Beruflich Dokumente
Kultur Dokumente
On
10th August, 2014
Venue
Organized by
www.iaetsd.in
About IAETSD:
The International Association of Engineering and Technology for
Skill Development (IAETSD) is a Professional and non-profit conference
organizing company devoted to promoting social, economic, and technical
advancements around the world by conducting international academic
conferences in various Engineering fields around the world. IAETSD
organizes multidisciplinary conferences for academics and professionals
in the fields of Engineering. In order to strengthen the skill development
of the students IAETSD has established.
IAETSD is a meeting place where Engineering students can share their
views, ideas, can improve their technical knowledge, can develop their
skills and for presenting and discussing recent trends in advanced
technologies, new educational environments and innovative technology
learning ideas. The intention of IAETSD is to expand the knowledge
beyond the boundaries by joining the hands with students, researchers,
academics and industrialists etc, to explore the technical knowledge all
over the world, to publish proceedings. IAETSD offers opportunities to
learning professionals for the exploration of problems from many
disciplines of various Engineering fields to discover innovative solutions
to implement innovative ideas. IAETSD aimed to promote upcoming
trends in Engineering.
About ICCTER:
The aim objective of ICCTER is to present the latest research and results
of scientists related to all engineering departments topics. This conference
provides opportunities for the different areas delegates to exchange new
ideas and application experiences face to face, to establish business or
research relations and to find global partners for future collaboration. We
hope that the conference results constituted significant contribution to the
knowledge in these up to date scientific field. The organizing committee
of conference is pleased to invite prospective authors to submit their
original manuscripts to ICCTER 2014.
All full paper submissions will be peer reviewed and evaluated based on
originality, technical and/or research content/depth, correctness, relevance
to conference, contributions, and readability.
The conference will be held every year to make it an ideal platform for
people to share views and experiences in current trending technologies in
the related areas.
1
8
15
21
27
GESTURE RECOGNITION
42
7
8
9
10
49
64
70
76
11
83
12
86
13
SEARL EFFECT
91
14
99
15
TECHNO-HOSPITAL
104
16
107
17
110
18
115
19
121
21
126
22
133
23
139
25
150
26
163
27
169
28
29
174
180
30
186
31
191
32
194
33
34
35
36
37
38
199
205
208
212
215
219
39
227
40
233
41
42
43
243
249
254
44
258
45
263
46
269
47
275
48
281
ABSTRACT
The transcoding refers to a two-step process in which
the original data/file is decoded to an intermediate
uncompressed format which is then encoded into the
target format. Transcoding is the direct digital-todigital data conversion of one encoding to another.
This paper proposes a system of secure image
transcoder which mainly focuses on multimedia
applications such as web browsing through mobile
phones, in order to improve their delivery to client
devices with wide range of communication, storage
and display capabilities. This system based on CKBA
encryption ensures end to end security. The
performance of the system has been evaluated for
different images. It is verified that the proposed
system is having less resource complexity with good
performance.
Keywords: CKBA, Encryption, Transcoding
1.
INTRODUCTION
www.iaetsd.in
4. MOTIVATION
The motivation for image transcoding research is mainly
due to contemporary developments in the field of
security and compression of many multimedia
applications. In the digital world nowadays, the security
of digital images becomes more and more important
since the communications of digital products over
network occur more and more frequently. Furthermore,
special and reliable security in storage and transmission
of digital images is needed in many applications, such as,
medical
imaging
systems,
military
image
database/communications and confidential data.
5. METHODOLOGY
The proposed secure image transcoder system is
basically a modification of the existing jpeg encoderdecoder algorithm. The main modifications are;
Encryption
Transcoding
www.iaetsd.in
Forward DCT
F[i,j]= C(i)C(j)
(
cos
[ , ]cos
(5.1)
www.iaetsd.in
Zigzag scanning
The output of typical quantization is a 2-D matrix of
values/ coefficients which are mainly zeros except for a
number of non-zero values in the top left hand corner of
the matrix. Clearly, if we simply scanned the matrix
using a line-by-line approach, then the resulting (164)
vector would contain a mix of non-zero and zero values.
In general, however, this type of information structure
does not lend itself to compression. In order to exploit
the presence of large number of zeros in the quantized
matrix, a ZIG-ZAG SCAN is used.
Zigzag scanning
Differential encoding
Huffman encoding
www.iaetsd.in
P[x, y] =
C(i)C(j) [ , ]cos
(
cos
5.3
www.iaetsd.in
7. CONCLUSION
Conclusion
Several Transcoding algorithms are already
been examined for the effective utilization of bandwidth
and user satisfaction. The proposed image transcoder
gives the idea of how a high quality data like image can
be securely transmitted to different environments with
effective utilization of available bandwidth. From the
www.iaetsd.in
[2].
Huafei Zhu, Adaptive and Composable Multimedia transcoders, Proceedings of the 3rd
IEEE International Conference on Ubi-media
computing
(U-media).
10.1109/UMEDIA.2010.5543914, pp, 113
117, 2010.
[3].
[4].
[5].
[6].
[7].
www.iaetsd.in
Abstract:
Photo electrochemical deposition of CdxHg1-xTe thin films on the Se-modified Au
electrode using electrochemical quartz crystal micro gravimetric (EQCM) and
voltammetry is described. Corrosion of pre-deposited Te electrodes by illumination at a
fixed potential resulted in Se2 species, which was manifest from the EQCM frequency
changes. Se2 species generated from the photo corrosion reacted with Cd2+ and Zn2+
ions in the electrolyte to form Cd xHg1-xTe films on the Au electrode. The effect of
electrolyte composition on the composition and band gap of CdxHg1-xTe films was
studied in detail. Also, photo electro chemistry, EDX, Raman spectroscopy were used
for the characterization of CdxHg1-xTe thin films.
www.iaetsd.in
Introduction
Group 12-16 compound semiconductors are important in a wide spectrum of optoelectronic
applications.1 Especially, ternary compounds including Cd xHg1-xTe have attracted much attention in the
fields of solar cells due to their interesting properties of band gap modulation by composition.2-6 For
example, band gap values of Cd xHg1-xTe ternary semiconductors can be varied from 1.7 eV (HgTe) to
2.7 eV (CdTe) with composition.2-4
Different methods have been used for the synthesis of ternary compounds including vacuum
techniques, chemical bath deposition and electrodeposition.1-6 In particular, electro deposition is a
simple and cost-effective approach, which can conveniently modulate the composition of the thin films
using electrolyte composition and deposition potentials.1
Photo corrosion reaction is detrimental to the long-term stability of the photoelectrode and can be
prevented by a suitable redox couple.7 As an extension to the previous studies,8,9 we utilized photo
corrosion reaction to synthesize ternary semiconductor CdxHg1-xTe thin films. Photo excitation of the
pre-deposited p-Se generates Se2 under light illumination and thus generated Te2- species react with
Cd2+ and Hg2+ in electrolyte to result in CdxHg1-xTe. The composition as well as band gap of the film
varies with electrolyte com-position. This approach is validated using electrochemical quartz crystal
micro gravimetry (EQCM) and voltammetry.
Experimental
Details of the electrochemical instrumentation and the set-up for electrochemical quartz crystal
microgravimetry (EQCM) are given elsewhere. 8,9 For voltammetry and film deposition, an EG&G
Princeton Applied Research (PAR) 263A instrument equipped with Model M250/270 electro-chemistry
software was used. For EQCM, a Seiko EG&G Model QCA 917 instrument consisting of an oscillator
module (QCA 917) and a 9 MHz AT-cut gold-coated quartz crystal (geometric area, 0.2 cm2) as a
working electrode were used. A Pt wire served as a counter electrode and the reference electrode was
Ag/AgCl/3 M NaCl.
Cadmium sulfate hydrate (purity 98+%), Tellurium di-oxide (purity 99.8%), zinc sulfate heptahydrate
(purity 99%), sodium sulfate (purity 99+%) and sulfuric acid (purity 98+%) were obtained from
Aldrich. All chemicals were used as received.
Mller Elektronik-Optik halogen lamp was used as the light source. The light intensity measured on
the electrode surface with the Newport 70260 radiant power meter com-bined with the 70268 probe was
~100 mW in all the experi-ments described below, and this value is uncorrected for cell reflection and
electrolyte absorption losses. Raman spectra were measured using the 514 nm line of an Ar+ ion laser
(HORIBA-LABRAM) at room temperature. Film morpho-logy and atomic composition of the
electrodeposited Se and CdxHg1-xTe were studied by energy dispersive X-ray analyses (EDX) attached
to a field emission scanning electron micro-scope (FESEM, JEOL 6700F). Interferometric reflectance
spectra were obtained with an Ocean Optics R4000 spectro-meter system equipped with a fiber optic
probe and a W-halogen light source.
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
www.iaetsd.in
0.1 M Na2SO4 electrolyte containing 10 mM TeO2. The photocurrent transients (solid line) at 0.25 V
in 0.1 M Na2SO4 electrolyte are cathodic, signaling that the Te as deposited on the Au surface is acting
as a p-type semi-conductor.10 Apparently, the cathodic photocurrents are accompanied by the photo
corrosion of Te to Te2- which results in mass decreases (EQCM frequency increases, dashed line).
It should be noted that the electrode mass is regained when the light is switched off in each cycle
showing that Te0 re-deposits on the Au surface in the dark. To understand this, a combined cyclic
voltammogram (CV) and EQCM is obtained for a Te modified Au electrode in 0.1 M Na2SO4. As
shown in the Figure 1B, cathodic stripping of Te to Te2 is accompanied by frequency increase (mass
decrease) and as-generated Te2 species re-deposit on the Au electrode again during the return scan
(from ~ 0.5 V). This explains why photo generated Te2 is oxidized and re-deposited on the Au
electrode in the dark. Again, frequency increase with an anodic peak at 0.8 V is due to the oxidation of
Se to Se4+.11,12
Under the light illumination, electro deposited Te is stripped off due to the photocorrosion.11,13
10
www.iaetsd.in
By contrast, addition of Cd2+ and/or Hg2+ to the electrolyte showed different frequency changes during
the light illumi-
11
www.iaetsd.in
For example, irradiation on the Te modified Au electrode in 0.1 M Na2SO4 electrolyte containing 30
mM TeSO4 at a fixed potential of -0.25 V results in frequency increase followed by a frequency
decrease (Figure 3A). The frequency decrease resulted from the CdTe formation by the precipitation
process:
Cd2+ + Te2 (by photocorrosion)
CdTe
(1)
Unlike the p-Te, the photocurrent is anodic as shown in figure 3B diagnosing that thus formed CdTe is
n-type.10,14-17 Again, the frequency changes systemically during the light on-off cycles as explained
before (Figure 1A).
When electrolyte contains Zn2+ ions, similar frequency changes are observed during the light
illumination on the Se modified Au electrode. Figure 4A contains chronoampero-metric and EQCM
data for the Se modified Au electrode under the light illumination in 0.1 M Na2SO4 electrolyte
containing 50 mM ZnSO4 at a fixed potential of 0.25 V. The fixed potential of 0.25 V was selected
since we observed cadmium and zinc deposition at more negative potentials in the dark. In the case of
zinc, the frequency increases initially and starts to decrease, which implies the formation of CdxHg1-xTe
Here, the frequency decreases from ~40 s, which is later than that of the CdTe case. We believe that this
is due to the difference in solubility products of HgTe
Bull. Korean Chem. Soc. 2008, Vol. 29, No. 5 941
(Ksp = 4.0
12
www.iaetsd.in
It is well known that band gap of CdxHg1-xTe is dependent on the film composition.3,4 The
composition of CdxHg1-xTe thin films synthesized by the approach developed here is deter-mined by
EDX, Raman spectroscopy and UV reflectance spectroscopy. Figure 6A clearly shows that film
composition and therefore band gap can be modulated by controlling electrolyte compositions. As
shown in the figure, the ratio of Hg/Cd in films increases with the ratio of Cd/Hg in electrolyte. In
addition, band gap has been modulated by the
Conclusion
We have demonstrated a photo electrochemical deposition of CdxHg1-xTe thin films using a Te
modified Au electrode using a photo corrosion. Unlike previous studies on binary semiconductors,
composition and band gap of ternary semi-conductors have been modulated by controlling composition
of electrolytes. Also, we presented a new route for the synthesis of CdTe and HgTe films using a photo
electro-chemical approach. Finally, EQCM combined with ampero-metry proved to be effective to
study photo electrochemical behavior of binary and ternary semiconductors.
References
1. (a) Rajeshwar, K. Adv. Mater. 1992, 4, 23. (b) Lee, J.; Kim, Y.; Kim, K.; Huh, Y.; Hyun, J.; Kim, H.
S.; Noh, S. J.; Hwang, C.
Bull. Korean Chem. Soc. 2007, 28, 1091.
2. (a) Krishnan, V.; Ham, D.; Mishra, K. K.; Rajeshwar, K. J. Electrochem. Soc. 1992, 139, 23. (b)
Chae, D.; Seo, K.; Lee, S.; Yoon, S.; Shim, I. Bull. Korean Chem. Soc. 2006, 27, 762.
3. Natarajan, C.; Nogami, G.; Sharon, M. Thin Solid Films 1995, 261, 44.
4. Chandramohan, R.; Mahaligam, T.; Chu, J. P.; Sebastian, P. J.
Solar Energy Mater. Solar Cells 2004, 81, 371.
5. Loglio, F.; Innocenti, M.; Pezzatini, G.; Foresti, M. L. J. Elelctroanal. Chem. 2004, 562, 117.
6. Kaschner, A.; Strassburg, M.; Hoffmann, A.; Thomsen, C.; Bartels, M.; Lischka, K.; Schikora, D.
Appl. Phys. Lett. 2000, 76, 2662.
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
13
www.iaetsd.in
7. Licht, S. In Semiconductor Electrodes and Photoelectrochemistry; Licht, S., Ed.; Wiley: Weinheim,
Germany, 2002; Vol. 6, p 325.
8. Ham, S.; Choi, B.; Paeng, K.; Myung, N.; Rajeshwar, K.
Electrochem. Commun. 2007, 9, 1293.
9. Ham, S.; Paeng, K.; Park, J.; Myung, N.; Kim, S.; Rajeshwar, K.
J.Appl. Electrochem. 2008, 38, 203.
10. Myung, N.; de Tacconi, N.; Rajeshwar, K. Electrochem. Commun. 1999, 1, 42.
11. Rabchynski, S. M.; Ivanou, D. K.; Streltsov, E. A. Electrochem. Commun. 2004, 6, 1051.
12. Myung, N.; Wei, C.; Rajeshwar, K. Anal. Chem. 1992, 64, 2701.
13. Streltsov, E. A.; Poznyak, S. K.; Osipovich, N. P. J. Elelctroanal. Chem. 2002, 518, 103.
14. Lade, S. J.; Uplane, M. D.; Lokhande, C. D. Mater. Chem. Phys. 2001, 68, 36.
15. Kazacos, M. S.; Miller, B. J. Electrochem. Soc. 1980, 127, 2378.
14
www.iaetsd.in
D.KHADHAR BASHA
IV B.Tech, ECE
BITS, ADONI.
Abstract
The role of telecommunications in disaster reduction is critical in order to improve the timely flow of crucial
information needed for appropriate assistance to be delivered before, during and after the disaster. The
breakdown of essential communications is one of the most widely shared characteristics of all disasters. The
collapse of communications infrastructure, due to the collapse of antennas, buildings, power etc is the usual effect
of disaster. This paper describes a communication network that is appropriate, suitable and reliable in any
disaster: - Mobile Ad hoc Network (MANET). A mobile ad hoc network is formed dynamically by an autonomous
system of mobile nodes that are connected via wireless links without using the existing network infrastructure or
centralized administration. The ease of deployment and infrastructure less nature of the network are some of
reasons why MANET is recommended in disaster area.
operations. One solution to this problem is the use of
wireless communication systems.
Introduction
Disasters are of varying intensity and occurrence
ranging from less frequent like earthquake, volcanic
eruption to more frequent like floods, fire, drought,
cyclones, landslides besides industrial reaction and
epidemics. Disasters kill at least one million people
each decade and leave millions more homeless (ITU,
TDBEC). When disaster strikes, communication link
are often disrupted, yet for disaster relief workers,
these links are essential in order to answer critical
questions as to how many people have been injured or
died, where the injured are located and the extent of the
medical help needed. In disaster and emergency
situations, communications can save lives.
The collapse of communications infrastructure, due to
the collapse of antennas, buildings, power etc is the
usual effect of disaster. The breakdown of essential
communications is one of the most widely shared
characteristics of all disasters. Whether partial or
complete, the failure of communications infrastructure
leads to preventable loss of life and damage to
property, by causing delays and errors in emergency
response and disaster relief efforts (Townsend and
Moss, 2005). Yet despite the increasing reliability and
resiliency of modern communications networks to
physical damage, the risk associated with
communications failures remains serious because of
growing dependence upon these tools in emergency
15
www.iaetsd.in
16
www.iaetsd.in
and routing.
Ease of deployment: MANET does not depend on any
established infrastructure or centralized administration.
Each node operates in distributed peer-to-peer mode,
acts as an independent router and generates
independent data. This make it possible to apply Ad
hoc networking anywhere there is little or no
communication infrastructure or the existing
infrastructure is expensive or inconvenient to use. Ad
hoc networking allows the devices to maintain
connections to the network as well as easily adding and
removing devices to and from the network (Corson and
Maker, 1999).
Multihop routing: Basic types of ad hoc routing
algorithms can be single-hop and multihop, based on
different link layer attributes and routing protocols. In
MANET, there are no default router available, every
node acts as a router and forwards each others packets
to enable information sharing between mobile hosts
(Murthy and Garcia, 1996)
Dynamic network topology: Since the nodes are
mobile, the network topology may change rapidly and
unpredictably and the connectivity among the terminals
may vary with time. MANET adapts to the traffic and
propagation conditions as well as the mobility patterns
of the mobile network nodes (Royer and Tohc, 1999).
The mobile nodes in the network dynamically establish
routing among themselves as they move about, forming
their own network on the fly.
Network scalability. Currently, popular network
management algorithms were mostly designed to work
on fixed or relatively small wireless networks. Many
mobile ad hoc network applications involve large
networks with tens of thousands of nodes, as
17
www.iaetsd.in
MANET applications
The application of MANET system is not only limited
to disaster areas but with the increase of portable
devices as well as progress in wireless communication,
ad hoc networking is gaining importance with the
increasing number of widespread applications. Ad hoc
networking can be applied anywhere there is little or
no communication infrastructure or the existing
infrastructure is expensive or inconvenient to use. The
set of applications for MANETs is diverse, ranging
from large-scale, mobile, highly dynamic networks, to
small, static networks that are constrained by power
sources. Table 1 gives a brief description of the various
application areas of MANET.
disasters
Policing and fire fighting
Tactical Networks
Military communications and operations
Automated battlefields
Commercial and
Civilian
E-commerce: electronic payments anytime and anywhere
environments
Home
and
networking
Education
Entertainment
Sensor networks
18
www.iaetsd.in
Bluetooth
19
www.iaetsd.in
Conclusion
Mobile Ad hoc Network can be used in
emergency/rescue operations for disaster relief efforts,
e.g. in fire, flood, or earthquake. Emergency rescue
operations take place where non-existing or damaged
communications infrastructure and rapid deployment
of a communication network is needed. Information is
relayed from one rescue team member to another over
a small handheld device.
References
Abolhassan M, Wysocki T and Dutkiewicz E (2004),
A review of routing protocols for mobile ad hoc
networks, Ad Hoc networks 2(1), pp 1-22.
20
www.iaetsd.in
current spike also has the effect of lengthening the motor life
because the current spike alone would cause increased wear
and tear on the motor compared to a DC input.
I. INTRODUCTION
The induction motor is a simple and robust machine,
but its control might be a complex task when managed directly
from the line voltage, the motor operates at nearly a constant
speed. To obtain speed and torque variations, it is necessary to
modify both the voltage and the frequency. Following this was
the realization that the ratio of the voltage and frequency
should be approximately constant [1].
III.
21
www.iaetsd.in
R
P
2 L ln 1
100
D13
D10
MUR130
MUR130
R1
X3
L1
1
2.5
2
2.1m
MCR230M
D11
V1
VOFF = 0
VAMPL = 230
FREQ = 50
D12
MUR130
R2
MUR130
R3
0.012
21.8
1
L2
L3
0.1328
U1
MCT2E
2m
V3
R4
10Vdc
V1 = 0
V2 = 20
TD = 7m
TR = 1n
TF = 1n
PW = 2m
PER = 10m
R5
0.012
V2
0.1315
1
L4
L5
0.1328
2m
0
0
22
www.iaetsd.in
1 0A
0A
SEL >>
-1 0A
I(R 1)
40 0V
0V
200V
-40 0V
0s
10m s
V(D 13: 1,0)
20m s
30ms
40ms
50ms
6 0ms
7 0ms
8 0ms
90 ms
1 00ms
0V
Time
V(D13:1,0)
5.0A
0A
-5.0A
0s
10ms
20ms
30ms
40ms
50ms
60ms
70ms
80ms
90ms
100ms
I(R1)
Time
2.0A
(158.636m,1.6610)
1.0A
10. 0A
(81 .03 6m,7 .340 4)
SEL>>
0A
RMS(I(R1))
50V
(158.636m,41.636)
5. 0A
SEL >>
0A
25V
RMS (I( R1))
20 0V
(81 .036 m,15 7.9 26)
0V
0s
10 0V
20ms
RMS(V(D13:1,0))
40ms
60ms
80ms
100ms
120ms
140ms
160ms
180ms
200ms
Time
10m s
RMS (V( D13: 1,0) )
20m s
30ms
40ms
50ms
6 0ms
7 0ms
8 0ms
90 ms
1 00ms
Time
23
www.iaetsd.in
(83.636m,2.6101)
2.0A
10A
1.0A
0,-16.662p)
SEL>>
0A
RMS(I(R1))
80V
0A
(83.636m,62.122)
SEL>>
-10A
40V
I(R1)
200V
0V
0s
10ms
RMS(V(D13:1,0))
20ms
30ms
40ms
50ms
0V
60ms
70ms
80ms
90ms
100ms
Time
-200V
0s
10ms
V(D13:1,0)
20ms
30ms
40ms
50ms
60ms
70ms
80ms
90ms
100ms
Time
The RMS value of output voltage and output current waveform is as shown in
the Fig.7.
D13
D10
MUR130
MUR130
X3
H1
+
MCR230M
D11
V1
VOFF = 0
VAMPL = 230
FREQ = 50
D12
MUR130
R13
E1
+
-
100
E
V4
R8
R7
1k
1.5
1k
V3
U1
MCT2E
R10
R9
1k
1k
10Vdc
U2
OUT
OPAMP
U3
OUT
V5
+
U4
E3
2
+
-
3
1
0
0
OPAMP
+
-
R12
1k
120
E
V6
AND2
V1 = 0
V2 = 10
TD = 0
TR = 0.1n
TF = 0.1n
PW = 7m
PER = 10m
0
TD = 0
TF = 7.7m
PW = 0.01n
PER = 10m
V1 = -10
TR = 0.1n
V2 = 10
24
www.iaetsd.in
4.0V
2.0V
SEL>>
0V
V(X3:G,X3:K)
10A
0A
-10A
0s
50ms
100ms
150ms
200ms
250ms
300ms
I(H1:1)
Time
The controller was designed after the system had been fully
bread-boarded, but before the software had been fully
implemented. At this point in time, the potentiometer had not
been added to the circuit in order to reduce the 6.2V maximum
tachometer output to 5V. This is the reason that it is not
included in the schematics.
) J (W
) (1 ) J ( W
)
J (W
r
(1)
1, c med
0, c med
e( k ) n
e(k ) n
mean e(k )
mean e(k )
nH
0.5
0.45
0.4
0.35
0.3
0.25
0.2
0.15
0.1
0.05
0
500
1000
1500
2000
2500
3000
(2)
nH
25
www.iaetsd.in
[7] K. Idir, et al, A new global optimization approach for induction motor
design, IEEE Canadian Conf. Proc. Electrical and Computer Engineering,
2007, pp. 870-873.
26
www.iaetsd.in
ELECTROCHEMICAL MACHINING OF
SS 202
Bharanidharan1,Jhonprabhu2
Department of Mechanical Engineering
M.Kumarasamy college of Engineering, Karur -639 113
Email: bharanidharan1021@gmail.com, bharanivijay11@gmail.com
ABSTRACT
increased
electrolyte
are
upon
and
distance.
removed
the
from
electrons
the
anode
means
the
the
voltage
immerged
Results
electrode
factors
immerged
in
the
indicated that
material
material
1) Power supply,
cathode,
3) Depth of immersion.
27
www.iaetsd.in
CHAPTER-1
INTRODUCTION
IMPORTANCE OF ECM:
acid.
amplitude
of
oscillation,
and
phosphoric
acid
of
conditions,
electrode
and
dimensions
were
frequency
range
small
studied
rate;
Parameters
operating
be
conditions.
The
mass
Sh=0.316Sc0.33Rev0.64.The
requirements.
CHAPTER-2
LITERATURE REVIEW
machining,
and
other
28
www.iaetsd.in
F. Klocke 2013:
discussed.
and
integrated
blisks
(blade
disks).
Electrochemical
Here
single-crystalline
Machining
excellent
thermo-mechanical
properties
capabilities
beforehand
still
high
temperatures
is passed through.
approach
modeling
ECM
the
at
for
material
electrochemical
electrochemical
proper
machining
PECM
the
29
and
precise
machining
parameters
for
electrochemical
www.iaetsd.in
characteristics
dependent
on
the
microstructure
and
the
chemical
homogeneity
of
LEK94
CHAPTER-3
ELECTROCHEMICAL
are
MACHINING PROCESS:
conductivity
used.
yield
of
Low
the
current
inhomogeneous
electrochemical
dissolution
of
fig.3.1
by
employing
electrochemical
homogenous
dissolution,
which
densities.
special
Furthermore,
30
www.iaetsd.in
work
piece.
These
can
get
COMPONENTS:
Power supply
Work piece
Tool
removal action
flowing
positive
202 material.
electrolyte.
The
removal
of the
anode
31
www.iaetsd.in
PHYSICAL PROPERTIES:
PROPERTY
VALUE
Density
3.3WORKPIECE:
7.80 g /
cm3
17 10-6 /
Thermal
expansion
Modulus
k
of
Elasticity
200
GPa
Thermal
Conductivity
15 W /
mk
MECHANICAL
PROPERTIES:
PROPERTY
VALUE
fig.3.2
Proof Stress
MPa
PROPERTIES:
SS202
310
Tensile Strength
Material
is
655
MPa
Elongation
40 %
different properties.
32
www.iaetsd.in
3.4 Tool:
3.5 Electrolyte:
fig.3.4
fig.
fig.3.3
33
www.iaetsd.in
S.NO
3. EXPERIMENTAL
VOLTAGE
(Volts)
ELECTROCHEMICAL
MATERIAL
(Min)
ELECTRODE
DISTANCE
(cm)
TIME
REMOVAL
RATE(cm3
min-1)
MACHINING
1.
240
15
12
1.191
CONSTANT POWER
2.
240
15
1.186
SUPPLY
3.
240
15
1.157
CALCULATION FOR
3.1. TABULATION 1:
The
S.NO
VOLT
AGE
(Volts)
TIM
E
IMMER
GEDDIS
TANCE
(Min)
(cm)
MATER
IAL
Table.2
material removal
rate
is
REMO
VALRA
TE(cm3
min-1)
1.
240
15
2.8
1.191
2.
240
15
3.1
1.186
3.
240
15
6.5
1.157
removal
rate
The
material
is
removal.
