Beruflich Dokumente
Kultur Dokumente
I.
INTRODUCTION
Neeta Singh
Asst Prof., School of ICT,
Gautam Buddha University
Greater Noida, U.P.
neeta@gbu.ac.in
4000
20m/sec
Protocols
AODV, DSR
6000
III. IMPLEMENTATION
TABLE I. Network Specifications
(k=1)
(1)
(2)
of a node after a
(3)
Et = Total Energy
B. PDF
Packet Delivery Fraction (PDF) defined as the ratio
of the total number of data packets received by the
destination to the total number of data packets
transmitted.
.
(4)
Fig. 6. End to End Delay (Nodes 10)
V. CONCLUSION
Fig. 4. PDF (Nodes 10)
[1]
[2]
[3]
[4]
Technologies,
pp.
282-286,
2012.
[5]
[6]
Payal Mittal
Student, MSIT, GGSIP
University
New Delhi
Divyanshi Rathi
Student, MSIT, GGSIP
University
New Delhi
I. INTRODUCTION
Speaker recognition is the process of recognizing
the speaker from the database based on the
characteristics in the speech wave. Most of the
speaker recognition systems contain two phases. In
the first phase feature extraction is done. The
unique features from the voice signal are extracted
which are used latter for identifying the speaker.
The second phase is feature matching in which we
compare the extracted voice features with the
database of own speakers. The overall efficiency of
the system depends on how efficiently the features
of the voice are extracted and the procedures used
to compare the real time voice sample features with
the database. A general block diagram of speaker
recognition system is shown in Fig 1[1]. It is clear
from the above diagram that the speaker
recognition is a 1: N match where one unknown
speakers extracted features are matched to all the
templates in the reference model for finding the
closest match. The speaker feature with maximum
similaritynisnselected[2].
Research and development on speaker recognition
-------- (1)
A. Acoustic Processing
Acoustic processing is sequence of processes that
receives analog signal from a speaker and convert it
into digital signal for digital processing. Human
speech frequency usually lies in between 300Hz8000kHz [5].Therefore 16kHz sampling size can be
chosen for recording which is twice the frequency
of the original signal and follows the Nyquist rule
of sampling [6].The start and end detection of
isolated signal is a straight forward process which
detect abrupt changes in the signal through a given
threshold energy. The result of acoustic processing
would be discrete time voice signal which contains
meaningful information. The signal is then fed into
spectral analyser for feature extraction.
B. Feature Extraction
Feature Extraction module provides the acoustic
feature vectors used to characterize the spectral
properties of the time varying speech signal such
that its output eases the work of recognition stage.
MFCC Extraction
Mel frequency cepstral coefficients (MFCC) is
probably the best known and most widely used for
both speech and speaker recognition [7].
A mel is a unit of measure based on human ears
perceived frequency. The mel scale is
approximately linear frequency spacing below
codebook, and
is a splitting parameter (we
choose =0.01).
3. Nearest-Neighbor Search: for each training
vector, find the codeword in the current codebook
that is closest (in terms of similarity measurement),
and assign that vector to the
corresponding cell (associated with the closest
codeword).
REFERENCES
Indu
Student, Dept of IT
MSIT, GGSIP University
New Delhi
panchithakur8@gmail.com
I. INTRODUCTION
The process or an approximation of the probable
cost of a product, program, or a project is called
cost estimation. Software cost estimation starts at
the proposal state and continues throughout the life
time of a project.
Accurate cost estimation is important because of
the following reasons :
It can help to classify and prioritize development
projects with respect to an overall business plan ;
to determine what resources to commit to the
project and how well these resources will be used ;
to assess the impact of changes and support
preplanning; Projects can be easier to manage and
control when resources are better matched to real
needs.; Customers expect actual development costs
to be in line with estimated costs.
Inaccurate estimation is a real problem in the
production world of software which should be
solved despite of the indicated statistics which is
pessimistic.
