The vulcanizates prepared using non-regulated nitrosamine generating accelerators are reported as non-carcinogenic. Efficient vulcanization system containing non-regulated single accelerator (either N, N-dicyclohexyl-2-benzothiazolesulfenamide (DCBS) or N,N-dibenzyl-2-benzothiazolesulfenamide (DBBS)) was used for the preparation of safe natural rubber vulcanizates. Safe vulcanizates were also prepared using the sulfenamide accelerator (DCBS or DBBS) in binary combination with safe tetrabenzyl thiuramdisulfide (TBzTD). Comparative study based on cure characteristics and mechanical property evaluation proved that binary accelerator based vulcanizates are the best choice. Fluid resistance in oil and cytotoxicity of the binary accelerator based vulcanizates were assessed.
- Page(s): 01-06
- Date of Publication: 21 June 2017
- Abhitha K.Department of Polymer Science and Rubber Technology, Cochin University of Science and Technology, Kochi –682022, Kerala, India
- Thomas KurianDepartment of Polymer Science and Rubber Technology, Cochin University of Science and Technology, Kochi –682022, Kerala, India
References
[1]. Iavicoli, I. and Carelli, G., (2006), J. Occup. Environ. Med., 48, 195–198. [2]. Fishbein, L., (1979), Potential Industrial Carcinogens and Mutagens, Netherlands: Elsevier Scientific Publishing Company. [3]. Vieira, E.R., Pierozan, N.J. and Lovison, V., (2006), Braz Arch Biol Technol, 49, 73-77. [4]. Goss Jr., L.C., Monthey,S. and Issel, H.M., (2006), Rubb. Chem. Technol., 79, 541- 552. [5]. Seeberger, D. B., (1990), Rubber World, August. [6]. International Agency of Research Cancer, “IARC Monographs on the Evaluation of Carcinogenic Risks to Humans,” Some N-Nitrosamines Compounds, (1998). [7]. Druckrey, H.,Preussmann, R., Ivankovic, S. and Schmahl, D. Z., (1967), Krebsforsch., 69, 103. [8]. Kleiner, T., Ruetz, L. and Bayer, A. G., DCBS: A preferred accelerator for adhesion compounds and other tyre applications, 148th ACS Rubber Division meeting, Fall 1995, Cleveland, Oh., 17 -20 October, paper 75, page 21.012- Datta, R.N. (ed), Rapra Review Reports, Rubber Curing systems,vol12, (2001). [9]. Coran, A. Y. (2003), J. Appl.Polym. Sci., 87, 24-30. [10]. Oury, B., Limasset, J. C. and Protois, J. C., (1997), Int Arch Occup Environ Health, 70, 261-271. [11]. Choi, S. S., Park, B.H., Lee, S. G. and Kim, B.T., (2002), Bull. Kor. Chem. Soc., 23, 320. [12]. Aprem, A.S.,Thomas, S., Joseph, K., Nektaria, M. B. and Karger, K.J., (2003), J.ElastomPlast., 35, 29-55. [13]. Byran, G. and Welding, G.W., (1963), Techniques of Polymer Science, Society of Chemical Industries, vol.17, 75. [14]. Gorton, A.D.T. and Pendle, T.D., (1976), Nat. Rubber Technol., 7, 77. [15]. Ellis, B. and Welding, G.W., (1964), Rubber Chem. Technol., 37, 571. [16]. Flory, P.J. and Rhener, J., (1943), J. Chem. Phys., 11, 5120. [17]. Aprem, A.S., Joseph, K. and Thomas, S., J. (2004), Appl.Polym. Sci., 91, 1070. [18]. ISO 10993-5, Biological evaluation of medical devices-Part 5, Tests for in vitro cytotoxicity, International Organization for Standardization, Geneva, Switzerland, (1999). [19]. Fotakis, G. and Timbrell, J.A., (2006), ToxicolLett., 160, 171–177. [20]. Bhowmick, A., Malcolm, M.H. and Henry, A B. (eds.), (1994), Rubber Products Manufacturing Technology, Marcel Dekker Inc., NewYork, 341. [21]. Brendan, R. (ed.), (2016), Rubber compounding Chemistry and applications, second edition, CRC Press, Boca Raton, 488. [22]. Mathew, G., Nah, C., Rhee, J.M. and Singh, (2006), R.P., J. ElastomPlast, 38, 43. [23]. Fujimoto, K., Nishi, T. and Okamoto, T., (1981), Int. Polym. Sci. Technol., 8 (8), 30. [24]. Mathew, G., Singh, R.P., Nair, N.R. and Thomas, S., (2003), J. Mater. Sci., 38, 2469. [25]. Isayev, A.I. and Brijesh, S., (2006), J. ElastomPlast, 38, 291. [26]. Peter, A. C. and Norman, H., (1999),The Rubber Formulary, Noyes Publications, New York, U.S.A.. [27]. Norman, H., (2007), Compounding precipitated silica in elastomers, William Andrew Publishing, Norwich, New York, U.S.A. [28]. Raju, P., Nandanan, V. and Sunil, K.N.K., (2007), J Rubb. Res., 10(1), 1-16. [29]. Aprem, A. S.,Kuruvilla, J., Thomas, M., Volker, A. and Sabu, T., (2003), Eur. Polym. J., 39, 1451-1460. [30]. Pimolsiriphol, V., Saeoui, P. and Sirisinha, C., (2007), Polym-Plas. Technol. Eng., 46(2), 113-121. [31]. Rohana, Y.Y. S., Azura, A. R. and Ahmad, Z., (2011), Journal of Physical Science, 22(2), 1-14. [32]. Elizabeth, K. A., Evaluation of Natural Rubber Latex Gloves and Vulcanizates with Special Reference to Residual Zinc Dithiocarbamate Accelerator, Ph. D. Thesis, Sree ChitraTirunal Institute for Medical Sciences and Technology, Thiruvananthapuram, Kerala, India, (2005). [33]. Hyun, S. B., Ja, Y. Y., Dong, K. R., Dong-Wook, H., Dong, H. L., Oh-Hun, K. and Jong-Chul, P., (2005), Yonsei Med. J., 46(4), 579-583.
Abhitha K.and Thomas Kurian "Non-regulated Accelerator (DCBS/DBBS) Incorporated Natural Rubber Formulations - Cure Characteristics and Mechanical Properties" International Journal of Research and Scientific Innovation-(IJRSI) vol.4 issue 6s, pp.01-06 2017
The quantification of water resources is very essentiaal to water resources management. The Venkatapura Watershed of Karnataka has been selected for the present study. The groundwater recharge is determined by using different empirical models proposed by Chaturvedi, Up Irrigation Research Institute, Bhattacharjee, Krishna Rao, Sehgal, Kumar and Sethapathi. According Sehgal formulae average maximum groundwater recharge of 34.27% observed and based on Chaturvedi formulae minimum groundwater recharge of 8.04% is observed. The correlation analysis reveals that Chaturvedi, UPRI and Kumar and Sethapathi formulas are nearly same. The present study helps to calculate groundwater recharge without hydrogeological methods.
- Page(s): 07-10
- Date of Publication: 21 June 2017
- Praveen G. Deshbhandari Department of Marine Geology, Mangalore University, Mangalagangothri- 574 199, India
- C. Krishnaiah Department of Marine Geology, Mangalore University, Mangalagangothri- 574 199, India
References
[1]. Adhikary S. K., Chaki T., Rahman M. M. and Gupta A D (2013) Estimation of groundwater recharge into a shallow unconfined aquifer in Bangladesh, Journal of Engineering Science 04 (1): 11-12 [2]. Ebrahimi H., Ghazavi R., Karimi H. (2016) Estimation of groundwater recharge from the rainfall and irrigation in an Arid environment using inverse modeling approach and RS. Water Resource Management 30:6, pp1939-1951. [3]. Oke, M. O. Martins O., Idowu O. A. and Aiyelokun, O. (2015) Comparative analysis of groundwater recharge estimation value obtained using empirical methods in Ogun and Oshun river basins. Ife Journal of Science, 17(1) p53-56 [4]. Gontia N and Patil P. Y. (2012) Assessment of groundwater recharge through rainfall and water harvesting structures in Jamka Microwatershed using Remote sensing and GIS J Indian Soc. Remote Sens, 40(4):639-648 [5]. Jukik D. and Jukik V. D. (2004) A frequency domain approach to groundwater recharge Estimation in Karst , Journal of Hydrology , 289(1-4): 95-110 [6]. Karthick B. and Ramachandra T. V. (2007) Spatial variation of physico-chemical and hydrological parameters with land-use in Venkatapura Catchment, Karnataka, 9(4): 1001-1005. [7]. Kumar, C. P. and Sethapathi, P. V. (2002) Assessment of natural Ground water recharge in upper Ganga Canal command area. Journal of Applied Hydrology, 15(4):13-20. [8]. Scalon B. R., Hearly, R. W. and Cook, P. G. (2002) Choosing appropriate techniques for quantifying groundwater recharge . Hydrogeology Journal 10(1): 18-39.
Praveen G. Deshbhandari, C. Krishnaiah "Comparative Analysis of Empirical Models Derived Groundwater Recharge Estimation in Venkatapura Watershed, Karnataka" International Journal of Research and Scientific Innovation-IJRSI vol.4 issue 6s, pp.07-10 2017
Blood Pressure is the pressure exerted by blood on the walls of arteries. Normal blood pressure is considered to be a systolic blood pressure of 120 millimetres of mercury and diastolic pressure of 80 millimetres of mercury (stated as "120 over 80"). If an individual were to have a consistent blood pressure reading of 140 over 90, he would be evaluated for having high blood pressure. If left untreated, high blood pressure can damage important organs, such as the brain and kidneys, as well as lead to a stroke. Thus it becomes important to measure blood pressure as it can lead to early diagnosis of diseases that may be linked to high or low blood pressure. PTT is the time taken by the arterial pulse propagating from the heart to a peripheral site. This can be calculated from ECG signals and PlethysmoGram signals. Since, PTT has been found to be correlated to Blood Pressure, it is imperative to calculate PTT accurately. In this paper, a relation has been developed between PTT and Blood Pressure using regresssion analysis. Another indicator, known as the Photoplethysmogram Intensity Ratio, henceforth known as the PIR has also been used in estimation of the Blood Pressure. The coding has been done in LabVIEW which is has a graphical programming syntax that makes it simple to visualize, create, and code engineering systems.
