Home
Issues List
1 Dec 25, 2016
A Comparative Study of Biped Dynamic Walking

Biped legged robots have been motivated by its potential use in rough terrain, as well as for advancement in prosthesis manufacturing and testing. This paper will give comparative analysis of various walking schemes of biped humanoid robot and concentrates on issues related to its automatic control. The paper shows that there is scope for improvement in the present available biped robots and further enhancement can be done in order to augment controllability and speed of working with more accuracy. The deficit in the available technology has been addressed and the emphasis on which further research work must be done is highlighted....

Authors: Bharat Sharma, Anil Kumar, Kumar Gaurav, Dhirendra Yadav, Monika Jain.

2 Dec 25, 2016
A Fuzzy Similarity Approach for Automated Spam Filtering and Naïve Bayes Classifier

E-mail communication is indispensable nowadays, but the e-mail spam problem continues growing drastically. In recent years, the notion of collaborative spam detection system with a novel e-mail abstraction scheme with nearduplicate matching scheme has been widely discussed. The primary idea of the similarity matching for spam detection is to maintain a known spam database, On purpose of achieving efficient similarity matching and reducing storage utilization, prior works mainly represent each e-mail by a succinct abstraction derived from e-mail content text. However, these abstractions of e-mails cannot fully catch the evolving nature of spams, and are thus not effective enough in near-duplicate detection. In this paper, we propose a novel e-mail abstraction scheme, which considers email layout structure to represent e-mails. We present a procedure to generate the e-mail abstraction using HTML content in e-mail,imap,pop3 and this newly devised abstraction can more effectively capture the A Fuzzy Similarity Aproch For Automated Spam Filtering And Naïve Bayes Classifier is a near-duplicate phenomenon of spams....

Authors: CH. N. V. V. Sivakumar.

3 Dec 25, 2016
A Proximity Feed Dual Band Circular Shaped Antenna with Semicircular Ground Plane

In this work, we present a Circular Shaped proximity feed Microstrip Patch Antenna. The antenna is comprised of circular shaped radiation patch and this radiating patch is faded by proximity coupling. The ground plane of the antenna has Semicircular pattern to improve the coupling level of the patch. The simulated result shows it provides the return loss less than -10 dB for two frequencies 1.27 GHz and 1.43 GHz which could be a useful frequencies for wireless communication system. The simulation work is carried out on IE3D software, a product of Zeland Software Company....

Authors: Amitesh Raikwar, Abhishek Choubey, Alok Dubey.

4 Dec 25, 2016
A Improved Privacy Preserving Algorithm Using Association Rule Mining in Centralized Database

The recent advancement in data mining technology to analyze vast amount of data has played an important role in several areas of Business processing. Data mining also opens new threats to privacy and information security if not done or used properly. The main problem is that to hide sensitive information, including personal information, fact or even patterns which are generated by any algorithm of data mining from the others. In order to focusing on privacy preserving association rule mining, the simplistic solution to address the problem of privacy is presented. To overcome these problems, we propose a algorithm named improved Privacy Preserving Algorithm using Association Rule Mining which is based on the random Perturbation technique which is best in efficiency and performance. This method is suitable to the any type of data. Our algorithm is a good way to apply data mining techniques with security that hides our logical instances from others....

Authors: Archana Tomar, Vineet Richhariya, Mahendra Ku. Mishra.

5 Dec 25, 2016
Effect of RF Linewidth on BER Performance of 64-QAM ROF

The optical and wireless communication systems integration will activate the potential capacity of photonic technology for providing the expected growth in interactive video, voice communication and data traffic services that are cost effective and a green communication service. The last decade growth of the broadband internet projects the number of active users will grow to over 2 billion globally by the end of 2014. Enabling the abandoned capacity of photonic signal processing is the promising solution for seamless transportation of the future consumer traffic demand. One emerging technology applicable in high capacity, broadband millimeter-wave access systems is Radio over Fiber also called Fiber To The Air (FTTA). In this paper, Optical SSB signal is specifically selected as it has tolerance for power degradation due to dispersion effects over a length of fiber and BER (bit error rate) is evaluated in terms of RF line width and percentage of received power....

Authors: Subodh Bansal, Parvin Kumar Kaushik.

6 Dec 25, 2016
Automatic Power Grid Controller

Now days, there is a lot of requirement to control the appliances in an industry or in a home connected to the power grid when we are working with our PC. In these situations we need to go to the place where the power grid has been situated which is a time consuming process. The main aim of the present project is to provide a facility by which we can control all the appliances connected to the power grid like bulbs, fans, TV, fridge, and air cooler etc. from your PC or from your laptop at a distance of 10meters around the control board. The only thing is we need to connect a RF remote transmitter to your PC and a control board to the power control section of home....

Authors: Neelika Tripathi, Manju Vishwakarma.