34
www.iaetsd.in
MRR VS
ELECTRODE
DISTANCE
V = r h
r - Radius of the work piece, h Length of the work piece
20
10
0
MRR
VS
ELECT
RODE
DIST
3.3. Calculation:
Volume of removed material, V= r2h
IMMERGED
DISTANCE VS
1.2
V = (0.39)22.8
V = 0.47782.8
3
IMME
RGED
DISTA
NCE
VS
1.15
V =1.34 cm
1.1
Volume of remaining
Material, V= r2h
Fig 10 & 11
V= (0.4)232.9
V= 0.5026 32.9
V= 16.53 cm3
decreased
When
the
electrode
distance
is
increased.
= 17.87 cm3
4. EXPERIMENTAL
ELECTROCHEMICAL
MRR= 17.87 / 15
MACHINING
CALCULATION FOR
3.4. RESULT:
VARIABLE POWER
SUPPLY:
35
www.iaetsd.in
The
material
removal
rate
is
S.N VOLT
TI
IMMER
AGE
ME
GED
(volts)
(mi
DISTAN
n)
CE
MATE
RIAL
REMO
VAL
RATE(c
m3 min1
)
(cm)
COMPONENTS:
RPS meter
Power supply
Work piece
Tool
Electrolyte
1.
10
45
2.8
0.129
2.
20
45
2.8
0.167
3.
30
45
2.8
0.216
Electrolytic tank
is
increase
means
the
material
S.N
VOLTA
TIM
IMMERG
of meter is 0-30V.
GE
ED
(volts)
(min
DISTANC
E
(cm)
MATERI
AL
REMOV
AL
RATE(cm
3
min-1)
1.
10
45
3.1
0.118
2.
20
45
3.1
0.156
3.
30
45
3.1
0.194
36
www.iaetsd.in
(45min)
will
be
constant.
Y-
RESULT:
5. CONCLUSION:
MRR VS VOLTAGE
35
30
25
20
MRR VS
VOLTAGE
15
10
5
0
0.156
0.194
MRR VS VOLTAGE
40
30
6. APPLICATION:
20
MRR VS
VOLTAGE
10
0
0.129
0.167
ECM include:
0.216
1. Die-sinking operations.
Fig 13 & 14
The applied voltage is increased
and
the
second
graph
the
37
www.iaetsd.in
7. REFERENCE:
8. EXPRIMENT PICTURES:
journal
of
Manufacturing
Processes, Volume
14, Issue 1,
Pages
205-226
38
www.iaetsd.in
39
www.iaetsd.in
40
www.iaetsd.in
41
www.iaetsd.in
GESTURE
RECOGNITION
BY
AMREEN AKTHAR .J.
AKSHAYA .B.
III YEAR E.C.E
PANIMALAR ENGINEERING COLLEGE
42
www.iaetsd.in
I.
43
www.iaetsd.in
IV. IMPLEMENTATION
Obtaining signal from fingers which is used to
recognize sign symbol consists of lot of methods including
[5]
EMG (Electromyography)
Load cell
Wearable conductive fiber
Sliding fiber optic cable
Flex sensor
44
www.iaetsd.in
Fig.6.Direction of ACC
C. Speak jet IC
A.MPLAB
45
www.iaetsd.in
VI. RESULT
The hardware circuit of the module is shown in
figure12. It consists of microcontroller interfaced flex
sensors, speak jet IC, etc.
C. Phrase-A-Lator
This software is a demonstration program from
Magnevation which allows speak jet IC to speak. It is used
to set voice quality like pitch, volume and speed. It will
generate the code for the corresponding words we need
which is then used in main code to make the speak jet IC to
speak. The main menu for this software is shown in fig.10,
is used to select communication settings and other editor
menu. When connected to PC the serial port check box will
turn the color to green if correct COM port is selected.
46
www.iaetsd.in
VIII. OUTPUT
Sample output obtained for some important
conversations such as WELCOME and HOW ARE YOU,
are shown in below figure 16a and b. The Left portion of
figure 16a, and b shows the exact position to keep the
fingers for the word which is obtained using the reference
site and right portion of figure 16 a and b shows the output
obtained in digital display by wearing gloves with flex
sensors and IMU in the hands and by keeping the hands in
the position referred by the picture. At the same time same
word which is displayed is also heard through speaker using
speak jet IC.
47
www.iaetsd.in
48
www.iaetsd.in
Abstract :
Electronic and structural properties of Silicon Nanowire (SiNW) when doped with Al and P atoms
are obtained from simulation studies have been reviewed . The bandgap , density of states and
Structural property of Sillicon Nanowire has been compared when this nanowire is doped with
phosphrous and aluminium atoms. We observed that decrease in bandgap increases the metallic
property of silicon. Total energy is maximum then the structure is least stable . So we can say that
total energy is inversely proportional to stability. In density of states , we clearly see the decline in
DOS/Ev with the increase of doping Al and P atoms. In this paper , we have discussed all the
electronic and structural properties.
1.Introduction
The nanowire, a structure that has an amazing length-to-width ratio. Nanowires can be
incredibly thin -- it's possible to create a nanowire with the diameter of just one nanometre,
though engineers and scientists tend to work with nanowires that are between 30 and 60
nanometres wide. Scientists hope that we will soon be able to use nanowires to create the
smallest transistors yet, though there are some pretty tough obstacles in the way. Nanowires
possess unique electrical, electronic, thermo electrical, optical, magnetic and chemical
properties, which are different from that of their parent counterpart.Sillicon NW are the
answers for on going obstacles in electronic field .These Si NW are the one-dimensional
structures. Their electronic conduction can be controlled by doping. Si NW can be used from
field effect transistor to Biosensors.[4,5] The photoluminescence in Si NW and nanoparticle
have been observed [7,8] which is an experimental evidence of the quantum confinement.[ 6]
Silicon-wire research started in the mid 1990s, when advances in microelectronics triggered a
renewed interest in siliconnow nanowireresearch. [1] Last, we will turn our attention to
the electrical properties of silicon nanowires and discuss the different doping methods. Then,
three effects essential for the conductivity of a silicon nanowire are treated.
[9]Experimentally it has been observed that the band Gap can be tuned by choosing different
growth directions and diameters of wire . [10] The electronic structure of Si NW being
critically depends on the size , orientation , passivation and doping level of
nanostructure.These are the diameter dependence of the dopant ionization efficiency, the
influence of surface traps on the charge-carrier density, also causing a diameter dependence,
49
www.iaetsd.in
and the charge-carrier mobility in silicon nanowires. [1]Many techniques, including both
top-down and bottom-up approaches, have been developed and applied for the synthesis of
Nanowires. VaporLiquidSolid (VLS) Mechanism, Chemical Vapor Deposition (CVD),
Evaporation of SiO, Molecular Beam Epitaxy (MBE), Laser Ablation and Electroless metal
deposition and dissolution (EMD) [2]. These days Si NW are used for enhanced thermo
electricperformance [3]. Sillicon nanowire can be uniformly made at low temperature using
Vapour-Liquid-Solid growth.
2. Computational Method
We have performed the calculation using the ab-intiopsuedopotential method which is based
on the density functional theory and analyse the electronic properties of silicon nanowire
(alpha) . We have used atomistix toolkit (ATK)[11] for computation , a further development
of TranSIESTA-C[13,14] which, in turn , is based on the technology, models and algorithms
developed in the academic code TranSIESTA and ,in part, McDCal [12] , employing
localized basis sets as developed in SIESTA[15]. The computation has been made in selfconsistent manner using steepest descent geometric optimization with Pulay Algorithm for
iteration mixing . A mesh cut-off of 70 Hartre has been used throughout the study. The
Brilloun-zone(BZ) integration is performs with a Monkhorst-Pack scheme using 1*1*11 k
points. The cutoff energy and the number of k points are varied to test the convergence and
are found to converge within the force tolerance of 0.05eV/A for the reported value . The
exchange correlation functional described within the extended huckel and with generalised
gradient approximation revised-PBE(rev-PBE) as proposed by Zhang and Yang [16] are used
for the computation of total energies of Si Nanowire and its doping with aluminium and
phosphorous atoms . The total energy for Si nanowire extended huckel potential is -2426.37
ev . The extended huckel potential is quite good for the computation of total energy.[17]The
nanowires are placed in the supercell along the wire length in z-direction while the supercell
lengths in the x and y direction are chosen big enough to avoid interaction between nanowire
and its periodic image.[18] For better understanding of fundamental physics associated with
different structures , the binding energies of Si nanowire have also been analysed and to
understand the nature of material , localization and delocalization of states near the Fermi
level , we have analysed the electronic band structure and density of states for all the doping
configuration of Si nanowire.
3. Results
50
www.iaetsd.in
B
Polynomial Fit of Data1_B
-2421
-2422
total energy
-2423
-2424
-2425
-2426
-2427
0.26
0.27
0.28
0.29
0.30
51
www.iaetsd.in
(a)
(b)
(c)
(d)
(e)
Fig.2. The atomic Configurations of Si nanowires (a) SiNW without doping , (b) SiNW doped with 1
Al atom , (c) SiNW doped with 2 Al atoms , (d) SiNW doped with 3 Al atoms and (e) SiNW
Doped with 4 Al atoms
(a)
(b) (c)
52
www.iaetsd.in
(d)
Fig.3.
(e)
The atomic Configurations of Si nanowires (a) SiNW without doping , (b) SiNW doped with 1
P atom , (c) SiNW doped with 2 P atoms , (d) SiNW doped with 3 P atoms and (e) SiNW
Doped with 4 P atoms
Table :
Lattice
Atomic
Configuration constant
Total
energy
Sillicon Pristine
Doped with 1 Al
atom
Doped with 2
Al atoms
Doped with 3 Al
atoms
Doped with 4 Al
atoms
Doped with 1 P
atom
Doped with 2 P
atoms
Doped with 3 P
atoms
Doped with 4 P
atoms
0.285
0.27
-2426.37
-2375.27
Binding
energy
4.29
4.64
Formation
energy
1.29
0.27
-2326.86
4.99
2.55
0.29
-2282.88
5.35
3.71
0.30
-2237.89
5.70
4.9
0.27
-2468.46
3.89
0.58
0.27
-2510.69
3.49
1.66
0.27
-2548.93
3.03
1.8
0.27
-2594.44
2.88
2.33
53
www.iaetsd.in
54
www.iaetsd.in
(a)
(b)
(c ) (d)
55
www.iaetsd.in
(e)
Fig.4.
The Bandstructures of Si nanowires (a) SiNW without doping , (b) SiNW doped with 1
Al atom , (c) SiNW doped with 2 Al atoms , (d) SiNW doped with 3 Al atoms and (e) SiNW
Doped with 4 Al atoms
(a )
(b)
56
www.iaetsd.in
(c )
(d)
(e )
Fig.5.
The Bandstructures of Si nanowires (a) SiNW without doping , (b) SiNW doped with 1
P atom , (c) SiNW doped with 2 P atoms , (d) SiNW doped with 3 P atoms and (e) SiNW
Doped with 4 P atoms
57
www.iaetsd.in
high peak which is at 19.4 DOS/ev in y axis and -4.7 E/ev on x axis . There are two peaks on
the right side which appears on 3.7 , 5.4 DOS/ev on y axis resp. and -13,-15 E/ev in x axis
resp. But there are two peaks on the left side is present on 7.4,8.2 DOS/ev on y axis and 10 ,
11.7 E/ev in x axis resp. . The left side of Fermi level is more dense which clearly indicates
high metallic nature. Now its the turn for phosphorous doping on Silliconnanowire . When
this bulkSillicon nanowire is doped with a P atom, the graph shows a high peak which is at
22.67 DOS/ev in y axis and -11 E/ev on x axis . There are three peaks on the right side
appears on 4.4 , 6 , 8.7 DOS/ev on y axis and -11,-17,-20.7 E/ev in x axis resp. But there are
5 peakson the left side is present on 9.5,9.7,4.7,1.6,1.08 DOS/ev on y axis and 4,9.6,17,20,
25 E/ev in x axis resp. Now this bulkSillicon nanowire is doped with two P atoms , the
graph becomes very dense and it clearly defends very high metallic nature. There are three
peaks on both sides of femilevel . The peaks appears on 23 , 6.2 ,9.2 DOS/ev on one side of
Fermi level which is at -0.3, -12.5 , -21.6 in x axis .But when this Sillicon nanowire is doped
with three P atoms , we observe one side of Fermi level has three peaks ,the graph shows
peaks which is at -1.3,-0.5,-1.7 DOS/ev in y axis and 10.3,10.4,10.2E/ev on x axisresp . But
on the other side , there are many small peaks . We observe lot of distorted peaks on the
valence band which defends it is metallic .Finally this bulk Sillicon nanowire is doped with
four P atoms , the graph shows a three peaks on one side of fermi level which is at 7.5,
12.6,19.8 DOS/ev in y axis and other side has around seven peaks which appears on 9.6 ,
10.4 , 4.7 ,5.4,4.8,1.8,1 DOS/ev .Here , we see small peaks raising up .As usual there is
presence of more peaks but now the peaks are getting distorted on both sides because of
increase in number of electrons of Aluminium and phosphrous atoms .
(a)
(b)
58
www.iaetsd.in
(c )
(d)
(e )
Fig.6.
The Density of States of Si nanowires (a) SiNW without doping , (b) SiNW doped with 1
Al atom , (c) SiNW doped with 2 Al atoms , (d) SiNW doped with 3 Al atoms and (e) SiNW
Doped with 4 Al atoms
59
www.iaetsd.in
(a)
(b)
(c )
(d)
60
www.iaetsd.in
(e )
Fig.7.
The Density of structures of Si nanowires (a) SiNW without doping , (b) SiNW doped with 1
P atom , (c) SiNW doped with 2 P atoms , (d) SiNW doped with 3 P atoms and (e) SiNW
Doped with 4 P atoms
Conclusions
After analysing the structural and electronics properties of Silliconnanowire , we can
conclude that in case of structural property , if total energy is maximum then the structure is
least stable . So we can say that total energy is inversely proportional to stability . With the
increase of doping Al and P atoms , total energy is increasing . In density of states , we
clearly see the decline in DOS/Ev with the increase of doping Al and P atoms . But the graph
was getting denser and crowded with conduction lines as the metallic property is increasing.
Finally , in Bandstructure , we observe that band gap gets hidden because of crowded
conduction lines while doping it with Al and P atoms which depicts the increase of metallic
nature as earlier in case of Si NW , there was small band gap available depicting
semiconductor property.
Acknowledgement
Authors greatly acknowledge the support from ABP-IIITM Gwalior for providing the
infrastructure support in doing the research work.
61
www.iaetsd.in
References
1.Volker Schmidt,* Joerg V. Wittemann, Stephan Senz, and Ulrich Gosele , Adv. Mater.
2009, 21, 26812702
2. Mehedhi Hasan1, MdFazlul Huq2* and ZahidHasanMahmood , 2013 Hasan et
al.;licensee Springer
3. Kui-Qing Penga, XinWanga, Li Lia, YaHua, Shuit-Tong Lee,
10.1016/j.nantod.2012.12.009
62
www.iaetsd.in
16.B. Hammer , L.B. Hansen and J.K. Norskov , Improved adsorption energetics within
density Functional theory using revised Perdew-Burke17.AnuragShrivastav ,NehaTyagi and R.K.Singh , JCTN , Vol.8.1-6,2011
18.AnuragShrivastav ,NehaTyagi and R.K.Singh , Materials Chemistry and Physics 127
(2011)489-494
19. Anurag Srivastava,1 Mohammad Irfan Khan,1,2 Neha Tyagi,1 and PurnimaSwaroopKhare,
Volume 2014 (2014), Article ID 984591
63
www.iaetsd.in
Assistant Professor
UG Scholars
Department of Mechatronics Engineering, Kongu Engineering College
Perundurai, Erode, Tamil Nadu, India-638052
1
bala2009mct@gmail.com
2
faheem.ashkar@gmail.com
3
iamjahirhussain@gmail.com
4
elamparithiramasamy@gmail.com
#2, #3,#4
II
I INTRODUCTION
Large pipelines and pipe networks are part of almost every
industrial setup today. These are most commonly found in
petroleum rigs, refineries, factories producing chemicals and
pharmaceuticals, and in power plants. In these and other industrial
applications, pipes are very often used to carry substances that, by
virtue of their pressure, temperature, physical and chemical
characteristics, can have serious negative effects on health,
property and the environment, if released into the atmosphere.
Examples of such substances include steam, oil and chlorine gas.
Failure in a piping system could cause problems, like an
unscheduled, and hence costly, plant shutdown for maintenance
or even a catastrophe, like exposing the core of a nuclear reactor.
Therefore, the integrity of pipes in industrial contexts is of
paramount importance. This integrity relies heavily on the
correctness of pipe design, which can only be achieved through a
thorough understanding of the behavior of piping components and
systems under different types of loads.
64
www.iaetsd.in
Pipe Size
25 mm
33.4 mm
Inside Diameter
Tensile Strength(min)
413MPa
Yield Strength(min)
241MPa
------- (2.2)
Where,
Tnom
Tmax
Tmin
Ovality
During the bending operation the cross section of the
bend assumes to be an oval shape whose major axis is
perpendicular to the plane of bend. The degree of ovality is
determined by the difference between the major and minor axes
divided by the nominal diameter of the pipe. When the bend is
subjected to internal pressure, it tries to reround the cross section
by creating secondary stress in hoop direction. The percentage
change in ovality is calculated using the equation 2.3 (Veerappan
A and Shanmugam S, 2012).
III
STANDARD PARAMETERS
The specification such as bend dimensions and
chemical compositions of the bend section were taken from
ASME B36.10 catalogue for 1inch diameter bend. The bends are
classified into the following categories.
1) SCH40 (Wall Thickness-3.4mm)
2) SCH80 (Wall Thickness-4.5mm)
3) SCH160 (Wall Thickness-6.4mm)
The outer diameter of the bend is kept constant and the bore size
will be varied according to the schedule number of bend. In
schedule number itself the bends are classified into two
categories.
1) Long Radius Bend.
2) Short Radius Bend.
In our investigation three types of specimens has been
used according their availability.
1) SCH40 Long Radius Bend.
2) SCH40 Short Radius Bend.
3) SCH80 Short Radius Bend
In each section a straight pipe of six inch length has been attached
at the both side of the bend section.
The standard parameters and chemical composition of
the pipe is given in the table 3.1 and 3.2 which is taken from
ASME B36.10 and ASTM A106 Grade B catalogue.
0.29 to 1.06
Phosphorous(max)
0.025
Sulfur(max)
0.025
Silicon(min)
0.10
0.30
Manganese
IV
EXPERIMENTATION SETUP
`
The diagrammatical model of the experimentation setup
is shown in figure 4.1 for testing the elbow under in-plane
bending mode. One end of the pipe end is clamped at the ground
and other end is kept free for applying the in-plane moment load.
A long rod is attached at the end of the free end for applying the
in-plane load easily. The length of the straight pipe EB and GH is
equal to six times the diameter of the bend section. In-plane
bending mode can be created when the load applied in vertical
direction on the beam BA. When the load applied in vertically
upward direction, the bend section is subjected to in-plane
opening mode and vertically downward direction, the bend
section is subjected to in-plane closing mode. And out-of-plane
bending mode is created by applying the load in horizontal
direction on the beam. Spring balance and load cell is used to
measure the magnitude of the applying load which is placed at the
free end of the rod. Dial gauges are used to measure the deflection
in the bend section by fixing it in the intrados, crown and extrados
regions. The maximum elastic bending moment that can be
applied in the test specimen is calculated by using the formula
given below which is taken from ASME BPVC, Section III is
shown
in
the
equation
4.1.
-------- (2.3)
Where,
D max
=Maximum Outside Diameter of the Bend (mm).
D min
=Minimum Outside Diameter of the Bend (mm).
D nom
=Nominal Outside Diameter of the Bend (mm).
Pipe Standard
Carbon(max)
------ (4.1)
Where,
z
65
Section Modulus.
www.iaetsd.in
FRONT VIEW
SIDE VIEW
SIDE VIEW
FRONT VIEW
TOP VIEW
Figure 4.2 CREO Elements Model
TOP VIEW
66
www.iaetsd.in
V.I
ANALYSIS RESULTS
67
www.iaetsd.in
Schedule
No
Number
40-Long
Radius
40-Short
Radius
80-Short
Radius
Percentage change
in Ovality
Zero
Intrados
Crown
Extrados
Region
Region
Region
1.69
0.92
1.48
4.310
3.070
0.74
0.151
0.62
1.417
0.299
0.75
0.258
0.99
3.333
1.856
Load
(kg)
Maximum
Load (kg)
EXPERIMENTAL RESULTS
Percentage change
in Ovality
Schedule
Number
40-Long
Radius
40-Short
Radius
80-Short
Radius
Zero
Intrados
Crown
Extrados
Region
Region
Region
0.79
0.56
0.74
4.32
2.09
0.54
0.05
0.35
0.35
0.299
0.65
0.154
0.59
0.59
1.57
Load
(kg)
Maximum
Load (kg)
68
www.iaetsd.in
CONCLUSIONS
VIII
REFERNCES
69
www.iaetsd.in
A REVIEW ON PERFORMANCE ANALYSIS OF MIMOOFDM SYSTEM BASED ON DWT AND FFT SYSTEMS
1
I.Suneetha,
N.Pushpalatha
M.Tech(DECS) Student,
I. INTRODUCTION
The number of increased users in the wireless
mobile communication system is needed to provide a high
QOS (Quality of Service) and to provide High-data-rates.
High-data-rates can be achieved by increasing the
Spectrum efficiency. The goal of the future communication
network is to be implemented to provide a high data rates
and service would be high speed internet access, video
communication videophones etc. The barrier of any
communication system is the transmission losses of the
propagation signal from transmitter to the receiver end in
number of different paths said to be multipath propagation
of signal. The multipath propagation of signals will
undergone to various types of Fading which leads to
change of the transmitted signal with respect to its pace,
amplitude, frequency leads to decay of signal strength at
receiver side. The multipath propagation loss occurs in both
Time domains as well as in the Frequency domain.
The invention of Orthogonal Frequency Division
Multiplexing (OFDM) becomes a popular technique for
effective transmission mitigate of the signal in multipath.
OFDM in a wireless communication channels transmits
very extraordinary speed of data rates without limiting the
channel capacity in an allocated Frequency. The OFDM
has a number of advantages, reduction of Impulse
Response over the channel, high Spectral efficiency and
robustness against the Inter Symbol Interference (ISI), Inter
Carrier Interference (ICI). The goal of the any
70
www.iaetsd.in
II. OVERVIEW
2.1 MIMO-OFDM SYSTEM:
In order to increased demand of the wireless
system it is necessitate to establish the efficient use of
radio
spectrum, which is done by placing of the
Modulation Carriers closely as possible as without
occurring of the Inter Symbol Interference (ISI) and
capability of carrying ability of many bits as possible. For
the transmission of higher Data-rates the short symbol
period should be used. The symbol period is T is always
inverse to the base band data rate R (R=1/T), as symbol
period T should be small if transmitting Data- rates are to
be high. However a shorter symbol period increases the ISI
(Inter Symbol Interference), by using of the OFDM which
address the unique Modulation and Multiplexing technique
to overcome it.
The MIMO (Multiple-input Multiple-output)
communication system is implementation of array of
antennas at the transmission and at the receiver side in
Wireless Communication System. The MIMO systems are
invented in the middle of 1980 by Jack Winters and Jack
Saltzs of Bell Laboratories. The MIMO systems provide
the enhanced system performance under the same
transmission capability of Single-input Single-output
system. The MIMO-OFDM system has a capability of
transmitting higher Data-rate to the user with no ISI (Inter
Symbol Interference) and no ICI (Inter Carrier
Modulation).
MIMO systems are used in the various possible
applications of digital televisions, wireless local area
networks,
metropolitan
networks
and
mobile
communications due to its great channel capacity which is
in proportional to the total number of transmitter and
receivers.
( )=
( )
=0
(1)
( )
=0
(2)
71
www.iaetsd.in
( )
=0
(3)
( )
72
=0
(4)
www.iaetsd.in
Eb/N0
FFT
HAAR
DB4
BIOR
0.5004
0.4148
0.501
0.5052
0.5003
0.3777
0.5005
0.5039
0.5003
0.3481
0.4998
0.5005
10
0.4998
0.2486
0.4996
0.4992
20
0.4998
0.0117
0.4995
0.4992
50
0.4996
0.4995
0.4991
100
0.4996
0.4995
0.4989
Eb/N0
FFT
HAAR
DB4
BIOR
0.7493
0.6506
0.7591
0.7584
0.7493
0.6088
0.753
0.757
0.7493
0.571
0.7563
0.7566
10
0.7493
0.4277
0.7541
0.7574
20
0.7495
0.0245
0.7519
0.7567
50
0.7497
0.7495
0.7545
100
0.7496
0.7479
0.7511
-2
1( ) =
( ) (2 )
-1
(5)
2( ) =
( )(2 )
(6)
t =(2t-n)h(n).
(8)
73
www.iaetsd.in
The analysis side the samples are down sampled by two ,at
synthesis side the samples are up samples by the factor 2
and then filtering the Low and High pass coefficients at K
levels and then adding the 2 this gives the low pass
coefficients at the (K-1) levels are described in the Fig.6.
(9)
(t)= (2t-n)g(n)
(10)
Fig4. The
decomposition
tree
structure
of
the
wavelet
Fig7. Performance of FFT-OFDM with DWT-OFDM in
Flat Fading Rayleigh channels.
IV.PROPOSED DWT MMO-OFDM SYSTEM
The proposed DWT MIMO-OFDM system has a lot
of advantages over the FFT based MIMO-OFDM system.
DWT based system constructed with the Haar mother
transform reduces number of multiple antennas than the
consequences of required number of antennas, which
perfectly suits for the arena of 3GPP network. The DWT
based MIMO-OFDM with modified Haar transform
converts the matrix into Circulant matrix form and
simulation can be don easily and as well as it performs the
Interleaving operation produce efficient result . Unlike the
FFT based MIMO-OFDM the DWT based MIMO-OFDM
particularly using the Haar mother wavelet transformation
is conceptually simple, provides the great Orthogonal
properties and it has a absolute Symmetric property, the
DWT based MIMO-OFDM oversample the signal into
different resolutions as well as oversamples the signal in
both Time domain and as well as in Frequency domain. By
using the sub band coding in DWT uses Haar
transformation can reconstruct the samples accurately. The
performance measure can be done by using the
implementation of BER to the transmission capability. The
DWT based MIMO-OFDM can be suitable for all
applications of the next generation wireless systems and it
has a capability of delivering a high speed packet access
(HSPA) capabilities. The representation of the
DWT
based transceiver of MIMO-OFDM is constructed below.
74
www.iaetsd.in
References:
[1] Introduction to Space-Time Wireless Communications,
Cambridge, UK: Cambridge Univ. Press, 2003. By A.J.
Paulraj, R.U.Nabar, and D. A. Gore
[2] G. J. Foschini, Layered space -time architecture in
fading environment for wireless communication when
using multi-element antennas, Bell Labs Tech. J., pp. 41
59, Autumn 1996.
[3] G. G. Raleigh and J. M. Cioffi, Spatio-temporal coding
for wireless communication system, IEEE Trans.
Communications., vol. 46, pp. 357366, Mar. 1998.
[4] MCM(Multi carrier modulation for data transmission
in wireless communication: An idea whose time has come,
IEEE Communication Magazine, vol. 28, no. 5 by J. A. C
Bingam.