- Page(s): 11-15
- Date of Publication: 21 June 2017
- Alister DsouzaM. Tech Scholar, Electrical Engineering Dept., VJTI, Mumbai, India
- Dr. M. S. PanseAssociate Professor, Electrical Engineering Dept., VJTI, Mumbai, India
References
[1] Ding, X., Zhang, Y., Liu, J., Dai, W. and Tsang, H. (2016). Continuous Cuffless Blood Pressure Estimation Using Pulse Transit Time and Photoplethysmogram Intensity Ratio. IEEE Transactions on Biomedical Engineering, 63(5), pp.964-972. [2] Gesche, H., Grosskurth, D., Küchler, G. and Patzak, A. (2011). Continuous blood pressure measurement by using the pulse transit time: comparison to a cuff-based method. European Journal of Applied Physiology, 112(1), pp.309-315. [3] Kounalakis, S. and Geladas, N. (2009). The Role of Pulse Transit Time as an Index of Arterial Stiffness During Exercise. Cardiovascular Engineering, 9(3), pp.92-97. [4] HALLOCK, P. (1934). ARTERIAL ELASTICITY IN MAN IN RELATION TO AGE AS EVALUATED BY THE PULSE WAVE VELOCITY METHOD. Archives of Internal Medicine, 54(5), p.770. [5] Smith, R., Argod, J., Pepin, J. and Levy, P. (1999). Pulse transit time: an appraisal of potential clinical applications. Thorax, 54(5), pp.452-457. [6] OCHIAI R, TAKEDA J, HOSAKA H, SUGO Y, TANAKA R, SOMA T: The relationship between modified pulse wave transit time and cardiovascular changes in isoflurane anesthetized dogs. J ClinMonitComput 15: 493-501, 1999. [7] AHLSTROM C, JOHANSSON A, UHLIN F, LÄNNE T, ASK P: Noninvasive investigation of blood pressure changes using the pulse wave transit time: a novel approach in the monitoring of hemodialysis patients. J Artif Organs 8: 192-197, 2005. [8] S. Alty, N. Angarita-Jaimes, S. Millasseau and P. Chowienczyk, "Predicting Arterial Stiffness From the Digital Volume Pulse Waveform", IEEE Transactions on Biomedical Engineering, vol. 54, no. 12, pp. 2268-2275, 2007. [9] Fechir M, Schlereth T, Purat T, Kritzmann S, Geber C, Eberle T, Gamer M, Birklein F: patterns of sympathetic responses induced by different stress tasks. openneurol j 2: 25-31, 2008. [10] Schmalgemeier H, Bitter T, Bartsch S, Bullert K, Fischbach T, Eckert S, Horstkotte D, Oldenburg O: pulse transit time: validation of blood pressure measurement under positive airway pressure ventilation. sleep breath 16: 1105-1112, 2012. [11] Contal O, Carnevale C, Borel J-C, Sabil A, Tamisier R, Lévy P, Janssens J-P, Pépin J-L: pulse transit time as a measure of respiratory effort under non-invasive ventilation. eurrespir j 41: 346-353, 2013. [12] KortekaasMc, NiehofSp, Van VelzenMhn, Galvin Em, HuygenFjpm, StolkerRj: pulse transit time as a quick predictor of a successful axillary brachial plexus block. ActaAnaesthesiolScand 56: 1228-1233, 2012. [13] Ma, H. (2014). A Blood Pressure Monitoring Method for Stroke Management. BioMed Research International, 2014, pp.1-7. [14] Zhang, G., Liu, C., Ji, L., Yang, J. and Liu, C. (2016). Effect of a Percutaneous Coronary Intervention Procedure on Heart Rate Variability and Pulse Transit Time Variability: A Comparison Study Based on Fuzzy Measure Entropy. Entropy, 18(7), p.246. [15] Gómez García, M., Troncoso Acevedo, M., Rodriguez Guzmán, M., Alegre de Montaner, R., FernándezFernández, B., del Río Camacho, G. and González-Mangado, N. (2014). Can Pulse Transit Time Be Useful for Detecting Hypertension in Patients in a Sleep Unit?.Archivos de Bronconeumología (English Edition), 50(7), pp.278-284. [16] Ding, X., Zhang, Y. and Tsang, H. (2016). Impact of heart disease and calibration interval on accuracy of pulse transit time–based blood pressure estimation. Physiological Measurement, 37(2), pp.227-237. [17] T. Wibmer, et al., "Pulse transit time and blood pressure during cardiopulmonary exercise tests," Physiol. Res., vol. 63, pp. 287-296, 2014.
Alister Dsouza, Dr. M. S. Panse "LabVIEW Based Measurement of Blood Pressure using Pulse Transit Time" International Journal of Research and Scientific Innovation-IJRSI vol.4 issue 6s, pp.11-15 2017
A finite element modelling of composite plate with integrated piezoelectric layers, acting as sensor/actuator, for active vibration control is presented in this paper. The displacement feedback (DF) and direct velocity feedback (DVF) controls are integrated into the FE software ANSYS to perform closed loop analysis for vibration control. A smart laminated composite beam with different layup configurations under free and forced vibration condition is studied and the results shows suppression of vibration achieved successfully in both DF and DVF controls.
- Page(s): 16-22
- Date of Publication: 21 June 2017
- Chennappa H. Korishetti Assistant Professor, Department of Mechanical Engineering Angadi Institute of Technology & Management, Belagavi, Karnataka, India
- Deepak S. HuddarAssistant Professor, Department of Mechanical Engineering Angadi Institute of Technology & Management, Belagavi, Karnataka, India
References
[1]. V. Balamurugan and S. Narayanan, Shell finite element for smart piezoelectric composite plate/shell structures and its application to study of active vibration control, Finite elements in Analysis and Design, vol. 37, 2001 pp.713-738. [2]. J. Artel and W. Becker, Coupled and uncoupled analyses of piezoelectric free-edge effect in laminated plates, Composite Structures, vol. 69, 2005, pp.329-335. [3]. I. F. Pinto Correia, Cristovao M. Moto Soares, Carlos A. Mota Soares, and J. Herskovits, Active control of axisymmetric shells with piezoelectric layers: a mixed laminated theory with a higher order field, Computers and Structures, vol. 80, 2002, pp.2265-2275. [4]. Jose M. Simoes Moita, Isidoro F. P. Correia, Cristovao M. Moto Soares, and Carlos A. Mota Soares, Active control of adaptive laminated structures with bonded piezoelectric sensors and actuators, Computers and Structures, vol. 82, 2004, pp.1349-1358. [5]. Levent Malgaca, Integration of active vibration control methods with finite element models of smart laminated composite structures, Composite Structures, vol. 92, 2010, pp.1651-1663. [6]. H. Boudaoud, E. M. Daya, S. Belouettar, L. Duigou and M. potier-Ferry, Damping analysis of beams submitted to passive and active control, Engineering Structures, vol. 31, 2009pp. 322-331. [7]. ANSYS User Manual (release 14.0).
Chennappa H. Korishetti, Deepak S. Huddar "Active Vibration Control of Composite Plate” International Journal of Research and Scientific Innovation-IJRSI vol.4 issue 6s, pp.16-22 2017
Fetal monitoring is the way of checking the condition of unborn baby during labor and delivery by continuously monitoring his or her heart rate. A normal fetal heart rate (FHR) can reassure safe birth of the baby. Fetal monitoring techniques are broadly classified into invasive and non-invasive techniques. Non-invasive techniques are involves monitoring the fetus through mother’s abdominal region. This can be done in all gestation weeks and during the delivery also. Abdominal ECG (AECG) is a composite ECG signal containing both mother’s as well as fetal ECG. This paper presents an efficient technique to extract FECG from abdominal ECG. A modified Pan Tompkin’s method is employed for the QRS detection. It involves series of filters and methods like band pass filter, derivative filter, squaring, integration and adaptive thresholding. Further heart rate of fetus and mother is calculated and heart rate variability analysis is done using detected R-peaks. The algorithm is tested on 5 different non-invasively recorded abdominal and direct FECG signals taken from MIT PhysioNet database and the results are obtained using MATLAB software. The performance of the QRS detector is evaluated using parameters like Sensitivity and Positive Prediction.
- Page(s):23-26
- Date of Publication: 21 June 2017
- Apurva GaikwadDepartment of Electrical Engineering, VJTI, Mumbai, India
- Dr. M. S. PanseDepartment of Electrical Engineering, VJTI, Mumbai, India
References
[1]. World health organization. Management of birth defects and haemoglobin disorders: Report of a Joint WHO-March of Dimes meeting. Geneva, Switzerland, Geneva: WHO; 2006. [2]. Abdulhay, Enas W., Rami J. Oweis, Asal M. Alhaddad, Fadi N. Sublaban, Mahmoud A. Radwan, and Hiyam M. Almasaeed (2014), "Review Article: Non-Invasive Fetal Heart Rate Monitoring Techniques." Biomedical Science and Engineering ,Vol no. 3 53-67. [3]. A. Gaikwad, M.S. Panse (2017), "Extraction of FECG from Non-Invasive AECG signal for Fetal Heart Rate Calculation", IJSRNSC-International Journal of Scientific Research in Network Security and Communication, Volume-5, Issue-2, Page No (16-19) [4]. Gizeaddis Lamesgin, Yonas Kassaw, and Dawit Assefa (2015) “Extraction of Fetal ECG from Abdominal ECG and Heart Rate Variability Analysis,” Springer International Publishing Switzerland. [5]. N. Marchon and G. Naik (2016), "QRS detector for maternal abdominal ECG," 2016 International Conference on Signal and Information Processing (IConSIP), Vishnupuri, , pp. 1-5.,” [6]. Jiapu Pan And Willis J. Tompkin (March 1985),” A Real-Time QRS Detection Algorithm,” IEEE Transactions On Biomedical Engineering, Vol. Bme-32, No. 3, Page No (231-236). [7]. Abdominal and Direct Fetal Electrocardiogram Database.[Online].Available:www.physionet.org/physiobank/database/adfecgdb.
Apurva Gaikwad, Dr. M. S. Panse "De-noising of Fetal ECG for Fetal Heart Rate Calculation and Variability Analysis" International Journal of Research and Scientific Innovation-IJRSI vol.4 issue 6s, pp.23-26 2017
In SoC no. of IP block inside it depends upon specific application, increase in the Ip block increases no. of digital control lines causes increase in the size of the chip. GPIO helps internal IP blocks to share digital control lines using MUX and avoids additional circuitry. Since design productivity cannot follow the pace of nanoelectronics technology innovation, it has been required to develop various design methodologies to overcome this gap. In system level design, various design methodologies such as IP reuse, automation of platform integration and verification process have been proposed. GPIO configuration register decides in which mode system has to work GPIO has four modes i.e input, output, functional, interrupt. As per operation particular mode is selected and the operation get performed. Devices with pin scarcity like integrated circuits such as system-on-a-chip, embedded and custom hardware, and programmable logic devices cannot compromise with size can perform well without additional digital control line circuitry.
- Page(s): 27-32
- Date of Publication: 21 June 2017
- Rakshit BhandareM. Tech Scholar, Electrical Engineering Dept., VJTI, Mumbai, India
- Dr. M. S. PanseAssociate Professor, Electrical Engineering Dept., VJTI, Mumbai, India
Reference
[1] Chris Spear, Greg Tumbush,”SystemVerilog for Verification: A Guide to Learning the Testbench Language Features”,3rd edition,Springer Science & Business Media, 2012. [2] Sik Kim, Kwang-Hyun Cho, Byeong Min “An efficient GPIO block design methodology using formalized SFR description”, SoC Design Conference (ISOCC), 2011 International. [3] D. Gajski, "Essential Issues for IP Reuse", Proceedings of ASP-DAC, pp. 37-42. [4] C. K. Lennard, "Industrially Proving the SPIRIT Consortium Specifications for Design Chain Integration", Proceedings of DATE 2006, pp. 1-6. [5] K. Cho, "Reusable Platform Design Methodology For SOC Integration And Verification", Proceedings of ISOCC 2008, pp. 1-78. [6] 6W. Kruijtzer, "Industrial IP integration flows based on IP-XACT standards", Proceedings of DATE 2008, pp. 32-37. [7] S. Sarkar, S. Chanclar G, S. Shinde “Effective IP reuse for high quality SOC design”, SOC Conference, 2005. Proceedings. IEEE International. [8] M. Strik, "Subsystem Exchange in a Concurrent Design Process Environment", Proceedings of DATE 2008, pp. 953-958. [9] V. Guide, "SystemVerilog TestBench", Verificationguide.com, 2016. [Online]. Available: http://www.verificationguide.com/p/writing-systemverilog-verification.html. [Accessed: 19- Sep- 2016]. [10] "Typical Verification Flow", Asic-world.com, 2016. [Online]. Available: http://www.asic-world.com/tidbits/typical_verification.html. [Accessed: 19- Sep- 2016]. [11] "Basic UVM | Universal Verification Methodology | Verification Academy", Verificationacademy.com, 2016. [Online]. Available: https://verificationacademy.com/courses/basic-uvm. [Accessed: 19- Sep- 2016]. [12] 12. "UVM (Universal Verification Methodology)", Accellera.org, 2016. [Online]. Available: http://www.accellera.org/activities/vip. [Accessed: 19- Sep- 2016]. [13] "Teach Yourself Perl 5 in 21 days - Table of Contents", Wwwacs.gantep.edu.tr, 2016. [Online]. Available: http://wwwacs.gantep.edu.tr/docs/perl-ebook/. [Accessed: 03- Dec- 2016]. [14] "Perl tutorial", Perl Maven, 2016. [Online]. Available: https://perlmaven.com/perl-tutorial. [Accessed: 03- Dec- 2016]. [15] R. Schwartz, T. Phoenix and B. Foy, “Learning Perl”, 1st ed. Sebastopol, CA: O'Reilly, 2005. [16] "The Perl Programming Language - www.perl.org", Perl.org, 2016. [Online]. Available: https://www.perl.org/. [Accessed: 03- Dec- 2016].