Vinay Gautam
Student, Dept of IT
MSIT, GGSIP University
New Delhi
gautamv1532@gmail.com
Effort Applied,
E=
Development Time,
D=
People required,
P=
[man-months]
months]
[count]
(1)
(2)
(3)
RELY
Reliability required
0.82-1.26
DATA
Database size
0.90-1.28
CPLX
Product complexity
0.73-1.74
RUSE
Required reusability
0.95-1.25
DOCU
Documentation
0.81-1.23
TIME
1.00-1.63
STOR
1.00-1.46
PVOL
Platform volatility
0.87-1.30
ACAP+
Analyst capability
1.42-0.72
PCAP
Programmers capability
1.34-0.76
PCON
Personnel continuity
1.29-0.81
AEXP
PEXP
Analyst experience
Programmer experience
1.22-0.81
1.19-0.85
LTEX
1.20-0.84
TOOL
SITE
1.22-0.80
SCED
Schedule
1.43-1.00
1.17-0.78
SCALE
FACTOR
PREC
FLEX
RESL
TEAM
PMAT
SCALE FACTOR
(NAME)
Precedentedness
Development
flexibility
Architecture/risk
resolution
Team cohesion
Process maturity
RANGE
0.00-6.20
0.00-5.07
0.00-7.07
0.00-5.48
0.00-7.80
IV.
PROPOSED WORK
Fig .2
Fig. 1
Fuzzy rule : If
is Ais ,then = Cis where s = 1,
2,. . ., 6.
where the fuzzy set Ais corresponds to a rating level
having range from Very Low to Extra High for
the i-th cost driver, and Cis is the corresponding
parameter value of the s-th rating level. Now let us
study each layer of the given above figure.
Layer 1 : The membership values for each rule is
calculated in this layer. The activation function of
node in this layer is defined as the corresponding
membership function[13].
= (
)
Where CRi is the adjusted rating value of the i-th
cost driver, and Ais is a fuzzy set associated with
the s-th rating level such as Low, High.
(
)
is the membership function of Ais.
Layer 2 : The firing strength for each rule is
calculated in this layer. The inputs for each nodes
are the membership values in the premise of the
fuzzy rule. The product of all input membership
values is the output, which is called the firing
strength of the corresponding fuzzy rule. the firing
strength is the same because there is only one
condition in the premise of each fuzzy rule of NFi
(13)
=
Layer 5 : All the reasoning results of fuzzy rules
are sum up in this layer that we get from Layer 4,
i.e.:
=
In summary, the overall output of neuro-fuzzy
subsystem NFi is :
=
Learningmalgorithm:
For the neuro-fuzzy subsystem NFi, we use the
followingmformulamtomcalculatemthemnumerical/
multiplier value
of cost driver i :
=
(C
;
) =
=
, i=1,2....,22.
(6)
where
=[ ,
,......,
] is the parameter
vector calibrated by the learning process.
For the COCOMO II post architecture model, we
predict the software development effort by:
Effort=
( , ,..........
)
(7)
=A
=A
From Eqs. (6) and (7), we can rewrite our
neurofuzzy model as follows:
Effort=
)
(8)
where X = [ , ,.....
,
,....
,
Size ) and
,
,...
.
Now let us derive the learning algorithm. Given
NN project data points (
), n = 1,2,..NN. the
learning problem of parameters CD can be
formulated as the following optimizing problem:
E=
(9)
subject to the following monotonic constraints:
(10)
(11)
where
is the size of software and cost drivers
ratings for Project n,
is the weight of Project n,
is
the actual effort for Project n,
=
=
)
,forvvvvi=1,2,...,5
.
(14)
(15)
(16)
V.
CONCLUSION
I INTRODUCTION
The critical phenomena are characterized by the
free energy singularity and the long-range
correlations of spins. The former indicates that an
old phase, a disordered state, disappears; the latter
shows that this is just the property of a new phase,
an ordered state. As a new state it is considered a
normal ferromagnetic that should have its normal
and non-singular free energy and heat capacity. It is
incredible that a ferromagnetic Ising model has no
normal thermodynamic quantities to which the
spins contribute. There has been only one theory so
far, the spin-wave theory, can explain these normal
quantities. Dyson drew a physical picture for a 3di-mensional model [1]. On microscopic level, as his
showing, the spin waves arise from interference
effects in the lowest partial-wave collisions
resulting in a rotation of the spins of the scattered
Tuhin Dutta
Dept of Physics
Ramjas College North Campus
University of Delhi
New Delhi
dr.tuhindutta@gmail.com
A.
block spin, each block spin has its own q , and all
summation zero. In a word, the q will be a ddimensional periodically varying parameter rather
than random.