VI. CONCLUSION
75
www.iaetsd.in
Abstract:
In this paper the novel method of complex
weighting for peak to average power (PAPR)
reduction of OFDM is addressed. The Study of
various effects on peak to average power
reduction using OFDM on this paper. The
simulation result are studied about the
combination of both different
amplitude
weighting factors including rectangular ,
Bartlett , Gaussian , raised cosine , Half-sin ,
Shannon , and sub carrier masking with
phasing of each OFDM Subcarrier using
random phase updating algorithm. By using
the amplitude weighting factor Bit error
performance
of
weighted
multicarrier
transmission over a multipath channel is also
investigated. In the random phase updating
algorithm the phase of each carrier is updated
by a random increment until the PAPR goes
below a certain threshold level. Further the
random phase updating algorithm has been
extended by dynamically reducing the
threshold level. For an OFDM system with 322
subcarriers and by Gaussian weighting
combined with random phase updating, a
PAPR reduction gain of 3.2 dB can be
reduced. Result show that grouping of
amplitudes weights and phase reduce the
hardware complexity while not much
impacting the PAPR reduction gain of the
method. Even further dynamic threshold gives
the best results and can reduce the mean
power variance of 8-carrier OFDM signal with
BPSK modulation by a factor of 7 dB.
1. Introduction:
Orthogonal frequency division multiplexing
(OFDM) is a parallel transmission method where
the input data is divided into several parallel
information sequences. And each sequence
modulates a subcarrier. OFDM signal has a non
constant envelope characteristic since modulated
signal form orthogonal subcarriers are summed.
76
www.iaetsd.in
2.1.2.
Weighted
modulation:
()
)
(2)
multicarrier
m=0,1,2,M-1
(1)
77
www.iaetsd.in
( ) = | ( )|
0
(3)
Bartlett: This weighting function has simply
a triangular shape for 0 1
1
, =
0
(10)
( )
[ ( )]
=
weighting
function
| |
|
[
(12)
The symbols on different carriers are
assumed to be independent i.e., therefore,
the second term in (13) is zero and
accordingly, by using (9) the average power
becomes
(6)
is
(7)
0
Shannon: The shape of this weighting
factors is the sinc function i.e., sinc(x) = (sin
(x)/ (x))
, =
sin
[ ( )] =
| =1
(13)
The variation of the instantaneous power of
OFDM signal from the average is
( ) = ( ) [ ( )]
(8)
0
(11)
Averaging the power P (t) yields E [P (t)]
if 0mM-1
Half-sin: This
explained by
(5)
0
Where s= spread or standard deviation of the
weighting factors around M/2
Raised cosine: The shape of this function in
the interval [0,M-1] is described by 1cos(2m/M)
, =
, =
, =
(4)
(14)
Averaging of ( ) over a symbol period
of T yields
( )=
()
( )
( )|
(15)
Where R cc (i) is the autocorrelation function
of the complex sequence cm=bm. m
(9)
For the calculation of PAPR first by using
(10) we obtain the instantaneous power of
OFDM signal as
()=
(16)
78
www.iaetsd.in
{ ( )}
{ (
= max{ ( )} =
)}
(17)
=
=
( 1/ 2
( 1)
2
(18)
Using (18) and (19) it can be easily shown
that PAPR has the following relationship
with the power variance
( )=
( )=
( )=
(21)
Where T is the OFDM symbol duration, bm is the
symbol of the m-th sub channel, which is 1 for
the BPSK modulation and
(1 )/2 for
QPSK modulation and M is the number of
carriers. The power of s(t) is
( )|
(24)
Where 2m is the m-th subcarrier phase
shift. Adding random phases to each
subcarrier will change the power variance of
OFDM Signal. In the random phase updating
algorithm, the phase of each subcarrier is
updated by a random increment as:
( ) = ( ) + ( )
(25)
Where i is the iteration index and
is
the phase increment of the m-th subcarrier at
ith iteration. Assume the initial phase is zero,
consequently a random phase increment is
generated and the phase is updated by adding
the increment to the phase of that subcarrier.
Flow chart of the algorithm for this iterative
phase updating is shown in figure. Figure 8a
a certain threshold for PV is set and for figure
8b a limited number of iterations is allowed.
Two distributions are Gaussian and uniform
where
the
uniform
distribution chosen for the distribution of
phase increments. A connection between
phase shift variance and the number of
iteration
2.2.1. Description
( ) = | ( )| =
(20)
2.2.3.
RANDOM
PHASE
UPDATING ALGORITHM
(19)
( ( ) )
(23)
Where Rbb (i) is the autocorrelation function
of
the
sequence
bm
as
()=
]
) exp
(22)
The PAPR of the OFDM signal is written as
PAPR=Max {P(t)}/Mean{p(t)}. The variation of
the instantaneous power of OFDM signal from
79
www.iaetsd.in
s
reaching the threshold. Fig.2. Flow chart
showing the iterative random phase updating
algorithm. A) With threshold. B) With limited
number of iterations.
( )=
(26)
Where M is number of subcarriers, BM is
modulation data of the m-th subcarrier, T is
the OFDM symbol
period, and wm is a
complex factor defined as
=
Where a positive real value and m m is the
phase of m-th subcarrier. The block diagram
of an OFDM modulator with complex
eighting factors is shown in fig
and receiver.
with
80
www.iaetsd.in
4.0. Conclusion:
In this paper we have addressed the novel
method of PAPR reduction for OFDM signal
by applying both amplitude weighting and
phasing of OFDM subcarriers. This joint
application gives more PAPR reduction gain
than only weighting or phasing. Employing
both weighting and phasing to subcarriers
implies more complex implementation.
However, the complexity can be reduced by
grouping of the subcarriers when weighting
or phasing is applied. Furthermore, the
complex weighting with dynamic threshold
was
studied.
Combining
amplitude
weighting, phasing and dynamic thresholding
will result in a larger PAPR reduction gain of
the proposed algorithm.
References:
[1] T.A.Wilkinson et al," Block coding
scheme for Reduction of peak to mean
envelope power ratio of Multicarrier
81
www.iaetsd.in
IEEE
Trans.
82
www.iaetsd.in
ABSTRACT :
A green building, which is also known as a sustainable
building is designed to meet some objectives such as occupant
health; using energy, water, and other resources more efficiently;
and reducing the overall impact to the environment. It is an
opportunity to use the resources efficiently while creating
healthier buildings that improve human health, build a better
environment, and provide cost savings. All the development
projects lead to over-consumption of natural resources. This leads
to serious environmental problems. Green building concept deals
with the optimum use of natural resources for the development of
infrastructure. The low cost eco-friendly house is the modern
construction method which uses locally available material and
unskilled labor and also reduces the construction time. Similarly,
use of recycled plastic, recycled aggregates and municipal wastes
for the construction of pavement has considerable effect on the
environment of earth. Another advanced method is the
construction of low carbon building which uses sustainable
materials like blended cement, compacted fly ash blocks, low
energy intensity floor and roofing system, rammed earth walls and
stabilized mud blocks etc. This ultimately results in reduction of
green house gases which will help to reduce green house effect.
This paper presents an overview of application of modern green
infrastructure construction technology which makes a significant
impact on conservation/proper utilization of resources like land,
water, energy, air, material etc thereby reducing the overall cost
of construction as well as adverse impacts of climate change .
KEYWORDS :
Sustainable building, eco-friendly house, low carbon building,
green house effect . optimum use
INTROUCTION :
In todays world of climate change and high energy
prices, it is critical that buildings use
as few fossil fuels as possible to future proof the home against
unpredictable and rapidly rising prices. There are many definitions
of what a green building is or does. Definitions may range from a
building that is not as bad as the average building in terms of its
impact
on the environment or one that is notably better
than the average building, to one that may even represent a
regenerative process where there is actually an improvement and
restoration of the site and its surrounding environment. The ideal
green project preserves and restores habitat that is vital for
sustaining life and becomes a net producer and exporter of
resources, materials, energy and water rather than being a net
consumer.A green building is one whose construction and lifetime
of operation assure the healthiest possible environment while
representing the most efficient and least disruptive use of land
water, energy and resources.
SETTING GREEN GOALS AND OBJECTIVES
Once the decision to build green has been made, one of
the first steps in the green design process is to establish firm
environmental goals for the project. This is often done during
83
www.iaetsd.in
ECONOMICAL BENEFITS :
Reduce operating costs
Create, expand, and shape markets for green product and
services
Improve occupant productivity
Optimize life-cycle economic performance
MERITS OF GREENBUILDING :
Efficient Technologies
Easier Maintenance
Return On Investment
Improved Indoor Air Quality
Energy Efficiency
Waste Reduction
Temperature Moderation
Water Conservation
Economical Construction For Poor
Healthier Lifestyles and Recreation
Improved Health
DEMERITS OF GREEN BUILDING :
Initial Cost Is High
Availability Of Materials
Need More Time To Construct
Need Skiled Worker
CONCLUSION
Nowadays, we should make a way to maximize our natural
resources and also help our mother earth to get some relief since
pollution is everywhere plus the global warming that we are all
experiencing. Non-renewable energy is expensive and unsafe but
did you know that through green building we can save a lot of
energy.Before that, let's define first the meaning of green building
(know also as green construction is the practice of creating
structures and using processes that are environmentally
responsible and resource-efficient throughout a building's lifecycle: from siting to design, construction, operation, maintenance,
renovation, and deconstruction.The importance of this is it lessen
the consume of energy and the pollution as well because the more
we use nonrenewable energy the higher the risk of pollution.
84
www.iaetsd.in
REFERENCES:
1. K.Ghavami Bamboo as reinforcement in structural concrete
elements Lightweight Concrete Beams, Pontificia Universidade
Catolica, Rio deJaneiro, Brazil (2003).
2. V.R. Desai, Green infrastructure: overview and case study,
IIT Kharagpur, 2010.
3. B.B.Pandey, Green technology for road constructio,
Workshop on green infrastructure at 2010.
4. Sherwood,P.T.(2001), Alternate materials in road
construction, Thomas Telford.
5. Heerwagen J. Green buildings, organizational success and
occupant productivity. Building Research & Information
2000;28(5/6):35367.
6. Ajdukiewicz A B, kliszczewicz A T. (2007). Comparative
tests of beams and columns made of recycled aggregate concrete
and natural aggregate concrete. Journal of Advanced Concrete
Technology, 5(2): 259-273.
7. Rao A, Jha K N, Misra S. (2007). Use of aggregates from
recycled construction and demolition waste in concrete.
Resources, Conservation and Recycling. 50(1): 71-81.
8. Charles J. Kibert, Sustainable construction: green building
design and delivery, Book.
9. Jerry Yudelson, S. Richard Fedrizzi, The green building
revolution, by U.S. Green Building Council.
.http://www.greenconcepts.com/ |
85
www.iaetsd.in
N.S.Bharath Kumar.
Sreenivasan.B,
A.Rajani
Assistant professor
Assistant professor
Department of ECE,AITS
Annamacharya Institute of Technology and Sciences,Tirupati,India-517520
1
nsnandi1990@gmail.com
2
srinu3215@gmail.com
3
rajanirevanth446@gmail.com
I.INTRODUCTION
The Document Image Binarization technique is
applied at the starting stage of document analysis process.
Binarization refers to the process of converting the gray
scale image into a binary image. Binarization Technique
segments the image pixels into two fields namely white
pixels as foreground text and black as the background
surface of the document. A fast and accurate Image
Binarization technique was chosen in order to accomplish
the document analysis task such as Optical Character
Recognition (OCR).As more and more degraded
documents are digitized, the importance of such document
Image Binarization also increases accordingly.
Thresholding of degraded document images is an
unsolved problem due to high and little variations between
86
www.iaetsd.in
Where
C (I , J)=Local image contrast.
The local image contrast evaluated by local maximum
and minimum is shown below
C (I, J) =
( , )
( ,)
(1)
( ,)
( ,)
(2)
Where
87
www.iaetsd.in
(4)
3.2.2. Pre-processing:
Pre-processing is essential in order to remove the
noise present in the gray scale source image, to smooth the
background texture. Weiner filter is used to remove the
noise and to increase the contrast between the text and
background. The main purpose of the Weiner filter used in
the filtering technique is for image restoration. The source
image I sis transformed into grayscale image according to
the below formula.
{1
Ne N minimum&&
I(x, y) E mean+
0
(3)
Other-wise.
E mean=
( , )(
(5)
( , ))
E standard = (( ( , )
) 1 ( , ) )2/2.
3.2.1. Description:
88
www.iaetsd.in
(b): Histogram.
The average distance DAverage between foreground and
background can be calculated as follows
DAverage=
{I(x, y)
( ( , )(1 ( , ) ))
(6)
0,
(9)
If N(x, y)=1.
T(x, y) = {1,
(8)
(1 ( ( , ))
( , ))
( , )
If N(x, y) = 0.
( ( , )
}
(7)
Histogram for a document image is shown below with
two peaks, one for text and another one for background
region.
89
www.iaetsd.in
V.SIMULATION RESULTS
90
www.iaetsd.in
SEARL EFFECT
(By John Roy Robert Searl )
Abstract
Searl Effect Generator:
The Searl Effect Generator is actually a converter of Electrons into usable
Electricity. The working and construction is given below
Introduction:
The solution to the world's energy crisis might be found in a magnetic device that
utilizes both ambient temperature and magnets to generate power. In theory, the "Searl Effect Generator" (SEG)
has the potential to run completely on its own through a complex interaction between various materials,
resulting in an unlimited supply of free and clean energy.
Discovered by John Roy Robert Searl in 1946, the "Searl Effect", as it is called, effectively captures the kinetic
energy generated by natural changes in ambient temperature, and uses it to create electricity. The technology
works based on a precise design that utilizes the unique characteristics of various materials to create continual
motion. These materials include magnets, neodymium, Teflon and copper.
When joined together in just the right way, these materials are capable of perpetuating a cycle of electron
movement that is virtually infinite, which gives the device the potential to create more power than it uses to
power itself. In other words, if successful, the SEG could one day replace our dependence on fossil fuels as a
primary and superior energy source.
So how does the device work exactly?
The SEG is composed of a series of circular cylinders, all of which have small magnetic rotors spaced evenly
around them one of the neat things about Searl technology is that it is scalable, meaning it can be designed in
varying sizes for different applications. According to the company, SEG sizes range from a one meter in
diameter machine capable of power an average house, to a 12 meter in diameter machine that could power an
entire city. The team says machines even larger than 12 meters are possible as well.
There has been a great interest in examining non-linear effects in the system of rotating magnetic fields. Such
effects have been observed in the device called Searl generator or Searl Effect Generator (SEG. A SEG
consists of a series of three concentric rings and rollers that circulate around the rings. All parts of SEG are
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
91
www.iaetsd.in
based on the Law of the Squares. The rollers revolve around the concentric rings, but they do not touch
them. There's a primary north-pole and primary south pole on the rollers and a primary north-pole and primary
south-pole on the concentric rings. Obviously, the north-pole of the roller is attracted to the south-pole of the
concentric rings and vice versa.
The rollers have a layered structure similar to the concentric rings. The external layer is titanium then iron,
Teflon and the last internal layer was made from neodymium. John R.R. Searl has supposed that electrons
are given off from the central element (neodymium) and travel out through other elements. Dr. Searl
contends that if nylon had not been used, the SEG would act like a laser and one pulse would go out and it
would stop, build up, and another pulse would go out. The nylon acts as a control gate that yields an even
flow of electrons throughout the SEG.
it was shown that in the process of magnetization of the plate and rollers, the combination of constant and
variable magnetic fields for creating a special wave (sine wave) pattern on a plate surface and rollers
surface was used. The basic effects consist of the rollers self-running around the ring plate with a concurrent
reduction of weight and an increasing occurrence of propulsion. These effects come about because of a
special geometry of experimental setup. It was shown that the operation of the device in the critical
regime is accompanied by biological and real physical phenomena.
92
www.iaetsd.in
Fig.1. Variant of one-ring converter. / Fig.2. Sprocket effect of magnetic stator and roller inserts.
The ratio of parameters of the stator 1 and the rotor 2 in Fig.2 is chosen so that the relation of stator diameter D to
the roller diameter d is an integer equal to or greater than 12. Choosing such ratio allowed us to achieve a
"magnetic spin wave resonant mode" between elements of a working body of the device since the
circumferences also maintained the same integer ratio.
The elements of magnetic system were assembled in a uniform design on an aluminum platform. In Fig. 3 the
general view of the platform with the one-ring converter is displayed. This platform was supplied with springs
and shock absorbers with limited ability to move vertically on three supports. The system has a maximum value of
displacement of about 10 mm and was measured by the induction displacement meter. Thus, the instantaneous
change of the platform weight was defined during the experiment in real time. Gross weight of the platform
with magnetic system in the initial condition was 350 kg.
The stator was mounted motionlessly, and the rollers were assembled on a mobile common separator also
regarded as the rotor, connected with the basic shaft of the device. The rotary moment was transferred
through this shaft. The base of the shaft was connected through a friction clutch to a starting motor, which
accelerated the converter up to a mode of self-sustained rotation. The electrodynamics generator was
connected to the basic shaft as a main loading of the converter. Adjacent to the rotor, electromagnetic inductor
with open cores were located.
93
www.iaetsd.in
94
www.iaetsd.in
95
www.iaetsd.in
3. Experimental results
The magnetic-gravity converter was built in a laboratory room on three concrete supports at a ground level. The
ceiling height the lab room was 3-meters, the common working area of the laboratory was about 100 sq. meters.
Besides the presence of the iron-concrete ceiling, in the immediate proximity from the magnetic system there was a
generator and electric motor, which contained some tens of kilograms of iron and could potentially deform the
field's pattern.
The device was initially started by the electric motor that accelerated the rotation of the rotor. The revolutions
were smoothly increased up to the moment the ammeter included in a circuit of the electric motor started to show
zero or a negative value of consumed current. The negative value indicated a presence of back current. This back
current was detected at approximately 550 rpm. The displacement meter, 14, starts to detect the change in
weight of the whole installation at 200 rpm. Afterwards, the electric motor is completely disconnected by the
electromagnetic clutch and the ordinary electrodynamics generator is connected to the switchable resistive load.
The rotor of the converter continues to self-accelerate and approach the critical mode of 550 rpm where the
weight of the device quickly changes.
96
www.iaetsd.in
INTERNATIONAL
CONFERENCE
ON CURRENT
IN ENGINEERING
RESEARCH,
ICCTER
- 2014 ring electrodes
The
net weight Gn
of the platform
can be TRENDS
controlled
by applying high
voltage to
polarization
located at a distance of 10 mm from external surfaces of the rollers. Under the high
20Kv (electrodes having negative polarity) the increase of tapped power of the basic generator to more than 6
kW does not influence G if the rotation speed is kept above 400 rpm. "Tightening" of this effect is observed
as well as the effect of hysteresis on G (a kind of "residual induction"). The experimental diagrams given
on Fig.4 illustrate the +G and G modes of the converter operations vs. rotor rpm.
4. Discussion
All the results we obtained are extremely unusual and require some theoretical explanation. Unfortunately, the
interpretation of results within the framework of the conventional physical theory cannot explain all the observed
phenomena besides the change of weight. It is possible to interpret the change of weight either as a local change
of gravitational force or as an antigravity force repelling its own field. Direct experiment, confirming the presence
of a draft force was not performed, but in any case both interpretations of the weight change do not correspond to
the modern physics paradigm. A reconsideration of the standard theory of gravitation is possible if we take into
consideration space-time curvature. For example, the Kerr metric usually represents the field exterior to an axially
symmetric rotating body and distinguishes between positive and negative spin directions as well as forward and
backward time directions. An examination of the physical vacuum as a source of these phenomena may also
lend itself to better interpretation since the Maxwell stress-energy tensor in the vicinity of the converter
undergoes a complex evolution.
From the modern physics position, electrification and luminescence of the converter's magnetic system in the near
zone is not completely clear. The phenomenon of the magnetic and thermal "walls" may be connected with
Alphen's magnetic-sound waves raised in near zone in magnetized plasma induced by a variable magnetic field
of a rotating rotor. The energy exchange between ambient air molecules and the converter may be occurring.
At the present time we can not give an exact description of the interactions mechanism and transformation of
energy, but without a relativistic we are completely unable to give a physically substantial theory of these
phenomena
In conclusion, we emphasize that issues of the biological influence effects and especially of the variations of real
time stream effects, which must be taking place in an operative zone of the converter, were not considered at all.
These issues are extremely important and absolutely unexplored; though there are some mentions of J.R.R.Searl
about healing action of the SEG's radiation. Our own experience allows us to make only cautious assumption
that the short-term stay (dozen minutes) in a working zone of the converter with the fixed output power of 6
kW remains without observed consequences for those exposed. The present paper is only a beginning.
References
1. Schneider, Koeppl, & Ehlers. ( Beginning with John R.R.Searl) Raum and Ziet, #39,
1989, pg. 75-80.
2. Sandberg, Von S. Gunnar. Raum und Ziet, #40, 1989
3. Schneider & Watt. (The Searl effect a n d it s w o r k i n g ) Raum and Ziet, # 42, 1989, pg.7581; #43, pg.73-77.
.
97
www.iaetsd.in
98
www.iaetsd.in
V.Sundara moorthy
smsubasantosh@gmail.com
3rd Year EEE Department
Panimalar Engineering College, Chennai
G.Surendiran
Surendiran888@gmail.com
3rd Year EEE Department
Panimalar Engineering College, Chennai
Abstract
3. Problems
1. Statistics
In the city of Chennai alone, 47 lakh people use
the services of the MTC on a daily basis,
A total of 21,989 buses are currently being
operated in the State. Around 1.82 crore
commuters use the service on a daily basis. So
this is a must to make their travel easy.
99
www.iaetsd.in
4. Existing App
filled ride at night. The mock-up is shown
below in figure 1.
100
www.iaetsd.in
101
www.iaetsd.in
102
www.iaetsd.in
13.Future
14. Conclusion
This app will give the exact location of buses at
various position,says no of seats available and
your current location by tower signal. This app
will modernized transport system. Private buses
or private companies having their own transport
may implement this easily. Around 1.82 crore
commuters use the service on a daily basis. So
this is a must to make their travel easy. This
15. References
[1] "Android Code Analysis". Retrieved June 6,
2012.
[2] Claburn, Thomas (March 4, 2009).
[3] "Court Asked To Disallow Warrantless GPS
Tracking". Information Week. Retrieved 200903-18.
[4] "Traccar Client - free open source Android
tracker". Retrieved 2012-08-15.
[5] "Widgets | Android
Developers". Developer.android.com. Retrieved
2012-09-15.
[6] Saylor, Michael (2012). The Mobile Wave:
How Mobile Intelligence Will Change
Everything. Perseus Books/Vanguard Press.
p. 304. ISBN 978-1593157203.
[7] "Ticket-in, Ticket-out Technology".
Retrieved January 22, 2014.
103
www.iaetsd.in
TECHNO-HOSPITAL
(Android App Development)
Sanjay. T
Preethika. R
Technical Feasibility
To develop this application, a high speed internet
connection, a cloud database server, a web server and IDE
(such as Eclipse) are required.
Social Feasibility
The application is socially feasible since it requires no
technical guidance, all the modules are user friendly and
execute in a manner they were designed to.
I. INTRODUCTION
Our idea belongs to the category Internet of things to
deliver Public Services for the future. Todays world is highly
connected through internet and this can help people widely. It
describes a future where everyday physical objects will be
connected to the Internet and be able to identify themselves to
other devices. However, efficient implementation of Internet of
things does lead to a higher citizen satisfaction.
Pentium 4
256 MB
Minimum 250MB
B. SOFTWARE REQUIREMENTS
Operating system: Windows XP / Mac OS 10.5.8 or
later/Linux
Platform
: Android SDK Framework
IDE
: Eclipse (Juno)
Android
: SDK Version 2.2 or Higher
Emulator
Database
: MySQL
Technologies
: Java, Xml
Front End
: Eclipse
Back End
: SQLite, Cloud SQL server
Data analytics for handling huge data.
ECONOMIC FEASIBILITY
Economic analysis is the most frequently used method for
evaluating the effectiveness of a new system. The project is
economically feasible as it only requires a mobile phone with
Android operating system. The application is free to download
once released into Android market. The users should be able
104
www.iaetsd.in
ii)
VI. SOLUTION
1) Each person will be provided a login where a database
that maintains the persons entire medical details(his
prescriptions , scan reports and surgeries undergone ) with
date , names of hospitals and doctors served is maintained.
X. VALUE PROPOSTION
XII. CONCLUSION
3) Consider an app which allows you to select the place and
hospital you want and immediately the app tells the token
number of the patient who currently undertakes treatment
.So that the patient can estimate the time at which he should
be at the hospital for getting treatment. Thus the waste of time
can be reduced.
.
Thus, this idea can be implemented to help people
maintain their medical records safe, take proper treatment, save
lives just by a user friendly android app.
105
www.iaetsd.in
REFERENCES
[1] Zigurd Mednieks, Laird Dornin, G. Blake Meike, and
Masumi Nakamura,Programming Android, Second
Edition 2009.
[2] Diego Torres Milano , Android Application Testing
Guide, Packt Publishing, 2011
[3] Wallace Jackson, Learn Android App development,
Third Edition, 2010.
[4] http://developer.android.com/guide/topics/resources/provid
ing-resources.html
[5] Android SDK | Android Developers
http://developer.android.com/sdk/index.html
106
www.iaetsd.in
PREPARATION OF W.P.S FOR STAINLESS STEEL (Ni, Cr, Mo, Nu) WELDING
W.r.t MECHANICAL & THERMAL PROPERTIES
M.VALLIAPPAN
ASSISTANT PROFESSOR
M.KUMARASAMY COLEGE OF ENGINEERING
KARUR
TAMILNADU 639 113
II. SS MATERIALS
In this paper we are going to weld the 321(Plate) of 5.6mm
thick, by TIG and ARC similarly 316(Seamless Tube) of
60.3mm, 6mm thick, 347 (Seamless Tube) of 60.3mm, and
5mm thick by TIG and ARC. Welding is carried out by
preparation of WPS under the Properties of the material. The
main Purpose of the choosing the TIG and ARC welding is
based on the material thickness apart from this TIG gives
Higher Accuracy and ARC gives in vice versa. The main
purpose of choosing Nb,Mo,Ti in Ni alloy combination is
because SS 347 contains Nb which has high Creep Strength,
where SS 316 consists of Mo, it has Fatigue strength, and 321
contains Ti which has high Ductility.
I. INTRODUCTION
This paper deals with the preparation of Welding procedure
specification for SS welding by optimizing the existing WPS
method with respect to mechanical and thermal properties. It
also aims to reduce the creep, fatigue, Residual stress and
thermal stresses in the Boiler materials by the application of
stainless steel material and welding it.
Stainless steels are weldable materials and a welded joint can
provide optimum corrosion resistance, strength and fabrication
economy. However it may undergo certain changes during
welding it is necessary to take care of welding to minimize the
defects and to maintain the same strength and resistance in the
weld zone that is an inherent part of base metal. Seamless
Tubes of 316 and 347 and 321 plate materials having
improved austenite stability. The stability of the austenite in
CrNi and CrNiMo steels is achieved by increasing the nickel
content over that of standard 18/8 CrNi and 18/8/2 CrNiMo
steels, and more especially by additions of nitrogen, which is
particularly effective in promoting the austenite stability.
The project starts with micro testing and chemical analysis of
materials and preparation of WPS based on thermal and
mechanical properties. Finally calculating the strength of
material and to replace the current boiler materials in to
improved SS materials. In welding by controlling the
parameters of thermal property mechanical deviations are
reduced and so weld with less defect could be obtained and
also the service life of material will be increased.
107
www.iaetsd.in
IV.A.TIG
Polarity
Composition
Color Code
Inert Gas
V.B.ARC
V.B.1. BASE METAL
Position
Edge preparation
Root Gap
Cleaning
Preheating Conditions:
For S.S chromium and nickel equivalent is very
important and for other alloys carbon equivalent.