Rakshit Bhandare, Dr. M. S. Panse "System Development for Verification of General Purpose Input Output" International Journal of Research and Scientific Innovation-IJRSI vol.4 issue 6s, pp.27-32 2017
Data is the lifeblood of all type of business. Clean, accurate and complete data is the prerequisite for the decision-making in business process. Data is one of the most valuable assets for any organization. It is immensely important that the business focus on the quality of their data as it can help in increasing the business performance by improving efficiencies, streamlining operations and consolidating data sources. Good quality data helps to improve and simplify processes, eliminate time-consuming rework and externally to enhance a user’s experience, further translating it to significant financial and operational benefits [1] [2]. All organizations/ businesses strive to retain their existing customers and gain new ones. Accurate data enables the business to improve the customer experience. Data augmentation adds value to base data by enhancing information derived from the existing source. Data augmentation can help reduce the manual intervention required to develop meaningful information and insight of business data, as well as significantly enhance data quality. Hence the business can provide unique customer experience and deliver above and beyond their expectations. The Data Augmentation is immensely important as it helps in improving the overall productivity of the business. It is also important in making the most accurate and relevant information available quickly for decision making. This work focuses on augmentation of the customer dataset using Genetic Algorithm(GA). These augmented data are used for the purpose of customer behavioral analysis. The data set consists of the different factors inherent in each situation of the customer to understand the market strategy. This behavioral data is used in the earlier work of analyzing the data [13]. It is found that collecting a very large amount of such data manually is a very cumbersome process. It is inferred from the earlier work [13] that the more number of data may give accurate result. Hence it is decided to enrich the dataset by using Genetic Algorithm.
- Page(s): 33-39
- Date of Publication: 21 June 2017
- Nethravathi P.SDepartment of Master of Computer Applications, Shree Devi Institute of Technology, Mangaluru, Karnataka, India.
- K.KaribasappaDepartment of Computer Science and Engineering, Dayanand Sagar College of Engineering, Bengaluru, Karnataka, India.
References
[1]. Erhard Rahm, Hong Hai Do, “Data Cleaning: Problems and Current Approaches”, University of Leipzig,Germany. http://dbs.uni-leipzig.de. [2]. Heiko Müller, Johann-Christoph Freytag, “Problems, Methods, and Challenges in Comprehensive DataCleansing”, Humboldt-Universität zu Berlin zu Berlin, 10099 Berlin, Germany. [3]. Grefenstette, J.J. and Baker J.E. How Genetic Algorithms Work: A Critical Look at Implicit Parallelism. In Schaffer, J.D. (ed.), Proceedings of the Third International Conference on Genetic Algorithms. Morgan Kaufmann, San Mateo, CA,1989, pp. 20–27. [4]. Genetic algorithm [Online] Available: http://en.wikipedia.org/wiki/Genetic_algorithm [5]. D. E. Goldberg and J. H. Holland, “Genetic algorithms and machine learning,” Machine learning, vol. 3, no. 2, 1988, pp. 95–99. [6]. Mehboob, Junaid Qadir, Salman Ali, and Athanasios Vasilakos, “Genetic Algorithms in Wireless Networking: Techniques, Applications, and Issues” arXiv :1411, CS.NI [7]. Li, L Weinberg., Darden T.A. and Pedersen,L.G. (2001) Gene selection for sample classification based on gene expression data: study of sensitivity to choice of parameters of the GA/KNN method. Bioinformatics, 17, 2001, pp 1131–1142 [8]. Melanie Mitchell Santa Fe L. D. Davis, “Handbook of Genetic Algorithms. New York: Van Nostrand Reinhold”, Santa Fe., 1991. [9]. Shruthi Rathnakar, K. Rajeswari, Rose Jacob, “Prediction of Heart Disease Using Genetic Algorithm For Selection of Optimal Reduced Set of Attributes “International Journal of Advanced Computational Engineering and Networking, Volume-1, Issue-2, April 2013. [10]. K. F. Man, Member, IEEE, K. S. Tang, and S. Kwong, “Genetic Algorithms: Concepts and Applications”, IEEE Transactions on Industrial electronics, VOL. 43, NO. 5, October 1996 [11]. Mitchell Melanie, “An Introduction to Genetic Algorithms A Bradford Book “, The MIT Press Cambridge, Massachusetts, England, Fifth printing, 1999. [12]. Nuwan I. Senaratna, “Genetic Algorithms: The Crossover-Mutation Debate”, A literature survey submitted in partial fulfilment of the requirements for the Degree of Bachelor of Computer Science(Special) of the University of Colombo, 2005. [13]. Nethravathi P. S, K.Karibasappa, “Business Intelligence Appraisal of the Customer Dataset Based on Weighted Correlation Index”, International Journal of Emerging Technology and Research. 2016. [14]. Moheb R. Girgis, “Automatic Test Data Generation for Data Flow Testing Using a Genetic Algorithm”, Journal of Universal Computer Science, vol. 11, no. 6 (2005), 898-915 [15]. D. E. Goldberg and J. H. Holland, “Genetic algorithms and machine learning,” Machine learning, vol. 3, no. 2, 1988, pp. 95–99. [16]. M. Anbarasi et. al., “Enhanced Prediction of Heart Disease with Feature Selection Method by using Genetic Algorithm”, International Journal of Engineering Science and Technology, Vol. 2(10), 2010, 5370-5376. [17]. A.K. Sharma, “Text Book of Correlations and Regression”, Discovery Publishing House, 2005. [18]. Silvia TRIF, “Using Genetic Algorithms in Secured Business Intelligence Mobile Applications”, Informatica Economica, Volume 15, Romania.2011. [19]. Nidhi Bhatla Kiran Jyoti , “International Journal of Engineering Research & Technology IJERT Vol. 1 Issue 8, October 2012.
Nethravathi P.S, K.Karibasappa "Augmentation of Customer’s Profile Dataset Using Genetic Algorithm" International Journal of Research and Scientific Innovation-IJRSI vol.4 issue 6s, pp.33-39 2017
Employment in rural areas is generated when by-product from the natural materials is used in construction industry. The extent of usage of coir fibres in construction industry is restricted by the fact that it is biodegradable. Though use of natural materials such as coir fibers is well established. In this view, the objective the present study is to surface treat the coir mats, making it hydrophobic. Model footing tests using model footing of 50mm diameter resting on Surface treated coir mat of different opening size were conducted. The results indicate that the surface treatment of coir products is beneficial in increasing the strength of reinforced soil when compared with untreated coir mats.
- Page(s): 40-44
- Date of Publication: 21 June 2017
- Sachin Patil Assistant Professor in Civil Engineering Department, Rao Bahadur Y Mahabaleshwarappa Engineering College, Ballari-583104, India
References
[1]. MadhaviLatha G, VidyaS.Murthy :Effects of reinforcement form on the behaviour of geosynthetic reinforced soil, Geotextiles and Geomembranes, Volume 25, Issue 1, February 2007, Pages 23-32,. (2007) [2]. Vinod P, Ajitha, B.Bhaskar, S.Sreehari: Behaviour of a square model footing on loose sand reinforced with braided coir rope , Geotextiles and Geomembranes, Volume 27, Issue 6, December 2009, Pages 464-474, (2009). [3]. MadhaviLatha, G., Amit Somwanshi : Effect of reinforcement form on the bearing capacity of square footings on sand, Geotextiles and Geomembranes, Volume 27, Issue 6, December 2009, Pages 409-422, (2009). [4]. Diambra , E. Ibraim, D. Muir Wood,: Fibre reinforced sands: Experiments and modeling, Geotextiles and Geomembranes, Volume 28, Issue 3, June 2010, Pages 238–250,(2010). [5]. Murad Abu-Farsakh, Qiming Chen, Radhey Sharma: An experimental evaluation of the behaviour of footings on geosynthetic-reinforced sand, Soils and Foundations, Volume 53, Issue 2, April 2013, Pages 335-348,(2013). [6]. H.P. Singh [2013] “Effects of Coir Fiber on CBR Value of clayey Soil” International Journal of Current Engineering and Technology , Vol.3, No.4,(2013). [7]. Parag M. Chaple, A I. Dhatrak [2013] “Performance of Coir fiber Reinforced Clayey Soil” The International Journal of Engineering and Science (IJES) Volume2, Issue 4, pp 54-64,(2013).. [8]. Mohanty A.K, Mishra .M, and Drzal L.T.: Surface modifications of natural fibers and performance of the resulting bio-composites: An overview. Composite Interaces, Vol.8, No. 5, pp.313-343, (2001).
Sachin Patil "Effect of Surface Treatment on Settlement of Coir Mat Reinforced Sand" International Journal of Research and Scientific Innovation-IJRSI vol.4 issue 6s, pp.40-44 2017
Energy demand in India and especially in Telangana state is continuously increasing, however the electric utilities failed to meet this load demand. Photovoltaic (PV) solar power plant is used for larger development of solar power generation. In a solar roof top system, the solar panels are installed on the roof of any residential, commercial, institution and industrial building. The solar roof top system may come up with storage facility using battery or grid connected. The roof top system with storage facility has a battery to store solar electricity and can be utilized during night when sunlight is not available. In this research paper, real time monitoring and Simulation analysis of 5WP off grid connected photovoltaic solar roof top power plant at Hyderabad city is carried out using software PV Syst V5.74 and simulation results of energy output of PV module are presented.
- Page(s): 45-48
- Date of Publication: 21 June 2017
- Jayanna KanchikereElectrical & Electronics Engineering, Bharat Institute of Engineering and Technology, Hyderabad, India
- K. KalyankumarFormer Vice-Chancellor, Vinayaka Mission Sikkim University, East Sikkim, India
References
[1] Jayanna Kanchikere and K KalyanKumar, “Estimation of cost analysis for 5KW grid connected solar roof top power plant: A case study”, International Journal of engineering science and computing, vol 6, Issue 4, PP. 4505-4507, Apr 2016. [2] Jayanna Kanchikere, kotresh K and K KalyanKumar, “A 5KW photovoltaic solar roof top power plant design : An analysis”, International Journal of engineering science and computing, vol 6, Issue 4, PP. 4501-4504, Apr 2016. [3] Vinay Janardhan shetty and Keerti Kulkarni, “Estimation of cost analysis for 500KW grid connected solar photovoltaic plan: A case study”, International Journal of current engineering and technology, vol 4, PP. 1859-1861,No.3,June 2014. [4] Hemakshi Bhoye, Gaurang and Sharma, “ An analysis of one MW photovoltaic solar power plantdesign”, International Journal of Advanced research in Electrical, Electronics and Instrumentation Engineering, vol 3, Issue 1, PP 6969-6973,Jan2014. [5] Radhey S M, Jeetendra Singh Rathore and Shivani J, “Grid connected roof top solar power generation: A review”, International Journal of Engineering development and research, vol 3, Issue 1,PP.325-330,2014. [6] https://eosweb.larc.nasa.gov/sse.
Jayanna Kanchikere, K. Kalyankumar "Real Time Monitoring and Performance Evaluation of 5WP Off Grid Solar Rooftop Photovoltaic Power Plant Using PVsyst" International Journal of Research and Scientific Innovation-IJRSI vol.4 issue 6s, pp.45-48 2017
In India power cut is big problem also having many remote places where electricity not reached and that will affect many small scale business and ongoing work, like Carpentry, ongoing work got stop because of power cut. To overcome this problem manually operated economical; conceptual model of a machine which would be capable of performing different operation like sawing/cutting and grinding without use of power i.e. wood working machine is introduced. In this paper, design concept and fabrication of manually operated wood sawing/cutting machine is explained. It is designed and fabricated so portable that it can be move and used at various places. It is used for sawing/cutting of wood, plywood, thin metals (<=2mm), and pvc pipes. The material can be cut without any external energy like fuel or current. As machine uses no electric power and fuel, this will help to maintain green environment. The observations show that power required for pedaling is well below the capacity of an average healthy human being.