B. CONSERVATION EQUATION OF
SCALAR
where K ( q ) K exp i q ij ,
ij
ij is
a vector
t1 , their
j th lattice, and
from the i
th
lattice to the
q y1 0 and q y 2 0 , anti-parallel; at t 3 (t 3 t 2 ) ,
q1 y 0
q2 y 0 ,
and
parallel
down;
at
qx2 q y2
4
D
[1 min ]
2
(n 1)
D
(1)
t1 ; at t 6 (t 6 t 5 ) , both vectors
return to the states at t1 , indicating the two block
spins come back their states at t1 . The time
same as those at
qx q cos[ (t r / v) ]
q y q sin[ (t r / v) ]
(2)
q in a 3-
qx
f ( x p ) C[ qx ( x p 1 ,t ) qx ( x p ,t ) qx ( x p 1 ,t ) q x ( x p ,t )] M
2 (C / M )k 2 a 2
(5)
d 2 qx ( x p ,t )
IV DISCUSSION
dt 2
(3)
A. NONSINGULAR HEAT CAPACITIES
d 2 qx ( x p , t )
dt 2
2qx ( x p , t )
(4)
E (
4G
k BT 2 x D x 2
)
k
T
(
)
dx
B
v2
0 e x 1
(6)
x /( k BT ) ,
Plank
constant,
x D D /( k BT ) , D is Debye frequency.
Suppose that the total number of such 2-
is
v2
h 0 ( e x 1 )2
T G
(7)
12Vs k B k BT 3 x D x 4e x
CV (
)(
)
dx
v3
0 (e x 1) 2
(8)
q , qx 0 or q y 0 , or
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
Amer. J.
DIGITAL STEGENOGRAPHY
Surender Bhanwala
Asst Prof. Dept. of IT
MSIT, GGSIP University
New Delhi
Nikhil Sharma
Student, Dept of IT
MSIT, GGSIP University
New Delhi
Kirti Lakra
Student, Dept of IT
MSIT, GGSIP University
New Delhi
I. INTRODUCTION
In todays information technology era, the rise of
the internet is one of the most important fact of
information technology and communication due to
this the security of the data and the information has
raise concerned. So, great measures should be
taken to protect the data and information.
Cryptography- Cryptography is a method of storing
and transmitting data in a particular form so that
only those for whom it is intended can read and
process it. The modern field of cryptography can be
divided in to two ways: Symmetric key
cryptography and public key cryptography. The
symmetric key cryptography provides encryption
of data at the sender and the receiver side where
both share the same key. The symmetric key
cryptography is implemented via block ciphers or
stream ciphers. This form of cryptography has a
disadvantage that it involves the key management
process for the secure networking. The number of
keys required increases as the square of the number
of network members, which very quickly requires
complex key management schemes to keep them
all consistent and secret .To solve the said issue ,
Anshul Dabas
Student, Dept of IT
MSIT, GGSIP University
New Delhi
Yagnish Dahiya
Student, Dept of IT
MSIT, GGSIP University
New Delhi
Types of Steganography
1. Text Steganography: It consists of hiding
information inside the text files. In this method, the
secret data is hidden behind every nth letter of
every words of text message. Numbers of methods
are available for hiding data in text file. These
methods are i) Format Based Method; ii) Random
and Statistical Method; iii) Linguistics Method.
2. Image Steganography: Hiding the data by
taking the cover object as image is referred as
image steganography. In image steganography
pixel intensities are used to hide the data. In digital
steganography, images are widely used cover
source because there are number of bits presents in
digital representation of an image.
3. Audio Steganography: It involves hiding data
in audio files. This method hides the data in WAV,
AU and MP3 sound files. There are different
methods of audio steganography. These methods
are i) Low Bit Encoding ii) Phase Coding iii)
Spread Spectrum.
4. Video Steganography: It is a technique of
Line-Shift Coding
This is a method of altering a document by
vertically shifting the locations of text lines to
encode the document uniquely. This encoding may
be applied either to the format file or to the bitmap
of a page image. The embedded codeword may be
extracted from the format file or bitmap. In certain
cases this decoding can be accomplished without
need of the original image, since the original is
known to have uniform line spacing between
adjacent lines within a paragraph.
Word-Shift Coding
This is a method of altering a document by
horizontally shifting the locations of words within
text lines to encode the document uniquely. This
encoding can be applied to either the format file or
to the bitmap of a page image. Decoding may be
performed from the format file or bitmap. The
method is applicable only to documents with
variable spacing between adjacent words. Variable
spacing in text documents is commonly used to
ix)
Digital watermarking.
IV. STEGANOGRAPHY REVIEW
VI. CONCLUSION
The paper presented above gives a understanding
of cryptography and steganography concepts, along
with it the paper gives a review of the research and
developments in the field of steganography through
the various steganography techniques. The paper
also provides the suggestion regarding the future
researches in the field of steganography.
REFERENCES
[1]
[2]
[3]
[4]
[5]
I.
