remove the obstacles. Fuzzy c-mean (FCM) clustering is used to extract the lesion from the segmented liver. First order statistical features, co-occurrence matrix based texture features, auto covariance features and Zernike moments are extracted from the segmented lesion. The sequential backward selection is applied to get the reduced feature set. The textual information obtained after feature reduction is used to train various neural networks such as a Probabilistic Neural Network (PNN) and Cascade feed forward BPN (CFBPN). The outcome obtained from neural networks is analyzed.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Multimodal Biometric Authentication at Feature Level Fusion[ ]


Biometric recognition technology provides a secure method of recognition that cannot be stolen, misplaced or forgotten.Unimodal biometrics is affected by many problems like noise in sensor data, spoof attacks, non universality. The problems in unimodal biometrics are resolved in multimodal biometrics. It is providing better accuracy in recognition. I present an innovative technique in which input images of iris and finger print images are preprocessed using techniques like contrast enhancement, filters to improve the quality of the image. Subsequently, features from the iris and fingerprint are extracted using LBP and LGXP. Features extracted from two images are fused at feature level extraction module.GSO algorithm is used for optimal selection of features. Selected features are fused and given to optimized neural network for recognition.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Novel Genetic Algorithm Approach to Routing in Data Network[ ]


Routing is the process of moving information from source to destination, and is one of the major issues found in computer network literature. For data networks, the complexity of routing increases due to the multiple constraints such as distance/cost and transmission success rate (TSR). These constraints are to be properly addressed for the reliability, robustness, manageability and functionality of the data networks. The biggest challenge in this kind of network is to find the optimal path between the common end points satisfying various requirements. Genetic algorithms (GA) are a class of search strategy based on the mechanism of biological evolution. GA is able to reduce search space and can also converge to a good solution of the problem efficiently. In this project an approach using genetic algorithm to routing in data network is explained. Appropriate chromosome structure, crossover operator and mutation operators are devised and tested on variety of network topologies. The results are found to be encouraging and satisfactory.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Survey of Extramural Research and Development Projects and funding agencies in India[ ]


Research & Development seeks to achieve an advance in science or technology. The activities which directly contribute to achieve advance in science or technology through the resolution of scientific or technological is being considered as R&D. Government of India is funding Research and Development projects through its various agencies to encourage citizens and agencies to work on projects which helps the society a better place to live. In every budget certain percentage of funds were exclusively reserved for R&D projects. Each funding agency is concentrating on one or more domains specifically for allocation of funds. The list of domains includes agriculture, education, medicine, defence, bio-diversity, space, communications, information technology etc. Knowledge on various funding agencies is very much essential to the individuals and institutions who are involved in active research for various purposes so as to approach the relevant agency for funds. In this context the paper will list various funding agencies and their schemes under which the agency is allocating the funds towards extramural R&D projects in India and its progress over the years.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Reinforce Parallel K-Means Clustering Using OpenMP: OM K-Means[ ]


In the era of data mining, cluster analysis is very needy technique in engineering applications. So in the jargon of clustering techniques, k means is one among the most effective and efficient algorithm. K means algorithm varies by selecting the initial centriods, distance measures and mean calculations. As the dataset size increases the algorithm performance degrades rapidly. In order to maintain accuracy and time complexity we propose an algorithm that gives accurate results.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Big Data Processing Model from Mining Perspective[ ]


Big data is defined as large amount of data which requires new technologies and architectures. Due to such large size of data it becomes very difficult to perform effective analysis using the existing traditional techniques. Big data due to its various properties like volume, velocity, variety, variability, value and complexity put forward many challenges. Since Big data is a recent upcoming technology in the market which can bring huge benefits to the business organizations, it becomes necessary that various challenges and issues associated in bringing and adapting to this technology are brought into light. This paper introduces the Big data technology along with its importance in the modern world and existing projects which are effective and important in changing the concept of science into big science and society too. The various challenges and issues in adapting and accepting Big data technology, its tools (Hadoop) are also discussed in detail along with the problems Hadoop is facing. The features of the Big Data revolution, and proposes a Big Data processing model, from the data mining perspective. This data-driven model involves demand-driven aggregation of information sources, mining and analysis, user interest modeling, and security and privacy considerations. We analyze the challenging issues in the data-driven model and also in the Big Data revolution.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A review on some aspects of ancillary services in a competitive electricity market[ ]