7 Dec 25, 2016
Developing Dictionary for Identifiers Using Natural Language Processing

Now a day’s software maintenance and reuse process is a tedious process. Meaningful method names are useful for readability and maintenance of the software .Large time and effort provided to software maintenance and reuse. This can be reduced by providing software engineers with software tools such as IDEs, which automatically provide information about the source code. Identifiers are the important element in the program, if the identifiers in the program has inappropriate name programmers find difficult to understand the program. In this paper proposes a method to for building dictionary for identifiers from source code written in object oriented language. Dictionary is built using the verb object relationship extracted from source code. This dictionary is helpful in software reengineering and maintenance....

Authors: V. Angayarkanni.

8 Dec 25, 2016
A Design and Development of a Model to Authorize Certificates in Government Sectors Using Cloud Computing Environments

In this paper we have design and developed a model, where user can request and administrator can authorizes certificates through online in several sectors. we used fifth generation cloud computing environments to maintain data.This model enables a convenient, on-demand network access for a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort. we developed an application which allow users to make a request to get certificates (e.g Income/Residential/Land Records e.tc..) through online by filling user application form by attaching appropriate proof (voter id, Dl,Aadhar card,ration card e.t.c..).all this process will be carried out in main remote server which is placed in the public cloud and it can be accessible by all the web based systems through online on-demand. we also maintain a Private cloud in which special privileged administrator(i.e.village accountant and thashildar) authorize certificates(using digital signatures) by access/reviewing data from public cloud. We ensure the data Integrity and security using Rsvp security algorithm and enhance the applications search in public and private cloud using Cloudle search engine....

Authors: Yogeesh A.C, Roopashree H.R, Anjan punith B.G, Rajesh. B.

9 Dec 25, 2016
Crosstalk Noise and Delay Reduction in VLSI Interconnects

Crosstalk in interconnects had a great impact on overall reliability and performance of IC and thus it plays a key role in deep submicron (DSM) VLSI circuits.In this paper schmitt trigger is designed as a buffer which operates at a 20 GHz frequency so as to minimize crosstalk noise and delay in interconnects. In order to propagate the signal with the reduced noise and delay simultaneous buffer and wire sizing is done along with buffer insertion through interconnects .Accurate SPICE results shows that at 90nm technology node crosstalk noise is reduced by 60% and delay by 56% for 1V power supply....

Authors: Shikha Singh, V.Sulochana Verma.

10 Dec 25, 2016
Analysis and Applications of H.264 Video Coding Standard

This paper investigates the effects of many parameters, which are crucial for performance of H.264 video coder .H.264 is the latest international video coding standard. It was jointly developed by the video coding expert group (VCEG) of the ITU-T and moving picture expert group (MPEG) of ISO/IEC. The main goals of the H.264 standardization effort have been enhanced compression performance. H.264 has achieved a significant improvement in rate distortion efficiency relative to existing standards. It uses state of the art coding tools and provide enhanced coding efficiency for a wide range of applications including video telephony , video conferencing , streaming video , digital video authority , digital cinema and many others...

Authors: Imran Ullah Khan, M.A.Ansari .

11 Dec 25, 2016
Analysis of Effect of Sound Levels on EEG

This paper describes the effects of various levels of sound on brain using Electroencephalogram (EEG). In this study music (a form of sound) has been considered and analyzed. International 10-20 System has been used to get 19 channels of EEG signal. Consequently, the brainwave's signal has analyzed and the comparison between these different sound levels is discussed. This experiment focused mainly on two types of brain waves which are alpha (8-12 Hz) and beta wave (13-30 Hz). The analysis is carried out using Power Spectral Analysis method. Alpha wave is important as stress indicator meanwhile beta wave is associated with fast brain activity or disturbed situation of brain. High power of alpha waves and low power of beta waves that obtained during low levels of sound indicate that subjects were in relaxed state. However, when subjects exposed to 100db, beta waves power increased indicating subjects in disturbed state. Meanwhile, the decrease of alpha wave magnitude showed that subjects in tense. ...

Authors: Renu Bhoria, Poonam Singal, Deepika Verma.

12 Dec 25, 2016
Implementation of Kea-Keyphrase Extraction Algorithm by Using Bisecting K-Means Clustering Technique for Large and Dynamic Data Set

In most traditional techniques of document clustering, the number of total clusters is not known in advance and the cluster that contains the target information cannot be determined since the semantic nature is not associated with the cluster. To solve this problem, this work proposes a new clustering algorithm based on the Kea[1] key phrase extraction algorithm which returns several key phrases from the source documents by using some machine learning techniques. In this work, documents are grouped into several clusters like Bisecting K-means, but the number of clusters is automatically determined by the algorithm with some heuristics using the extracted key phrases. By this it is easy to extract test documents from massive quantities of resources....