INTRODUCTION
and resilient resource systems, as well as insightdriven and innovative approaches to strategic
planning. The application of information,
communication and technology are common
means to meet these objectives :
A smart city uses digital technologies or ICT
to enhance quality and performance of urban
services, to reduce costs and resource
consumption, and to engage more effectively
and actively with its citizens.
Smart city applications are developed with the
goal of improving the management of urban
flows and allowing for real time responses to
challenges. The Smart Energy City, as a core
to the concept of the Smart City, provides its
users with a livable, affordable, climatefriendly and engaging environment that
supports the needs and interests of its users
and is based on a sustainable economy.
The Smart Energy City is highly energy and
resource efficient, and is increasingly powered
by renewable energy sources; it relies on
integrated and resilient resource systems, as
well as insight-driven and innovative
approaches to strategic planning. The
application of information, communication
and technology are common means to meet
these objectives.
The Smart Energy City leverages the Smart
City vision as a tool to help set the trajectory
for an overall smarter city development. This
development will encompass all social,
economic and environmental aspects of
sustainability. Major technological, economic
and environmental changes have generated
interest in smart cities, including climate
change, economic restructuring, move to
online retail and entertainment, ageing
populations, and pressures on public finances.
Beyond these objectives, this paper demonstrates
the concept of smart city through integration of
Renewable energy sources means in conventional
power grid. With this, this paper is an attempt to
Components
Specificati
ons
Utilization
Stepper motor
500 rpm
Wind plant
Dynamo(Gener
ator)
Solar panel
12V
3W
Solar plant
Solar panel
2W
Solar plant
Solar panel
1.5W
Solar plant
LED Bulbs
1W
Lighting
Water pump
220V
Battery
4V
Storage of electricity
Wind blades
Wind plant
Turbine
6 blades
Hydro plant
Battery
4 volt
Battery bank
IV. CONCLUSION
Requirements of the Smart Grid scenario in Smart
City are presented. The potential of technical
features available with smart grid technologies to
support these requirements and also to streamline
grid operations at the distribution level with
improved reliability and efficiency, is explored. It
has been analyzed that, by adopting advanced and
innovative communication and information
technologies in various utilities provide various
opportunities for advanced and futuristic Smart
City applications.
REFERENCES
[1] www.itu.int
[2] www.metropolitansolutions.de
[3] C. Cecati, G. Mokryani, A. Piccolo, and P. Siano, An
overview on the smart grid concept, 36th Annual
Conference on IEEE Industrial Electronics Society,
IECON, pp. 3322-3327, 2010.
[4] Z. Xue-Song, C. Li-Qiang and M. You-Jie , Research on
smart grid technology, International Conference on
Computer Application and System Modeling (ICCASM),
pp.599-603, 2010.
[5] Ikbal Ali, Mini S. Thomas, Sunil Gupta, Substation
communication architecture to realize the future smart
grid, International Journal of Energy Technologies and
Policy, Vol. 1(4), pp. 25-35, 2011.
[6] John D. McDonald, P.E., Smart Grid Applications,
Standards Development and Recent Deployments, GE
energynT&D.http://www.ieeepesboston.org/files/2011/06/
McDonaldSlides.pdf.
Anish Sharma
Student, Dept of EEE
MSIT, GGSIP University
New Delhi
I.
INTRODUCTION
Anshul Mendiratta
Student, Dept of EEE
MSIT, GGSIP University
New Delhi
TECHNOLOGIES USED
III.
HARDWARE REQUIRED
B. Relay
A relay is an electrically operated switch. Many
relays use an electromagnet to mechanically
operate a switch, but other operating principles are
also used, such as solid-state relays. Relays are
used where it is necessary to control a circuit by a
low-power signal (with complete electrical
isolation between control and controlled. Relays
were used extensively in telephone exchanges and
early computers to perform logical operations.
(Resistance)
S3a
1k
S3b
1k
S3c
1k
3KM
1k
S1a
1k
S2b
1k
S1b
1k
S2c
1k
S1c
1k
2KM
Relay 1
FAULT DETECTION
(Switch)
S2a
MC
Relay
Driver
Relay 2
Relay 3
1KM
Phase A
Phase B
Phase C
MC
S1a,s1b,s1c,etc
1k
V.
Microcontroller
Switch matrix
1 kilo-ohms reistance
C. Calculations
In case of copper Conductor, R (copper) = 22.5 /
Surface-area .