Ancillary services (AS) defined as all those activities that are necessary on the interconnected grid which related to security and reliability of a power system. There are several activities that appear under the preview of ancillary services. In vertically integrated system the liability generation, transmission and distribution was with one organization. Ancillary services were integral part of energy generation, supply and cannot dealt separately. In a restructured power system the system operator (SO) is the entity liable for the secure and reliable operation of the power system. In this way, management of all the Ancillary services considered as an explicit function of the system operator. Under a restructured framework, ancillary services separated from the real power production, and shall be mandated or remunerated in competitive market mechanism by the system operator. This paper overviews the management and pricing of ancillary services in some of the restructured electricity markets.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Application of Metal Matrix Composites to reduce stress in Disc Brake Rotor using FEA[ ]


Disc brake is a critical component in mechanical breaking system. A pair of disc and pads is in action generally subjected to static dynamic load and bending stresses. Therefore the combined action of these loads a region of failure of surface of disc brake. These types of failures can be minimized by careful analysis of the problem during design state and proper manufacturing methods.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Grid of Security:A New Approach of the Network Security[ ]


Network security is in a daily evolving domain. Every day, new attacks, virus or intrusion techniques are released. Hence, network devices, enterprise servers or personal computers are potential targets of these attacks. Current security solutions like firewalls, intrusion detection systems (IDS) and virtual private networks (VPN) are centralized solutions which rely mostly on the analyze of inbound network connections. This approach notably forgets the effects of a rogue station, whose communications cannot be easily controlled unless the administrators establish a global authentication policy using methods like 802.1x to control all network communications among each device. To the best of our knowledge, a distributed and easily manageable solution for the global security of an enterprise network does not exist.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Analysis of Scheduling of Dynamic Spectrum Using Cognitive Radio in Wireless Ad-Hoc Networks[ ]


The concept of Cognitive Radio frequency (CR) in wireless communication is used to sense the radio frequency for data and message transfer. Recent investigations results some issues related to spectrum utilization which is a function of time and space calls for dynamic access strategies, which adapts with the electromagnetic environment. The usage of free spectrum sharing between primary users (licensed) and secondary users (being license-exempted) and has been incontestable within the recent experimental trails supported TV white space networks. The technique of dynamically accessing unused spectrum victimization Dynamic Spectrum Access (DSA) is gaining momentum. Many experimental trails on dynamic spectrum networks are being disbursed within the TV-band spectrum to check the technology and enact rules. This paper works out, a summary of psychological feature radio i.e. spectrum sensing, spectrum sharing, spectrum management and spectrum quality square measure etc. This work can explore the dynamic spectrum technologies as a precursor to full-fledged psychological feature radio networks.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Multiresolution Analysis based Decomposition and Reconstruction of Power Quality Disturbances using Wavelet Transform[ ]


Proper operation of a power system depends upon the quality of power supplied to consumers by transmission and distribution networks of utilities. Supply voltage across various industrial and domestic loads must be free of any disturbances, deviations, distortions, changes in frequency, and interruptions. The deviations in supplied power are termed as electrical power quality disturbances. Wavelet transform, a signal processing technique, is used for analyzing power quality disturbances. The disturbances considered for analysis are voltage sag, swell, interruption, transient, harmonics, and voltage fluctuations. The aim of this paper is to present multiresolution analysis based decomposition and reconstruction of power quality disturbances using wavelet transform. In multiresolution analysis based decomposition, the original power quality disturbance signals are decomposed into approximation and detail components at various levels by using discrete wavelet transform.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Design and Analysis of an Antenna for S-Band Operations[ ]


Antenna plays a major role in wireless communications. The type of antenna includes parabolic reflectors, patch antennas, slot antennas, folded dipole antennas etc. Among those, most useful antennas at microwave frequencies (f>1GHz) are micro strip antennas also called patch antennas with a metal patch on top of grounded dielectric substrate. The patch may be in variety of shapes but rectangular and circular are most common.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
PHASE NISE IN MIMO SYSTEM:BAYESIAN CRAMER RAO LOWER BOUNDS IN SOFT INPUT ESTIMATION[ ]