- Page(s): 49-56
- Date of Publication: 21 June 2017
- Rahul C Meshram Mechanical Engineering Department, G H Raisoni College of Engineering and Management, Amravati, India.
Reference
[1]. Dharwa Chaithanya Kirthikumar, “A Research on Multi-Purpose Machine”, International Journal for Technological Research in Engineering (Vol.1, Issue.1, ISSN: 2347-4718) (2013). [2]. Dhanasegaran A, Dhilip Kumar H, Dinesh Kumar V T, Gopi Kumar K. and S.Gokul, International Journal of Current Engineering and Technology. “Design and Fabrication of Pedal Powered Circular Saw for Wood Working Applications”. [3]. Prof. Zoeb khan, Mr.Sushil Dopekar, ”Design and Fabrication of Human Powered Wood Cutting machine” International Journal on Recent and Innovation Trends in Computing and Communication. ISSN: 2321-8169. [4]. J.P. Modak and R. D. Askhedkar, “Hypothsis for the Extrusion of lime flash sand bricks using a manually driven bricks making machine”, Building Research and Information, 22 (1); 47-54 [5]. Machine design and drawing by R.S. Khurmi and J.K. Gupta, S. Chand publications.
Rahul C Meshram “Design and Fabrication of Manually Operated Wood Sawing Machine: Save Electric Power” International Journal of Research and Scientific Innovation-IJRSI vol.4 issue 6s, pp.49-56 2017
Cloud computing based applications are beneficial for businesses of all sizes and industries as they don’t have to invest a huge amount on initial setup. This way, businesses can opt for Cloud services and can implement innovative ideas. But evaluating the performance of provisioning (e.g. CPU scheduling and resource allocation) policies in a real Cloud computing environment for different application techniques is challenging because clouds show dynamic demands, workloads, supply patterns, VM sizes, and resources (hardware, software, and network). User’s requests and services requirements are heterogeneous and dynamic. Applications models have unpredictable performance, workloads, and dynamic scaling requirements. So a demand for a Simulation toolkit for Cloud is there. Cloudsim is self-contained simulation framework that provides simulation and modeling of Cloud-based application in lesser time with lesser efforts. In this paper we tried to simulate the task performance of a cloudlet using one data center, one VM. We also developed a Graphical User Interface to dynamically change the simulation parameters and show simulation results.
- Page(s): 57-63
- Date of Publication: 21 June 2017
- Pooja GuptaAssistant Professor, Uttaranchal University, Dehradun, State: Uttarakhand, India
- Anurag Kumar Department of Computer Science and Engineering, GRD Institute of Management and Technology, Dehraun.. State: Uttarakhand, India.
- Dr. Gopal Krishan Department of Computer Service Centre, IIT Delhi, India
References
[1]. J. Geelan,“Twenty-one experts define cloud computing”,Cloud Computing Journal, vol. 2, (2009),pp. 1-5. [2]. Buyya, Rajkumar, Chee Shin Yeo, and Srikumar Venugopal. "Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities." In High Performance Computing and Communications, 2008. HPCC'08. 10th IEEE International Conference on, pp. 5-13. Ieee, 2008. [3]. Mishra, Mayank, Anwesha Das, Purushottam Kulkarni, and Anirudha Sahoo. "Dynamic resource management using virtual machine migrations." IEEE Communications Magazine 50, no. 9 (2012). [4]. Shaw, Subhadra Bose, and Anil Kumar Singh. "Use of proactive and reactive hotspot detection technique to reduce the number of virtual machine migration and energy consumption in cloud data center." Computers & Electrical Engineering 47 (2015): 241-254. [5]. Nagesh, Bhavani B. "Resource Provisioning Techniques in Cloud Computing Environment-A Survey." IJRCCT 3, no. 3 (2014): 395-401. [6]. Calheiros, Rodrigo N., Rajiv Ranjan, Anton Beloglazov, César AF De Rose, and Rajkumar Buyya. "CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms." Software: Practice and experience 41, no. 1 (2011): 23-50. [7]. Buyya, Rajkumar, Rajiv Ranjan, and Rodrigo N. Calheiros. "Modeling and simulation of scalable Cloud computing environments and the CloudSim toolkit: Challenges and opportunities." In High Performance Computing & Simulation, 2009. HPCS'09. International Conference on, pp. 1-11. IEEE, 2009. [8]. Buyya, Rajkumar, and Manzur Murshed. "Gridsim: A toolkit for the modeling and simulation of distributed resource management and scheduling for grid computing." Concurrency and computation: practice and experience 14, no. 13‐15 (2002): 1175-1220. [9]. Legrand A, Marchal L, Casanova H. Scheduling distributed applications: The SimGrid simulation framework. Proceedings of the Third IEEE/ACM International Symposium on Cluster Computing and the Grid, Tokyo, Japan, 2003; 138–145. [10]. Chappell D. Introducing the Azure services platform. White Paper, October 2008. [11]. Dumitrescu CL, Foster I. GangSim: A simulator for grid scheduling studies. Proceedings of the IEEE International Symposium on Cluster Computing and the Grid, Cardiff, U.K., 2005; 1151–1158. [12]. El-Refaey, Mohamed A., and Mohamed Abu Rizkaa. "Virtual systems workload characterization: An overview." In Enabling Technologies: Infrastructures for Collaborative Enterprises, 2009. WETICE'09. 18th IEEE International Workshops on, pp. 72-77. IEEE, 2009. [13]. Núñez, Alberto, Jose L. Vázquez-Poletti, Agustin C. Caminero, Gabriel G. Castañé, Jesus Carretero, and Ignacio M. Llorente. "iCanCloud: A flexible and scalable cloud infrastructure simulator." Journal of Grid Computing 10, no. 1 (2012): 185-209. [14]. Sakellari, Georgia, and George Loukas. "A survey of mathematical models, simulation approaches and testbeds used for research in cloud computing." Simulation Modelling Practice and Theory 39 (2013): 92-103. [15]. Bahwaireth, Khadijah, Elhadj Benkhelifa, Yaser Jararweh, and Mohammad A. Tawalbeh. "Experimental comparison of simulation tools for efficient cloud and mobile cloud computing applications." EURASIP Journal on Information Security 2016, no. 1 (2016): 1-14. [16]. Bhavani, B. H., and H. S. Guruprasad. "A comparative study on resource allocation policies in cloud computing environment." Compusoft 3, no. 6 (2014): 893. [17]. Weblink: http://opensourceforu.com/2014/03/CloudSim-framework-modelling-simulating-cloud-environment/) accessed on 30/05/17. [18]. W. Bhatia, R. Buyya, R. Ranjan CloudAnalyst: a CloudSim based visualmodeller for analysing cloud computing environments and applications, 24th IEEE International Conference on Advanced Information Networking and Applications (2010), pp. 446–452 [19]. G. Belalem, F.Z. Tayeb, W. Zaoui Approaches to improve the resources management in the simulator CloudSim R. Zhu, Y. Zhang, B. Liu, C. Liu (Eds.), ICICA 2010. LNCS, 6377, Springer, Heidelberg (2010), pp. 189–196. [20]. Calheiros, Rodrigo N., Rajiv Ranjan, César AF De Rose, and Rajkumar Buyya. "Cloudsim: A novel framework for modeling and simulation of cloud computing infrastructures and services." [21]. Roy, Sudip, Sourav Banerjee, K. R. Chowdhury, and Utpal Biswas. "Development and analysis of a three phase cloudlet allocation algorithm." Journal of King Saud University-Computer and Information Sciences (2016). [22]. Gulati, Ajay, and Ranjeev K. Chopra. "Dynamic round robin for load balancing in a cloud computing." IJCSMC 2, no. 6 (2013): 274-278. [23]. Ahmad, Raja Wasim, Abdullah Gani, Siti Hafizah Ab Hamid, Muhammad Shiraz, Abdullah Yousafzai, and Feng Xia. "A survey on virtual machine migration and server consolidation frameworks for cloud data centers." Journal of Network and Computer Applications 52 (2015): 11-25. [24]. Jamali, Shahram, Sepideh Malektaji, and Morteza Analoui. "An imperialist competitive algorithm for virtual machine placement in cloud computing." Journal of Experimental & Theoretical Artificial Intelligence 29, no. 3 (2017): 575-596.
Pooja Gupta, Anurag Kumar, Dr. Gopal Krishan "Task Performance Analysis in Virtual Cloud Environment" International Journal of Research and Scientific Innovation-IJRSI vol.4 issue 6s, pp.57-63 2017
Wireless Sensor Networks (WSN) has several limitations, which may not support information communication because of energy constraints. Information sensed by the sensor nodes in WSN is scalar, which can’t be used in some of the applications involving video surveillance like traffic monitoring, defense applications, seashore monitoring, etc. To overcome these limitations, Wireless Multimedia Sensor Networks (WMSN) which consists of video sensors can be used for such applications. As WMSN supports sensing of videos, the amount of data to be transmitted wirelessly in multihop communication raises a challenge. To overcome this issue, this paper proposes an agent based video fusion in Wireless Multimedia Sensor Networks. The video sensors transmit sensed videos to the respective cluster head node. Cluster head node exploits the spatial and temporal redundancy using multi sensor video fusion using wavelet transform. Fused video is in turn transmitted to sink node using multi-hop communication. To evaluate the performance of the proposed scheme, this work is simulated using MATLAB.
- Page(s): 64-70
- Date of Publication: 21 June 2017
- Bhanu K NReasearch Scholar, Rayalaseema University, A.P., India
- Bhaskar Reddy.T Professor, Dept. of Computer Science & Technology, Sri Krishnadevaraya University, A.P., India
References
[1]. Erdal Cayirci, “A Survey on Sensor Networks Georgia Institute of Technology”, Journal of Computer Networks,Vol 38, Jul 2002. [2]. Ian F. Akyildiz, Tommaso Melodia, Kaushik R. Chowdhury, “A survey on wireless multimedia sensor networks”, Science Direct, Comput. Netw.(2006), doi:10.1016/j.comnet.2006.10.002 [3]. Huadong Mat, Yonghe Liu, “Correlation Based Video Processing in Video Sensor Networks”, International Conference on Wireless Networks, Communications and Mobile Computing, IEEE Xplore 2005. [4]. W. Feng, B. Code, E. Kaiser, M. Shea. and W. Feng. "Panoptes: scalable low-power video sensor networking technologies." in Proceedings of thellth ACM international conference on Multimedia. Berkeley, CA. Nov.2003. [5]. W. Feng, I. Walpole, W. Feng, and C. Pu, "Moving towards massivelyscalable video-based sensor networks," in Proceedings of the Workshopon New Visions for Large-Scale Networks: Research and Applications.Washington, DC, March 2001. [6]. Anjali Malviya, S. G. Bhirud, “Feature-Level based Video Fusion for Object Detection”, IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 1, January 2011, ISSN (Online): 1694-0814, www.IJCSI.org [7]. Min Chen, Sergio Gonzalez, Victor C. M. Leung, “Applications and Design Issues for Mobile Agents in Wireless Sensor Networks”, IEEE Wireless Communications, December 2007. [8]. Umakishore Ramachandran, Rajnish Kumar, Matthew Wolenetz, Brian Cooper, Bikash Agarwalla, JunSuk Shin, Phillip Hutto, Arnab Paul, “Dynamic Data Fusion for Future Sensor Networks”, ACM Transactions on Sensor Networks (TOSN) TOSN Homepage archiveVolume 2, Issue 3, August 2006, Pages 404-443 [9]. P.Nalini, P.Lakshmi, P.Sri Hari, Ch.Gayatri, “Development of Video Fusion Algorithm at Frame Level for Removal of Impulse Noise”,IOSR Journal of Engineering (IOSRJEN) e-ISSN: 2250-3021, p-ISSN: 2278-8719, www.iosrjen.org, Volume 2, Issue 10 (October 2012), PP 17-22 [10]. Karen Hollingsworth, Tanya Peters, Kevin W. Bowyer, “Iris Recognition using Signal-level Fusion ofFrames from Video”, Proc. International Conference on Biometrics [1] c 2009 Springer
Bhanu K N, Bhaskar Reddy.T "Agent based Video Fusion in Wireless Multimedia Sensor Networks" International Journal of Research and Scientific Innovation-IJRSI vol.4 issue 6s, pp.64-70 2017
With current projections regarding the growth of Internet sales, online retailing raises many questions about how to market on the Net. A Recommender System (RS) is a composition of software tools that provides valuable piece of advice for items or services chosen by a user. Recommender systems are currently useful in both the research and in the commercial areas. Recommender systems are a means of personalizing a site and a solution to the customer’s information overload problem. Recommender Systems (RS) are software tools and techniques providing suggestions for items and/or services to be of use to a user. These systems are achieving widespread success in ecommerce applications now a days, with the advent of internet. This paper presents a categorical review of the field of recommender systems and describes the state-of-the-art of the recommendation methods that are usually classified into four categories: Content based Collaborative, Demographic and Hybrid systems. To build our recommender system we will use fuzzy logic and Markov chain algorithm.