S3a
S3b
S2a
1k
1k
S2b
1k
1k
S1a
1k
S1b
1k
S1c
1k
activated
S3c
S2c
1k
1k
ADVANTAGES
APPLICATIONS
CONCLUSION
ADC
REFERENCES
Relay 1
Relay
Driver
MC
Phase -B
Relay 2
active
www.edgefxkits.com/three-phase-fault-analysis-with-autoreset-on-temporary-fault-and-permanent-trip-otherwise
[2]....www.scribd.com/doc/159496497/3-PHASE-FAULTnDETECTION-2-docx
Relay 3
LCD Display
[1]
[3]m.www.academia.edu/2236873/Microcontroller_based_Fault
_Detector
NO FAULT
FAULT
AT PH-B (2KM)
[4] www.irjet.net/archives/V2/i1/Irjet-v2i115.pdf
Fig.5 Block diagram of faulty condition.
MC
S1a,s1b,s1c,etc
1k
Microcontroller
Switch matrix
1 kilo-ohms reistance
[5]
www.digikey.ch/en/pdf/c/cr-magnetics/3-phase-imbalance
-ground-fault-detection
[6]nnwww.mathworks.com/help/physmod/sps/powersys/ref/thr
ephase,fault.html?requestedDomain=www.mathworks.co
m
[7]nnwww.mathworks.com/help/physmod/sps/powersys/ref/thre
ephasenfault.html?requestedDomain=www.mathworks.co
m
I.
INTRODUCTION
Mahesh Kumar
Prabhat Kr. Chaubey
Student, Dept of IT
Student, Dept of IT
MSIT, GGSIP University MSIT, GGSIP University
New Delhi
New Delhi
FUTURE SCOPE
STEGANOGRAPHY
V.
CONCLUSION
REFERENCES
[1]. Andem, VikramReddy . A Cryptanalysis
m,,,,,,of the Tiny Encryption Algorithm, 2003
[2]. Wheeler, D.J., & Needham, R.J. TEA, a
mmmtiny.encryption
algorithm.
In
Fast
m,,,,,,Software Encryption nProceedings of the
m,,,,,,2nd International Workshop,1008, 1998
[3] Hernndez, Julio Csar; Isasi, Pedro;
nnnnRibagorda,.Arturo. "An application of
mm,genetic algorithms to the cryptoanalysis of
mm one round TEA"...Proceedings of the 2002
Symposium onArtificial Intelligence and its
Application, 2002.
[4]JohnsonN.
and
Jajodia
S.,
mmnSteganography: Seeing the Unseen,
mmnIEEE Computer Magazine, vol. 25, no. 4,
mmnpp. 26- 34, 1998.
[5]. .R.Anderson, R. Needham, and A. Shamir.
mmnThe steganographic file system. In
mm,..IWIH: International on Information
mm,..Hiding, 1998.
[6]. Video Steganography by LSB Substitution
mmnUsing Different Polynomial Equations, A.
mmnSwathi, Dr. S.A.K Jilani, International
mmnJournal of Computational Engineering
mmnResearch (ijceronline.com) Vol. 2 Issue. 5
[7]. An overview of image steganography, T
mmnMorkel, J.H.P. Eloff, M.S.Olivier.
Mayank Bhargava
Student, Dept of ECE
MSIT, GGSIP University
New Delhi
Harshit Chaudhary
Student, Dept of ECE
MSIT, GGSIP University
New Delhi
Keywords: nano-materials, CO2 reduction and cleanup, waste and water treatment, nanocomposite
I INTRODUCTION
Conventional solar cells are called photovoltaic
cells. These cells are made out of semiconducting
material, usually silicon. When light hits the cells,
they absorb energy though photons. This absorbed
energy knocks out electrons in the silicon, allowing
them to flow. By adding different impurities to the
silicon such as phosphorus or boron, an electric
field can be established. This electric field acts as a
diode, because it only allows electrons to flow in
one direction [1]. Consequently, the end result is a
current of electrons, better known to us as
Fig. 3
[8]
I.
INTRODUCTION
FIREFLY ALGORITHM
Where
is the attractiveness at r = 0.
The distance between any two fireflies i and j at
location xi and xj respectively is the Cartesian
distance [2].
=
(2)
Where x
i, k
)+t
(4)
Procedure FA:
Define the objective function of f(x), where
x=(x1,........,xd).
2. Generate the initial population of fireflies or xi (i=1,
2 ,..., n)
3.
Determine the light intensity of Ii at xi via f(xi)
4. While (t<MaxGen),
5.
For i=1 to n (all n fireflies)
6.
For j=1 to n (n fireflies)
7.
If(Ij>Ii)
8.
move firefly i towards j by using
11 equation;
9.
end if
10.
Attractiveness varies with distance r
via Exp [-r2 ];
11.
Evaluate new solutions and update
light intensity;
12.