For Stainless Steel:
Chromium Equivalent = %Cr+%Mo+%1.5%Si+0.5%Nb
Nickel Equivalent = %Ni+30%C+0.5%Mn
V.B.2. ELECTRODE
Type
Diameter
Arc length
Coating
V.B.3. PROCESS
Polarity
Bead
Technique
Run
Speed
Pre heating
Post heating
Heat treatment
By optimizing the above mentioned parameters with
existing W.P.S the strength of a material could be increased.
VI.NEED OF WPS
Welding could be done without preparation of WPS, but
which may results in improper weld or with defects like weld
decay, knife line attack and stress corrosion cracking. To
avoid such cases WPS is followed in all industries .Sometimes
Improper welding will increase the strength due to this the life
time of materials may be changed.
To overcome those weld defects WPS is optimized, use
extra low carbon electrode, avoiding hylogen family
VII.WELDING PROCESS
Welding is carried out by following parameters based on
Polarity- Straight and Reverse
Position Down hand, Vertical, Horizontal and 1G, 2G, 5G
Process TIG and SMAW
Bead Stinger and weaving
Technique - Forehand and Backhand
Speed low and high
Edge preparation based on angle (more than 75)
Root gap - based on thickness
Diameter of electrode based on thermal conductivity
Arc length shorter, longer and correct
Run Longer, shorter, skipping, alternate skipping
Preheating based on thickness of material
108
www.iaetsd.in
REFERENCES
References:
1. Parmar.R.S. Welding Engineering and Technology,
Khanna publishers, Delhi. (1997is carried out by
following
2. Avanar Material science Engineering
3. Dr.Srinivasan Engineeering Materials
4. Peter Mayr , Stefan Mitsche, Horst Cerjak , Samuel
M.allen The impact of weld metal creep strength on
the overall creep strength of 9% Cr steel weldments ,
Journal of engineering materials and technology , vol.
133(2011) .
5. Nattaphon
TAMMASOPHAN
,
weerasak
HOMHRAJAI , Gobboon LOTHONGKUM Effect
of post weld heat treatment on microstructure and
hardness of TIG weldment between P22 and P91
steels With inconel 625 filler metal, Journal of
metals, materials and minerals , vol.21(2011) .
6. Samsiah Sulaiman Structure of properties of the heat
affected zone of P91 creep resistant steel, Research
work.
7. Greg j. Nakoneczny ,carl c schultz Life assessment of
high temperature headers, American power
conference(1995).
XII. CONCLUSION
The various SS material was welded by TIG and ARC and
finally the following test are carried out,
Hardness test
Impact test
Bend test
Tensile test, is carried out after welding to measure the strength
of 321, 316, 347 which are compared with the reading from
AWS, ASME and finally the suitable boiler material is
109
www.iaetsd.in
I. INTRODUCTION
Cracks can be broadly divided into two categories
namely solitary cracks and pattern cracks. Generally,
solitary crack is due to a positive overstressing of concrete
either due to load or shrinkage, the cause of which will
become apparent when the line of the crack is compared
with the layout of the portion of the concrete, its
reinforcement and the known stresses in it. Overload
cracks are fairly easily identified because they follow the
lines demonstrated in laboratory load test. A crack due to
setting and hardening shrinkage is formed in the first week
of life of the concrete. If length of concrete under
inspection is more than about 9m, it is not likely that there
is a solitary crack, usually there will be another one of a
similar type and the analysis of the second confirms the
finding from the first.
Regular pattern of cracks may occur in the surfacing of
concrete and in thin slabs. The term pattern cracking is
used to indicate that all the cracks visible have occurred
more or less at the same time.
II. TYPES OF CRACKS
Cracks can be divided into two types:-Solitary cracks
and pattern cracks
A. Solitary cracks ( Isolated cracks)
Generally, a solitary crack is due to a positive over
stressing of the concrete either due to load or shrinkage,
the cause of which will become apparent when the line of
110
www.iaetsd.in
111
www.iaetsd.in
straight line and are accessible at one end. The drilled hole
should preferably be 2 or 3 inches in diameter and flushed
to clean out the crack and permit better penetration of the
grout.
F. Blanketing
Blanketing is similar to routing and sealing, but is used
on a larger scale and is applicable for sealing active as well
as dormant cracks. The following are the principal types of
blanket joints
i. Type 1 Where an elastic sealant is used: The sealant
material is the one which returns to its original shape
when not under an externally induced stress, i.e., acts
elastically. The recessed configuration is used where
the joint is subjected to traffic or a pressure head. The
strip sealant is applicable where there are no traffic or
pressure problems and is somewhat less costly. The
first consideration in the selection of sealant materials
is the amount of movement anticipated and the
extremes of temperature at which such movement
occur. It should be capable of deforming the required
amount under applicable conditions of temperature.
The material should be able to take traffic, be resistant
to chemical spillage, be capable of being pigmented, if
desired.
ii. Type 2 Mastic filled joint: The sealant is a mastic
rather than a compound having elastic properties. This
type of joint is for use where the anticipated
movements are small and where trafficabilty or
appearances are not considerations. The advantage is
that the mastic is less costly than the elastic type of
sealant material.
iii. Type 3 A mortar plugged joint: Proper sealing to the
crack is provide against leakage using a temporary
mortar plug. The mortar plug provides the strength for
the joints. The plug resists the pressure on the joint by
arching the load to the sides of the chase. Where the
pressure acts on the face of the joint, static balance
requires the development of the tensile and shear
stresses between the plug and the sides of the slot.
Compression and shear are developed when the
pressure head is internal. Theoretically, the edges of
the chase should be undercut so that the mortar plug,
which dries more quickly and more thoroughly at the
surface, does not shrink differentially and so pull away
from the sides and bottom of the chase.
iv. Type 4 A crimped water bar: Mortar is required
where the junctions which bear traffic. A crimped
water stop joint sealant is not applicable for the use
where the crack is subject to a heavy pressure head
from inside the joint, or where movement occurs as a
shear along the length of the crack. In the first case, the
pressure would tend to bulge out the crimp, and in the
second case, the longitudinal movement would tend to
tear the stop. Accordingly, this type of joint is primarily
for use where the anticipated movements are limited
to a simple extension or contraction and where the
pressure head is either small or acts from the face of
the joint. However, while not specifically intended for
such applications, a rubber type or similar crimped joint
112
www.iaetsd.in
113
www.iaetsd.in
114
www.iaetsd.in
EMG
(Electromyography)
is
I. INTRODUCTION
and
rehabilitation.
control
Pattern
prosthetics
recognition
plays
in
an
biological
neuronal
systems
and
they
are
training
function
and
learning
115
www.iaetsd.in
than 100ms) for the comfort of the users [1], [2], [3],
Perceptron
functions
in
Feed
model
based
on
Feed
forward
Forward
II. .METHODOLOGY
A.
EMG
SIGNAL
ACQUISITION
AND
FEATURE EXTRACTION
EMG signals used in this study are acquired
from the muscles of the forearm namely Flexor
Carpi Ulnaris (FCU), Extensor Carpi Radialis
(ECR) and Extensor Digitorum (reference) for two
types of hand movements-finger flexion and wrist
up. FCU assists in wrist flexion with ulnar
deviation and ECR assists in extension and radial
further processing.
116
www.iaetsd.in
(LM),
Gradient descent
The
sample
input
vectors,
their
the
efficiencies
of
SCG
and
LM
EMG
signals. The
respectively..
Marquardt
The
best
performance
and
algorithm
gives
good
and
fast
providing
the
least
response
time
(fastest
less
convergence),
higher
classification
rate,
117
www.iaetsd.in
Input vectors
13 extracted features
from EMG
Target
vectors
Wrist up
Finger flexion
Output
vectors
Wrist up
Finger flexion
Sample 1
257.92
0.42987
0.32246
0.20606
643.08
1.0647
0.80911
67.429
89.086
0.14872
6.5714
67.571
116.29
1
Sample 2
318.26
0.53044
0.39805
0.28215
695.51
1.1527
0.88938
88
115.55
0.1929
9.1429
68
111.86
1
Sample 3
154.49
0.25749
0.19358
0.1467
425.03
0.70138
0.58973
26.857
46.511
0.077647
0.85714
73.857
108.86
0
0
0.7866
0.2339
0
0.9530
0.0411
1
0.3495
0.6390
118
www.iaetsd.in
BEST
PERFORMANCE
GDM
GD
LM
SCG
0.15275
0.14585
0.18598
0.14172
HIDDEN
NEURONS
10
0.27954
0.16829
0.0991680
0.13132
20
0.12168
0.1526
0.14919
0.17166
30
1000
1000
21
10
1000
968
20
20
1000
1000
27
30
EPOCH AT
WHICH BEST
PERFORMANCE
IS GOT
10
20
30
40
50
Correctly classified
76.7
80
81.3
81.3
81.3
Misclassified
23.3
20
18.7
18.7
18.7
BEST PERFORMANCE
0.17323
0.10074
0.22587
0.14376
0.13385
11
12
19
15
CLASSIFICATION
RATES
(PERCENTAGE)
HIDDEN NEURONS
10
20
30
40
50
Correctly classified
78.7
76
84
87.3
88
Misclassified
21.3
24
16
12.7
12
BEST PERFORMANCE
0.20428
0.22699
0.14131
0.30642
0.20215
10
CLASSIFICATION
RATES
(PERCENTAGE)
119
www.iaetsd.in
REFERENCES
120
www.iaetsd.in
C.BALACHANDAR.
A.SIDHARTHAN.
I. INTRODUCTION
Abstract This paper deals about Vertical farm
buildings and some advanced technologies as upgrade
features to improve the efficiency of these buildings.
This paper also deals about vast area of benefits in
various categories in this modern agriculture.
Index TermsArtificial photosynthesis,
filtering system, Organic wastes, Pesticide-free.
Water
121
www.iaetsd.in
B.Air-Conditioning
C.Drip Irrigation
A.Thermal Insulation
Crops grow on certain temperature healthy and also
at a faster rate based on the temperature. The reason is
that the temperature influences the reaction that takes
place in growing a crop. The appropriate temperature
must be steadily maintained to achieve the steady
growth of a crop. But , the environmental temperature
may vary according to the different climatic conditions
and weather conditions. Hence , to maintain the
temperature that is different from environment, we
need thermal insulation for the building. While
building the outer walls of the building that is exposed
to the environment we must take in consideration to
provide thermal insulation. It is necessary to provide
thermal insulation on the top floor of the building. For
this purpose we may use cavity walls, foam concrete,
loose fill insulation, light weight aggregate. Using glass
wall panels is better thermal insulation also it allows
natural light to enter inside the building to some extent.
122
www.iaetsd.in
E. Power supplement
In vertical farms, some electrical energy is
required to achieve this process. We need power for
artificial lighting, water pumping and lift systems to
carry the loads. So this power can be supplemented by
using renewable energy sources. We can fit solar
panels on the walls of Vertical farm. On the top floor
we can have wind mills. Hence this power that is
required can be easily supplemented.
B. Environmental benefits
Eliminates the need for chemical pesticides
Because we grow plants in a controlled indoor
environment, our facilities are not affected by pests.
Pesticides are not only an environmental and health
concern, but also represent an additional cost in field
agriculture.
123
www.iaetsd.in
D. Social Benefits
C.Retailer benefits
Conclsion:
Case study:
Some existing vertical farms and vertical
farms under construction are used for case study.
Notable of them are Sky Green Singapore, Farmed
Here , Bedfork in United States, Gotham Greens in
New York City, Local Garden in Vancouver of
Canada.
Price stability
Due to year-round production and controlled
growing conditions, Vertical farms produce does not
fall victim to seasonal availability or price swings.
Vertical farms is able to offer a fixed and competitive
price for produce year-round.
Consistent and reliable crop
Due to the controlled, indoor growing environment,
Vertical farms produce is not effected by crop loss due
to natural disasters or weather related issues, such as
droughts or floods. Vertical farms offers suppliers a
consistent quality crop regardless of the time of year, or
outdoor climate.
Longer shelf-life
Vertical farms's crops are attached to their roots until
they reach the cooler, which makes for a much longer
shelf life than crops harvested by traditional methods.
Our produce is delivered to stores the same day that it's
harvested.
Refernces:
1.
2.
3.
124
www.iaetsd.in
5.
6.
7.
8.
9.
10.
11.
12.
13.
125
www.iaetsd.in
ABSTRACT:
2. PROPERTIES OF HYDROGEN
Cryogenics,
Electrolysis,
1. INTRODUCTION
3. COMBUSTION OF
HYDROGEN
126
www.iaetsd.in
a. Electrolysis Process
Battery: The battery is an electro-chemical
device for converting electrical energy into
chemical energy. It stores the electrical
energy in the form of chemical energy and
provides a current for the electrolysis
process. It is a 12V battery which supplies a
7Amps of current. Electrical wires are
connected between the battery and the
electrodes for the passage of current from
battery to electrodes.
127
www.iaetsd.in
needed.
Fig 3: Compressor
Role of Compressor: In this compressor is
used to compress the hydrogen produced by
electrolysis process. Because the hydrogen
produced by electrolysis process will not be
at a sufficient pressure to store in a tank. So
a compressor must be use for boosting the
pressure of the hydrogen.
128
www.iaetsd.in
129
www.iaetsd.in
6. CRYOGENICS
When
the
electrolysis
process is going since the engine is also
running by hydrogen. After some time there
will not be hydrogen to continue the running
the engine, if the hydrogen tank is not
present. Because the electrolysis process is
very slow. So due to the above reasons the
hydrogen is stored with a high pressure in a
2kg cylindrical tank.
5. SYSTEM WORKING
PRINCIPLE
Since the
motor
is
running and it
runs
the
compressor by
chain
drive,
compressor
sucks
the
produced
hydrogen
to
compress it for
a high pressure.
From the outlet
of
the
compressor the
pressurized hydrogen come out due to the
low pressure at the tank. When the low
pressure is created at vaporizer which is next
to tank, the compressed hydrogen flows to
the vaporizer through the gas regulator.
WORKING
SYSTEM
PRINCIPLE
OF
7. PROPERTIES
HYDROGEN
OF
LIQUID
THIS
130
www.iaetsd.in
8. PROCESS OF
LIQUIFICATION
b. CLAUDE'S PROCESS
Air can also be liquefied by Claude's
process in which the gas is allowed to
expand isentropically twice in two
chambers. While expanding, the gas has
to do work as it is led through an
expansion turbine. The gas is not yet
liquified, since it would destroy the
turbine. Final liquefaction takes place by
isenthalpic expansion in a JouleThomson-Valve.
131
www.iaetsd.in
9. FUEL TANK
11. CONCLUSION
REFERENCES
1. S.S.Dara A text book of
engineering chemistry.
2. "Cryonics is NOT the Same as
Cryogenics". Retrieved 5 March
2013.
3. Shaw, David (2009). Cryoethics:
Seeking Life After Death. Bioethics.
ISSN 0269-9702(print); 1467-8519
(online). 23:9, 515-521.
4. Hydrogen as an Alternative Fuel
Almc.army.mil. Retrieved on 201108-28.
5. Thermophysical
Properties
of
Hydrogen , nist.gov, accessed 201209-14
6. Handling, Transport and Storage of
Cryogens.
7. William Cullen, Of the Cold
Produced by Evaporating Fluids and
of Some Other Means of Producing
Cold, in Essays and Observations
Physical and Literary Read Before a
Society in Edinburgh and Published
by Them, II.
132
www.iaetsd.in
venkatraman094@gmail.com
vasuvikram5@gmail.com
surensrn3@gmail.com
ABSTRACT
This paper represents the importance when
any tissue or layers of retina, cells and optic nerves of
eye gets damaged. Blindness is more feared by the
public than any other ailment. Artificial vision for the
blind was once the stuff of science fiction. But now, a
limited form of artificial vision is a reality .Now we are
at the beginning of the end of blindness with this type of
technology. In an effort to illuminate the perpetually
dark world of the blind, researchers are turning to
technology. They are investigating several electronicbased strategies designed to bypass various defects or
missing links along the brain's image processing
pathway and provide some form of artificial sight.
I.INTRODUCTION:
This paper is about curing blindness.
Linking electronics and biotechnology, the scientists
has made the commitment to the development of
technology that will provide or restore vision for the
visually impaired around the world. This paper
describes the development of artificial vision system,
which cures blindness to some extent. This paper
explains the process involved in it and explains the
concepts of artificial silicon retina, cortical implants
etc. The roadblocks that are created are also
explained clearly. Finally the advancements made in
this system and scope of this in the future is also
presented clearly.
133
www.iaetsd.in
Figures (3) The dot above the date on this penny is the full size of
the Artificial Silicon Retina.
134
www.iaetsd.in
Figure (4): Here you can see where the ASR is placed between the
outer and inner retinal layers.
135
www.iaetsd.in
V. VISIBILITY:
It has been demonstrated in some studies
that to a sighted person, image resolution of some 64
by 64 pixels is (more than) enough to get easily
recognizable images. See for instance the reference at
the end of this page which suggested a lower limit of
136
www.iaetsd.in
16
pixels
(4 4)
64
pixels
(8 8)
144
pixels
(12 1
2)
256
pixels
(16 1
6)
1024
pixels
(32 3
2)
4096
pixels
(64 6
4)
16384
pixels
(128
128)
137
www.iaetsd.in
[3] www.artificialvision.com
[4] www.howstuffworks.com
[5] www.wikipedia.org
IX. CONCLUSION:
In view of the above analysis we conclude
and feel that the researchers may go further deep into
this matter and find a new simple and compact
technical device using the latest welcoming Nano
technology which may lessen the burden of carrying
multiple devices and also lessen the cost factor. We
would like to mention that the angioplast for insertion
of artificial valves into the heart is replaced by a
simple needle insertion directly into the heart using
Nano technology is found successful some years ago.
Hence the same technology may be developed in the
case of eye diseases such as retinal diseases ,death of
eye cells and blockage of optical nerves etc. We hope
this may also results in getting crystal clear vision
without carrying small small miniature devices
inside and outside the body. And finally this Nano
138
www.iaetsd.in
CYBER CRIMEAND
SECURITY
P.V.SubbaReddy
3rd year-CSE
SRM University,
Chennai.
Mobile no:9444153735
ABSTRACT:
The terms computer crime and cybercrime are more properly restricted to describing criminal
activity in which the computer or network is a necessary part of the crime, these terms are also
sometimes used to include traditional crimes, such as fraud, theft, blackmail, forgery, and
embezzlement, in which computers or networks are used. As the use of computers has grown,
computer crime has become more important.
Computer crime can broadly be defined as criminal activity involving an information technology
infrastructure, including illegal access (unauthorized access), illegal interception (by technical
means of non-public transmissions of computer data to, from or within a computer system), data
interference (unauthorized damaging, deletion, deterioration, alteration or suppression of
computer data), systems interference (interfering with the functioning of a computer system
139
www.iaetsd.in
CONTENTS:
Cyber crime
Specific computer crimes
o Spam
o Phishing
o Fraud
o Obscene or offensive content
o Harassment
o Drug trafficking
o Cyberterrorism
Documented cases
Security
Approaches
Some techniques
Applications
Conclusion.
References
CYBER CRIME:
Learn cybercrime why?
Because
Everybody is using COMPUTERS.
From white collar criminals tto Terrorist organizations andfrom TeenagerstoAdults
Conventional crimes like Forgery,extortion,,kidnappingetc.. Are being committed with tthe
help of computers
New generation iis growing up with computers
140
www.iaetsd.in
Examples of crimes that merely use computer networks or devices would include,
Cyber stalking
Fraud and identity theft
Phishing scams
Information warfare
A common example is when a person starts to steal information from sites, or cause damage to, a
computer or computer network. This can be entirely virtual in that the information only exists in
digital form, and the damage, while real, has no physical consequence other than the machine
ceases to function. In some legal systems, intangible property cannot be stolen and the damage
must be visible, e.g. as resulting from a blow from a hammer. Where human-centric terminology
is used for crimes relying on natural language skills and innate gullibility, definitions have to be
modified to ensure that fraudulent behavior remains criminal no matter how it is committed.
A computer can be a source of evidence. Even though the computer is not directly used for
criminal purposes, it is an excellent device for record keeping, particularly given the power to
encrypt the data. If this evidence can be obtained and decrypted, it can be of great value to
criminal investigators.
In news:
1 out of 5 children received a sexual solicitation or approach over the Internet in a oneyear period of time (www.missingchildren.com)
California warns of massive ID theft personal data stolen from computers at University
of California, Berkeley (Oct 21, 2004 IDG news service)
141
www.iaetsd.in
Microsoft and Cisco announced a new initiative to work together to increase internet
security
(Oct 18, 2004 www.cnetnews.com)
Cyber attackCustomer information misappropriated through unauthorised access to
privileged systemsor other electronic means]
For example:
through tapping the ATM/POS network connection cables,
hacking into the network computer,
Spam
Spam, or the unsolicited sending of bulk email for commercial purposes, is unlawful to varying
degrees. As applied to email, specific anti-spam laws are relatively new, however limits on
unsolicited electronic communications have existed in some forms for some time.Spam
originating in India accounted for one percent of all spam originating in the top 25 spamproducing countries making India the eighteenth ranked country worldwide for originating spam.
142
www.iaetsd.in
Phishing
Phishing is a technique used by strangers to "fish" for information about you, information that
you would not normally disclose to a stranger, such as your bank account number, PIN, and
other personal identifiers such as your National Insurance number. These messages often contain
company/bank logos that look legitimate and use flowery or legalistic language about improving
security by confirming your identity details.
1.
Fraud
altering computer input in an unauthorized way. This requires little technical expertise
and is not an uncommon form of theft by employees altering the data before entry or
entering false data, or by entering unauthorized instructions or using unauthorized
processes;
altering, destroying, suppressing, or stealing output, usually to conceal unauthorized
transactions: this is difficult to detect;
altering or deleting stored data; or
altering or misusing existing system tools or software packages, or altering or writing
code for fraudulent purposes. This requires real programming skills and is not common.
Other forms of fraud may be facilitated using computer systems, including bank fraud, identity
theft, extortion, and theft of classified information(Csonka, 2000)
2.
The content of websites and other electronic communications may be distasteful, obscene or
offensive for a variety of reasons. In some instances these communications may be illegal.
Many jurisdictions place limits on certain speech and ban racist, blasphemous, politically
subversive, libelous or slanderous, seditious, or inflammatory material that tends to incite hate
crimes.
The extent to which these communications are unlawful varies greatly between countries, and
even within nations. It is a sensitive area in which the courts can become involved in arbitrating
between groups with entrenched beliefs.
3.
Harassment
Whereas content may be offensive in a non-specific way, harassment directs obscenities and
derogatory comments at specific individuals focusing for example on gender, race, religion,
143
www.iaetsd.in
nationality, sexual orientation. This often occurs in chat rooms, through newsgroups, and by
sending hate e-mail to interested parties (see cyber bullying, cyber stalking, harassment by
computer, hate crime, Online predator, and stalking). Any comment that may be found
derogatory or offensive is considered harassment.
4.
Drug trafficking
Drug traffickers are increasingly taking advantage of the Internet to sell their illegal substances
through encrypted e-mail and other Internet Technology. Some drug traffickers arrange deals at
internet cafes, use courier Web sites to track illegal packages of pills, and swap recipes for
amphetamines in restricted-access chat rooms. The rise in Internet drug trades could also be
attributed to the lack of face-to-face communication. These virtual exchanges allow more
intimidated individuals to more comfortably purchase illegal drugs. The sketchy effects that are
often associated with drug trades are severely minimized and the filtering process that comes
with physical interaction fades away. Furthermore, traditional drug recipes were carefully kept
secrets. But with modern computer technology, this information is now being made available to
anyone with computer access.
5.
Cyberterrorism
1.
Documented cases
The Yahoo! website was attacked at 10:30 PST on Monday, 7 February 2000. The attack
lasted three hours. Yahoo was pinged at the rate of one gigabyte/second.
On 3 August 2000, Canadian federal prosecutors charged MafiaBoy with 54 counts of
illegal access to computers, plus a total of ten counts of mischief to data for his attacks on
Amazon.com, eBay, Dell Computer, Outlaw.net, and Yahoo.
144
www.iaetsd.in
MafiaBoy had also attacked other websites, but prosecutors decided that a total of 66
counts was enough. MafiaBoy pleaded not guilty. About fifty computers at Stanford
University, and also computers at the University of California at Santa Barbara, were
amongst the zombie computers sending pings in DDoS attacks.
In 26 March 1999, the Melissa worm infected a document on a victim's computer, then
automatically sent that document and copy of the virus via e-mail to other people. 21
January 2003
Two years jail for UK virus writer who infected 27,000 PCs
145
www.iaetsd.in
management and also because it is not widely understood. Such ultra-strong secure operating
systems are based on operating system kernel technology that can guarantee that certain security
policies are absolutely enforced in an operating environment. An example of such a Computer
security policy is the Bell-La Padula model. The strategy is based on a coupling of special
microprocessor hardware features, often involving the memory management unit, to a special
correctly implemented operating system kernel. This forms the foundation for a secure operating
system which, if certain critical parts are designed and implemented correctly, can ensure the
absolute impossibility of penetration by hostile elements. This capability is enabled because the
configuration not only imposes a security policy, but in theory completely protects itself from
corruption. Ordinary operating systems, on the other hand, lack the features that assure this
maximal level of security. The design methodology to produce such secure systems is precise,
deterministic and logical.
If the operating environment is not based on a secure operating system capable of maintaining a
domain for its own execution, and capable of protecting application code from malicious
subversion, and capable of protecting the system from subverted code, then high degrees of
security are understandably not possible. While such secure operating systems are possible and
have been implemented, most commercial systems fall in a 'low security' category because they
rely on features not supported by secure operating systems (like portability, et al.). In low
security operating environments, applications must be relied on to participate in their own
protection. There are 'best effort' secure coding practices that can be followed to make an
application more resistant to malicious subversion.
In commercial environments, the majority of software subversion vulnerabilities result from a
few known kinds of coding defects. Common software defects include buffer overflows, format
string vulnerabilities, integer overflow, and code/command injection.
Some common languages such as C and C++ are vulnerable to all of these defects (see Seacord,
"Secure Coding in C and C++"). Other languages, such as Java, are more resistant to some of
these defects, but are still prone to code/command injection and other software defects which
facilitate subversion.
Recently another bad coding practice has come under scrutiny; dangling pointers. The first
known exploit for this particular problem was presented in July 2007. Before this publication the
problem was known but considered to be academic and not practically exploitable.
In summary, 'secure coding' can provide significant payback in low security operating
environments, and therefore worth the effort. Still there is no known way to provide a reliable
degree of subversion resistance with any degree or combination of 'secure coding.'
CAPABILITIES VS. ACLS:
Within computer systems, the two fundamental means of enforcing privilege separation are
access control lists (ACLs) and capabilities. The semantics of ACLs have been proven to be
146
www.iaetsd.in
insecure in many situations (e.g., Confused deputy problem). It has also been shown that ACL's
promise of giving access to an object to only one person can never be guaranteed in practice.
Both of these problems are resolved by capabilities. This does not mean practical flaws exist in
all ACL-based systems, but only that the designers of certain utilities must take responsibility to
ensure that they do not introduce flaws.
Capabilities have been mostly restricted to research operating systems and commercial OSs still
use ACLs. Capabilities can, however, also be implemented at the language level, leading to a
style of programming that is essentially a refinement of standard object-oriented design. An open
source project in the area is the E language.
First the Plessey System 250 and then Cambridge CAP computer demonstrated the use of
capabilities, both in hardware and software, in the 1970s. A reason for the lack of adoption of
capabilities may be that ACLs appeared to offer a 'quick fix' for security without pervasive
redesign of the operating system and hardware.