Authors: Arshad.

13 Dec 25, 2016
HDL Implementation of Data Compression: LZW Algorithm

This paper presents LZW data compression algorithm which is implemented using finite state machine technique. The proposed algorithm enhances the performance by using less number of bits than their ASCII code, utilizing content addressable memory arrays. Thus the text data can be effectively compressed using the proposed algorithm. Simulation results using Xilinx tool shows an improvement in lossless data compression scheme. In addition to this, the proposed technique results in reduced storage space by 60.25% and increased compression rate by30.3%....

Authors: Simrandeep kaur, V.Sulochana Verma.

14 Dec 25, 2016
Architecture and Performance of Intelligent System

In this paper defined the heterogeneous agents that solve problems by sharing the knowledge retrieved from the WEB and cooperating among them for an intelligent system. The control structure of those agents is based on a general purpose Multi-Agent architecture based on a deliberative approach. Any agent in the architecture is built by means of several interrelated modules: control module, language and communication module, skills modules, knowledge base etc. Basically the control module uses an agenda to activate and coordinate the agent skills for a best intelligent system. This agenda handles actions from both the internal goals of the agent and from other agents in the basic environment. In this paper describes how SKELETONAGENT has been used to implement different kinds of agents and a specialized for a Multi-Agent System. The implemented Multi Agent System is the specific implementation of a general WEB gathering architecture, named MAPWEB, which extends SKELETONAGENT. MAPWEB has been designed to solve the basic problems in WEB domains through the integration of information gathering and their resources planning techniques. The system which uses information gathered directly from several WEB sources (plane, train, and hotel Companies etc.) To solve travel problems. The proposed a architecture allows integrating the different agent’s tasks with AI techniques like planning to build MAS which is able to gather and integrate information retrieved from the WEB to solve problems....

Authors: Rajesh Kumar, B. S. Jangra.

15 Dec 25, 2016
Mining Tree-Based Association Rules from XML Documents

The increasing amount of XML datasets available to casual users increases the necessity of investigating techniques to extract knowledge from these data. Data mining is widely applied in the database research area in order to extract frequent correlations of values from both structured and semi-structured datasets. In this work we describe an approach to mine Tree-based association rules from XML documents. Such rules provide information on both the structure and the content of XML documents; moreover, they can be stored in XML format to be queried later on. The mined knowledge is approximate, intentional knowledge used to provide: (i) Quick, approximate answers to queries and (ii) Information about structural regularities that can be used as data guides for document querying. A prototype of the proposed system is also briefly described....

Authors: Saranya T.J.

16 Dec 25, 2016
Electricity Tariff Indicator

This paper depicts the electricity billing system named “electricity with tariff indicator”. It is easily accessible by the consumer, in which any consumer can buy a memory card (which is an EEPROM IC) with a password stored inside using a MC program. Different ranges of memory card are easily available. The Female symbolizes the memory card. The smart card is protected from other user. This is done when the consumer inserts a female (prepaid card) into male (card reader) which is connected to the kit. The stored into is read by the male and the info is deleted from the EEPROM IC with the aid of a microcontroller program. To avoid any inconvenience of the deletion of whole amount it is equipped with an alarm sound, which is another add on of our project In this scheme, each consumer is provided with a memory card (female); with password and the required number of units pre-entered by the service provider and a microcontroller based system is installed at each consumer premises. The microcontroller based system is activated only after insertion of prepaid card and ensures the authentication and keeps track on consumption of energy, and cuts down the supply if either authentication fails or consumption expires. In this scheme the Electronic Energy meters are employed for measuring energy which will output a fixed number of pulses per unit of Energy which can be counted to estimate the units consumed....

Authors: Namrata Singh, Poonam Singh, Akanksha Yadav,Pratibha Patel.

17 Dec 25, 2016
Controlling of Device through Voice Recognition Using Matlab

Speech Recognition is the process of automatically recognizing a certain word spoken by a particular speaker based on individual information included in speech waves. This technique makes it possible to use the speaker?s voice to verify his/her identity and provide controlled access to services like voice based biometrics, database access services, voice based dialing, voice mail and remote access to computers. In this project, the algorithms for the speech recognition has been developed and implemented on MATLAB .These algorithms can be used for any security system in which the person authentication is required....

Authors: Sonam Kumari, Komal Saxena.