End for j;
1.
13.
End for i;
14. Rank the fireflies and find the current best;
15. End while;
3.
III.
BAT ALGORITHM
A. Bat Motion
Each bat is associated with a velocity
and a
location
, at iteration t, in a d-dimensional search
or solution space. Among all the bats, there exists a
current best solution x [8]. Therefore, the above
three rules can be translated into the updating
equations for and velocities :
(5)
(6)
(7)
CUCKOO SEARCH
Levy ()
(9)
11.
12.
13.
14.
V.
CONCLUSION
(10)
REFERENCES
[1]
[2]
[3]
[4]
[5]
Nitin Khanna
Student, Dept of ECE
MSIT, GGSIP University
New Delhi
I.
INTRODUCTION
Amit Kumar
Student, Dept of ECE
MSIT, GGSIP University
New Delhi
Kapil Kumar
Student, Dept of ECE
MSIT, GGSIP University
New Delhi
(1)
II.
HAAR TRANSFORM
III.
ALGORITHM
FOR
HAARTRANSFORM OF AN IMAGE
(t) =
1,t
[0,1/2)
-1 , t [1/2,1)
0 , otherwise
1,
0t<1
(t) =
0
, otherwise
(3)
[4]
S.nBhavani,nK.Thanushkodi, A Survey on Coding
mmmAlgorithms in
Medical Image Compression,
mmn.,International
Journal
on,Computer
Scienceand
mmn.,Engineering, Vol. 02, No. 05, pp. 1429-mmn,,1434, 2010.
[5]
G. K. Kharate, V. H. Pati, ColornImage Compression
mmn..Based On Wavelet Packet Best Tree, International
mmn..Journal of Computer Science, Vol. 7, No.3, March 2010.
[6]
Othman Khalifa, W avelet Coding Design for Image
mmb . Data Compression, The International Arab Journal of
mmm Information Technology, Vol. 6, No. 2, pp. 118-127,
mmm April 2009
[7]
N. A. Koli, M. S. Ali, A Survey on Fractal Image
mmm,,Compression Key Issues,Information Technology
mmn,,,,Journal, 2008.
[8]
[9]
Aldroubi, Akram and Unser, Michael (editors,
mmmn,Wavelets in Medicine and Biology), CRC Press, Boca
mmmn,Raton FL, 1996.
IV.
CONCLUSION
A.
Alice
Blessie1,J.
Nalini
andmS.C.Ramesh
ImageCompression Using Wavelet Transform Based
[10]
Benedetto, John J. And Frazier, Michael (editors,
mmn, ,wavelets, Mathematics and Applications), CRC Press,
mmn,, Boca Raton FL,1996.
I.
INTRODUCTION
Living
Environment
SMART- CITY
COMPONETS
Mobility
People
Governance
Economy
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
REFERENCES
[1]
[2]
www.itu.int
www.metropolitansolutions.de
[19]
www.abb.com
C. Cecati, G. Mokryani, A. Piccolo, and P. Siano, An
overview on the smart grid concept, 36th Annual
Conference on IEEE Industrial Electronics Society,
IECON, pp. 3322-3327, 2010.
Z. Xue-Song, C. Li-Qiang and M. You-Jie , Research on
smart grid technology, International Conference on
Computer Application and System Modeling (ICCASM),
pp.599-603, 2010.
John D. McDonald, P.E., Smart Grid Applications,
Standards Development and Recent Deployments, GE
energy
T&D.
http://www.ieeepesboston.org/files/2011/06/McDonaldSlid
es.pdf
Ikbal Ali, Mini S. Thomas, Sunil Gupta, Substation
communication architecture to realize the future smart
grid, International Journal of Energy Technologies and
Policy, Vol. 1(4), pp. 25-35, 2011.
Ikbal Ali, Mini S. Thomas, Sunil Gupta and Suhail
Hussain, Information modeling for distributed energy
resource integration in IEC 61850 based substations, 12th
IEEE India international conference, INDICON 2015,
Jamia Millia Islamia (JMI), 17th -20th December, 2015.
IEC 61850: Communications Networks and Systems in
Substations,
2002-2005,
Available
[Online]:
http://www.iec.ch./
Ikbal Ali, Mini S. Thomas, Sunil Gupta, Features and
scope of IEC 61850, National Electrical Engineering
Conference (NEEC-2011), Delhi Technological University
(DTU), 16th 17th December, 2011.