The most secure computers are those not connected to the Internet and shielded from any
interference. In the real world, the most security comes from operating systems where security is
not an add-on, such as OS/400 from IBM. This almost never shows up in lists of vulnerabilities
for good reason. Years may elapse between one problem needing remediation and the next
APPLICATIONS:
IN AVIATION
The aviation industry is especially important when analyzing computer security because the
involved risks include human life, expensive equipment, cargo, and transportation infrastructure.
Security can be compromised by hardware and software malpractice, human error, and faulty
operating environments. Threats that exploit computer vulnerabilities can stem from sabotage,
espionage, industrial competition, terrorist attack, mechanical malfunction, and human error. The
consequences of a successful deliberate or inadvertent misuse of a computer system in the
aviation industry range from loss of confidentiality to loss of system integrity, which may lead to
more serious concerns such as data theft or loss, network and air traffic control outages, which in
turn can lead to airport closures, loss of aircraft, loss of passenger life. Military systems that
control munitions can pose an even greater risk.
NOTABLE SYSTEM ACCIDENTS:
In 1994, over a hundred intrusions were made by unidentified hackers into the Rome Laboratory,
the US Air Force's main command and research facility. Using trojan horse viruses, hackers were
able to obtain unrestricted access to Rome's networking systems and remove traces of their
activities. The intruders were able to obtain classified files, such as air tasking order systems data
and furthermore able to penetrate connected networks of National Aeronautics and Space
Administration's Goddard Space Flight Center, Wright-Patterson Air Force Base, some
Defensecontractors, and other private sector organizations, by posing as a trusted Rome center
user. Now, a technique called Ethical hack testing is used to remediate these issues.
147
www.iaetsd.in
Electromagnetic interference is another threat to computer safety and in 1989, a United States
Air Force F-16 jet accidentally dropped a 230 kg bomb in West Georgia after unspecified
interference caused the jet's computers to release it.
A similar telecommunications accident also happened in 1994, when two UH-60 Blackhawk
helicopters were destroyed by F-15 aircraft in Iraq because the IFF system's encryption system
malfunctioned.
TERMINOLOGY:
The following terms used in engineering secure systems are explained below.
Authentication techniques can be used to ensure that communication end-points are who
they say they are.
Automated theorem proving and other verification tools can enable critical algorithms
and code used in secure systems to be mathematically proven to meet their specifications.
Capability and access control list techniques can be used to ensure privilege separation
and mandatory access control.
Chain of trust techniques can be used to attempt to ensure that all software loaded has
been certified as authentic by the system's designers.
Cryptographic techniques can be used to defend data in transit between systems, reducing
the probability that data exchanged between systems can be intercepted or modified.
Firewalls can provide some protection from online intrusion.
Mandatory access control can be used to ensure that privileged access is withdrawn when
privileges are revoked. For example, deleting a user account should also stop any
processes that are running with that user's privileges.
Secure cryptoprocessors can be used to leverage physical security techniques into
protecting the security of the computer system.
microkernels can be reliable against errors: eg EROS and Coyotos.
Some of the following items may belong to the computer insecurity article:
Anti-virus software consists of computer programs that attempt to identify, thwart and
eliminate computer viruses and other malicious software (malware).
Backups are a way of securing information; they are another copy of all the important
computer files kept in another location. These files are kept on hard disks, CD-Rs, CDRWs, and tapes. Suggested locations for backups are a fireproof, waterproof, and heat
proof safe, or in a separate, offsite location than that in which the original files are
contained. Some individuals and companies also keep their backups in safe deposit boxes
inside bank vaults. There is also a fourth option, which involves using one of the file
hosting services that backs up files over the Internet for both business and individuals.
148
www.iaetsd.in
Encryption is used to protect the message from the eyes of others. It can be done in
several ways by switching the characters around, replacing characters with others, and
even removing characters from the message. These have to be used in combination to
make the encryption secure enough, that is to say, sufficiently difficult to crack. Public
key encryption is a refined and practical way of doing encryption. It allows for example
anyone to write a message for a list of recipients, and only those recipients will be able to
read that message.
Firewalls are systems which help protect computers and computer networks from attack
and subsequent intrusion by restricting the network traffic which can pass through them,
based on a set of system administrator defined rules.
Honey pots are computers that are either intentionally or unintentionally left vulnerable to
attack by crackers. They can be used to catch crackers or fix vulnerabilities.
Intrusion-detection systems can scan a network for people that are on the network but
who should not be there or are doing things that they should not be doing, for example
trying a lot of passwords to gain access to the network.
Pinging the ping application can be used by potential crackers to find if an IP address is
reachable. If a cracker finds a computer they can try a port scan to detect and attack
services on that computer.
Social engineering awareness keeps employees aware of the dangers of social
engineering and/or having a policy in place to prevent social engineering can reduce
successful breaches of the network and servers.
File Integrity Monitors are tools used to detect changes in the integrity of systems and
files.
REFERENCES:
CONCLUSION:
Computer security is critical in almost any technology-driven industry which
operates on computer systems.Computer security can also be refered to as computer
safety. The issues of computer based systems and addressing their countless
vulnerabilities are an integral part of maintaining an operational industry.
149
www.iaetsd.in
150
www.iaetsd.in
Introduction:
For the first few decades of their existence, computer networks were
primarily used by university researchers for sending e-mail and by
corporate employees for sharing printers. Under these conditions,
security did not get a lot of attention. But now, as millions of ordinary
citizens are using networks for banking, shopping, and filing their tax
returns, network security is looming on the horizon as a potentially
massive problem.
The requirements of information security within an organization have
undergone two major changes in the last several decades.Before
the widespread use of data processing equipment ,the security of
information felt to be valuable to an organization was provided
primarily by physical and administrative means .
.with the introduction of computer the need for automated tools for
protecting files and other information stored on the computer
became an evident .this is especially the case for a shared system
such as time sharing system and the need is even more acute for
systems that can be accessed for a public telephone or a data
network. The generic name for the collection of tools to protect data
and to thwart hackers is computer security.
Network security:
Security is a broad topic and covers a multitude of sins. In its simplest
form, it is concerned with making sure that nosy people cannot
read, or worse yet, secretly modify messages intended for other
recipients. It is concerned with people trying to access remote
services that they are not authorized to use. Most security problems
are intentionally caused by malicious people trying to gain some
benefit, get attention, or to harm someone. Network security
problems can be divided roughly into four closely intertwined areas:
secrecy, authentication, nonrepudiation, and integrity control.
Secrecy, also called confidentiality, has to do with keeping
information out of the hands of unauthorized users. This is what
usually comes to mind when people think about network security.
Authentication deals with determining whom you are talking to
151
www.iaetsd.in
Secracy: Only
152
www.iaetsd.in
information does an intruder have access to, and what actions can
be taken on the transmitted data?
Figure illustrates the scenario
Alice, the sender, wants to send data to Bob, the receiver. In order
to securely exchange data, while meeting the
requirements of secrecy, authentication, and message integrity,
Alice and Bob will exchange both control message anddata
messages (in much the same way that TCP senders and receivers
exchange both control segments and data
segments). All, or some of these message will typically be encrypted.
A passive intruder can listen to and record the
control and data messages on the channel; an active intruder can
remove messages from the channel and/or itself add messages into
the channel.
Network Security Considerations in the Internet :Before delving into the technical aspects of network security in the
following sections, let's conclude our introduction by relating our
fictitious characters - Alice, Bob, and Trudy - to "real world" scenarios
in today's Internet
. Let's begin with Trudy, the network intruder. Can a "real world"
network intruder really listen to and record passively receives all
data-link-layer frames passing by the device's network interface. In a
broadcast environment
153
www.iaetsd.in
such as an Ethernet LAN, this means that the packet sniffer receives
all frames being transmitted from or to all hostson the local area
network. Any host with an Ethernet card can easily serve as a packet
sniffer, as the Ethernet interface card needs only be set to
"promiscuous mode" to receive all passing Ethernet frames. These
frames can then be passed on to application programs that extract
application-level data. For example, in the telnet scenario , the login
password prompt sent from A to B, as well as the password entered
at B are "sniffed" at host C. Packet sniffing is a double-edged sword it can be invaluable to a network administrator for network
monitoring and management but also used by the unethical
hacker. Packet-sniffing software is freely available at various WWW
sites, and as commercial products.
Cryptography:- Cryptography
154
www.iaetsd.in
Freshness
Cryptographic principle 2: Some method is needed to foil replay
attacks
One such measure is including in every message a timestamp valid
only for, say, 10 seconds. The receiver can then just keep messages
around for 10 seconds, to compare newly arrived messages to
previous ones to filter out duplicates. Messages older than 10
seconds can be thrown out, since any replays sent more than 10
seconds later will be rejected as too old.
155
www.iaetsd.in
Substitution Ciphers
In a substitution cipher each letter or group of letters is replaced by another letter
or group of letters to disguise it. One of the oldest known ciphers is the Caesar
cipher,
attributed
to
Julius
Caesar.
In
this
method, a becomes D, b becomes E, c becomes F, ... ,
and z becomes C.
For
example, attack becomes DWWDFN.
The next improvement is to have each of the symbols in the plaintext, say, the 26
letters for simplicity, map onto some other letter. For example,
plaintext: a b c d e f g h i j k l m n o p q r s t u v w x y z
ciphertext: Q W E R T Y U I O P A S D F G H J K L Z X C V B N M
Transposition Ciphers:Substitution ciphers preserve the order of the
plaintext symbols but disguise them. Transposition ciphers, in contrast, reorder
the letters but do not disguise them depicts a common transposition cipher, the
columnar transposition.
M E G A B U C K
7 4 5 1 2 8 3 6
W E L C O M E T PLAIN TEXT: WELCOME TO SAfire-2K8,CHIRALA,
O S A f i r e 2 PRAKASAM, AP.
K 8 C H I R A L CIPHER TEXT: CfHAOiIKEeASES8PALACRPT2LA
A P R A K A S A WOKAMMRRA
M A P
The cipher is keyed by a word or phrase not containing any repeated letters. In
this example, MEGABUCK is the key. The purpose of the key is to number the
columns, column 1 being under the key letter closest to the start of the alphabet,
and so on. The plaintext is written horizontally, in rows, padded to fill the matrix if
need be. The ciphertext is read out by columns, starting with the column whose
key letter is the lowest.
156
www.iaetsd.in
157
www.iaetsd.in
158
www.iaetsd.in
159
www.iaetsd.in
160
www.iaetsd.in
Conclusion:
All the three techniques discussed in this presentation i.e. network
security; cryptography andfirewalls are most widely used and
implemented networks security tools. Each of them had itsown
significance in its own mode. For example, a single
organization
or
establishment
tomaintain
privacy
of
information within itself can use cryptography. These methods
are beingus e d to p ro v i d e c o n fi d e n t ia l i ty re q u i re d b y t he
ne t w o rk . T he re is a l o t o f s c o p e fo r t he development in this
field. Digital signatures are one of the latest developments in
the field of c r y p t o g r a p h y . W i t h t h e i n c r e a s e i n
number
of
computers,
and
the
usage
161
www.iaetsd.in
www.iec.org/onlinehttp://ftp.research.att.com/dist/internetsecurity/http://www.jjtc.com/stegdoc/
162
www.iaetsd.in
A technical paper On
AUTHOR
K.HUSENAIAH
IV B.TECH C.S.E
Email:kinghusen100@gmail.com
Ph.no:9550277153
163
www.iaetsd.in
ABSTRACT
and
agencies.
vaccine
and
in
cold
distribution
storage,
transportation
infrastructures,
particularly
refrigeration
units
along
the
supply
INTRODUCTION
regions.
164
www.iaetsd.in
COLDTRACE FEATURES:
temperatures.
Continuously
tracks
GPS
location
coordinates.
analyzed.
Cell
phones
display
and
keypad
intervals.
log
refrigeration
of
Web
temperatures
units
dashboard
and
in
clinic
allows
supports
for
remote
clinics.
Chains
165
www.iaetsd.in
ethical
about
tempe-
understated.
vaccines
reaching
critical
considerations
around
temperature-
Communication
166
www.iaetsd.in
ing
communication
an
SMS-enabled
system
issue
tracking
and
that
allows
poor
167
www.iaetsd.in
CONLCUSION
ColdTrace is
low-cost
wireless
sensor
broadly available,
SMS Platform:
data-driven process
for
world.
REFERANCES
www.sensor scientific.com
www.innovativeprojects.com
168
www.iaetsd.in
II.
SCOPE
To
encourage
housing
developers in investing these
materials in house construction.
INTRODUCTION
III.
MATERIALS
169
www.iaetsd.in
CEMENT
COMPOUND
CLASS
CLASS C CLASS N
F
Fly ash
IV.
LITERATURE
STUDY
LITERATURE ANALYSIS
SiO2
54.90
39.90
58.20
22.60
A12O3
25.80
16.70
18.40
4.30
Fe2O3
6.90
5.80
9.30
2.40
CaO
8.70
24.30
3.30
64.40
MgO
1.80
4.60
3.90
2.10
SO3
0.60
3.30
1.10
2.30
1.30
1.10
0.60
AND
DESIGN MIXTURE
170
www.iaetsd.in
171
www.iaetsd.in
COMPRESSION TEST
Cube
No
14 Days
28 Days
(N/mm2 )
(N/mm2 )
1.72
4.81
3.61
4.41
2.15
3.61
1.41
3.63
VARIED COMPOSITIONS
Cube
No
Composition
0.78
0.88
100% cement
0.12
0.23
0.28
0.48
4.08
4.91
40%lime,20%bagasse,
40% fly ash
GRAPH
N/MM
6
4
2
0
172
14 DAYS
28 DAYS
www.iaetsd.in
V.
INFERENCE
VI.
CONCLUSION
VII.
REFERENCE
2. flyash.sustainablesources.com
http://www.flyash.com/data/upimages/p
ress/TB.2%20Chemical%20Comparison
%20of%20Fly%20Ash%20and%20Portl
and%20Cement.pdf
173
www.iaetsd.in
INTRODUCTION
If a blood vessel is occluded and the blood
stream is obstructed, the oxygen supply for cells
will be insufficient. This leads to disorders such as
the malfunction of cells or generation of the
vulnerable neovascularity. Even an advanced retinal
disease symptoms may be treated by a laser
treatment, however, early stage detection of the
vascular malfunction is important for preventing
alteration in visual acuity or the loss of the eyesight.
The retinal vessels are only the blood vessels inside
the human body that can be seen directly from
outside. If one has retinal disorders, it is suspicious
174
www.iaetsd.in
175
www.iaetsd.in
EXPERIMENT
In this experiment, the optical system that
has the basic function of a commonly used fundus
camera is built on an optical table to keep enough
space for a high intensity light source and the
tunable spectral filter. The optical setup is shown in
Fig.1. A photographic-type fundus camera needs a
mechanism in an illumination system to prevent the
specular reflection from the surface of the cornea; a
ring-shaped aperture is illuminated from its back
and focused onto the surface of the cornea. In
addition, a beamsplitter or a perforated mirror is
necessary to split the illumination light and the
reflected light from the retina because both lights
share the optical path just before the eye. In our
optical setup, the perforated mirror with the 10 mmcircular aperture is located with an angle of 45
degrees to the optical path. The focusing lens
between the ring slit and the perforated mirror has a
black circular mask at its center to prevent the
specular reflection at the surface of the lens. The
image of the retina acquired by the CCD camera is
degraded without this mask.
Next, brief explanations about the light
source, the imaging CCD camera, and the tunable
spectral filter are given as follows. The light source
176
www.iaetsd.in
Morphological angiography
Morphology is one of the digital image
processing techniques based on the firm
mathematical foundation, defined as set operations
between a subject pattern and an elemental
structure. Originally, morphology was developed in
the late 1960s for analysing microscope images.
Recently morphology has been extended to the wide
variety of fields. The morphological image
processing is typified by opening and closing;
enable to delete unnecessary small patterns and to
clarify the desired subject. They are implemented
by combining dilation and erosion, defined
mathematically as Minkowski addition and
subtraction.
Since the blood vessels have clear edges and
their structural feature is apparently different from
other area in the multispectral images, it is expected
that the FA-like effect can be implemented by
applying morphological image processing. The
images created by this method will be used as the
mask filter that is overlapped on the predicted 2-D
oxygen saturation distribution for eliminating
retinal tissue areas.
The mask filter is created based on the
bottom-hat filtering method; bottom-hat filtering is
defined as subtracting the result image of
performing a closing operation on the original
image from the original image itself. In the obtained
multispectral images, the reflectance of ONH is
much higher than that of surrounding areas. Thus
the algorithm adopted to our purpose need to be
robust to the large change of the intensity
distribution. The bottom-hat filtering is one of the
adequate technique for this purpose. However, we
should consider the boundaries between thick main
vessels and thin capillaries. This time, we focused
on extracting comparatively thick main vessels. For
extracting thick vessels near and within ONH area,
we adopted the combination method of bottomhat
and top-hat filtering; subtracting the top-hat result
from the bottom-hat result. Top-hat filtering is a
subtraction of the closing-operated image from the
original image. As a result, thick vessels can be
extracted clearly from the measured multispectral
image. Results of both the gray scale and binary
operations were shown in Figs.3 (a) and (b). The
original image is the observed data at the
wavelength of 580 nm.
DATA PROCESSING
We process the measured multispectral
images in three steps for estimating the oxygen
saturation levels across the retinal vessels. The first
step is a technique similar to the fluorescence
angiography (FA) that extracts blood vessels
structure from the background image. This step is
performed by the digital image processing based on
the morphology. The second step is compensating
the small involuntary eye movement. Even very
small gaps among all the images will result in the
inaccurate spectra. The last step is estimating the
oxygen saturation levels at all the points extracted
in the first step employing the multivariate
regression analysis.
177
www.iaetsd.in
178
www.iaetsd.in
CONCLUSION
We reported on the preliminary experiment
for measuring the blood oxygen saturation at the
retina. The multispectral images were acquired in
the wavelength range from 500 to 650 nm with the
wavelength resolution of 7 nm. The measured
images were pre-processed by the morphological
blood vessel extraction and the alignment
processing.
Finally,
the
two-dimensional
distribution of oxygen saturation across the retina
was calculated by the PLS regression method. The
result showed clearly the difference of the oxygen
saturation levels in the retinal blood stream.
REFERENCES
[1] F. C. Delori, Noninvasive technique for
oximetry of blood in retinal vessels, Appl. Opt.,
vol. 27, no. 6, pp. 11131125, 1988.
[2] M. H. Smith, K. R. Denninghoff, L. W. Hillman,
and R. A. Chipman, Oxygen saturation
measurements of blood in retinal vessels during
blood loss, J. Biomed. Opt., vol. 3, no. 3, pp. 296
303, 1998.
[3] J. J. Drewes, M. H. Smith, K. R. Denninghoff,
and L. W. Hillman, Instrument for the
measurement of retinal vessel oxygen saturation,
Proc. SPIE, vol. 3591, pp. 114120, 1999.
[4] A. Agarwal, S. Amarasinghe, R. Barua, M.
Frank, W. Lee, V. Sarkar, and M. Srikrishna, D.and
Taylor. The RAW compiler project. In Proc.
Second SUIF Compiler Workshop, August 1997.
[5] Annapolis Micro Systems, Inc., Annapolis,
MD. STARFIRE Reference Manual, 1999.
www.annapmicro.com.
179
www.iaetsd.in
D. Phaneendra,
I.Suneetha,
A. Rajani,
M.Tech(DECS) Student,
dorasalaphanendrakumarreddy@gmail.com
2
iralasuneetha.aits@gmail.com
3
rajanirevanth446@gmail.com
I. INTRODUCTION
The
180
www.iaetsd.in
=y +I
Where y(i,j), is the original image intensity at pixe
position (i,j), is the watermarked image, and I
represents the embedded data in the form of small
changes in intensity levels. The author of the
watermark holds two keys:
The region of the image where the logo is
marked and
The information in the watermark, I.
Given the marked image, the original owner will be
able to recover the watermark by comparing the
marked image with the original. In the reconstruction
of the embedded watermark, the following
computation is made,
I= (-y)/
181
www.iaetsd.in
B. Frequency-Domain Technologies
Compared
to
spatial-domain
watermark,
watermark in frequency domain is more robust and
compatible to popular image compression standards.
Thus frequency-domain watermarking obtains much
more attention. To embed a watermark, a frequency
transformation is applied to the host data. Then,
modifications are made to the transform coefficients.
Possible frequency image transformations include the
Discrete Fourier Transform (DFT), Discrete Cosine
Transform (DCT) and others
182
www.iaetsd.in
C. Wavelet-domain Technologies
The wavelet transform is identical to a hierarchical
sub-band system, where the sub-bands are
logarithmically spaced in frequency. The basic idea
of the DWT for a two dimensional image is described
as follows. An image is first decomposed into four
parts of high, middle and low frequencies (i.e. LL1,
HL1, LH1, HH1 sub bands) by critically subsampling horizontal and vertical channels using
Daubechies filters. The sub-band HL1, LH1 and HH1
represent the finest scale of wavelet coefficients as
shown in figure 5. To obtain the next coarser scaled
wavelet coefficient, the sub-band LL1 is further
decomposed and critically sub-sampled. This process
is repeated several times, which is determined by the
application in hand. An example of an image
decomposed into ten sub-bands for three levels is
shown in Figure 6. Each level has various bands
information such as low-low, low-high, high-low and
high-high frequency bands.
III. CONCLUSION
In this paper we have briefly discussed regarding
the methods (Spatial domain, Frequency domain and
Wavelet domain) which are formerly used in visible
watermarking. The former methods used DCT, DFT,
DWT and LSB (Least Significant Bit) for desired
visible watermarking.
A novel method for generic visible watermarking
with a capability of lossless image recovery is
proposed. The method is based on the use of
deterministic one-to-one compound mappings of
image pixel values for overlaying a variety of visible
watermarks of arbitrary sizes on cover images. The
compound map-pings are proved to be reversible,
which allows for lossless recovery of original images
from watermarked images. The mappings may be
adjusted to yield pixel values close to those of desired
visible watermarks. Different types of visible
watermarks, including opaque monochrome and
translucent full color ones, are embedded as
applications of the proposed generic approach. A
two-fold monotonically increasing compound
mapping is created and proved to yield more
distinctive visible watermarks in the watermarked
image. Security protection measures by parameter
and mapping randomizations have also been
proposed to deter attackers from illicit image
recoveries. Experimental results demonstrating the
effectiveness of the proposed approach are also
included.
183
www.iaetsd.in
REFERENCES
[1] G. Braudaway, K. A. Magerlein, and F. Mintzer,
Protecting publicly available images with a
visible image watermark, in Proc. SPIE Int.
Conf. Electronic Imaging, Feb. 1996, vol. 2659,
pp. 126133.
[2] I. J. Cox, J. Kilian, F. T. Leighton, and T.
Shamoon,
Secure
spread
spectrum
watermarking for multimedia, IEEE Trans.
Image Process., vol. 6, no. 12, pp. 1673 1687,
Jun. 1997.
[3] F.A.P
Patitcolas,
R.J.Anderson,
and
M.G.KunInformation hiding- A surveyProc.IEEE, vol:87, no.7, jul. 1999.
[4] M. S. Kankanhalli, Rajmohan, and K. R.
Ramakrishnan, Adaptive visible watermarking
of images, in Proc. IEEE Int. Conf. Multimedia
Computing and Systems, 1999, vol. 1, pp.
[5] S. P. Mohanty, K. R. Ramakrishnan, and M. S
Kankanhalli, A DCT domain visible
watermarking technique for images, in Proc.
IEEE Int. Conf. Multimedia and Expo, Jul. 2000,
vol. 2, pp. 1029 1032.
[6] N. F. Johnson, Z. Duric, and S. Jajodia,
Information
Hiding.
Steganography
and
Watermarking Attacks and Countermeasures.
Boston, MA: Kluwer, 2001.
[7] Y. Hu and S.Kwong,Wavelet domain adaptive
visiblewatermarking, Electron. Lett., vol. 37,
no. 20, pp. 12191220, Sep. 2001.
[8] Y. J. Cheng and W. H. Tsai, A new
method for copyright and integrity protection
for bitmap images by removable visible
watermarks
and
irremovable
invisible
watermarks, presented at the Int. Computer
Symp. Workshop on Cryptology and Information
Security, Hualien,Taiwan, R.O.C., Dec. 2002.
[9] P. M. Huang and W. H. Tsai, Copyright
protection and authentication of grayscale
images by removable visible watermarking and
invisible signal embedding techniques: A new
approach, presented at the Conf. Computer
Vision, Graphics and Image Processing, Kinmen,
Taiwan, R.O.C., Aug. 2003.
[10] Y. Hu, S. Kwong, and J. Huang, An algorithm
for removable visible watermarking, IEEE
Trans. Circuits Syst. Video Technol., vol. 16, no.
1, pp. 129 133, Jan.2006.
[11] S. K. Yip, O. C. Au, C. W. Ho, and H. M. Wong,
Lossless visible watermarking, in Proc. IEEE
Int. Conf. Multimedia and Expo, Jul. 2006, pp.
853856.
[12] Neminath Hubballi and Kanyakumari D P,
Novel DCT based watermarking scheme for
digital images, International Journal of Recent
184
www.iaetsd.in
K.SAI KRISHNA
3rd Year CSE,
SRM University,
Chennai,
MobileNo.:9003226055
Artificial Intelligence
ABSTRACT:
Artificial Intelligence (AI) for speech recognition involves two basic ideas. First, it
involves studying the thought processes of human beings. Second, it deals with
representing those processes machines (like computers, robots, etc).AI is behaviour
of a machine, which, if performed by a human being, would be called intelligence. It
makes machines smarter and more useful, and is less expensive than natural intelligence. Natural language processing (NLP) refers to artificial intelligence methods of
communicating with a computer in a natural language like English. The main objective of a NLP program is to understand input and initiate action. The input words are
scanned and matched against internally stored known words. Identification of a keyword causes some action to be taken. In this way, one can communicate with the
computer in one's language
INTRODUCTION:
Artificial intelligence involves two basic ideas. First, it involves studying the
thought processes of human beings. Second, it deals with representing those processes
via machines (like computers, robots, etc.).
AI is behaviour of a machine, which, if performed by a human being, would be
called intelligent. It makes machines smarter and more useful, and is less expensive than
natural intelligence.
Natural language processing (NLP) refers to artificial intelligence methods of communicating with a computer in a natural language like English. The main objective of a
NLP program is to understand input and initiate action.
Definition:
185
www.iaetsd.in
It is the science and engineering of making intelligent machines, especially intelligent computer programs.
AI means Artificial Intelligence. Intelligence however cannot be defined but AI can
be described as branch of computer science dealing with the simulation of machine exhibiting intelligent behaviour.
History:
Work started soon after World-WarII.
Name is coined in 1957.
Several names that are proposed are
Complex Information Processing
Heuristic programming
Machine Intelligence
Computational Rationally
Foundation:
Philosophy
(428 B.C.-present)
Mathematics
(c.800-present)
Economics
(1776-present)
Neuroscience
(1861-present)
Psychology
(1879-present)
Computer Engineering
(1940-present)
Control theory and cybernetics (1948-present)
Linguistics
(1957-present)
Speaker independency:
The speech quality varies from person to person. It is therefore difficult to build an
electronic system that recognises everyones voice. By limiting the system to the voice of a
single person, the system becomes not only simpler but also more reliable. The computer
must be trained to the voice of that particular individual. Such a system is called speakerdependent system.
Speaker independent systems can be used by anybody, and can recognise any
voice, even though the characteristics vary widely from one speaker to another. Most of
these systems are costly and complex. Also, these have very limited vocabularies.
It is important to consider the environment in which the speech recognition system
has to work. The grammar used by the speaker and accepted by the system, noise level,
noise type , position of the microphone, and speed and manner of the users speech are
some factors that may affect the quality of speech recognition.