- Page(s): 71-80
- Date of Publication: 21 June 2017
- Prof. Mehul BarotResearch Scholar, Computer Engineering Department, C.U.Shah University, Wadhwan City, India.
- Dr. Kalpesh H. WandraDean, C.U.Shah University, Wadhwan City, India
- Dr. Samir B. PatelAssitant Professor, Pandit Deendayal Petroleum University, Gujarat, India
References
[1]. Andomavicius, G. and A. Tuzhilin,” Toward the next generation of recommender system: A survey of the state-of-the- art and possible extensions”. IEEE Trans, Knowledge Data Eng., 17: 734-749, 2005. [2]. J. Canny. Collaborative filtering with privacy via factor analysis. In Proc. of SIGIR ’02, pages 238–245, Tampere, Finland, 2002. [3]. T. Hofmann. Collaborative filtering via gaussian probabilistic latent semantic analysis. In Proc. of SIGIR ’03, pages 259–266, Toronto, Canada, 2003. [4]. J. D. M. Rennie and N. Srebro. Fast maximum margin matrix factorization for collaborative prediction. In Proc. of ICML ’05, 2005. [5]. R. Salakhutdinov and A. Mnih. Bayesian probabilistic matrix factorization using markov chain monte carlo. In Proc. of ICML ’08, 2008. [6]. D. Agarwal and B.-C. Chen. flda: matrix factorization through latent dirichlet allocation. In Proc. of WSDM ’10, pages 91–100, New York, New York, USA, 2010. [7]. R. Bell, Y. Koren, and C. Volinsky. Modeling relationships at multiple scales to improve accuracy of large recommender systems. In Proc. of KDD ’07, pages 95–104, San Jose, California, USA, 2007. [8]. M. Jahrer, A. T¨oscher, and R. Legenstein. Combining predictions for accurate recommender systems. In Proc. of KDD ’10, pages 693–702, Washington, DC, USA, 2010. [9]. pertz shoval, Veronica Maidel, Brancha shapira, “international journal of information theories and applications", Vol.15.pp. 303-314,2008. [10]. Novák, V., Perfilieva, I. and Močkoř, J. (1999) Mathematical principles of fuzzy logic Dodrecht: Kluwer Academic. ISBN 0-7923-8595-0 [11]. "Fuzzy Logic". Stanford Encyclopedia of Philosophy. Bryant University. 2006-07-23. Retrieved 2008-09-30. [12]. Zadeh, L.A. (1965). "Fuzzy sets". Information and Control. 8 (3): 338–353. doi:10.1016/s0019-9958(65)90241-x. [13]. P. Brusilovsky, A. Kobsa, and W. Nejdl (Eds.): The Adaptive Web, LNCS 4321, pp. 291 – 324, 2007. © Springer-Verlag Berlin Heidelberg 200 [14]. Research-Paper Recommender Systems: A Literature Survey [15]. Bela Gipp, Jöran Beel, and Christian Hentschel. Scienstein: A Research Paper Recommender System. In [16]. Proceedings of the International Conference on Emerging Trends in Computing (ICETiC’09), pages 309–315, [17]. Virudhunagar (India), January 2009. Kamaraj College of Engineering and Technology India, IEEE [18]. https://en.wikipedia.org/wiki/Markov_chain [19]. http://www.corporatetech.in/admin/ieee/A%20Fuzzy%20Preference%20Tree-Based%20Recommender.pdf https://en.wikipedia.org/wiki/Markov_chain [20]. http://setosa.io/ev/markov-chains/ [21]. https://en.wikipedia.org/wiki/Fuzzy_logic [22]. http://whatis.techtarget.com/definition/fuzzy-logic [23]. http://in.mathworks.com/help/fuzzy/what-is-fuzzy-logic.html?requestedDomain=in.mathworks.com [24]. http://scholarworks.sjsu.edu/cgi/viewcontent.cgi?article=1096&context=etd_projects [25]. https://www.ismll.uni-hildesheim.de/pub/pdfs/RendleFreudenthaler2010-FPMC.pdf [26]. http://ijariie.com/AdminUploadPdf/Survey_Paper_on_Fuzzy_Logic_Based_Recommended_System_ijariie3553.pdf [27]. http://www.jmlr.org/papers/volume6/shani05a/shani05a.pdf [28]. Research paper on FTM: Fuzzy Theoretic Model
Prof. Mehul Barot, Dr. Kalpesh H. Wandra, Dr. Samir B. Patel "Fuzzy Logic Based Recommender System" International Journal of Research and Scientific Innovation-IJRSI vol.4 issue 6s, pp.71-80 2017
In VANET, the emphasis is given on the exchange of traffic information and road conditions between the vehicles and thereby preventing the accidents. Distinctive characteristics of VANET like restricted topology, unpredictable mobility, vehicle density, varying channel capacity, etc. make VANET environment exciting for developing efficient routing protocols. Owing to the dynamic topology in VANET, the routes are unstable and unreliable for exchange of information among the vehicles. To enrich the performance and throughput of the VANETs, the links between nodes must be reliable and stable. In order to tackle the relaiblity and stability of information communication this work proposes ‘Multi-agent system for Secured and Reliable Routing (MSRR) in VANET. The performance of the proposed scheme is tested in terms of packet delivery ratio, route reliability, route discovery time and delay.
- Page(s): 85-96
- Date of Publication: 21 June 2017
- Anil D. DevangaviBasaveshwar Engineering College, Bagalkot, Karnataka, India
- Dr. Rajendra GuptaAISECT University, Madhya Pradesh, India
References
[1]. Nizar Alsharif, Xuemin (Sherman) Shen, (2017) “iCAR-II: Infrastructure-based Connectivity Aware Routing in Vehicular Networks”, IEEE Transactions on Vehicular Technology, Vol. 66, Issue 5, pp 4231 – 4244 . [2]. Kapil Sharma, Brijesh Kumar Chaurasia , ShekharVerma and Geetam Singh, (2016) “Token Based Trust Computation in VANET ”, International Journal of Grid and Distributed Computing Vol. 9, No. 5, pp 313-320. [3]. Tasneem Darwish, Kamalrulnizam Abu Bakar, (2016) “Traffic aware routing in vehicular ad hoc networks: characteristics and challenges”, Telecommunication Systems, Vol. 61, Issue 3, Springer, pp 489–513. [4]. Mahmoud HashemEiza, Thomas Owens, and Qiang Ni, Senior Member, (2016) “Secure and Robust Multi-Constrained QoS aware Routing Algorithm for VANETs”, IEEE Transactions on Dependable and Secure Computing , Vol. 13, Issue 1, pp 32-45. [5]. Samira Harrabi ,Ben Jaafar ,KhaledGhedira ,(2016) “ A Novel Clustering Algorithm Based on Agent Technology for VANET”, Network Protocols and Algorithms, ISSN 1943-3581, Vol. 8, No. 2 (doi: 10.5296/npa.v8i2.8434) [6]. Neha Goel, Isha Dhyani, Gaurav Sharma, “A Study of Position Based VANET Routing Protocols”, In: Proceedings of IEEE International Conference on Computing, Communication and Automation, April 2016, India (doi: 10.1109/CCAA.2016.7813803). [7]. T. Sivakumar, R. Manoharan, (2016) “SRP: A Stable Routing Protocol for VANETs”, International Journal of Applied Engineering Research ISSN 0973-4562 Vol. 11, No. 5, pp 3499-3504. [8]. Ahmed I. Saleh a,,Samah A. Gamel a, Khaled M. Abo-Al-Ez b, (2016) “ Reliable Routing Protocol for Vehicular Ad hoc Networks”, Computers and Electrical Engineering, Elsevier Ltd., (https://doi.org/10.1016/j.compeleceng.2016.11.011). [9]. Chang Sang-woo and Lee Sang-sun, (2016) “A Routing Protocol for Urban Vehicular Multi-hop Data Delivery”, Chinese Journal of Electronic Vol. 25, No.2, pp 348-356. [10]. Lina Zhu, Changle Li, Bingbing Li, Xinbing Wang, Guoqiang Mao, (2016) “Geographic Routing in Multilevel Scenarios of Vehicular Ad Hoc Networks”, IEEE Transactions on vehicular technology, Vol. 65, No. 9, pp 7740 – 7753. [11]. JianShen , Chen Wang , Anxi Wang , Xingming Sun , SangmanMoh , Patrick C.K. Hung, (2016) “Organized topology based routing protocol in incompletely predictable ad-hoc networks” Computer Communication 99, Elsevier , Issue C, pp 107-118 (https:// doi.org/ 10.1016/ j.comcom. 2016.07.009). [12]. Xuanxia Yao , Xinlei Zhang , HuanshengNing , Pengjian Li , (2016) “Using trust model to ensure reliable data acquisition in VANETs”, Ad Hoc Networks, Elsevier, Vol. 55, pp 107–118. [13]. He, Yang, WenjunXu, and Xuehong Lin , "A Stable Routing Protocol for Highway mobility over Vehicular Ad-hoc Networks." In: Proceedings of Vehicular Technology Conference (VTC Spring), IEEE, Glassgow, UK, May 2015 (doi: 10.1109/VTCSpring.2015.7145647). [14]. Souaad Boussoufa-Lahlaha, Fouzi Semchedinea, Louiza Bouallouche-Medjkoune,(2015) “A position-based routing protocol for vehicular ad hoc networks in a city environment”, In: Proceedings of the International Conference on Advanced Wireless, Information, and Communication Technologies, Procedia Computer Science 73 ( 2015 ) 102 – 108 (doi: 10.1016 /.procs. 2015.12.054). [15]. FarhanaAnjum, V.D.Bondre, Ausaf Umar Khan, (2015) “Design of Single and Multipath Routing Protocol for Quality of Service (QoS) in VANET” In: Proceedings of the IEEE India International Conference on Communications and Signal Processing, April 2015 (doi: 10.1109/ ICCSP.2015.7322606). [16]. Sergio M. Tornell, Carlos T. Calafate, Juan-Carlos Cano, and Pietro Manzoni, (2015) “DTN Protocols for Vehicular Networks: An Application Oriented Overview”, IEEE Communication surveys & tutorials, Vol. 17, No. 2, pp 868 – 887. [17]. Celimuge Wu, YushengJi, Fuqiang Liu , Satoshi Ohzahata , Toshihiko Kato, (2015) “Toward Practical and Intelligent Routing in Vehicular Ad Hoc Networks”, IEEE Transactions on Vehicular Technology, Vol. 64, No 12, pp 5503-5519. [18]. Amrita Jain, VivekKapoor, (2015) “Secure Communication using RSA Algorithm for Network Environment ” , International Journal of Computer Applications (0975 – 8887) Vol. 118, No. 7, pp 6-9. [19]. JacekRak, (2014) “LLA: A New Anypath Routing Scheme Providing Long Path Lifetime in VANETs”, IEEE Communications letters, Vol. 18, No. 2, pp 281-284. [20]. Samira Harrabi ,WalidChainbi,KhaledGhedira, (2014)“ A Multi-Agent Proactive Routing Protocol for Vehicular Ad-Hoc Networks”, In: Proceedings of International Symposium on Networks, Computers and Communications, Tunisia, July 2014 (doi: 10.1109 /SNCC. 2014. 