This project addresses the estimation of time varying phase noise caused by imperfect oscillators in multiple input and multiple output (MIMO) systems. The estimation problem is paramtrasied in detail and based on an equivalent signal model is dimensionally is reduced tominimize the overhead associated with phase noise estimation.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Time Series Prediction of Stock market data by using Chaos theory and Neural Network[ ]


Time series analysis is one of important issues in science, engineering, and so on. Up to The present statistical methods such as AR model and Kalman filter have been successfully applied however, those statistical methods may have problems for solving highly non-linear problems. In this paper, an attempt is made to develop practical methods of non-linear time series by introducing such Soft Computing technique as Chaos theory, Neural Network. Using the stock market data input to various models the applicability and accuracy of the proposed methods are discussed with comparison of results.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Automated Face Detection & Recognition for Detecting Impersonation of Candidate in Examination System[ ]


Impersonation of the candidate is a fundamental problem in examination system often referred as malpractice. Hall ticket and identity cards are normally used in the examination system for fraud detection .Existing examination system mainly deals with document image analysis techniques and biometric system in identification, recognition and classification of the candidate. Generally fraud is detected by using document image analysis where as the proposed model is focus on the image/video for analysis. In this paper an attempt is made to develop automated face detection and recognition for detecting impersonation of candidate in examination system. Automated face detection and recognition can further be used in identity verification and attendance monitoring in examination system. The proposed work comprises of two steps: enrollment and authentication. The enrollment process is divided into two stages online registration and face detection. In authentication image analysis process is carried out with the help of local binary patterns which is used to convert an image into array for further processing.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
EFFICIENT AND ENHANCED CARRY SELECT ADDER FOR MULTIPURPOSE APPLICATIONS[ ]


Carry Select Adder (CSLA) is one of the fastest adders use in many data-processing processors to perform fast arithmetic functions. From the structure of the CSLA, it is clear that there is scope for reducing the area and power consumption in the CSLA. This work uses a simple and efficient gate-level modification to significantly reduce the area and power of the CSLA. Based on this modification 8 and 16 bit square-root CSLA (SQRT CSLA) architecture have been developed and compared with the regular SQRT CSLA architecture.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Mobile and Android Cloud Computing: A Survey[ ]


Mobile Cloud Computing (MCC) is the combination of cloudcomputing, mobile computing and wireless networks to bring rich computational resources to mobile users, network operators, as well as cloud computing providers. The ultimate goal of MCC is to enable execution of richmobile applications on a plethora of mobile devices, with a rich user experience. Android platform occupies a predominant proportion of mobile market but lacks an approach that can provide accurate, efficient and agile security assessment for android applications present in the application market. In this paper, we provide an extensive survey of the recent research work, while highlighting the issues with the help of a taxonomy. This will help general readers have an overview of MCC including definition, architecture, and applications. We conclude the paper with critical analysis of the challenges and our proposed solution with future work.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
BEHAVIOUR AND ANALYSIS OF LATERALLY LOADED PILES SUBJECTED TO STATIC LATERAL LOADS[ ]


Deep foundations are used when the soil is very weak below the ground surface. The most common types of deep foundations are piles, piers and cassions. A pile subjected to lateral loading is one of the classes of problems that involve interaction of soil and structures.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Spyware Detection System with a Comparative Study of Spywares using Classification Rule Mining[ ]


Malicious software befall a major threat to the security of computer system. The quantity and multiplicity of its variants, render classic security defense in futile and millions of host in the internet are being affected with malware. In this paper, we propose a framework for auto-identification of spyware using data mining techniques. Our framework allows automatic identify classic spyware with similar behavior and assigning unknown spyware to these of discovered classes (classification). We collected, analyzed and processed some thousands of malicious and trustworthy programs for in our experiment to find out the best framework that can classify a given program into a spyware or a trustworthy class.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
BEHAVIOUR OF BETHAMCHRLA WASTE STONE ON MECHANICAL AND WORKABILITY PROPERTIES OF FIBRE REINFORCED CONCRETE[ ]