Environmental influence:
Real applications demand that the performance of the recognition system be unaffected by
changes in the environment. However, it is a fact that when a system is trained and tested
under different conditions, the recognition rate drops unacceptably. We need to be concerned about the variability present when different microphones are used in training and
186
www.iaetsd.in
testing, and specifically during development of procedures. Such care can significantly improve the accuracy of recognition systems that use desktop microphones.
Acoustical distortions can degrade the accuracy of recognition systems. Obstacles to robustness include additive noise from machinery, competing talkers, reverberation from surface reflections in a room, and spectral shaping by microphones and the vocal tracts of individual speakers. These sources of distortions fall into two complementary classes; additive noise and distortions resulting from the convolution of the speech signal with an unknown linear system.
A number of algorithms for speech enhancement have been proposed. These include the
following:
1.
2.
3.
4.
Although relatively successful, all these methods depend on the assumption of independence of the spectral estimates across frequencies. Improved performance can be got with
an MMSE estimator in which correlation among frequencies is modeled explicitly.
Speaker-specific features:
Speaker identity correlates with the physiological and behavioural characteristics of the
speaker. These characteristics exist both in the vocal tract characteristics and in the voice
source characteristics, as also in the dynamic features spanning several segments.
The most common short-term spectral measurements currently used are the spectral coefficients derived from the Linear Predictive Coding(LPC) and their regression coefficients. A
spectral envelope reconstructed from a truncated set of spectral coefficients is much
smoother than one reconstructed from LPC coefficients.
Therefore, it provides a more stable representation from one repetition to another of a particular speakers utterances.
As for the regression coefficients, typically the first and second order coefficients are extracted at every frame period to represent the spectral dynamics.
These coefficients are derivatives of the time function of the spectral coefficients and are
called the delta and delta-delta-spectral coefficients respectively.
187
www.iaetsd.in
Speech Recognition:
The user communicates with the application through the appropriate input device i.e. a microphone. The Recogniser converts the analog signal into digital signal for the speech
processing. A stream of text is generated after the processing. This source-language text
becomes input to the Translation Engine, which converts it to the target language text.
Salient Features:
Input Modes
Through Speech Engine
Through soft copy
Interactive Graphical User Interface
Format Retention
Fast and standard translation
Interactive Preprocessing tool
Spell checker.
Phrase marker
Proper noun, date and other package specific identifier
188
www.iaetsd.in
Input Format
txt,.doc.rtf
Applications:
One of the main benefits of speech recognition system is that it lets user do other
works simultaneously. The user can concentrate on observation and manual operations,
and still control the machinery by voice input commands.
Another major application of speech processing is in military operations. Voice control of weapons is an example. With reliable speech recognition equipment, pilots can give
commands and information to the computers by simply speaking into their microphones they dont have to use their hands for this purpose.
Another good example is a radiologist scanning hundreds of X-rays, ultra sonograms, CT scans and simultaneously dictating conclusions to a speech recognition system
connected to word processors. The radiologist can focus his attention on the images rather
than writing the text.
Voice recognition could also be used on computers for making airline and hotel
reservations. A user requires simply to state his needs, to make reservation, cancel a reservation, or make enquiries about schedule.
Ultimate Goal:
The ultimate goal of the Artificial Intelligence is to build a person, or, more humbly,
an animal.
Conclusion:
189
www.iaetsd.in
By using this speaker recognition technology we can achieve many uses. This
technology helps physically challenged skilled persons. These people can do their works
by using this technology with out pushing any buttons. This ASR technology is also used in
military weapons and in Research centres. Now a days this technology was also used by
CID officers. They used this to trap the criminal activities.
Bibliography:
www.google.co.in/Artificial intelligence for speech recognition
www.google.com
www.howstuffworks.com
www.ieeexplore.ieee.org
190
www.iaetsd.in
VV college of Engineering,tisayanvilai
tutucorin
Abstract Cement, the second most consumed product in the
world, contributes nearly 7% of the global carbon dioxide
emission. Several efforts are in progress to reduce the use of
Portland cement in concrete in order to address the global
warming issues. Geopolymer concrete is a cementless concrete. It
has the potential to reduce globally the carbon emission that lead
to a sustainable development and growth of the concrete
industry. In this study, geo-polymer concrete is prepared by
incorporating ground granulated blast furnace slag (GGBS) and
black rice husk ash (BRHA) as source materials. In India RHA is
used for cattle feeding, partition board manufacturing, land
filling, etc. RHA is either white or black in colour. If the rice
husk is burnt in controlled temperature and duration, it will
result the ash in white colour. This type of RHA has high
percentage of silica content. The ease availability of RHA is black
in colour due to uncontrolled burning temperature and duration
in various rice mills, so the resulting rice husk ash is called as
black rice husk ash (BRHA).
In this study GGBS used as a base material for geopolymer
concrete and it is replaced upto 30% by BRHA. The strength
characteristic of GGBS and BRHA based geopolymer concrete
has been studied. The suitable compressive strength test is
performed. The result shows that the replacement of BRHA
decreases the compressive strength of geopolymer concrete,
because of the unburnt carbon content present in the BRHA.
INTRODUCTION
Concrete is the second most used material in the world after
water. Ordinary Portland cement has been used traditionally
as a binding material for preparation of concrete. One tone of
carbon dioxide is estimated to be released to the atmosphere
when one ton of ordinary Portland cement is manufactured.
Also the emission by cement manufacturing process
contributes 7% to the global carbon dioxide emission. It is
important to find an alternate binder which has less CO2
emission than cement. Geopolymer is an excellent alternative
which transform industrial waste products like flyash, GGBS
and rice husk ash into binder for concrete. Al- Si materials
which are used as source materials undergoes dissolutions, gel
formation, setting and hardening stages to form geopolymers.
There are two main constituents of geo-polymers, namely the
source materials and the alkaline liquids. The source materials
for geo-polymers based on alumina-silicate should be rich in
silicon (Si) and aluminium (Al). These could be natural
minerals such as kaolinite, clays, etc. Alternatively, by-
Property
SiO2
Al2O3
Fe2O3
CaO
MgO
Specific gravity
191
GGBS
31.25 %
14.06 %
2.80 %
33.75 %
7.03 %
2.61
BRHA
93.96 %
0.56 %
0.43 %
0.55 %
0.4 %
2.11
www.iaetsd.in
Materials
Property
Specific gravity
Fineness modulus
Bulk density
Coarse
Aggregate
2.73
7.36
1533 kg/m3
Fine
Aggregate
2.60
2.63
1254 kg/m3
GGBS
RHA
Coarse
Aggregate
Fine
Aggregate
Sodium
Hydroxide
Sodium
Silicate
Super
Plasticizer
Extra
Water (15%)
B. Alkaline solution
A mixture of Sodium hydroxide and Sodium Silicate was used
as the alkaline solution in the present study. Commercial
grade Sodium Hydroxide in pellets form (97%-100% purity)
and Sodium silicate solution having 7.5%-8.5% of Na2O and
25% -28% and water of 67.5%- 63.5% were used in the
present study. The ratio of Sodium Silicate to Sodium
Hydroxide was kept as 2.5. In this study the compressive
strength of geo-polymer concrete is examined for the mix of
8M of NaOH solution. The molecular weight of NaOH is 40.
For example to prepare 8M of NaOH solution 320g of NaOH
flakes are weighed and they can be dissolved in distilled water
to form 1 litre solution. For this, volumetric flask of 1 litre
capacity is taken, NaOH flakes are added slowly to distilled
water to prepare 1litre solution.
In order to improve the workability of fresh concrete, highrange water-reducing naphthalene based super plasticizer was
used. Extra water nearly 15% of binder is added to increase
the workability of the concrete.
METHODOLOGY
Mass(Kg/m3)
Mix1
Mix2
(0%
(10%
RHA)
RHA)
394
355
0
39
647
647
Mix3
(20%
RHA)
315
79
647
Mix4
(30%
RHA)
276
118
647
1201
1201
1201
1201
45
45
45
45
113
113
113
113
59
59
59
59
Mix
192
Compr
essive
strength
at
3rd
day(MPa)
Compr
essive
strength
at
7th
day(MPa)
Compre
ssive
strength at
28th
day(MPa)
www.iaetsd.in
55.9
60.5
69.2
48.6
54.3
57.46
Mix 3 (80%
GGBS, 20% RHA)
40.75
44.72
47.36
Mix 4 (70%
GGBS, 30% RHA)
20.8
23.54
27.36
4.
5.
6.
CONCLUSIONS
From the limited experimental study conducted on the
geopolymer concrete made with GGBS and BRHA, the
following conclusions are made.
1. The GGBS based geopolymer concrte gives higher
strength.
2. The replacement of GGBS by BRHA decreases the
compressive strength because of the unburnt carbon
content.
3. The percentage replacement of BRHA in GGBS based
geo-polymer concrete is significant only in 10%.
Alireza Naji Givi, Suraya Abdul Rashid, Farah Nora A. Aziz, Mohamad
Amran Mohd Salleh, (2010), Assessment of the effects of rice husk
ash particle size on strength, water permeability and workability of
binary blended concrete, Construction and Building Materials., Vol.
24, Issue 11, pp.2145-2150.
Bhosale, M.A, Shinde, N.N (2012), Geo-polymer concrete by using fly ash
in construction, IOSR Journal of Mechanical and Civil Engineering.,
Vol. 1, Issue 3, pp.25-30.
Detphan.S, and P. Chindaprasirt, (2009), Preparation of fly ash and rice husk
ash geo-polymer International Journal of Minerals, Metallurgy and
Materials., Vol. 16, Issue 6, pp. 720-726.
Hardjito, D. and Rangan, B. V. (2005), Development and Properties of Low
Calcium Fly Ash Based Geo-polymer Concrete, Research Report GC
1, Faculty of Engineering, Curtin University of Technology.
Joseph Davidovits, (1994), Global Warming Impact on the Cement and
Aggregates Industries, World Resource Review, Vol. 8, No.2,
pp. 263-278.
Kartini, K, Mahmud, H.B, Hamidah, M.S, (2006), Strength Properties of
Grade 30 Rice Husk Ash Concrete 31st Conference on Our World in
Concrete & Structures.
Malhotra, V. M. (1999), Making Concrete "Greener" With Fly Ash
American Concrete Institute. pp. 61-66.
McCaffery, R. (2002), Climate Change and the Cement Industry, Global
Cement and Lime Magazine (Environment Special Issue),
pp. 15-19.
Mehta, P. K., (2001) Reducing the Environmental Impact of Concrete, ACI
Concrete International, Vol. 23, (10) pp. 61-66.
193
www.iaetsd.in
D. Authentication mechanisms:
E. The authentication mechanisms employed by ecommerce sites for their customers also have some
loopholes which can be exploited by a hacker once he gets
access to sensitive customer data of the e-commerce
website. Most of the prominent e-commerce sites do not
verify whether the shipping and billing address are same
when a customer places an order. This gives leeway to a
hacker impersonating as a customer to get away with
goods purchased with the customers id and credit card. A
proper layer of authentication layers would be essential to
prevent such frauds apart from securing customer data.
II. VULNERABILITY
A. Storage of customer data:
First, almost all highly vulnerable e-commerce sites
collect and store customer information like their name,
address, password, preferences, history of purchase and
transaction, and in some cases even the credit card number
and its cvv number.They use these data for analyzing
customer trends and to customize the online experience of
the customer. Hence it becomes imperative for them to
either have a foolproof mechanism to protect this data or
avoid collecting such sensitive data.
194
www.iaetsd.in
195
www.iaetsd.in
I.
J.
Authentication mechanism to fix loop holes
in payment gateways :
IV.
196
www.iaetsd.in
;\\ if the credit card is from new york , the user ip should be
near by to its state location//
else transaction should declined
if
the user is placing the order from some other country with his
own card
then
authentication code from shopping website to the bank is
supplied
new solution :
def ipEntered():
global ipEntered
ipEntered = input ( please enter the ip):
# illegal ip
else
ip.sucess
if
ipEntered.match
a = s.split()
match.credit card details
return True
else
payment.failed
its not a brief coding , its a basic authentication for the
payments gateways , if the websites fix some open source
coding to verify untrusted connection and also to match ip
..illegal access can be reduced
conclusion :
thus if we maintain good encrypted records and good
payment gateway with trusted ssl connection then the illegal
access will be stopped
197
www.iaetsd.in
REFERENCES
198
www.iaetsd.in
I. INTRODUCTION
In almost every information recovery and text applications it
is essential to locate quickly some or all occurrences of user
defined patterns in text. String matching problem is to locate
all the occurrences of a given string pattern in a string text.
This string matching can be performed through single
pattern and multi pattern occurrences. For many string
matching problems multi pattern is the only solution
provided. Thanks for Alfred V. Aho and Margaret J.
Corasick who invented one of the best string matching
algorithms named Aho-Corasick algorithm.The multi
patterns matching in a text string can be easily found by
means of this algorithm as it is the only one which performs
exact matching of patterns in a given text. Just like a
dictionary matching algorithm it also starts searching pattern
from basis of sub-string matching. For every unit of time, a
character is read from the pattern string and then it tries to
find same character in the automata that is already
constructed, after reading the whole pattern string if the
automata is found to be entered in the final state then that
pattern occurrence will be submitted. Similarly for all
patterns it matches simultaneously. Intrusion detection
systems at multi-gigabit rates are achieved using hardware
acceleration; one prospect is the usage of Ternary Content
Addressable Memories (TCAM). Ternary Content
Addressable Memory (TCAM) is a type of memory that can
execute parallel searches at high speeds. A TCAM contains a
set of entries. The top entry of the TCAM has the least index
and the bottom entry has the biggest. Each entry is a bit
vector of cells, where each cell can store one bit. As a result,
a TCAM entry can be
used to store up a string. The working of TCAM is as follows:
for a certain input string, it compares against all entries in its
memory in parallel, and reports the one which match the
input.
II. AHO CORASICK ALGORITHM
Aho-Corasick is the Multi-pattern matching algorithm
which traces all the occurrence of set of patterns in a string. It
is done by creating Deterministic Finite Automata (DFA) for
all the predefined patterns; along with it using automaton,
which process a text in a single pass.
Example: Let us consider a finite set of patterns,
{OTHER, HER, HATE, HEIGHT}
Preprocessing Phase
Step 1: Construct finite state automata for the set of
Predefined patterns which is supposed to be originate in the
text string. The states will be numbered by their names and
transitions are represented by the characters between the
defined states would be accessible in the particular pattern
As a first step, Aho-Corasick algorithm constructs finite
automata for the set of patterns
O
T
H
E
R
0
H
E
A
T
E
11
10
H
E
12
I
13
G
14
15
H
16
T
17
199
www.iaetsd.in
INPUT
STATE
O
1
------------------
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
T
-2
-------10
------17
--
H
--3
-------11
----16
---
E
---4
--------13
------
R
----5
--8
-----------
A
------7
------------
I
-------------14
-----
G
--------------15
----
E
3
R
4
H
E
6
R
8
A
T
E
11
10
H
E
12
I
13
G
14
15
H
16
T
17
200
www.iaetsd.in
201
www.iaetsd.in
CS
6
4
3
2
1
1
0
0
9
7
5
4
IN
E
y
E
y
T
y
o
b
E
*
*
*
*
NS
9
7
5
4
8
2
6
1
3
3
3
2
1
F
0
0
0
0
0
0
0
0
0
1
1
1
1
CS
CS
8
6
4
3,7,9
2,5
1,4
1,4
All states
All states
IN
E
Y
E
Y
T
Y
O
B
E
NS
9
7
5
4
8
2
6
1
3
Fig. 9. TCAM/SRAM
entries in NFA architecture
recursively during the computation of dim (0), where 0
indicates the initial state
Step 3-Assigning State Codes
For a state s, the unique code u_code(s) can make use of a
code covered by c_code(s) and in this case a code is used
which is obtained by replacing *with 0 in c _code(s) as
u_code(s). The codes are recursively assigned. Initially, the
code of the root 0 is assigned as follows:
C_code(0)=**.* and u_code(0)=00.0.
202
www.iaetsd.in
203
www.iaetsd.in
204
www.iaetsd.in
Keywords:
Abstract:
By applying sodium hydroxide/urea and a sample
freeze drying method, we successfully synthesized
green cellulose aerogel from paper waste for the
first time. We adjusted the cellulose concentration
from 1.5 percents to 4 percents in the initial
hydrogel. They yielded densities changing from
0.03-0.1 g/cm3.The absorption capacities varied
from 9 to 20 times of their own weight. To
investigate the water absorption capacity in
relationship with the initial chemical dosage, we
changed the input amount of urea and sodium
hydroxide, which is the first study ever. The
thermal conductivity of the 2 percents sample
ranged from 0.029-0.032 W/mK. Besides, the
material has a high potential to be used in diaper
industry as it is biodegradable which is better than
most super absorbent polymers.
Synthesis Procedure:
For standard sample, urea (13.7 wt%, 5.025g) and
sodium hydroxide (1.9 wt%, 0.725g) were
dispersed in DI water (30g), which is dispersed by
a magnetic stir. Recycled cellulose (2 wt%, 0.75g)
was added to the transparent solution, pre-cooled in
ice/water bath for 10 minutes, then sonication for
10 minutes. Thereafter, the solution was placed in
refrigerator for more than 24 hr to allow gelation of
the solution. After the solution was frozen, it was
then thawed at room temperature and then followed
by immersing into ethanol (99 vol %) for
coagulation for two days. After coagulation,
solvent exchange was carried out by immersing the
gel in de-ionised (DI) water for 2 days. The sample
was then frozen in a freezer at 18 for 24 h. After
that, freeze drying is carried out for 2 days with a
Scan Vac Cool Safe 95-15 Pro freeze dryer
(Denmark) to obtain the desired aerogel. Other
samples were prepared by the same method by
varying one component of the standard sample.
Detail refers to the Table 1
Introduction:
Most diapers in market are composed of super
absorbent polymers, which are not biodegradable.
Averagely a baby needs more than 5,000 diapers
before it is potty-trained . Adult diapers are also
requested in large amount every day. Huge amount
of diapers is consumed daily in this world.
Nowadays, as super absorbent polymer is not
biodegradable. The used diapers waste large
amount of land to store them. Our paper gives a
potential alternative of traditional diapers-Cellulose
aerogel, which with high absorbent capacity
(almost 20 times) and also biodegradable can be
used to replace the non-biodegradable super
absorbent polymer. Cellulose aerogel can be
derived from paper. Only United States alone used
85.5 million tons of paper per year . This huge
amount of used paper needs to be recycled and
functions as useful material to prevent waste. Our
Group 1
Cellulose amount
G1_015
0.5444[g]
Standard
0.75[g]
2%
G1_03
1.1057[g]
3%
G1_04
1.4896[g]
4%
Group 2
urea amount
G2_10
3.4972[g]
10%
standard
5.025[g]
13.76%
205
Cellulose concentration
1.50%
Urea concentration
www.iaetsd.in
Characterization:
Thermal conductivity measurement:
Sample
No
Wet
Weight
[g]
8.3431
Water
uptake
Ratio
20.24
Water
uptake
Ratio
0.984
Density
[g/cm3]
G1_015
Dry
Weight
[g]
0.3928
Standard
0.7280
17.43
0.978
0.04
G1_03
0.8976
12.80
0.970
0.05
G1_04
2.4507
13.414
0
12.388
5
24.463
4
8.98
0.935
0.10
0.03
Sample
No
Wet
Weight
[g]
14.1073
Water
uptake
Ratio
20.02
Porosity
G2_10
Dry
Weight
[g]
0.6712
Standard
0.7280
13.4140
17.43
0.978
G2_15
0.7532
14.5129
18.27
0.975
G2_20
0.6985
13.1829
17.87
17.87
0.978
206
www.iaetsd.in
Summary:
Our group successfully synthesized recycled
cellulose aerogel from paper waste. The newly
developed material is with high absorption
capacity. Sodium hydroxide amount and cellulose
concentration alter the water uptake ratio of
cellulose aerogel greatly, while urea amount do not
play a significant role in the water uptake ratio.
References :
1.
Informationon
http://www.enfamil.com/app/iwp/enf10/content.do
?dm=enf&id=/Consumer_Home3/Prenatal
3/Prenatal_Articles/changingdiaper&iwpst=B2C&l
s=0&csred=1&r=3557620074
Sample
No
Dry
Weight
[g]
Wet
Weight
[g]
Water
uptake
Ratio
Porosity
G3_015
0.5925
11.9001 19.08
0.983
standard 0.7280
13.4140 17.43
0.978
G3_025
0.7639
12.6251 15.53
0.974
G3_03
0.7066
11.3263 15.03
0.976
207
www.iaetsd.in
Near Field
Communication Tag Design with AES Algorithm
1
Ashwin S, 2Priyatam Ch
ashwinksk@yahoo.com, kakarotgokuvegeta@gmail.com
I INTRODUCTION
NFC stands for Near Field Communication. NFC
specificationscan be found in ISO 18092.The main
characteristic of NFC is that it is a wireless communication
interface with a working distance limited to about 10 cm.
The interface operates in different modes. The modes are
distinguished whether a device creates its own RF field or
whether a device retrieves the power from the RF field
generated by another device. Radio-frequency identification
(RFID) technology is the enabler for a variety of new
applications. Many of these new applications will require
RFID tags to support additional functionality, which
increases their design complexity. Especially security
functionality will play an important role. In order to cope
with this increased complexity of the tags, new design
concepts such as programmable approaches are necessary.
Cryptography is the science of information and
communication security that enables the confidentiality
through an insecure channel communication. It prevents
unauthorized alteration of use. It uses a cryptographic
system to transform a plaintext into a cipher text, using most
of the time a key. There exists certain cipher that doesn't
need a key at all. The AES is the winner of the contest, held
in 1997 by the US Government, after the data encryption
standard was found too weak because of its small key size
208
www.iaetsd.in
The RxTx unit is the interface between the serial data signals
of the RS232 and the parallel data signals of the control unit.
Additionally, the RxTx unit is provided with an external
clock signal .This provides a bit-clock signal to all
components of the tags digital part. But in this analysis our
attention is only towards the Digital part of the system .so,
input signal (data) is given directly to the RxTx Unit.
Incoming serial data from the RS232 interface is first
sampled by the RxTx unit, decoded into bits, transformed to
byte data. The AMBA interface places this data into a FIFO
buffer stores up to 6 Bit that is accessed by the
microcontroller over the AMBA bus. The outgoing data
from the microcontroller is first placed in the FIFO buffer of
the FL and then transmitted to the RxTx unit by the control
unit. The AMBA interface connects the FL with the AMBA
bus. The AMBA interface also contains a status register that
provides information about the internal state of the FL i.e.
about the presence of data in the FIFO bus and a
configuration register. All the components can be accessed
by the microcontroller via the AMBA bus.
B. 8 Bit Microcontroller
209
www.iaetsd.in
one clock cycle. Also writing into one port and reading from
the other is possible
IV PROCESSING ARCHITECTURE OF AES
ALGORITHM
210
www.iaetsd.in
211
www.iaetsd.in
Green concrete
Eco-friendly construction
M.SASIDHAR
V.SUNDARKISHNAN
I.
INTRODUCTION:
Green concrete is a revolutionary topic in the history
of concrete industry. This was first invented in Denmark
in the year 1998. Green concrete has nothing to do with
colour. It is a concept of thinking environment into
concrete considering every aspect from raw materials
manufacture over mixture design to structural design,
construction, and service life. Green concrete is very
often also cheap to produce, because, for example, waste
products are used as a partial substitute for cement,
charges for the disposal of waste are avoided, energy
consumption in production is lower, and durability is
greater. Green concrete is a type of concrete which
resembles the conventional concrete but the production
or usage of such concrete requires minimum amount of
energy and causes least harm to the environment. The
CO2 emission related to concrete production, inclusive of
cement production, is between 0.1 and 0.2 t per tonne of
produced concrete.
212
www.iaetsd.in
C. SILICA FUME:
Silica fume, also known as microsilica, is an
amorphous (non-crystalline) polymorph of silicon
dioxide, silica. It is an ultrafine powder collected as a byproduct of the silicon and ferrosilicon alloy production
and consists of spherical particles with an average
particle diameter of 150 nm. The main field of
application is as pozzolanic material for high
performance concrete.
It is sometimes confused with fumed silica.
However, the production process, particle characteristics
and fields of application of fumed silica are all different
from those of silica fume.
Silica fume is an ultrafine material with spherical
particles less than 1 m in diameter, the average being
about 0.15 m. This makes it approximately 100 times
smaller than the average cement particle. The bulk
density of silica fume depends on the degree of
densification in the silo and varies from 130 to 600
kg/m3. The specific gravity of silica fume is generally in
the range of 2.2 to 2.3. The specific surface area of silica
fume can be measured with the BET method or nitrogen
adsorption method. It typically ranges from 15,000 to
30,000 m2/kg.
ENVIRONMENTAL GOALS:
Green Concrete is expected to fulfil the following
environmental obligations:
Reduction of CO2 emissions by 21 %. This is in
accordance with the Kyoto Protocol of 1997.
Increase the use of inorganic residual products
from industries other than the concrete industry
by approx. 20%.
213
www.iaetsd.in
CONCLUSION:
The newer the technologies simultaneously it must
be eco-friendly. Using Green concrete in Construction
field is a revolution for the eco-friendly civil
infrastructural development. Upcoming generation must
use the green concrete instead of conventional concrete
so that CO2 emission is considerably reduced.
REFERENCES:
[1]
[2]
[3]
[4]
www.greenconcrete.info
http://greenglobe.com/
http://flyash.sustainablesources.com
http://www.microsilica-china.com
214
www.iaetsd.in
I.
Abstract
II.
Introduction
III.
215
www.iaetsd.in
Fig.1 Crash of the Wright Flyer, 1908. Courtesy of the National Air
and Space Museum,Smithsonian Institution Photo A-42555-A[1]
IV.
Modern automobiles increasingly utilize high-strength lowweight alloys for better fuel efficiency. Aluminium alloys
seem to serve the purpose owing to its high strength to
weight ratio. Several major automobile components such as
engine blocks, pistons, intake manifold, carburettors and
brake parts make use of aluminium castings. Since
aluminium alloys such as Al-356 is extensively used, a
study to realize the reason for their mechanical failure is
necessary.
S. Nasrazadani and L. Reyes investigated a clutch pedal
lever made of permanent mould cast Al 356-T6 aluminium
by way of metallography, SEM, hardness testing and visual
inspection [5]. They concluded that the parts in clutch
assembly must be designed with thicker sections to resist
the applied stress. Fatigue and brittle failure occurs due to
presence of dendrite phases and micro-porosity and it can
be avoided by production of heat treated Al 356-T6.
216
www.iaetsd.in
[6]
V.
217
Root-Cause Analysis
www.iaetsd.in
Conclusions
VIII.
References
VI.
218
www.iaetsd.in
ABSTRACT
Peer-to-Peer (P2P) Systems have
attracted significant interest in recent years.
In P2P networks, each peer acts as both a
server and client. This characteristic makes
peers vulnerable to a wide variety of attacks.
Having robust trust management is very
critical for such open environment to
exclude unreliable peer from the system.
Managing trust is a problem in peer to peer
environment, so our SORT model is built
based on trust metrics. The trust metrics
such as reputation, service trust,
recommendation trust are defined to
precisely measure trustworthiness of peers.
A peers trustworthiness is evaluated by
considering provided services and given
recommendations
with
service
and
recommendation contexts. When evaluating
recommendation,
recommenders
trustworthiness and confidence level about
the information provided are also
considered. Experiments on file sharing
application demonstrate that peers with the
highest trust value are considered and build
the trust model in their contiguity and
insulate malignant peers. Building trust
relationships among peers can mitigate
attacks of malicious peers. Peers create their
own trust network in their proximity by
I.