6866523). [21]. Ramesh B. Koti and Mahabaleshwar S. K., (2014) ”Multi Agent Based Congestion Control in VANETs”, International Journal of Future Computer and Communication, Vol. 3, No. 2, pp 102-104. [22]. CarolinaTripp-Barba, Luis Urquiza-Aguiar, MonicaAguilarIgartua, David Rebollo-Monedero, Luis J.dela Cruz Llopis, Ahmad Mohamad Mezher and Jose Alfonso Aguilar-Calder, (2014) “A Multimetric, Map-Aware Routing Protocol for VANETs in Urban Areas ”, Sensors, Vol. 14, No. 2 , pp 2199-2224. [23]. Mayuri Pophali, Shraddha Mohod, T.S.Yengantiwar, (2014) “Trust Based Opportunistic Routing Protocol for VANET Communication”, International Journal of Engineering And Computer Science,Vol. 3, Issue 8, pp 7408-7414. [24]. Sourav Kumar Bhoi, Pabitra Mohan Khilar, (2014) “SIR: a secure and intelligent routing protocol for vehicular ad hoc network”, IET, Vol. 4, No. 3, pp 185-194. [25]. Pavlos Sermpezis, Georgios Koltsidas, and Fotini-Niovi Pavlidou, (2013) “Investigating a Junction-Based Multipath Source Routing Algorithm for VANETs”, IEEE Communications letters, Vol. 17, No. 3, pp 600-603. [26]. Mahmoud HashemEiza and QiangNi , (2013) “An Evolving Graph-Based Reliable Routing Scheme for VANETs”, IEEE Transactions on Vehicular Technology, Vol. 62, No. 4, pp 1493-1504. [27]. Dr A.V. Sutagundar, Dr S SManvi, (2013) “Location aware event driven multipath routing in Wireless Sensor Networks: Agent based approach”, Egyptian Informatics Journal, Vol. 14, No. 1, pp 55–65. [28]. Mahmoud HashemEiza, Qiang Ni , Thomas Owens and Geyong Min , (2013) “Investigation of routing reliability of vehicular ad hoc networks” EURASIP Journal on Wireless Communications and Networking (doi:10.1186/1687-1499-2013-179). [29]. Nentawe Y. Goshwe,(2013) “Data Encryption and Decryption Using RSA Algorithm in a Network Environment ” ,IJCSNS International Journal of Computer Science and Network Security, Vol.13, No.7, pp 9-13. [30]. M. J. Khabbaz, W. F. Fawaz, and C. M. Assi,(2012) “Modeling and delay analysis of intermittently connected roadside communication networks,” IEEE Transactions on Vehicular Technology, Vol. 61, No. 6, pp 2698–2706. [31]. Oscar Urra, Sergio Ilarri, Thierry Delot and Eduardo Mena “Mobile Agents in Vehicular Networks:Taking a First Ride”, In: Proceedings of International Conference on Practical Applications of Agents and Multiagent Systems , 2010 (doi: 10.1007/978-3-642-12384-9). [32]. Network simulator: ns-2, Available: http://www.isi.edu/nsnam/ns [October 2010]. [33]. JosianeNzouonta, NeerajRajgure, Guiling Wang, (2009) “VANET Routing on City Roads using Real-Time Vehicular Traffic Information”, IEEE Transactions on Vehicular Technology,Vol. 58, No. 7, pp 3609 – 3626. [34]. Fan Li and Yu Wang, University of North Carolina at Charlotte,(2007) “Routing in Vehicular Ad Hoc Networks: A Survey”, IEEE Vehicular Technology , Vol. 2, Issue 2, pp 12 – 22. [35]. Tarik Taleb, Kazuo Hashimoto, (2007) “ A Stable Routing Protocol to Support ITS Services in VANET Networks”, IEEE Transactions on vehicular technology, Vol. 56, No. 6, 3337 – 3347. [36]. Charles Harsch , Andreas Festag, PanosPapadimitratos, “Secure Position-Based Routing for VANETs, In: Proceedings of IEEE 66th Vehicular Technology Conference, USA, October 2007 (doi: 10.1109/VETECF.2007.22). [37]. Bangalore City Map, Available: www.mapofbangalore.com [November 2007]. [38]. Tarik Taleb, Mitsuru Ochi, Abbas Jamalipour, Nei Kato, and Yoshiaki Nemoto ,“An Efficient Vehicle-Heading Based Routing Protocol for VANET Networks”, In:Proceedings of IEEE Wireless Communications and Networking Conference, April 2006 (10.1109/ WCNC. 2006. 1696637). [39]. W. Xiuchao and A. L. Ananda, “Link Characteristics Estimation for IEEE 802.11 DCF based WLAN”, In: Proceedings of IEEE International Conference on Local Computer Networks, Tampa, USA, November 2004 (doi: 10.1109/LCN.2004.73). [40]. S. Wiethlter and C. Hoene, “Design and Verification of an IEEE 802.11e EDCF Simulation Model in NS-2.26”, Technical report, Telecommunication Networks Group, Technische, Universitt Berlin, November 2004. [41]. F. Bai, N. Sadagopan, and A. Helmy, “Important: A Framework to SystematicallyAnalyze The Impact of Mobility On Performance of Routing Protocols for Ad hocNetworks”, In: Proceedings of 22th IEEE Annual Joint Conference on Computer Communicationsand Networking, April 2003 (doi: 10.1109/INFCOM.2003.1208920). [42]. Rivest R, Shamir A, Aldeman L, “A method for obtaining Digital Signatures and Public-key Cryptosystems”, Communications of the ACM, 21(2): 120-126, February 1978 (doi:10.1145/ 359340.359342).
Anil D. Devangavi and Dr. Rajendra Gupta "Multi-Agent System for Secured and Reliable Routing in VANET" International Journal of Research and Scientific Innovation-IJRSI vol.4 issue 6s, pp.85-96 2017
The implementation of Lean and the deciding parameters are elaborately studied by surveying the Indian Foundry industry workers. The study conducted in the domain of various demographical factors of age, firm size, education background, gender and years of experience shows cluttering of the data indicating the reasons, benefits and barriers of Lean implementation in Indian sub-continent. 28 Foundry Industries in the state of Karnataka are surveyed with a total of 204 workers providing the input for the intricate questionnaire designed for them. The results indicate that the factors like overall equipment effectiveness, plan-do-check-act, total productive maintenance, bottleneck analysis, continuous flow manufacturing, poka yoke, and standardized work are the most effective categories of Lean. The same is also evident from the standard deviation values obtained from chi-square distribution.
- Page(s): 97-106
- Date of Publication: 23 June 2017
- Sundareshan S DDepartment of Mechanical Engineering, HKBK College of Engineering, Bangalore, INDIA
- Dr.Swamy D RDepartment of Industrial Engineering & Management, JSSATE, Bangalore, INDIA
- Saurav Kumar GhoshDepartment of Mechanical Engineering, HKBK College of Engineering, Bangalore, INDIA
References
[1] J. P. Womack, D. T. Jones, and D. Roos, Machine that changed the world. Simon and Schuster, 1990. [2] J. P. Womack and D. T. Jones, “Beyond toyota: how to root out waste and pursue perfection,” Harvard business review, vol. 74, no. 5, p. 140, 1996. [3] J. F. Krafcik, “Triumph of the lean production system,” MIT Sloan Management Review, vol. 30, no. 1, p. 41, 1988. [4] R. Shah and P. T. Ward, “Defining and developing measures of lean production,” Journal of operations management, vol. 25, no. 4, pp. 785–805, 2007. [5] R. W. Hall, A. Production, and I. C. Society, Zero inventories. Dow Jones-Irwin Homewood, IL, 1983. [6] C. Karlsson and P. A° hlstro¨m, “Assessing changes towards lean production,” International Journal of Operations & Production Management, vol. 16, no. 2, pp. 24–41, 1996. [7] T. Hines, “Globalization: an introduction to fashion markets and fashion marketing,” Fashion marketing: Contemporary issues, pp. 121–32, 2001. [8] T. Papadopoulou and M. O¨ zbayrak, “Leanness: experiences from the journey to date,” Journal of Manufacturing Technology Management, vol. 16, no. 7, pp. 784–807, 2005. [9] N. Sayer and B. Williams, “Lean for dummies. hoboken,” 2007. [10] E. C. Ozelkan, S. Gary Teng, T. Johnson, T. Benson, and D. Nestvogel, “Building lean supply chain and manufacturing skills through an interactive case study,” Industry and Higher Education, vol. 21, no. 4, pp. 265–278, 2007. [11] S. Prasad, D. Khanduja, and S. K. Sharma, “An empirical study on applicability of lean and green practices in the foundry industry,” Journal of Manufacturing Technology Management, vol. 27, no. 3, pp. 408–426, 2016. [12] R. Torielli, R. Abrahams, R. Smillie, and R. Voigt, “Using lean methodologies for economically and environmentally sustainable foundries,” China Foundry, vol. 8, no. 1, pp. 74–88, 2011. [13] N. Patel, N. Chauhan, M. P. Trivedi, N. Patel, N. Chauhan, and M. P.Trivedi, “Benefits of value stream mapping as a lean tool implementation manufacturing industries: A review,” International Journal, vol. 1, pp. 53–57, 2015. [14] M. Manzouri, M. N. Ab-Rahman, C. R. C. M. Zain, and E. A. Jamsari, “Increasing production and eliminating waste through lean tools and techniques for halal food companies,” Sustainability, vol. 6, no. 12, pp. 9179–9204, 2014. [15] S. Mayya, “Report on,” 2009. [16] W. G. Cochran, “The estimation of sample size,”. Sampling techniques, vol. 3, pp. 72–90, 1977. [17] C. Hallam, C. Hallam, C. Contreras, and C. Contreras, “Integrating lean and green management,” Management Decision, vol. 54, no. 9, pp. 2157–2187, 2016. [18] M. S. Lande, K. Thakur, A. Gawande, and S. Bramhankar, “Effect of different carriers on shelf life of bradyrhizobium japonicum,” Trends in Biosciences, vol. 8, no. 17, pp. 4730–4733, 2015. [19] R. Kumar and V. Kumar, “Barriers in implementation of lean manufacturing system in indian industry: A survey,” International Journal of Latest Trends in Engineering and Technology, vol. 4, no. 2, pp. 243–251, 2014. [20] Z. Radnor, P. Walley, A. Stephens, and G. Bucci, “Evaluation of the lean approach to business management and its use in the public sector,” Scottish executive social research, vol. 20, 2006. [21] T. Nanjundeswaraswamy et al., “Leadership styles and quality of work life in smes,” Management Science Letters, vol. 5, no. 1, pp. 65–78, 2015
Sundareshan S D, Dr. Swamy D R, and Saurav Kumar Ghosh "Lean Implementation in Indian Foundry Industries: A Quantitative Survey" International Journal of Research and Scientific Innovation-IJRSI vol.4 issue 6s, pp.97-106 2017
Internet of things (IoT) is a collection of many interconnected objects, services, humans, and devices that can communicate, share data, and information to achieve a common goal in different areas and applications. The vision of IoT is to enable devices to collaborate with each other on the Internet. IoT security focuses on authentication and access control protocols. IoT security is the area with protection connected devices and networks. There are many key challenges in designing a secure IoT: Privacy, Authentication, Access Control, Trust, Confidentiality, Mobile Security, etc. Attacks on IoT security devices are physical attacks, side channel attacks, cryptanalysis attacks, software attacks, network attacks. This paper describes Security Problems of IoT, Security issues and Key Technologies of IoT.
- Page(s): 107-110
- Date of Publication: 23 June 2017
- Jinal P Tailor Department of Information Technology Shri S’ad Vidya Mandal Institute of Technology Bharuch, India.