Ikbal Ali, Mini S. Thomas, Sunil Gupta, Integration of
PSCAD based power system & IEC 61850 IEDs to test
fully digital protection schemes, IEEE PES Innovative
Smart Grid Technologies Conference (IEEE ISGT ASIA
2013), 10-13th Nov., 2013, Bangalore, India.
Ikbal Ali, Mini S. Thomas, Sunil Gupta, Sampled values
packet loss impact on IEC 61850 distance relay
performance, IEEE PES Innovative Smart Grid
Technologies Conference (IEEE ISGT ASIA 2013), 1013th Nov., 2013, Bangalore, India.
Ikbal Ali, Mini S. Thomas, Sunil Gupta, Methodology &
tools for performance evaluation of IEC 61850 GOOSE
based protection schemes, IEEE Power India
International Conference (PICON, 2012), December,
2012, DCRUST, Murthal, Haryana (India).
J.D. McDonald, Substation automation, IED integration
and availability of information, IEEE Power and Energy
Magazine, vol. 1, no. 2, p.p. 22-31, Mar.-Apr. 2003.
M.C. Janssen and A. Apostolov, IEC 61850 impact on
substation design, IEEE/PES Transmisssion and
Distribution Conference and Exposition, Chicago, 2008,
pp. 1-7.
A. Apostolov and D. Tholomier, Impact of IEC 61850 on
power system protection, IEEE PES Power Systems
Conference and Exposition, PSCE06, Atlanta,1053-1058.
S. Mohagheghi, J. C. Tournier, J. Stoupis, L. Guise, T.
Coste, C. A. Andersen, and J. Dall, Applications of IEC
61850 in distribution automation, IEEE/PES Power
Systems Conference and Exposition (PSCE), pp. 1-9, 2011.
R.E. Mackiewicz, Overview of IEC 61850 and benefits,
IEEE PES Transmission and Distribution Conference and
Exhibition, 21-24 May 2006, pp. 376-383.
smart-cities-india.com
I. INTRODUCTION
Segmentation is a key step towards image analysis
in various image processing application such as
object recognition, pattern recognition, medical
imaging. It can be stated as partitioning the image
into different regions each having homogeneous
features such as color, texture, and so on. This type
of segmentation is called clustering which is very
important in classifying different patterns in an
image. Data Mining comprises dependency
detection, class identification, class description, and
outlier/exception identification, the last focusing on
a very small percentage of data points which are
often ignored as noise. Cluster analysis plays an
important role in many engineering areas such as
data analysis, image analysis and pattern
recognition. Clustering helps in finding natural
boundaries in the data and fuzzy clustering is used
to handle the problem of vague boundaries of
clusters. In fuzzy clustering, the requirement of
crisp partition of the data is replaced by a weaker
requirement of fuzzy partition, where the
Himanshu Gupta
Student,
MSIT, GGSIP University
New Delhi
Harish Phulara
Student,
MSIT, GGSIP University
New Delhi
Fig 4
V. RESULTS
The following table shows the performance of all
the filters which were used. The table also
compares the
MSE and PSNR values after
applying various filters to the target image. The
above table summarizes the performance of the
filters under study. As is evident from the table, the
median filter shows the best results in removing
salt and pepper noise.
Filters
Median
Gaussian
Mean
Laplacian
->
filter
filter
filter
filter
PSNR
23.8
22.6
21.42
11.96
MSE
267.0
339.7
468.5
414.2
Fig 3
REFERENCES
[1]
[2]
[3]
Ivan Dervisevic, Machine Learning Methods for image
nnnn segmentation, mm2006
[4]
I.
Method
INTRODUCTION
II.
For example, to add Generalisation with the usecases in the basic Use Case Diagram that show
users interaction with the system (Rumbaugh J.
et. al, 1991). In this situation, the new method
concept added, must enter into the chunk of
purposes i.e. Basic life cycle purpose, Relational
purpose, Constraint Enforcement Purpose and
Integration class purposes. Since the set of
purposes gets modified, the dependencies and the
constraints have to mutate accordingly.
For every method concept Si to be added define the
purposes:
< Si, create> and < Si, delete >
<Generalisation, create> < Generalisation, delete>
Rules for Relational purposes
Rule-1: For all added method concepts Si such that
Si is composed of Sj that already exists and Si is
Laveena Rathi,
Student, Dept of IT
MSIT, GGSIP University,
New Delhi
laveena.rathi88@gmail.com
I.