Bethamcherla waste stone is basically marble stone. It is naturally split table A small place Bethamcherla in Kurnool district of Andhra Pradesh has been gifted by nature with huge quantity of Bethamcherla stone. Quarries producing natural stone, Bethamcherla stone, lime stone etc., Generates large quantity of solid waste. This waste is in the form of over lying burden, interbedded burden, production waste generation during cutting for different required form of sizing, splitting at quarry floor. Besides many environmental problems especially from large generation of waste and its disposal continue to be biggest factor for the municipal authorities that will determine the future development of Bethamcherla waste stone like other natural stone.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A SURVEY ON IMPROVING NETWORK PERFORMANCE IN WIRELESS SENSOR NETWORKS[ ]


A wireless sensor network (WSN) is a various networks consisting of a large number of tiny low-cost nodes and additional base stations. Each sensor node comprises sensing, processing, transmission, mobilize, position finding system and power units. Many applications in wireless sensor networks require communication performance that is both consistent and high quality. Unfortunately, performance of present network protocols can become important because of various interferences and environmental changes. present routing protocols estimates link quality based on the reception of control packets over a short time period. This method is neither efficient nor accurate enough to capture the dramatic variations of link quality. The purpose of the survey is to improve consistent network performance in wireless sensor networks such as more stable and the better transient performance. To improve the network performance in wireless sensor network by using a link metric that characterizes link over a longer period of time. Link metric combine with present short term estimations in routing algorithm designs. To further improve network performance a distributed route maintenance framework was designed based on feedback control solutions.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A NEW SINGLE BAND MICROSTRIP U-SHAPE PATCH ANTENNA[ ]


Antenna plays a major role in wireless communications. The type of antenna includes parabolic reflectors, patch antennas, slot antennas, folded dipole antennas etc. Among those, most useful antennas at microwave frequencies (f>1GHz) are micro strip antennas also called patch antennas with a metal patch on top of grounded dielectric substrate. The patch may be in variety of shapes but rectangular and circular are most common.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Review on Broadcast Storm Mitigation Techniques in Vehicular Ad hoc Networks[ ]


In traffic safety applications for VANETs, some warning messages have to be disseminated in order to increase the number of vehicles receiving the traffic warning information. In those cases, redundancy, contention and packet collisions due to simultaneous forwarding (usually known as “Broadcast storm problem”) are prone to occur. So to avoid this, the data should be disseminated efficiently without any loss. This paper focuses on survey of various broadcast storm mitigation techniques developed for efficient data dissemination.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Explosure of Micro Electromechanical Systems (MEMS) based applications[ ]


Over the past two decades, several advances have been made in micro machined sensors and actuators. Thesemicrosensors are used in almost every possible sensing modality including temperature, pressure, inertial forces, chemical species, magnetic fields, radiation etc. At this time, piezoelectric aluminum-nitride-based Film Bulk Acoustic Resonators (FBAR) has already been successfully commercialized in many applications. Future innovations and improvements in inertial sensors for navigation, high-frequency crystal oscillators and filters for wireless applications, microactuators for RF applications, chip-scale chemical analysis systems and countless other applications hinge upon the successful miniaturization of components and integration of piezoelectrics and metals into these systems. In this paper, a comprehensive study of micro electro mechanical systems, materials, fabrication technology and various applications of MEMS will be explained.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Effect of HDPE Plastic on the Unconfined Compressive Strength of Black Cotton Soil[ ]


Black Cotton soil which is a type of expansive soil, has the property of swelling excessively when wet and shrinks highly when exposed to dry conditions showing terrible surface cracks and due to this an uneven surface is created. This condition arises due to a mineral known as montmorillonite and presence of fine clay particles. The soil changes its shape rapidly due to addition of water.The soil occupies more than 20 % of the surface area of India.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
DESIGN OF SMART MAXIMUM DEMAND CONTROLLER FOR PEAK LOAD MANAGEMENT FOR DOMESTIC LOADS -application of DSM Tool[ ]