INTRODUCTION
219
www.iaetsd.in
220
www.iaetsd.in
221
www.iaetsd.in
[7] Yao Wang[Ya Wan, 05 ]. Peerto-peer networks are networks in which all
peers cooperate with each other to perform
article function in a decentralized manner
All peers are both users and providers of
resources and can access each other directly
without intermediary agents. Compared with
a centralized system, a peer-to-peer (P2P)
system provides an easy way to aggregate
large amounts of resource residing on the
edge of Internet or in ad-hoc networks with
a low cost of system maintenance.
fuzzy
logic
uses
of
System
storage, selection
anonymity.
05].
servers,
222
www.iaetsd.in
A. Method
cycle
223
www.iaetsd.in
B. Attacker Model
Attackers can perform service-based
and
recommendation
based
attacks.
Uploading a virus infected or an inauthentic
file is a service-based attack. Giving a
misleading recommendation intentionally is
a recommendation-based attack.
A. CONCLUSION
Trust model for P2P networks is
presented, in which a peer can develop a
trust network in its proximity. A peer can
isolate malicious peers around itself as it
develops trust relationships with good peers.
Two context of trust, service and
recommendation contexts, are defined to
measure capabilities of peers in providing
services and giving recommendations.
Interactions and recommendations are
considered with satisfaction, weight, and
fading effect parameters. A recommendation
contains
the
recommenders
own
experience,
information
from
its
acquaintances, and level of confidence in the
recommendation.
These
parameters
provided us a better assessment of
trustworthiness. Individual, collaborative,
and pseudonym changing attackers are
studied in the experiments. Damage of
collaboration and pseudo spoofing is
dependent to attack behavior. Although
recommendations
are
important
in
hypocritical
discriminatory
attackers.
Attacks in most experiments. However, in
extremely malicious environments such as a
50 percent malicious network, collaborators
can continue to disseminate large amount of
misleading recommendations. Another issue
about SORT is maintaining trust all over the
network. If a peer changes its point of
attachment to the network, it might lose a
part of its trust network. These issues might
be studied as a future work to extend the
trust model. Using trust information does
not solve all security problems in P2P
systems but can enhance security and
effectiveness of systems. If interactions are
224
www.iaetsd.in
B. Future Work
Managing trust is a problem of
particular importance in peer-to-peer
environments
where
one
frequently
encounters unknown agents. We present an
approach that addresses the problem of
reputation-based trust management at both
th data management and the scientific level.
We employ at both levels scalable data
structures and algorithm that require no
central control and allows assessing trust by
computing any agents reputation from its
former interactions with other agents. Thus
the method can be implemented in a p2p
environment and scales well for very large
number of participants. We expect that
scalable methods for trust management are
an important factor, if fully decentralized
peer-to-peer systems should become the
platform for more serious applications than
simple exchange.
Reference
[1] A Robust and Scalable Reputation
System for Trusted Peer-to-Peer
Computing: Run fang Zhou, Kai Hwang.,[R
Zhou, Kai Hw,06]
225
www.iaetsd.in
226
www.iaetsd.in
I.
INTRODUCTION:
WEB PERSONALIZATION:
The web is used for accessing a variety of information stored in various locations in
various formats in the whole world. The content in web is rapidly increasing and need for
identifying, accessing and retrieving the content based on the needs of the users is required.
An ultimate need nowadays is that predicting the user requirements in order to improve
the usability of the web site. Personalized search is the solution for this problem since different
search results based on preferences of users are provided.
In brief, web pages are personalized based on the characteristics of an individual user
based on interests, social category, context etc The Web Personalization is defined as any
action that adapts information or services provided by a web site to an individual user or a set of
users. Personalization implies that the changes are based on implicit data such as items
purchased or pages viewed.
Personalization is an overloaded term: there are many mechanisms and approaches bothe
automated and marketing rules controlled, whereby content can be focused to an audience in a
one to one manner.
227
www.iaetsd.in
The above web personalization process uses the web sites structure, Web logs created by
observing the users navigational behavior and User profiles created according to the users
preferences along with the Web sites content to analyze and extract the information needed for
the user to find the pattern expected by the user. This analysis creates a recommendation model
which is presented to the user. The recommendation process relies on the existing user
transactions or rating data, thus items or pages added to a site recently cannot be recommended.
II.
Web mining is a mining of web data on the World Wide Web. Web mining does the
process on personalizing these web data. The web data may be of the following:
1.
2.
3.
4.
With personalization the content of the web pages are modified to better fit for user needs.
This may involve actually creating web pages, that are unique per user or using the desires of a
user to determine what web documents to retrieve. Personalization can be done to a group of
specific interested customers, based on the user visits to a websites. Personalization also includes
techniques such as use of cookies, use of databases, and machine learning strategies.
Personalization can be viewed as a type of Clustering, Classification, or even Prediction.
USER PROFILES FOR PERSONALIZED INFORMATION ACCESS:
228
www.iaetsd.in
As shown in Figure 2.1, the user profiling process generally consists of three main
phases. First, an information collection process is used to gather raw information about the user.
Depending on the information collection process selected, different types of user data can be
extracted. The second phase focuses on user profile construction from the user data. The final
phase, in which a technology or application exploits information in the user profile in order to
provide personalized services.
TECHNIQUES USING USER PROFILE:
From an architectural and algorithmic point of view personalization systems fall into
three basic categories: Rule-based systems, content-filtering systems, and collaborative filtering
systems.
229
www.iaetsd.in
230
www.iaetsd.in
instances that belong to the same class. The recommendations generated by the proposed
collaborative system are in turn derived by binary matching the current user visit expressed as
ontology instances to the derived domain-level aggregate profiles, and no semantic relations
beyond hyperonymy/hyponymy are employed.
Acharyya and Ghosh [7] also propose a general personalization framework based on the
conceptual modeling of the users navigational behavior. The proposed methodology involves
mapping each visited page to a topic or concept, imposing a tree hierarchy (taxonomy) on these
topics, and then estimating the parameters of a semi- Markov process defined on this tree based
on the observed user paths. In this Markov modelsbased work, the semantic characterization of
the context is performed manually. Moreover, no semantic similarity measure is exploited for
enhancing the prediction process, except for generalizations/specializations of the ontology
terms.
Middleton et.al. [8] explore the use of ontologies in the user profiling process within
collaborative filtering systems. This work focuses on recommending academic research papers to
academic staff of a University. The authors represent the acquired user profiles using terms of a
research paper ontology (is-a hierarchy). Research papers are also classified using ontological
classes. In this hybrid recommender system which is based on collaborative and content-based
recommendation techniques, the content is characterized with ontology terms, using document
classifiers (therefore a manual labeling of the training set is needed) and the ontology is again
used for making generalizations/specializations of the user profiles.
Kearney and Anand [9] use an ontology to calculate the impact of different ontology
concepts on the users navigational behavior (selection of items). In this work, they suggest that
these impact values can be used to more accurately determine distance between different users as
well as between user preferences and other items on the web site, two basic operations carried
out in content and collaborative filtering based recommendations. The similarity measure they
employ is very similar to the Wu & Palmer similarity measure presented here. This work focuses
on the way these ontological profiles are created, rather than evaluating their impact in the
recommendation process, which remains opens for future work.
IV.
CONCLUSION
In this paper we surveyed the research in the area of personalization in web search. The study
reveals a great diversity in the methods used for personalized search. Although the World Wide
Web is the largest source of electronic information, it lacks with effective methods for retrieving,
filtering, and displaying the information that is exactly needed by each user. Hence the task of
retrieving the only required information keeps becoming more and more difficult and time
consuming.
To reduce information overload and create customer loyalty, Web Personalization, a
significant tool that provides the users with important competitive advantages is required. A
231
www.iaetsd.in
Personalized Information Retrieval approach that is mainly based on the end user modeling
increases user satisfaction. Also personalizing web search results has been proved as to greatly
improve the search experience. This paper also reviews the various research activities carried out
to improve the performance of personalization process and also the Information Retrieval system
performance.
REFERENCES
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
K. Sridevi and Dr. R. Umarani, Web Personalization Approaches: A Survey in IJARCCE, Vol.2.Issue3.
March 2013.
Adar, E., Karger, D.: Haystack: Per-User Information Environments. In: Proceedings of the 8th
International Conference on Information Knowledge Management (CIKM), Kansas City, Missouri,
November 2-6 (1999) 413-422.
Bamshad Mobasher, Data Mining forWeb Personalization The Adaptive Web, LNCS 4321, pp. 90135,
2007. Springer-Verlag Berlin Heidelberg 2007.
Indu Chawla, An overview of personalization in web search in 978-1-4244-8679-3/11/$26.00 2011
IEEE.
H. Dai, B. Mobasher, Using Ontologies to Discover Domain-Level Web Usage Profiles, in Proc. of the
2nd Workshop on Semantic Web Mining, Helsinki, Finland, 2002.
D.Oberle, B.Berendt, A.Hotho, J.Gonzalez, Conceptual User Tracking, in Proc. of the 1st Atlantic Web
Intelligence Conf. (AWIC),2003.
S. Acharyya, J. Ghosh, Context-Sensitive Modeling of Web Surfing Behaviour Using Concept Trees, in
Proc. of the 5th WEBKDD Workshop, Washington, August 2003.
S.E. Middleton, N.R. Shadbolt, D.C. De Roure, Ontological User Profiling in Recommender Systems,
ACM Transactions on Information Systems (TOIS), Jan. 2004/ Vol.22, No. 1, 54-88.
P. Kearney, S. S. Anand, Employing a Domain Ontology to gain insights into user behaviour, in Proc. of
the 3rd Workshop on Intelligent Techniques for Web Personalization (ITWP 2005), Endiburgh, Scotland,
August 2005.
http://en.wikipedia.org/wiki/Ontology
Bhaganagare Ravishankar, Dharmadhikari Dipa, WebPersonalization Using Ontology: A Survey, IOSR
Journal of Computer Engineering (IOSRJCE) ISSN : 2278-0661 Volume 1, Issue 3 (May-June 2012), PP
37-45 www.iosrjournals.org.
Cooley, R., Mobasher, B., Srivastava, J.: Web mining: Information and pattern discovery on the world wide
web. In: Proceedings of the 9th IEEE International Conference on Tools with Artificial Intelligence
(ICTAI97), Newport Beach, CA (November 1997) 558567.
Joshi, A., Krishnapuram, R.: On mining web access logs. In: Proceedings of the ACM SIGMOD Workshop
on Research Issues in Data Mining and Knowledge Discovery (DMKD 2000), Dallas, Texas (May 2000).
Liu, C. Yu, and W. Meng, 2002. Personalized web search by mapping user queries to categories. In
Proceedings of CIKM, pages 558-565.
Morris, M. R. (2008). A survey of collaborative Web search practices. In Proc. of CHI 08, 1657-1660.
Jones. W. P., Dumais, S. T. and Bruce, H. (2002). Once found, what next? A study of keeping behaviors
in the personal use of web information. Proceedings of ASIST 2002, 391-402.
Deerwester, S., Dumais, S., Furnas, G., Landauer, T.K., Harshman, R.: Indexing by Latent Semantic
Analysis. Journal of the American Society for Information Science, 41(6) (1990) 391-407
Dolog, P., and Nejdl, W.: Semantic Web Technologies for the Adaptive Web. In: Brusilovsky, P., Kobsa,
A., Nejdl, W. (eds.): The Adaptive Web: Methods and Strategies of Web Personalization, Lecture Notes in
Computer Science, Vol. 4321. Springer-Verlag, Berlin Heidelberg New York (2007) this volume.
232
www.iaetsd.in
Abstract
MIMO system has attracted considerable attention
recently for its potential to increase the system capacity.
In this paper, we aim to design practical user scheduling
algorithms to maximize the system performance. Various
MAC scheduling policies have been implemented, in
order to provide distributed traffic control and
robustness against interference. Further, in order to
increase the efficiency of resource-utilization, the
scheduling policies have been modified, and those have
also been implemented. MATLAB simulations have been
used throughout and the various policies have been
compared with each other in order to draw important
results and conclusions. This paper ends with a few
suggestions for future improvements.
1. Introduction
Multi antenna system has been researched
intensively in recent years due to their potential, to
increase the channel capacity in fading channel. It is
shown that MIMO systems can support higher data rates
under same transmit power and BER performance
requirements. Such system finds wide applications in
WLAN networks. The conventional collision avoidance
(CSMA/CA) approach described in the 802.11 standard
[9] makes use of control messages (RTS/CTS) to
mitigate the hidden terminal problem, thus preventing
collisions that would result in loss of data and waste of
resources. In a MIMO wireless network, however, this is
not always the best solution. Specifically, the receiver
structure is able to separate incoming PDUs, which
would then not result in a collision, but could instead be
detected separately. The networking protocols may then
choose how many and which channels to estimate, taking
into account that the limited receiver capabilities allow
locking onto at most N sequences simultaneously. While
doing this, trying to detect too many destinations
oriented data packets could leave limited resources for
interference cancellation, leading to data loss. Even with
channel estimation and spatial de-multiplexing, the
MIMO receiver itself is still vulnerable to hidden
terminals in some sense: if the receiver is not aware of
interfering nodes nearby, it cannot estimate their channel
and cancel them.
2. System Model
Traditionally, the growing demand of capacity has
been met by increasing the bandwidth and/or by
inventing more spectrally efficient communication
protocols. However, since the introduction at Bell Labs
about 10 years ago, the concept of MIMO (Multiple
Input Multiple Output) shown in figure 1 has received an
increasing attention. The main observation is that if both
the transmitter and the receiver are equipped with n
antennas, the capacity (bit rate) can be increased by up to
a factor of n, depending on the richness of the wireless
channel. In principle, one can form n parallel channels,
which can transmit independently of one another. In
general, this is not possible for line-of-sight (LOS)
channels, since the multiple channels cannot be
independent and will therefore interfere. However, in a
rich scattering environment, the capacity can increase by
a factor up to n. The transmission of data in parallel
streams is usually referred to as spatial multiplexing.
233
www.iaetsd.in
transmitted vector symbol, assuming symbolsynchronous receiver sampling and ideal timing. Letting
a = (a 1 , a2 , . . . ,aM )T denote the vector of transmit
symbols, then the corresponding received N vector is
r1 = Ha + (1)
Here is a noise vector. One way to perform detection
for this system is by using linear combinational nulling.
Conceptually, each sub-stream in turn is considered to be
the desired signal, and the remaining are considered as
"interferers". Nulling is performed by linearly weighting
the received signals so as to satisfy some performancerelated criterion, such as Zero-Forcing (ZF). When
symbol cancellation is used, the order in which the
components of a are detected becomes important to the
overall performance of the system. We first discuss the
general detection procedure with respect to an arbitrary
ordering.
S {k1 , k2 , . . . , kM}
.(1)
..(3)
r2 = r1 k1 (H)k1
..(4)
Wk T i(H)kj = 0
ji
j=i
------- (5)
234
www.iaetsd.in
the unique vector satisfying (5) is just the kith row of Hki
1 where the notation Hki denotes the matrix obtained
by zeroing columns k1, k2, . . . , ki of H and + denotes the
Moore-Penrose pseudo inverse.
235
www.iaetsd.in
4.1 Class
The maximum number of antennas as related to
the distance of a node is called the class of the node.
For any transmitter, the total power allocated for a single
instance of transmission is a constant quantity, say for
example 100 W. As the number of transmit antennas
increase, this power is divided equally among the same
i.e. 2 transmit antennas implies 50 W through each, 4
transmit antennas implies 25 W through each and 10
transmit antennas implies 10 W through each.
Now based on the location of the receiver, it is
an obvious conclusion that as the distance between the
transmitter and the receiver increases, the power
necessary to ensure successful reception with good
signal quality, increases and hence the CLASS of the
receiver with respect to that particular transmitter
decreases. In order to calculate the class of different
nodes with respect to each other, assuming free space
propagation losses only, the free space path loss model is
used to account for the power loss. By setting a
minimum threshold of necessary received power for
satisfactory signal quality, the maximum number of
transmit antennas permissible is calculated.
In simple terms, the maximum number of
antennas permissible (I) is inversely proportional to the
1.
2.
236
www.iaetsd.in
Partially
Fairness
Scheduling
Without
Interference Cancellation (PFS-WIC):
Do the following steps till Ns=0
- i=D(1). (Insert the first request in the
destination oriented list in the CTS)
- Read source Si and number of PDUs Pi for the
packet with index i
- Insert grant (Si,Pi) in the CTS.
- Ns=Ns-Pi
- queue=queue-i
- Let k be the request with highest power in the
queue D ND
- If kD then
Insert grant (Si,Pi) in the CTS.
Else store in interference cancellation list
Endif
- Stop
- Using resources allotted accept incoming
packets.
Priority
Scheduling
Without
Interference
Cancellation (PS-WIC):
Do the following steps till end of D.
- Read source Si and number of PDUs Pi for the
packet with index i
- Insert grant (Si,Pi) in the CTS.
- Ns=Ns-Pi
- If for any i, Ns<Pi, allot Ns-Pi PDUs for the
particular request.
- If Ns=0, STOP
Partially Fairness Scheduling(PFS):
Do the following steps till Ns=0
-
237
www.iaetsd.in
Capacity in bps/Hz
0
-10
-8
-6
-4
-2
0
2
Eb/No in dB
10
BER for BLAST for 12 Receiver Antennas and various number of Transmit antennas
0
10
-1
10
-2
10
-3
10
-10
4 Tx, 12 Rx
10 Tx, 12 Rx
14 Tx, 12 Rx
-8
-6
-4
-2
Eb/No,dB
238
www.iaetsd.in
8
7
6
5
4
3
2
1
0
5
6
no of tx ant
10
BER
for BLAST for 8 transmit antennas and various number of receive antennas
0
10
-1
10
-2
10
-10
8 Tx,
8 Tx,
8 Tx,
8 Tx,
8 Tx,
-8
8 Rx
10 Rx
12 Rx
14 Rx
22 Rx
-6
-4
-2
Eb/No,dB
239
www.iaetsd.in
PFS
PS
5
9000
10000
8000
7000
6000
5000
4000
3000
2000
1000
3
4
5
6
7
Packet arrival rate per node per second
PS-WIC
PFS
PS
PFS-WIC
1.5
SNR
0.5
3
4
5
6
7
Packet arrival rate per node per second
240
www.iaetsd.in
PS and conventional
8000
conventional RTS/CTS
PS
7000
6000
5000
4000
3000
2000
1000
0
References
[1] P. Wolniansky, G. Foschini, G. Golden, and R. Valenzuela,
V-BLAST: An Architecture for Realizing Very High Data
Rates Over the Rich- Scattering Wireless Channel, in Proc.
1998 URSI Int. Symp. on Sign., Syst., and Elect., 1998, pp.
295300.
6000
conventional RTS/CTS
PFS
5000
4000
3000
2000
1000
241
www.iaetsd.in
10
242
www.iaetsd.in
243
www.iaetsd.in
2 TECHNOLOGIES USED
WCDMA, CDMA2000, and IEEE 802.11g
are the three different types of wireless standard
technologies used.
2.1 WCDMA
W-CDMA (Wideband Code Division
Multiple Access) is a wideband spread-spectrum
channel access method that utilizes the directsequence spread spectrum method of asynchronous
code division multiple accesses to
achieve higher speeds and support more users
compared to most time division multiple access
(TDMA) schemes used today.
2.2 CDMA2000
CDMA2000 is a family of 3G mobile
technology standards, based on CDMA, to send
voice, data, and signaling data between mobile
phones and cell sites. CDMA2000 is also known as
IMT Multi -Carrier (IMT-MC))
2.3 IEEE 802.11g
The IEEE 802.11g wireless standard
protocol is growing rapidly worldwide and become
the most mature technology for WLANs. The IEEE
802.11g standard consists of detailed specifications
for both the medium access control (MAC) and three
physical layers (PHY). The PHY layer selects the
correct modulation scheme that provides spread
spectrum in channel accessibility, data rate as well as
the necessary bandwidth. The IEEE 802.11g physical
layer uses basically four types of wireless data
exchange techniques:
Infrared (IR)
Frequency hopping spread
spectrum (FHSS)
Direct sequence spread spectrum
(DSSS).
Orthogonal Frequency Division
Multiplexing (OFDM)
2.3.1 Infrared (IR)
IR transmission operate at wavelength near
850nm.The IR signal is produced either by semiconductor laser diodes or LEDs with the former
being preferable because their electrical to optical
conversion behavior is more liner. The infrared
technology is not successfully commercialized.
2.3.2 Frequency hopping spread spectrum (FHSS)
Frequency hopping spread spectrum (FHSS)
is to divide the allocated frequency band into a
244
www.iaetsd.in
3 PROPOSED SYSTEM
3.1 WCDMA
In WCDMA, the code synchronization is
divided into a three stage process Primary
synchronization code, secondary synchronization
codes have to be identified by active correlator.
Scrambling code is identified by ballot machine.
Stage 1 has to detect a 256-chip primary
synchronization code (PSC). Generally, the matched
filter is used to detect the slot boundary, and the
correlation results are further accumulated for 15
slots to improve the signal-to-noise ratio (SNR).
Stage 2, one of 16 secondary synchronization codes
(SSCs) has to be identified by active correlator for
further comma-free ReedSolomon decoding.
Stage 3, one of eight complex-valued scrambling
codes is identified as the cell-specific scrambling
code by ballot machine. Figure 3. 1 shows the
generalized model for the three stages. First, input
data are correlated with local generated PN code
sequence. Then, correlation results are calculated and
accumulated, and the maximal result is identified as
the desired timing or the local PN code is identified
as the desired one by the peak detector.
4. DESIGN METHODOLOGY
4.1 System Architecture
According to the models of Figures 3. 13.3,
the integrated synchronizer for WCDMA,
CDMA2000, and 802.11 g is generalized, and the
overall model is shown in Figure 4.1. Input data are
correlated. With local generated
PN-code
sequences. Then, correlation results are calculated
and accumulated, and the peak result is identified as
the desired timing or the local PN code is identified
as the desired one. Note that only necessary hardware
blocks in this generalized model are enabled when
operating in different systems
245
www.iaetsd.in
40
35
P
o
w
e
r(m
W
)
30
25
20
15
10
5
0
1
W CDMA W it hout S PST
Pow
er(m
W
)
30
25
20
15
10
5
0
1
WCDMA Without SPST
246
www.iaetsd.in
35
30
Power(mW)
25
20
15
10
1
802.11G Without SPST
40
35
Power(mW
)
30
25
20
15
10
5
0
1
CDMA W ithout SPST
10
40
10
CDMA-AWGN
WCDMA-AWGN
802.11g-AWGN
CDMA-FADING
WCDMA-Fading
802.11g-FADING
-1
35
BER
30
Power(mW)
25
10
-2
20
10
15
-3
10
10
5
0
1
CDMA Without SPST
-4
-20
-15
-10
-5
EsNo
10
10
10
CDMA-AW GN
WCDMA-AWGN
802.11g-AW GN
CDMA-FADING
WCDMA-Fading
802.11g-FADING
-1
-2
BER
10
10
10
10
-3
-4
-5
-20
-15
-10
-5
EsNo
10
40
35
Pow
er(m
W
)
30
25
20
15
10
5
0
1
802.11G W ithout SPST
6 CONCLUSIONS
247
www.iaetsd.in
248
www.iaetsd.in
Dr T.V. Rao
Professor& HOD in CSE Department
PVP Siddartha Institute of Technology
Kanuru, Vijayawada, AP, India
tv_venkat@yahoo.com
I. INTRODUCTION
Design patterns is a proven solution for frequently
occurring design problems. So design patterns play an
important role in web application design. Such
patterns when used appropriately can improve quality
and performance of web application design. Gamma et
al. [1] and Buschmann et al. [2] observed that design
patterns are reusable software components that can
solve a particular design problem. Design patterns
enable reusability of expert design experiences to stop
reinvent the wheel and solve recurring design
problems [39], [40], [41], [42], [43]. According to
Patil et al. [4] high latency should be the important
characteristic of modern web applications. Towards
achieving high latency they proposed proxy cache to
access large scale web applications. Caching is
generally used when multiple queries have same
249
www.iaetsd.in
250
www.iaetsd.in
AND
PERFORMANCE
251
www.iaetsd.in
REFERENCES
[1] Gamma, E., Helm, R., Johnson, R., and Vlissides,
J. Design Patterns: Elements of Reusable ObjectOriented Software, Addison-Wesley, Reading, Mass.,
1995.
[2] Buschmann, F., Meunier, R., Rohnert, H.,
Sommerlad, P., and Stal, M. Pattern-Oriented
Software Architecture: A System of Patterns, Wiley,
Chichester, 1996.
[3] David Parsons, Evolving Architectural Patterns
For Web Applications.
[4]. Prof. S B Patil1, Mr. Sachin Chavan2, Prof. Preeti
Patil3, Prof. Sunita R Patil4. (2012). HIGH QUALITY
DESIGN TO ENHANCE AND IMPROVE
PERFORMANCE OF LARGE SCALE WEB
APPLICATIONS. IEEE. 0 (0), p1-8.
[5] Ngamsuriyaroj, S. ; Rattidham, P. ; Rassameeroj, I.
; Wongbuchasin, P. ; Aramkul, N. ; Rungmano, S.
Performance Evaluation of Load Balanced Web
Proxies IEEE, 2011.
[6] S B Patil, Sachin Chavan, Preeti Patil; High
Quality Design And Methodology Aspects To
Enhance Large Scale Web Services, International
Journal of Advances in Engineering & Technology,
2012, ISSN : 2231-1963
[7] OhSoo Kwon and HyeJa Bang. (2012). Design
Approaches of Web Application with Efficient
Performance in JAVA. IEEE. 11 (7), p1-7.
[8] Mustafa Mamawala. (n.d). Web Application
Performance Tuning -A systematic approach. IEEE. 0
(0), p1-11.
[9] Daniel Schwabe and Robson Mattos Guimares.
(n.d). Cohesive Design of Personalized Web
Applications. IEEE. 0 (0), p1-10.
[10] Iacopo Carreras. (2010). Bottom-Up Design
Patterns and the Energy Web. IEEE. 40 (4), p1-10.
252
www.iaetsd.in
253
www.iaetsd.in
I. INTRODUCTION
Wireless sensor network is an emerging
technology in research field; it is used to monitor
health condition, temperature also used in military
application, home applications, etc. Wireless
sensors are also used in forest fire detection,
inventory control, energy management, and so on.
There are thousands of nodes are being
interconnected with one another the control station
collects all data from each node and transmits the
254
www.iaetsd.in
of packets
containing crucial perceived info and
reduces the time period of the network as a result
of weakened energy eciency at every device
node, and exaggerated energy consumption. In
event-driven
applications, once there's an abrupt
increase within the trac, congestion would
degrade the performance of the network by the
loss of the event packets or the delayed arrival of
the packets to the sink. Congestion control is not
solely necessary to enhance the general outturn
however additionally to elongate the network time
period and improve the end-to-end outturn, referred
to as accuracy level, by avoiding the packet loss as
a result of congestion. Congestion being one
among the largest problems for a device network,
needs to be avoided to enhance the Quality of
Service (QoS) in terms of outturn, packet delivery
ratio, latency, and energy eciency. Congestion
management in WSN has been wide concerning
police investigation the congestion within the
network and dominant the congestion by adjusting
the speed of the input traffic or prioritization of the
info packets or load equalization among the device
nodes. The trac within the network is adjusted
either hop-by-hop, at every device node, end to end
rate adjustment at the supply nodes wherever the
trac is generated. While congestion management
concentrates on sanctioning the network to live
through packet loss due to the prevalence of
congestion. Congestion rejection detects early cong
estion or estimates for the congestion within
the network and tries to forestall its prevalence. For
example, in associate event-based approach,
appropriate congestion rejection mechanism might
help to sight the approaching congestion and react
to matters before the particular collapse takes
place. Congestion rejection is that the core thought
for this paper model to proactively determine and
alleviate congestion within the network and change
the network to handle the longer term traffic.