INTRODUCTION
Pooja
Student, Dept of IT
MSIT, GGSIP University,
New Delhi
pooja1pathak@gmail.com
Image
Message
file
BMP image
file
Decryption
Image file
Image
Message file
TYPES OF STEGANOGRAPHY
TECHNIQUES
Significant
Bit
Substitution
1.4.
or
Frequency
Domain
Wavelet
Transformation
Adaptive Steganography:
ENCRYPTION STAGE:
The Encryption stage uses two types of files for
encryption purpose. One of them is the secret file
which is to be transmitted securely, and the other
one is a carrier file such as image which will carry
the secret data. In the encryption stage the secret
information is embedded into the image.
DECRYPTION STAGE:
V.
ALGORITHM
VI.
CONCLUSION
REFERENCES
[1] K.B.Raja, C.R.Chowdary, Venugopal K R, and
L.M.Patnaik, A Secure Image Steganography using
LSB, DCT and Compression Techniques on Raw
Images Department of Computer Science
Engineering, Bangalore 2005 IEEE.
[2] .Tahir Ali and Amit Doegar,A Novel Approach of
LSB
Based
Steganography
Using Parity
Checker,IJARCSSE, Vol. 5, Issue 1, January 2015.
[3] .Mr. Falesh M. Shelke1, Miss. Ashwini A. Dongre
and Mr. Pravin D. Soni, Comparison of different
techniques for Steganography in images",IJAIEM,
Vol. 3, Issue 2, February 2014.
[4] H. Yang, X. Sun, and G. Sun, A High-Capacity
Image Data Hiding Scheme using Adaptive LSB
Substitution , Radio Engineering, vol. 18, no. 4,
(2009).
[5] Z. H. Wang, C. C. Chang, and M. C. Li, Optimizing
Least Significant Bit Substitution using Cat Swarm
Optimization Strategy, Information Sciences, vol.
192, no. 1, (2012).
[6] S. Wang, B. Yang, and X. Niu, A secure
steganography .method based on genetic algorithm,
Journal of Information .Hiding and Multimedia
Signal Processing, vol. 1, no. 1 .(2010).
[7]
I INTRODUCTION
Discovery learning is an instructional approach
based on constructivism. It was originated in
1960s by Bruner and is supported by the works of
Piaget and S.Papert. Discovery learning can occur
whenever the students are provided with a problem.
It embarks students on an exciting, innovative and
thought provoking journey of investigation and
inquiry. The student draws on his previous
knowledge and experiences to investigate a
problem, interacts with the environment, explores
and manipulates objects and conducts experiments
to find a solution.
Jerome Bruner in his book The process of
education has discussed this method and
popularized it. The rationale behind using
discovery approach is that the motivation of pupil
to learn science will be increased, if they
experience the thrill scientists get after
discovering scientific knowledge. The students
also learn about the nature of science through the
process of discovery. It provides opportunity to
students to analyze the problem, collect data,
conduct experiments and arrive at solutions. In pure
discovery minimum guidance is given by the
teacher. There is no direct transmission or
imparting of facts. Rather students discover
knowledge and learn from their own observations
EFFECTIVE
DISCOVERY
Conclusion:
SO2
H2SO3
Observations:
.Constructivism in Education,
Mamta
Asst Prof., Dept of IT
MSIT, GGSIP University
New Delhi
mamta.ghalan@gmail.com
Juhi Jha
Student, Dept of IT
MSIT, GGSIP University
New Delhi
juhi.prashar1@gmail.com
I. INTRODUCTION
In our digital society Copyright protection is a
very important issue. A very large amount of
multimedia data are daily generated and distributed
using different kinds of consumer electronic
devices and very popular communication channels,
Ekta Sharma
Student,Dept of IT
MSIT, GGSIP University
New Delhi
shekta@yahoo.com
Nikhar Desai
Student, Dept of IT
MSIT, GGSIP University
New Delhi
nikds013@gmail.com
Secret image
Share2
Share2
overlapped shares
III.DIGITAL WATERMARKING
Digital watermarking is another technique that is
use to secure the data inside another piece of data
called cover media. Digital watermarking is the act
of hiding a message related to a digital signal (i.e.
an image, song, video) within the signal itself.
digital watermarking is used for copyright
protection of the image. Copyright protection of
digital data is defined as the process of proving the
intellectual property rights to a court of law against
the
unauthorized
reproduction,
processing,
transformation or broadcasting of digital data It is a
concept closely related to steganography, in that
they both hide a message inside a digital signal.
However, what separates them is their goal.
Watermarking tries to hide a message related to the
actual content of the digital signal, while in
IN
LSB
BASED
IN
DCT
BASED
V. CONCLUSION
Cover image
secret image
Share1
Share2
REFERENCES
Watermarked image
Fig 6. Encryption process of watermarking and VC schemes