- Ashish D Patel Department of Computer and Information Technology Shri S’ad Vidya Mandal Institute of Technology Bharuch, India
References
[1]. Oscar Garcia-Morchon, Sye-Loong Keoh, Sandeep S. Kumar, Pedro Moreno-Sanchez, Francisco Vidal-Meca, and Jan Henrik Ziegeldorf, Securing the IP-based Internet of Things with HIP and DTLS, ACM, 2013 [2]. Quandeng GOU, Lianshan YAN, Yihe LIU and Yao LI, Construction and Strategies in IoT Security System, IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, IEEE, 2013. [3]. Xu Xiaohui, Study on Security Problems and Key Technologies of The Internet of Things, International Conference on Computational and Information Sciences, IEEE, 2013. [4]. Kai Zhao, LinaGe and Guangxi, China, A Survey on the Internet of Things Security, Ninth International Conference on Computational Intelligence and Security, IEEE, 2013. [5]. Zhi-Kai Zhang, Michael Cheng Yi Cho, Chia-Wei Wang, Chia-Wei Hsu, Chong-Kuan Chen, Shiuhpyng Shieh and IEEE Fellow, IoT Security: Ongoing Challenges and Research Opportunities, IEEE 7th International Conference on Service-Oriented Computing and Applications, IEEE, 2014. [6]. Somia Sahraoui and Azeddine Bilami, Efficient HIP-based approach to ensure light weight end-to-end security in the internet of things, ELSEVIER, 2015. [7]. Kim Thuat Nguyen, Maryline Laurent and Nouha Oualha, Survey on secure communication protocols for the Internet of Things, ELSEVIER, 2015. [8]. Rwan Mahmoud, Tasneem Yousuf, Fadi Aloul and Imran Zualkernan, Internet of Things (IoT) Security: Current Status, Challenges and Prospective Measures, The 10th International Conference for Internet Technology and Secured Transactions (ICITST), IEEE, 2015. [9]. Rajendra Billure, Varun M Tayur and Mahesh V, Internet of Things - A Study on the Security Challenges, IEEE, 2015. [10]. Jin Hee Han, YongSung Jeon and Jeong Nyeo Kim, Security Considerations for Secure and Trust worthy Smart Home System in the IoT Environment, IEEE, 2015. [11]. Ashvini Balte, Asmita Kashid and Balaji Patil, Security Issues in Internet of Things (IoT): A Survey, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 4, 2015. [12]. Grant Ho, Derek Leung, Pratyush Mishra, Ashkan Hosseini, Dawn Song and David Wagner, Smart Locks: Lessons for Securing Commodity Internet of Things Devices, ACM, 2016. [13]. http://www.internetsociety.org/sites/default/files/ISOC-IoT/Overview/20151014_0.pdf
Jinal P Tailor, Ashish D Patel "Comprehensive Survey on Security Problems and Key Technologies of the Internet of Things (IoT)" International Journal of Research and Scientific Innovation-IJRSI vol.4 issue 6s, pp.107-110 2017
Moisture removal from crops and other food items is one of the ways to preserve them for longer duration. Previously, drying openly in sun was used to reduce moisture content. But it had some disadvantages like contamination due to dirt and other unwanted elements as well as attack by rodents and birds. Drying in covered close space with vents would be helpful in overcoming these problems. Solar greenhouse dryers are the close conduits in which crops can be dried without negatively affecting the nutrition value. The factors affecting the crop drying are solar radiation, climatic conditions, material of which the dryer is made of and shape of the dryer. A lot of experimental investigations have been done to improve the drying rate. With the advances in computational power and numerical techniques, Computational Fluid Dynamics (CFD) has emerged as a powerful tool to optimize any design. In the present study, simulations have been done on greenhouse dryer with modifications to identify the temperature distribution with variation in wind velocity. Different radiation levels have also been found out at different locations in the dryer. The model of the dryer has been created in CREO 5.0 and analysis has been performed using ANSYS 14.0. The simulation has been done for both forced and natural convection. Obtained results have been validated with the experimental work done by previous works. Better drying rate has been obtained for forced circulation as compared to natural convection which is in agreement with the available experimental results.
- Page(s): 111-115
- Date of Publication: 23 June 2017
- Rintu Kumar M.Tech. Scholar, Department of Mechanical Engineering, Radharaman Institute of Research and Technology, Bhopal, India
- Vishal GuptaPrincipal, Diploma, Radharaman Engineering College, Bhopal, India
- Rajiv Varshney Director, Radharaman Institute of Research and Technology, Bhopal, India
References
[1]. Rai G.D, 2015 Non Convention energy [2]. Sukhatma S.P, Nayak J.K,2010. Solar energy principal of Collection and storage. The McGraw Hill Companies [3]. Tanuj Kumar Sahu, Vishal Gupta, Experimental Analysis of Open, Simple and Modified Greenhouse Dryers for Drying Potato Flakes under Forced Convection,” Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 6, Issue 7, ( Part -4) July 2016, pp.56-60 [4]. M. Manoj, A. Manivannan, “Simulation of Solar Dryer Utilizing Green House Effect for Cocoa Bean Drying”, International Journal of Advanced Engineering Technology E-ISSN 0976-3945 IJAET/Vol. IV/ Issue II/April-June, 2013/24-27. [5]. M. A. Aravindh and A. Sreekumar, "Experimental and economic analysis of a solar matrix collector for drying application "CURRENT SCIENCE, VOL. 107, NO. 350 3, 10 AUGUST 2014 [6]. Megha S. Sontakke, and Sanjay P. Salve, "Study and Experimental Investigation of Solar Dryer by using Concentric Dish Collector" International Engineering Research Journal (IERJ) Special Issue Page 1075-1082, June 2016, ISSN 2395-1621 [7]. Barnwal P., Tiwari G.N., Grape drying by using hybrid photovoltaic-thermal (PV/ T) greenhouse dryer: an experimental study. Solar Energy Vol. 82 (2008) pp 1131-1144.
Rintu Kumar, Vishal Gupta, Rajiv Varshney "Numerical Simulation of Solar Greenhouse Dryer Using Computational Fluid Dynamics" International Journal of Research and Scientific Innovation-IJRSI vol.4 issue 6s, pp.111-115 2017
Ransomware is a type of malware that prevents or restricts user from accessing their system, either by locking the system's screen or by locking the users' files in the system unless a ransom is paid. More modern ransomware families, individually categorize as crypto-ransomware, encrypt certain file types on infected systems and forces users to pay the ransom through online payment methods to get a decrypt key. The analysis shows that there has been a significant improvement in encryption techniques used by ransomware. The careful analysis of ransomware behavior can produce an effective detection system that significantly reduces the amount of victim data loss.
- Page(s): 116-121
- Date of Publication: 23 June 2017
- Jinal P Tailor Department of Information Technology Shri S’ad Vidya Mandal Institute of Technology Bharuch, India.
- Ashish D Patel Department of Computer and Information Technology Shri S’ad Vidya Mandal Institute of Technology Bharuch, India
References
[1] P. Zavarsky and D. Lindskog, “Experimental Analysis of Ransomware on Windows and Android Platforms : Evolution and Characterization,” vol. 94, pp. 465–472, 2016. [2] H. Carter, P. Traynor, and K. R. B. Butler, “CryptoLock ( and Drop It ): Stopping Ransomware Attacks on User Data,” 2016. [3] J. Scott and D. Spaniel, “ICIT Ransomware Report,” 2016. [4] S. Song, B. Kim, and S. Lee, “The Effective Ransomware Prevention Technique Using Process Monitoring on Android Platform,” vol. 2016, 2016. [5] D. Bekerman, B. Shapira, L. Rokach, A. Bar, and B. Sheva, “Unknown Malware Detection Using Network Traffic Classification,” pp. 134–142, 2015. [6] K. Zhao, D. Zhang, X. Su, W. Li, and E. Engineering, “Fest : A Feature Extraction and Selection Tool for Android Malware Detection,” pp. 714–720, 2015. [7] S. Brown, B. Henz, H. Brown, M. Edwards, M. Russell, and J. Mercurio, “Validation of Network Simulation Model with Emulation using Example Malware,” pp. 1264–1269, 2015. [8] P.Y. Networks, “Protecting Your Networks from Ransomware”, U.S Government interagency technical guidance document aimed to inform chief information officres and chief information security officers at critical infrastructure entities.,2016. [9] S. K. Sahay and A. Sharma, “Grouping the executables to detect malwares with high accuracy,” Procedia - Procedia Comput. Sci., vol. 78, no. December 2015, pp. 667–674, 2016. [10] S. Zanero and F. M. B, “H EL D ROID : Dissecting and Detecting Mobile Ransomware,” pp. 382–404, 2015. [11] Anthony Ayodele, James Henrydoss, Walter Schrier, and T.E. Boult, “Study of Malware Threats Faced by the Typical Email User”, Springer, 2011. [12] Sunny Behal, Krishan Kumar, “An Experimental Analysis For Malware Detection Using Extrusions”, International Conference on Computer & Communication Technology (ICCCT), IEEE, 2011. [13] Zongqu Zhao, “A Virus Detection Scheme Based on Features of Control Flow Graph”, IEEE, 2011. [14] Mirosław Skrzewski, “Monitoring Malware Activity on the LAN Network”, Springer, 2010. [15] CHEN Chia-mei, LAI Gu-hsin, “Research on Classification of Malware Source Code”, Springer, 2014. [16] Ross Brewer, LogRhythm, “Ransomware attacks: detection, prevention and cure”, September 2016. [17] Byungho Min and Vijay Varadharajan, “Feature-Distributed Malware Attack:Risk and Defence”, Springer, 2014. [18] Anusha Damodaran, Fabio Di Troia, Corrado Aaron Visaggio, Thomas H. Austin, Mark Stamp, “A comparison of static, dynamic, and hybrid analysis for malware detection”,Springer, 2015. [19] Jose Andre Morales, Areej Al-Bataineh, Shouhuai Xu, and Ravi Sandhu, “Analyzing and Exploiting Network Behaviors of Malware”, Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Springer, 2010. [20] Mohamad Fadli Zolkipli and Aman Jantan, “A Framework for Defining Malware Behavior Using Run Time Analysis and Resource Monitoring”, International Conference on Software Engineering and Computer Systems (ICSECS), Springer, 2011. [21] Wen Wang, Xiaofeng Wang, Huabiao Lu, Jinshu Su, “Automatic Signature Analysis and Generation for Large-Scale Network Malware”, IET International Conference on Information Science and Control Engineering 2012 (ICISCE), IEEE, 2012. [22] Link: https://nakedsecurity.sophos.com/2016/03/24/8-tips-for-preventing-ransomware, visited on: 5 November 2016. [23] Link: https://www.tripwire.com/state-of-security/security-data-protection/cyber-security/22-ransomware-prevention-tips, visited on: 5 November 2016. [24] Link: https://www.netfort.com/blog/methods-for-detecting-ransomware-activity/, visited on: 7 November, 2016.
Jinal P. Tailor, Ashish D. Patel "A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage Control" International Journal of Research and Scientific Innovation-IJRSI vol.4 issue 6s, pp.116-121 2017
In recent world, detection and removal of fences from digital images become necessary when an important part of the view changes to be occluded by unnecessary structures. When a picture is taken, it may have certain structures or objects that are unwanted. Many scenes such as parks, gardens, and zoos are secured by fences and people can only take pictures through the fences. Images or videos taken at open places using low-resolution cameras, like smart phones are also frequently corrupted by the presence of occlusions like fences. For the background occluded by fences, the goal of image de-fencing is to restore them and return fence-free images. Multi-focus images are obtained and “defocusing” information is utilized to generate a clear image. The main aim is when a colored image is input having fence in the image and then deleting; removing the fence gives the resultant image with the removal of fence from the image. Also it involves filling the gaps of removed, damaged region to recover lost image details. This paper includes various methods for detection of fence(s), various methods for filling the gaps, literature survey and performance analysis of methods for background reconstruction.