255
www.iaetsd.in
Is route
available?
Yes
No
Forward
Message
Save message in
buffer & initiate
route request
Without Backup
Stop
With Backup
No. Of
Packets
Sent
No. Of
Packets
Received
Delay
(Secs)
No. Of
Packets
Received
Delay
(Secs)
1500
2250
4500
1015
1555
2791
0.16
0.18
0.20
1302
1872
3171
0.14
0.15
0.12
40000
30000
CTR
20000
QDA
10000
0
256
www.iaetsd.in
REFERENCES
[1] Chieh-Yih Wan, Shane B. Eisenman, Andrew T.
Campbell, Congestion Detection and Avoidance in
Sensor Networks, Proceedings of SenSys03,
pp. 266-279, 2003.
257
www.iaetsd.in
Sungkrityayan Khan
Manas Srivastava
Sabarinathan C
I. INTRODUCTION
A license plate is the unique identification of a
vehicle . The basic issues in real-time license plate
recognition are the accuracy and the recognition
speed. License Plate Recognition (LPR) has been
applied in numerous applications such as
automatically identifying vehicles in parking slots ,
access control in a restricted area and detecting and
verify ing stolen vehicles. Till now, there have been
some well-known commercially operational LPR
systems around the world. It is assumed that these
systems work under some given constraints and the
cameras are mounted at fixed locations without
mobility. LPR systems consist of three major components: license plate detection, character ext raction and character recognition.
License Plate detection is the first important
stage of an LPR system. Quality of algorithms used
in a license plate detector determines the speed and
258
www.iaetsd.in
Applying certain
heuristics to extract
original LP from the
candidate LPs.
image
Conversion of Gray
scale image to Canny
edge Image
Finding contours in the
Canny Edge Image
Approximating contours
to quadrilaterals and
applying bounding
Applying morphological
operations and
Thresholding to remove
noise and enhance
characters in the LP.
Plotting Vertical
Projection Histogram of
the noiseless LP image to
segment characters.
Extraction of characters
using the concept of ROI
Recognition of each
character using OCR
259
www.iaetsd.in
260
www.iaetsd.in
VI. CONCLUSION
In this paper we have proposed a heuristic
method to segment a license plate fro m an
image. The algorithm used in this paper not
only accelerates the process but also increases
the probability of detecting the license plate
and extraction of characters, under certain set
of constraints. The process is successful
through the steps of character width estimation,
vertical height estimation, and segmentation of
license plate into blocks and identification of
these character blocks.
Various well known techniques were
used to co me out with a final algorithm. The
results show high accuracy of non-character
area removal and thus better recognition of
characters after their segmentation. Finally the
percentage accuracy for the entire process
came to 88% . Our proposed approach is under
improvement and its accuracy will be increased
by using more sophisticated approaches.
VII. REFERENCES
[1]
th
10
IEEE conference on
Technology, 2010, Pg.No-512.
Success
Rate in LP
extraction
82
Success Rate
in Character
segmentation
93
Computer
and
Information
th
Xiangjian He, Lihong Zheng, Qiang He, Wenjing Jia, Bijan Samali
and Marimuthu palaniswami, Segmentation of Characters
Success [11] Parker J.R. and Federl P., An approach to License Plate
Recognition ,
Technical Report, Library of Computer
Rate of
Vision, University of Calagry, 1996
OCR
[12] Automatic Car Plate Recognition using a partial
90
Segmentation Algorithm, Fernando Martin, David Borges,
88
93
92
78
91
89
261
www.iaetsd.in
International
Conference
Networking and Automation (ICINA).
on
Information,
[15] Shuang Qiaol , Yan Zhul , Xiufen Li l , Taihui Liu2 ,3, Baoxue
Zhangl
[18] http://www.mathworks.com/help/toolbox/images
[19]http://en.wikipedia.org/wiki/Automatic_number_plate_recog
nition
262
www.iaetsd.in
By,
Dhanush.M
IV year
R.M.K. Engineering College
dhanushdhruvan@gmail.com
Diwakar.B
IV year
R.M.K. Engineering College
diwa.balakrishnan@gmail.com
263
www.iaetsd.in
ABSTRACT:
The development of new types of solar cells is
promoted by increasing public awareness that the
earths oil reserves could run out during this century.
As the energy need of the planet is likely to double
within the next 50 years and frightening climatic
consequences of the greenhouse effect caused by
fossil fuel combustion are anticipated, it is urgent that
we develop a new kind of renewable energy to cover
the substantial deficit left by fossil fuels. Since the
prototype of a Dye Sensitized Solar Cell (DSSC)
was reported in 1991, it has aroused intense interest
owing to its low cost, simple preparation procedure,
and benign effect on the environments. However, the
potential problems caused by liquid electrolyte limit
the long-term performance and practical use of
DSSC. Therefore, much attention has been given to
improving the light-to-electrical power conversion
and replacing the liquid electrolytes by solid-state or
quasi-solid-state electrolytes. This review will focus
on progress in the development of improved
electrolytes, especially quasi-solid-state electrolytes
for DSSCs.
electrolytes;
performance;
INTRODUCTION:
The prototype of a DSSC was reported in 1991 by
M.Gratzel. In Gratzel Cells the functions of light
absorption and charge-carrier transportation are
separated. Although the solar power conversion
efficiencies of DSSCs are lower than that of classical
crystalline silicon cells. In DSSCs based on liquid
electrolytes, a photoelectric conversion efficiency of
11 % has been achieved. However, the potential
problems caused by liquid electrolytes, such as the
leakage and volatilization of solvents, possible
desorption and photo-degradation of the attached
dyes, and the corrosion of Platinum counter
electrode, are considered as some of the critical
factors limiting the long-term performance and
practical use of DSSCs. It is believed that
quasi-solid-state electrolytes, especially those
utilizing thermosetting gels, are particularly
applicable for fabricating high photoelectric
performance and long-term stability of DSSC in
practical applications.
Here we describe a photo voltaic cell created from
low to medium purity materials through low cost
processes, which exhibits commercially realistic
264
www.iaetsd.in
1.
2.
3.
4.
5.
6.
TiO2|S + hv TiO2|S*
Excitation
TiO2|S* TiO2|S+ + e-(cb) Injection
TiO2|2S++3I- TiO2|2S + I3- Regeneration
I3 - + 2e-(Pt) 3IReduction
I3 - + 2e-(cb) 3IRecaption
TiO2|S+ + e-(cb) TiO2|S Recombination
QUASI-SOLID-STATE
ELECTROLYTES:
The quasi-solid state, or gel state, is a particular state
of matter, neither liquid nor solid, or conversely both
liquid and solid. Generally, a quasi-solid-state
electrolyte is defined as a system which consists of a
polymer network (polymer host) swollen with liquid
electrolytes. Owing to its unique hybrid network
structure, quasi-solid-state electrolytes always
possess, simultaneously, both the cohesive property
of a solid and the diffusive transport property of a
liquid. Namely, quasi-solid-state electrolytes show
better long-term stability than liquid electrolytes do
and have the merits of liquid electrolytes including
high ionic conductivity and excellent interfacial
contact property. These unique characteristics of
i () = LHE () x inj x e
where Light Harvesting Efficiency (LHE) is the
fraction of the incident photons that are absorbed by
the dye, inj is the quantum yield for charge injection
and e is the efficiency of collecting the injected
charge at the back contact.
Although attempts to use dye sensitized
photoelectrochemical cells in energy conversion have
been made before, the efficiency of such devices of
265
www.iaetsd.in
266
www.iaetsd.in
Characteristics of TPGE:
267
www.iaetsd.in
REFERENCES:
CONCLUSIONS:
In this review, we introduce on Quasi-solid-state
electrolytes for DSSCs. Although a lightto-electricity conversion efficiency of 11 % for
DSSCs containing liquid electrolytes has been
achieved, the potential problems caused by liquid
electrolytes, such as leakage and volatilization of
organic solvents, are considered as some of the
critical factors limiting the long-term performance
and practical use of DSSCs. Solid-state electrolytes
overcome the disadvantage of fluidity and volatility
for liquid electrolytes, however, poor interface
contact property and lower conductivity for
solid-state
electrolytes
lead
to
lower
light-to-electricity conversion efficiency for DSSCs.
Quasi-solid-state electrolytes, especially TSGEs,
possess liquid electrolytes ionic conductivity and
interface contact property and solid-state electrolytes
long-term stability, it is believed to be one kind of the
most available electrolytes for fabricating high
photoelectric performance and long-term stability of
DSSCs in practical applications.
268
www.iaetsd.in
I.
INTRODUCTION:
WEB PERSONALIZATION:
The web is used for accessing a variety of information stored in various locations in
various formats in the whole world. The content in web is rapidly increasing and need for
identifying, accessing and retrieving the content based on the needs of the users is required.
An ultimate need nowadays is that predicting the user requirements in order to improve
the usability of the web site. Personalized search is the solution for this problem since different
search results based on preferences of users are provided.
In brief, web pages are personalized based on the characteristics of an individual user
based on interests, social category, context etc The Web Personalization is defined as any
action that adapts information or services provided by a web site to an individual user or a set of
users. Personalization implies that the changes are based on implicit data such as items
purchased or pages viewed.
Personalization is an overloaded term: there are many mechanisms and approaches bothe
automated and marketing rules controlled, whereby content can be focused to an audience in a
one to one manner.
269
www.iaetsd.in
The above web personalization process uses the web sites structure, Web logs created by
observing the users navigational behavior and User profiles created according to the users
preferences along with the Web sites content to analyze and extract the information needed for
the user to find the pattern expected by the user. This analysis creates a recommendation model
which is presented to the user. The recommendation process relies on the existing user
transactions or rating data, thus items or pages added to a site recently cannot be recommended.
II.
Web mining is a mining of web data on the World Wide Web. Web mining does the
process on personalizing these web data. The web data may be of the following:
1.
2.
3.
4.
With personalization the content of the web pages are modified to better fit for user needs.
This may involve actually creating web pages, that are unique per user or using the desires of a
user to determine what web documents to retrieve. Personalization can be done to a group of
specific interested customers, based on the user visits to a websites. Personalization also includes
techniques such as use of cookies, use of databases, and machine learning strategies.
Personalization can be viewed as a type of Clustering, Classification, or even Prediction.
USER PROFILES FOR PERSONALIZED INFORMATION ACCESS:
270
www.iaetsd.in
As shown in Figure 2.1, the user profiling process generally consists of three main
phases. First, an information collection process is used to gather raw information about the user.
Depending on the information collection process selected, different types of user data can be
extracted. The second phase focuses on user profile construction from the user data. The final
phase, in which a technology or application exploits information in the user profile in order to
provide personalized services.
TECHNIQUES USING USER PROFILE:
From an architectural and algorithmic point of view personalization systems fall into
three basic categories: Rule-based systems, content-filtering systems, and collaborative filtering
systems.
271
www.iaetsd.in
272
www.iaetsd.in
instances that belong to the same class. The recommendations generated by the proposed
collaborative system are in turn derived by binary matching the current user visit expressed as
ontology instances to the derived domain-level aggregate profiles, and no semantic relations
beyond hyperonymy/hyponymy are employed.
Acharyya and Ghosh [7] also propose a general personalization framework based on the
conceptual modeling of the users navigational behavior. The proposed methodology involves
mapping each visited page to a topic or concept, imposing a tree hierarchy (taxonomy) on these
topics, and then estimating the parameters of a semi- Markov process defined on this tree based
on the observed user paths. In this Markov modelsbased work, the semantic characterization of
the context is performed manually. Moreover, no semantic similarity measure is exploited for
enhancing the prediction process, except for generalizations/specializations of the ontology
terms.
Middleton et.al. [8] explore the use of ontologies in the user profiling process within
collaborative filtering systems. This work focuses on recommending academic research papers to
academic staff of a University. The authors represent the acquired user profiles using terms of a
research paper ontology (is-a hierarchy). Research papers are also classified using ontological
classes. In this hybrid recommender system which is based on collaborative and content-based
recommendation techniques, the content is characterized with ontology terms, using document
classifiers (therefore a manual labeling of the training set is needed) and the ontology is again
used for making generalizations/specializations of the user profiles.
Kearney and Anand [9] use an ontology to calculate the impact of different ontology
concepts on the users navigational behavior (selection of items). In this work, they suggest that
these impact values can be used to more accurately determine distance between different users as
well as between user preferences and other items on the web site, two basic operations carried
out in content and collaborative filtering based recommendations. The similarity measure they
employ is very similar to the Wu & Palmer similarity measure presented here. This work focuses
on the way these ontological profiles are created, rather than evaluating their impact in the
recommendation process, which remains opens for future work.
IV.
CONCLUSION
In this paper we surveyed the research in the area of personalization in web search. The study
reveals a great diversity in the methods used for personalized search. Although the World Wide
Web is the largest source of electronic information, it lacks with effective methods for retrieving,
filtering, and displaying the information that is exactly needed by each user. Hence the task of
retrieving the only required information keeps becoming more and more difficult and time
consuming.
To reduce information overload and create customer loyalty, Web Personalization, a
significant tool that provides the users with important competitive advantages is required. A
273
www.iaetsd.in
Personalized Information Retrieval approach that is mainly based on the end user modeling
increases user satisfaction. Also personalizing web search results has been proved as to greatly
improve the search experience. This paper also reviews the various research activities carried out
to improve the performance of personalization process and also the Information Retrieval system
performance.
REFERENCES
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
K. Sridevi and Dr. R. Umarani, Web Personalization Approaches: A Survey in IJARCCE, Vol.2.Issue3.
March 2013.
Adar, E., Karger, D.: Haystack: Per-User Information Environments. In: Proceedings of the 8th
International Conference on Information Knowledge Management (CIKM), Kansas City, Missouri,
November 2-6 (1999) 413-422.
Bamshad Mobasher, Data Mining forWeb Personalization The Adaptive Web, LNCS 4321, pp. 90135,
2007. Springer-Verlag Berlin Heidelberg 2007.
Indu Chawla, An overview of personalization in web search in 978-1-4244-8679-3/11/$26.00 2011
IEEE.
H. Dai, B. Mobasher, Using Ontologies to Discover Domain-Level Web Usage Profiles, in Proc. of the
2nd Workshop on Semantic Web Mining, Helsinki, Finland, 2002.
D.Oberle, B.Berendt, A.Hotho, J.Gonzalez, Conceptual User Tracking, in Proc. of the 1st Atlantic Web
Intelligence Conf. (AWIC),2003.
S. Acharyya, J. Ghosh, Context-Sensitive Modeling of Web Surfing Behaviour Using Concept Trees, in
Proc. of the 5th WEBKDD Workshop, Washington, August 2003.
S.E. Middleton, N.R. Shadbolt, D.C. De Roure, Ontological User Profiling in Recommender Systems,
ACM Transactions on Information Systems (TOIS), Jan. 2004/ Vol.22, No. 1, 54-88.
P. Kearney, S. S. Anand, Employing a Domain Ontology to gain insights into user behaviour, in Proc. of
the 3rd Workshop on Intelligent Techniques for Web Personalization (ITWP 2005), Endiburgh, Scotland,
August 2005.
http://en.wikipedia.org/wiki/Ontology
Bhaganagare Ravishankar, Dharmadhikari Dipa, WebPersonalization Using Ontology: A Survey, IOSR
Journal of Computer Engineering (IOSRJCE) ISSN : 2278-0661 Volume 1, Issue 3 (May-June 2012), PP
37-45 www.iosrjournals.org.
Cooley, R., Mobasher, B., Srivastava, J.: Web mining: Information and pattern discovery on the world wide
web. In: Proceedings of the 9th IEEE International Conference on Tools with Artificial Intelligence
(ICTAI97), Newport Beach, CA (November 1997) 558567.
Joshi, A., Krishnapuram, R.: On mining web access logs. In: Proceedings of the ACM SIGMOD Workshop
on Research Issues in Data Mining and Knowledge Discovery (DMKD 2000), Dallas, Texas (May 2000).
Liu, C. Yu, and W. Meng, 2002. Personalized web search by mapping user queries to categories. In
Proceedings of CIKM, pages 558-565.
Morris, M. R. (2008). A survey of collaborative Web search practices. In Proc. of CHI 08, 1657-1660.
Jones. W. P., Dumais, S. T. and Bruce, H. (2002). Once found, what next? A study of keeping behaviors
in the personal use of web information. Proceedings of ASIST 2002, 391-402.
Deerwester, S., Dumais, S., Furnas, G., Landauer, T.K., Harshman, R.: Indexing by Latent Semantic
Analysis. Journal of the American Society for Information Science, 41(6) (1990) 391-407
Dolog, P., and Nejdl, W.: Semantic Web Technologies for the Adaptive Web. In: Brusilovsky, P., Kobsa,
A., Nejdl, W. (eds.): The Adaptive Web: Methods and Strategies of Web Personalization, Lecture Notes in
Computer Science, Vol. 4321. Springer-Verlag, Berlin Heidelberg New York (2007) this volume.
274
www.iaetsd.in
P.PRASANTH
deepu.neethu238@gmail.com
pprasanth94@gmail.com
exact change. The RFID enabled smart card is used to pay the
ticket fare. The purpose of making automated ticketing
system is: to reduce the conflict between commuters and
conductors regarding the issue of wrong tickets with
improper change; to reduce the culprits; to find the culprits
and to reduce the usage of papers in the form of tickets.
The RF Transceiver uses RF modules for high speed
data transmission. The microelectronic circuit in the digitalRF architecture works at speed up to 100 GHz. The RF
transceivers are available in various ranges at various costs
suitable for the user. RFID refers to Radio Frequency
Identification that uses three parts namely the reader, antenna
and the tag. RFID is classified into two such as active RFID
and passive RFID. The tag is nothing but a small chip which
consists of a unique id which is burnt at the time of
manufacture. The data can be stored in the tag and the
amount of data is based on the capacity of the tag. The reader
reads the tag when it comes within its range. GSM (Global
System for Mobile Communications, originally Groupe
Spcial Mobile), is a standard to describe protocols for
second generation (2G) digital cellular networks used by
mobile phones. Zigbee is a protocol that is used to transfer
data wirelessly to a greater distance than Bluetooth in a
minimum power usage.
I.
INTRODUCTION
II.
NECESSITY OF TECHNOLOGY
275
www.iaetsd.in
affected more due to the congestion and traffic near the bus
stop (fig.1). Infrequent commuters are unaware of the bus
schedule for which they are waiting. Actually, in general
each and every commuter is unaware of the arriving and
departed buses. This in turn paves way for the major
congestions near the bus stops and traffic in the city.
III.
SYSTEM OVERVIEW
When the bus, say Bus1, nears the bus stop, say Bus Stop
A, the RF transceivers both in the bus and the bus stop will
start communicating each other. These transceivers send their
corresponding information to each other. The microcontroller
processes this information; send the respective information to
the display board and the GSM module. The display board in
the bus stop A displays the details of the bus 1 that has just
arrived the stop. The details may contain the name, number,
type, source to destination and the time of arrival of the bus
1. Then this detail is sent to the two successive bus stops, say
B and C respectively using the GSM. The stops B and C
displays the current status of the bus 1 that it has arrived the
stop A and it is yet to arrive in some particular time as
calculated(approx.). Meanwhile the RF transceiver in bus
stop A transmits the name of the bus stop which is then
displayed in the display board inside the bus; this helps the
commuters inside the bus to know the stop they have arrived.
If the bus starts moving from stop A then the bus gets out of
range of the RF transceiver in the stop which then makes the
microcontroller of stop A to change the information such as
the bus moves from A to B in the display board where as the
GSM makes the corresponding changes to stop B and C. If
the bus reaches B then the same procedure follows as
proceeded in A and so on.
276
www.iaetsd.in
277
www.iaetsd.in
Start
If balance
is >=
minimum
Insufficient balance is
NO
indicated by a red led
YES
Fig.8 HDS at the entrance of a bus
278
www.iaetsd.in
with that of the ITMs exit log so that and if any mismatch
occurs it indicates the number of culprits inside the bus. The
working procedure of the HDS is described as a flow chart in
fig.10
Start
Allots Average
Waiting Time (ATT)
If the count
of both logs
are equal
Proceed
Fig.10 HDS flow chart
IV.
279
www.iaetsd.in
V.
VII.
Electronic
ticketing
system
[1] http://www.tn.gov.in/district_details/535
ABTS
[2] http://www.eurotech-inc.com/bus-passengercounter.asp
[3] http://www.eurotech-inc.com/automaticpassenger-counter.asp
[4] http://gpsmonitoring.trustpass.alibaba.com/pr
oduct/112187149101822825/capnavi_bus_people_counter_solu
tion.html
[5] http://www.alibaba.com/productdetail/Automatic-Passenger-Counting-SystemFor-Transit_11137078/showimage.html
[6] http://www.indiamart.com/exiontechnology/p
roducts.html
[7] http://www.pcb.its.dot.gov/factsheets/core.as
p
[8] http://www.dnaindia.com/bangalore/reportrecycling-of-tickets-can-save-many-trees1745406
[9] http://timesofindia.indiatimes.com/city/chenn
ai/400-passengers-travel-without-tickets-onMTC-buseseveryday/articleshow/4146022.cms
[10]http://jaroukaparade.blogspot.in/2012/02/bus
-tickets-honestly-waste-of-good.html
Self help/computerized
Involuntary and
Spontaneous
Paperless ticketing
Eco friendly
User Friendly
Less time consuming
Issuing Appropriate
tickets always
Issuing exact number
of tickets always
Avoids
misunderstanding
Determines the culprit
Omits ticket inspector
Economical
Not necessary of
carrying smartcards
Requires money only
for the distance to be
travelled
TABLE 1: Merits and Demerits
VI.
REFERENCE
CONCLUSION
[11] http://www.thehindu.com/news/cities/chennai/theproblem-of-issuing-tickets-onbuses/article5627863.ece
[12]http://www.complaintboard.in/complaintsreviews/tamil-nadu-transport-corporationl179177.html :
[13] http://www.hindu.com/2009/05/21/stories/
2009052159590400.htm
[14] 4Vol38No1
[15] F6 Hasan - RFID Ticketing
[16] researchpaper_Intelligent-Cars-using-RFIDTechnology
[17] Bus_Management_System_Using_RFID_In_WSN
[18] WCECS2012_pp1049-1054
280
www.iaetsd.in
P Mathu Meena2
mrg.manikandan@gmail.com,
I.
mathumeenabe93@gmail.com
INTRODUCTION
281
www.iaetsd.in
282
www.iaetsd.in
.....
BS
.....
MS2
MSL
x(1)
x(2)
...
(1)
H1(2)
H3(1)
H2(3)
MSL
n1
y1
Rx2
n2
H2(2)
(3)
H3(1) RxP
H1
UserL
nP
Py2 element
Receive
Antenna
Array
y3
H3(3)
Figure 2. Schematic of the SDMA uplink MIMO channel model .
H2
H 3 (2)
x(3)
B. Multi-User Detection
Robust multi-user detection schemes become necessary
in order to using the advantage of SDMA technique to
solve the capacity problem in wireless systems, since the
increasing number of users will decrease the performance of
system particularly when the number of users is more than
the number of receive antennas.
Consider the NR NT MIMO system, and H denote a
channel matrix with h ij is the channel gain between the ith
transmit antenna and the jth receive antenna, j=1,2,...,NR and
i=1,2,..,NT. The spatially multiplexed user data and the
corresponding
received signals are represented by
T
MS2
User2
A. Channel Estimation
The OFDM technique is capable of satisfying the
requirements of supporting a high grade of mobility in
diverse propagation environments. This is a benefit of their
ability to cope with highly time variant wireless channel
characteristics. Also in spite of an immense interest from
both the academic and the industrial communities, a
practical MIMO transceiver architecture, capable of
approaching channel capacity boundaries in realistic channel
conditions remains largely an open problem [4]. Thus, the
provision of an accurate and robust channel estimation
strategy is a crucial factor in achieving a high performance.
However, the channel estimation for wireless systems is a
challenging problem and the literature treating it is vast,
where its simply defined as the process of characterizing the
effect of the physical channel on the input sequence. In this
work, the channel estimation techniques are assumed to be
perfectly done at the BS and it can be used to detect the
users data.
Rx1
H1(1)
User1
III.
MS1
...
MS1
(1)
283
www.iaetsd.in
10
0
SNR-BASED
COLUMN NORM -BASED
SINR-BASED
(2)
-1
10
x'(1)
(1)st Stream
Estimation
y'(1)
(2)nd Stream
Estimation
BER
-2
x'(2)
10
-3
10
x'(3)
-4
10 0
y'(3)
(4)th Stream
Estimation
10
EB/NO (DB)
15
20
x'(4)
Figure 4. Performance of OSIC methods with different detection ordering.
10
OSIC DETECTOR
ML DETECTOR
-1
BER
10
-2
10
-3
10
-4
10 0
6
EB/NO (DB)
10
12
284
www.iaetsd.in
10
OSIC DETECTOR
ML D ETECTOR
10-1
BER
-2
10
EB/NO (DB)
In Direct Sequence Code Division Multiple Access (DSCDMA) systems [1], various versions of the so-called Gaussian approximation are widely used for modeling the distribution of the Multiple Access Interference (MAI). A few ex-
285
www.iaetsd.in
= Q (y-QRx)
10
Average BER, dB
= y' Rx
(4)
The performance of QRM-ML depends on the parameter
M, where, it equal to the number of users and number of
receive antennas NR. As M increases, its performance
approaches ML performance at the sacrifice of the
complexity [6]. Fig. 7 shows the performance of QRM-ML
for M= 4 and 16. The QRM-ML performance degrades
when M= 4 at the benefit of the reduced complexity.
10
c =1
Mc = 4
Mc = 8
10
10
15
20
25
30
35
Number of Users
Fig. 2 shows the BER performance over a frequency selective multipath Rayleigh fading channel with perfect
power control, as a function of the number of interfering
cells Mc. In this simulation, the number of multipaths is set
to Lk =
E
5, the signal-to-noise ratio (SNR)
286
www.iaetsd.in
40
IV. CONCLUSION
In this paper, we assume an OFDM/SDMA/CDMA
approach that couples the capabilities of these techniques.
OFDM helps to enhance the system performance, while
SDMA increases the spectral efficiency, where CDMA uses
high rate signature pulses to enhance the signal bandwidth
far beyond what is necessary for a given data rate.
Performance of various multi-user detection schemes based
on OFDM/SDMA/CDMA are investigated for different
scenarios. Results show the importance of robust detection
methods in improving the performance of the system,
particularly when the SDMA technique is used to achieve
the higher spectral efficiency. It is found that CDMA only
performs well in a multi-cellular environment where a single
frequency is used in all cells. This increases the comparative
performance against other systems that require a cellular
pattern of frequencies to reduce inter-cellular interference.
ML is the optimal multi-user detection scheme where it
gives high performance in comparison to the OSIC method
even if the number of users is higher than the number of
receive antennas. Thus the ML method can support the
SDMA technique, however this technique is associated with
large computational requirements. Long time is usually
needed for running the algorithm which does not allow real
time implementation. One major area, which hasnt been
investigated, is the problems that may be encountered when
OFDM is used in a multiuser environment. One possible
problem is that the receiver may require a very large
dynamic range in order to handle the large signal strength
variation between users . Hardware implementation of the
algorithm can help reduce the running time considerably.
Success in real time implementation of optimization
technique for SDMA can play a major role in next
generation communication systems.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
287
www.iaetsd.in
288
www.iaetsd.in
289
www.iaetsd.in
290
www.iaetsd.in