18 Dec 25, 2016
Cloud Computing Technology in Education System

In ancient India gurukul were the temples where the students received knowledge and get educated. The clock rotates and with the entrance of British rule the position of these gurukul were taken by schools. The sole purpose of starting schools was to make education available to each and every person in the country without the difference of cast, creed, or any type of financial issues. But till now h un dr eds of yea r s h a ve be en pa ssed but still there are places in India where getting proper education is just a dream. There are isolated areas situated not only at villages but also outside the major cities where schools are not present, if schools are there then no good teachers available. At several places they have only middle schools and no high school. Thus these type of problems keep emerging out and put hindrance to dawn of education to reach everywhere in India. Various surveys conducted by government put ahead the result that present system of education is not worth and has many loop holes associated with it. Cloud computing is the knowledge which has built by years of study in Distributed systems, grid computing etc and thus by using this technology we can make available the answers to all the short comes and promise to provide quality education to each and every citizen of India....

Authors: Gaurav Bhatia, Mohnish Anand.

19 Dec 25, 2016
Wheat Crop Identification and Discrimination Using Resourcesat P-6 LISS III And AWIFS Sensor Satellite Data of Indore District

Crop recognition (identification and discrimination) from other crops is a primary step for further research, analysis and studies about crop condition, acreage, production estimation, crop growth monitoring, crop disease analysis etc. Crop identification and discrimination is based on differential spectral response of various crops in a multi-dimensional feature space produced by different spectral bands, or time domain or both and is influenced by sensor characteristics and pattern recognition techniques. Each crop has its unique architecture and growing period, thus enabling discrimination through remote sensing data. If there are two crops with similar spectral signatures on a given date (confusion crops), multi-temporal remotely sensed data may be used to discriminate them. This paper highlights wheat crop identification and discrimination from pulses and other crops with the help of single date LISS-III and multidate AWiFS for Indore district of Madhya Pradesh during the period between 2010-11. For this study we have collected various ground control points (GCPs) from wheat dominant area and further plotted against the classified images for the same region. AWiFS and LISS-III data has proven its efficacy to reveal the information of natural resources especially wheat crop identification at district and village level respectively....

Authors: Goswami S. B., Aruna Saxena, G. D. Bairagi.

20 Dec 25, 2016
Design of Low Power Phase Locked Loop in Submicron Technology

This paper presents design of phase locked loop system for low power applications. The design focuses on reducing power consumption. This design consists of low power phase frequency detector, low jitter charge pump, fully differential Ring oscillator based VCO along with voltage to current convertor and current controlled oscillator, 2nd order passive loop filter and 7 bit digital frequency divider using 350nm, 180nm and 130nm technology nodes at 350MHz. Results are carried out on SPICE at various technology nodes. For 3V power supply, power consumption of PLL system is reduced to 65% at 350nm technology node....

Authors: Kanika Garg, V.Sulochana Verma.

21 Dec 25, 2016
Simulative Investigations of DDR2 (SDRAM) Model in HDL

This paper presents a simulation based implementation of DDR2 memory model in HDL language. The study covers single data rate, double data rate and their comparisons. This model consists of five blocks i.e. Instruction decoder, DDR2 interface, SRAM interface, bank control and adder reorder. This work is evaluated using Xilinx 12.4 ISE and ISIM is used for simulation....

Authors: Ajay Kumar, V.Sulochana Verma.

22 Dec 25, 2016
Supplier Selection by Technique of Order Preference by Similarity to Ideal Solution (TOPSIS) Method for Automotive Industry

A supply chain consists of all parties involved, directly or indirectly, in fulfilling a customer demand. The supply chain includes not only the buyer and suppliers, but also transporters, warehouses, retailers and even customers themselves. In supply chain supplier selection process determine the suitable suppliers who provide the right quality products at the right price, at the right time and in the right quantities to the buyer. The aim of this paper is developing a methodology for selection of suppliers in supply chain cycle in an automobile industry. For supplier selection different important criteria are taking in account. These criteria have different weights by different experts. Using these weights provide rank to every supplier with the help of Technique for Order Preference by Similarity to Ideal Solution (TOPSIS Method)....

Authors: Ravendra Singh, Hemant Rajput, Vedansh Chaturvedi, Jyoti Vimal.

23 Dec 25, 2016
Comparison of Feed Forward Network and Elman Network for Fault Diagnosis of Cathode Ray Oscilloscope Using Artificial Neural Network

Artificial neural networks (ANN) are an informationprocessing method of a simulation of the structure for biological neurons. This paper makes a research on the approach of the artificial neural network for fault diagnosis of cathode ray oscilloscope. In the last five years, the field of diagnosis has attracted the attention of many researchers, both from the technical area as well as medical area. In this paper, I present my efforts in developing the fast algorithm for the fault diagnosis of CRO using Artificial Neural Network. Eight different fault indications have been considered and numbers of faults for each indication have been taken. Network has eight input nodes, each for every indication and thirteen output nodes, each for every fault. The network ha trained by feed forward network and Elman network....

Authors: Ritu Munjal.

Announcements

  • Calling Papers For Volume 13, Issue 4 Last Deadline For Paper Submission 22-July-2023 Posted by Admin Posted by Admin.