Energy is one of the most important and essential source of life for the mankind. Among all types of sources, Electrical Energy is basis for development in any society or nation. In India substantial and sustained economic growth is creating enormous demand for electric energy. To meet the demand, many electrical power generating plants were installed, yet the gap between demand and supply has been continuously growing. A Way to overcome this problem in the present scenario is to utilize the existing sources as optimally as possible, limiting the wastage in the usage of electric energy.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Reducing Power Consumption at Computer Architectures to Improve the Performance[ ]


Power and Energy Consumption is a Key constraint and crucial Technology for High Performance computing era. Energy optimization is an enabling power Management. The Consumption of Energy should be ascertainable not only to Gate Level or Register Transfer (RT) Level but also to the System Level. Reducing the Energy Consumption without degrading performance of the system. The compiler-time power and Energy optimization that will be complementary to current hardware and Operating System Techniques. The Computing science developers focus on the compiler-time power and energy optimization that will be complementary to current hardware and Operating System techniques, compiler have the advantage that they can analyse whole program behaviour, and reshape the behaviour if considered profitable for a given optimization objective. Power and Energy management strategy will be investigating optimization criteria to minimization of overall energy consumption. The focuses on various and tools for minimization of energy without increasing runtime. The Energy consumption and run time computed for various compiler techniques on XScale Architecture using XEEMU tool. The optimized code picked out and code is tuned dynamically by varying voltage-frequency. The optimized codes are tuned dynamically.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Isolation, molecular characterization and self-healing capability of some native isolates of Bacillus sps[ ]


The paper describes characterization and sustainable concrete development, by using native isolate of alkaliphilic bacteria Bacillus stratosphericus. The isolate has high urease activity, continuous formation of dense CaCO3 crystals and a very negative zeta potential and also persists in extreme environments. The self-healing of experimentally induced cracked concrete varying different widths 0.1 to 0.55mm with different bacterial cells was studied. The bacteria were contemporaneous in the concrete and form calcium carbonate healed the cracks up to 0.50mm. These precipitated crystals can thus fill the cracks. The calcite crystal formation was observed by scanning electron microscopy.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Effect of Sea shell powder on the Unconfined Compressive Strength of Black Cotton Soil[ ]


Black Cotton Soil is a type of expansive soil which is basically susceptible to volumetric changes, with the changes in moisture. This is due to the presence of montmorillonite, which asanexpansive lattice. There are various materials that may be used as firm up agent. This paper presents the result of an attempt that was made to find the unconfined compressive strength of black cotton soil by adding sea shell powder as admixture. The admixture sea shell powder is added with an increment. Thus sea shells powder can be used as a firm up agent. It was concluded that with the addition of admixtures, the unconfined compressive strength of the black cotton soil has been increased.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Improvement in QoS for MIMO OFDM Multicast Systems[ ]


Adaptive resource allocation in the next generation wireless systems is a key technique that can significantly improve the performance with guaranteed QoS to users. Moreover, most of the current resource allocation algorithms are limited to unicast systems. In this paper, adaptive resource allocation is studied for multiple antenna OFDMA based systems which provide multicast services. The optimal resource allocation solution is proposed with low complexity algorithms. The numerical result is shown that the performance of our proposed algorithm improve the system capacity significantly compared with existing one.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Application of Embedded Systems In Automotives[ ]


The number of computer based functions embedded in vehicles has increased significantly in the past two decades. An in-vehicle embedded electronic architecture is a complex distributed system; the development of which is a cooperative work involving different manufacturers and suppliers. There are several key demands in the development process, such as safety requirements, real-time assessment, schedulability, composability, etc. Intensive research is being conducted to address these issues. This paper reviews recent technology advances in relevant aspects and covers a range of topics highlighted above.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Design of a Double Tail Dynamic Comparator for Low Power and High Speed applications[ ]


Now a days the entire world is running towards digitalization process in every field as digitalization is rapidly becoming one of the standard form of processing, storage and transmission of information. Digitalization is nothing but the conversion of traditional analog data into digital format in that scenario we necessitate a converter to change the analog data .so, in essential we go for ADC’s.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------