- Page(s): 122-127
- Date of Publication: 23 June 2017
- Bhumika P Patel Department of Information Technology Shri S’ad Vidya Mandal Institute of Technology Bharuch, India
- Ghanshyam I Prajapati Department of Information Technology Shri S’ad Vidya Mandal Institute of Technology Bharuch, India
References
[1] Muhammad Shahid Farid, Arif Mahmood and Marco Grangetto, “Image de-fencing framework with hybrid inpainting algorithm”, Accepted: 13 February 2016, Springer 2016. [2] Chetan S. Negi, Koyel Mandal, Rajiv R. Sahay and Mohan S. Kankanhalli, “Super-Resolution De-Fencing: Simultaneous Fence Removal And High-Resolution Image Recovery Using Videos”, IEEE, 2014. [3] Priyanka Deelip Wagh and D. R. Patil, “Text Detection and Removal from Image using Inpainting with Smoothing”, International Conference on Pervasive Computing (ICPC), IEEE, 2015. [4] Sankaraganesh Jonna, Vikram S. Voleti, Rajiv R. Sahay, and Mohan S. Kankanhalli, “Multimodal Approach for Image De-fencing and Depth Inpainting”, IEEE, 2015. [5] Yadong Mu, Wei Liu, and Shuicheng Yan, “Video De-Fencing”, IEEE Transactions On Circuits And Systems For Video Technology, Vol. 24, No. 7, IEEE, 2014. [6] B. A. Ahire and Neeta A. Deshpande, “Video Inpainting of Objects using Modified Patch based Image Inpainting Algorithm”, IEEE, 2014. [7] Weihai Chen, HaosongYue, JianhuaWang and XingmingWu, “An improved edge detection algorithm for depth map inpainting”, Optics and Lasers in Engineering, ELSEVIER, 2013. [8] Jing Wang, Ke Lu, Daru Pan, Ning He and Bing-kun Bao, “Robust object removal with an exemplar-based image inpainting approach”, Neuro computing, ELSEVIER, 2013. [9] Ye-fei Liu, Fu-long Wang and Xiang-yan Xi, “Enhanced algorithm for Exemplar-based Image Inpainting”, Ninth International Conference on Computational Intelligence and Security, 2013. [10] Shu-Chiang Chung, Ta-Wen Kuan, Chuan-Pin Lu and Hsin-Yi Lin, “A New Approach of Image Inpainting Based on PSO Algorithm”, IEEE, 2014. [11] Sankaraganesh Jonna, Krishna K. Nakka, Rajiv R. Sahay, “My camera can see through fences: A deep learning approach for image de-fencing”, IAPR Asian Conference on Pattern Recognition, IEEE, 2015. [12] Pinaki Pratim Acharjya, Ritaban Das and Dibyendu Ghoshal, “Study and Comparison of Different Edge Detectors for Image Segmentation”, Global Journal of Computer Science and Technology Graphics & Vision, Volume 12, Issue 13, 2012. [13] Scott McCloskey, “Masking Light Fields to Remove Partial Occlusion”, 22nd International Conference on Pattern Recognition, IEEE, 2014. [14] Atsushi Yamashita, Akiyoshi Matsui and Toru Kaneko, “Fence Removal from Multi-Focus Images”, IEEE, 2010. [15] Minwoo Park, Kyle Brocklehurst, Robert T. Collins and Yanxi Liu, “Image De-fencing Revisited”, SPRINGER, 2010. [16] Shailendra Kumane and Prof. Kanchan Doke, Image in Painting Using Related Frames in Video, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 2, February 2016. [17] Atsushi Yamashita, Fumiya Tsurumi, Toru Kaneko and Hajime Asama, “Automatic Removal of Foreground Occluder from Multi-Focus Images”, IEEE International Conference on Robotics and Automation, May 14-18, IEEE, 2012. [18] Jingyu Yang, Jun Wang, Leijie Liu and Chunping Hou, “RIFO: Restoring Images with Fence Occlusions”, IEEE, 2015. [19] Qin Zou, Yu Cao, Qingquan Li and Qingzhou Mao, “Automatic inpainting by removing fence-like structures in RGBD images”, Machine Vision and Applications, SPRINGER, 2014.
Bhumika P Patel, Ghanshyam I Prajapati "Removing Fence and Recovering Image Details: Various Techniques with Performance Analysis" International Journal of Research and Scientific Innovation-IJRSI vol.4 issue 6s, pp.122-127 2017
The use of solar energy in open sun drying in traditional way of drying crops, fruits, vegetables etc. The greenhouse drying is one of the techniques which overcome the problems associated with open sun drying. In the present work, an effort is made to improve the drying rate of traditional greenhouse dryer. An experimental investigation using tomato flakes has been done to compare the drying rates of both traditional as well as modified greenhouse dryers. Better drying conditions- high temperature & low relative humidity are found out to be for modified greenhouse dryer. Experiments were performed in October 2016.
- Page(s): 128-131
- Date of Publication: 23 June 2017
- Bhagyashri Dhurve Radharaman Institute of Technology and Science, Bhopal, M.P., India
- Vishal GuptaPrincipal, Diploma wing Radharaman Engineering College, Bhopal, India
- Ajay Kumar Singh Department of Mechanical Engineering, Radharaman Institute of Technology and Science, Bhopal, M.P., India
References
[1]. WWW.growtomatoes.com/tomato-world-production-statistics/ [2]. Abjidayil B, Banat F, Jumah R, Al-Asheh S, Hammad SA. Comparative study of rheological characteristics of tomato flakes paste and tomato flakes powder solutions. Int. J. food prop 2004, vol.7, Pp483-97 [3]. Tiwari G.N., Kumar S., Prakash O., Evaluation of convection mass transfer coefficient during drying of jaggery. Journal of Food Eng.Vol.63, Pp219-227, 2004. [4]. Tiwari G.N., Das T., Chen C.R., Banrnwal P., Energy and exergy analyses of greenhouse fish drying. Int. J. of Exergy. Vol.6, no.5, Pp620-636, 2009. DOI:10.1504/IJEX.2009.027493 [5]. Gaware TJ, Sutar N, Throat BN. Drying of tomato flakes using different method: comparison of dehydration and rehydration. Kinetics: Drying Technology.vol.28, no.5, Pp651-8, 2010. [6]. Reyes A*, Mahn A, Hunenulaf P &Gonzalez T. Tomato dehydration in a hybrid- solar dryer. J Chem. Eng Process Technol. [7]. Prakash O & Kumar A. Environorical analysis and mathematical modeling for tomato flakes drying in a modified greenhouse dryer under active mode. Int. J. Food Eng. Pp1-13, 2014. [8]. Sahu T., Gupta V., Singh A., Experimental analysis of open, simple and modified greenhouse dryers for drying potato flakes under natural convection. Ultra Engineer, vol.4, no. 1, 2016. [9]. Sahu T., Gupta V., Singh A., Experimental analysis of open, simple and modified greenhouse dryers for drying potato flakes under forced convection. Int. Journal of Engineering Research and Application, vol. 6, no.7, Pp56-60.2016. [10]. .Banout J., Ehl P., Havlik J., Lojka B., Polesny Z., Verner V., 2011. Design and performanceevaluation of a double-pass solar drier for drying of red chilli (Capsicum annum L.). SolarEnergy Vol. 85, pp 506-515
Bhagyashri Dhurve, Vishal Gupta, Ajay Kumar Singh "Experiment Analysis of Open, Simple and Modified Greenhouse Dryers for Drying Tomato Flakes" International Journal of Research and Scientific Innovation-IJRSI vol.4 issue 6s, pp.128-131 2017
Power factor plays important role in the function of the power system network. Hence, the power factor improvement will increase the performance of power system equipments. This paper presents the design and implementation of distribution static compensator (DSTATCOM) with the star-delta transformer for improvement of the power factor in three-phase four wire distribution system in the presence of three-phase linear load in the events of single phase, two-phase and three phase trippings. The unit vector template method based control algorithm has been implemented for the control of the proposed DSTATCOM. The proposed test model has been simulated in SIMULINK/MATLAB environment. The simulations results show the effectiveness of proposed algorithm.
- Page(s): 132-136
- Date of Publication: 23 June 2017
- Ayush Raj Apex Institute of Engg. & Technology, Jaipur, India
- Ravi Kumar Global Institute of Technology Jaipur, Rajsthan, India
- Dr. Akash Saxena Dept.of Electrical Engg. SKIT,Jaipur, Rajasthan India
- Dr. Ramesh Kumar Pachar Dept. of Electrical Engg. SKIT,Jaipur, Rajasthan India
References
[1]. Bhim Singh, P. Jayaprakash, T. R. Somayajulu, and D. P. Kothari, “Reduced rating VSC with a Zig-Zag transformer for current compensation in a three-phase four-wire distribution system,” IEEE Transactions on Power Delivery, Vol. 24, No. 1, January 2009, 249-259. [2]. Mahmoud zadehbagheri, Naziha Ahmad Azli, Askar bagherinasab,Shahrin bin Md Ayob, “ Performance evaluation of custom power devices in power distribution networks to power quality improvement: a review,” International Journal of Scientific & Engineering Research, Volume 4, Issue 5, May-2013. [3]. Bhim Singh, Sabha Raj Arya “Design and control of a DSTATCOM for power quality improvement using cross correlation function approach” International Journal of Engineering, Science and Technology, Vol. 4, No. 1, 2012, pp. 74-86. [4]. B. Singh, G.Bhuvaneswari, S. R. Arya “Review on power quality solution technology,” Asian Power Electronics Journal, Vol. 6, No. 2, Dec 2012. [5]. Bhim Singh, P. Jayaprakash, and D. P. Kothari “Magnetics for neutral current compensation in three-phase four-wire distribution system,” IEEE International Conference, 2010. [6]. Bhim Singh, P Jayaprakash, T. R. Somayajulu, D. P. Kothari, Ambrish Chandra, and Kamal-Al-Haddad, “Integrated three-leg VSC with a Zig-Zag transformer based three-phase four-wire DSTATCOM for power quality improvement,” IEEE International Conference, 2008. [7]. Bhim Singh, P. Jayaprakash and D. P. Kothari.” Three-leg VSC and a transformer based three-phase four-wire DSTATCOM for distribution systems,” Fifteenth National Power Systems Conference (NPSC), IIT Bombay, India, December 2008. [8]. Bhim Singh, P. Jayaprakash, Sunil Kumar, and D. P. Kothari “Implementation of neural-network-controlled three-leg VSC and a transformer as three-phase four-wire DSTATCOM,” IEEE Transactions on Industry Applications, Vol. 47, No. 4, July/August 2011. [9]. Hurng-Liahng Jou, Kuen-Der Wu, Jinn-Chang Wu, and Wen-Jung Chiang “A three-phase four-wire power filter comprising a three-phase three-wire active power filter and a Zig–Zag transformer” IEEE Transactions on Power Electronics, Vol. 23, No. 1, January 2008. [10]. Bhim Singh. Jayaprakash, D. P. Kothari, “ Isolated H-bridge VSC based 3-phase 4-wire DSTATCOM for power quality improvement” 2008 IEEE International conference on sustainable energy Technology, Singapore, 2008, pp. 366-377. [11]. Bhim Singh, Jayaprakash Pychadathil, and Dwarkadas Pralhaddas Kothari, “Star/hexagon transformer based three-phase four-wire DSTATCOM for power quality improvement,” International Journal of Emerging Electric Power Systems, Volume 9, Issue 6, 2008. [12]. Bhim Singh, Jayaprakash Pychadathil, and Dwarkadas Pralhaddas Kothari, “Three-phase four-wire DSTATCOM with H-bridge VSC and star/delta transformer for power quality improvement” 2008 IEEE India conference, Kanpur, India, pp 412-417. [13]. Bhim Singh, P Jayaprakash, and D.P Kothari, “DSTATCOM with reduced switches using two leg VSC and a zig-zag transformer for power quality improvement in three-phase four-wire distribution system” 2008 IEEE Region 10 Conference, Hyderabad, India, 2008, pp. 1-6 [14]. Bhim Singh, P. Jayaprakash, and D. P. Kothari, “Three-leg voltage source converter integrated with T-connected transformer as three-phase four-wire distribution static compensator for power quality improvement” Electric Power Components and Systems, pp. 817-831. [15]. D. Sreenivasarao, Pramod Agarwal, and Biswarup Das “Neutral current compensation in three phase, four wire systems: A review,” Electric Power Systems Research Journal, Vol. 86, pp. 170– 180, 2008. [16]. Om PrakashMahela, AbdulGafoorShaik, “A review of distribution static compensator,” RenewableandSustainableEnergyReviews50(2015)531–546.
Ayush Raj, Ravi Kumar, Dr. Akash Saxena, Dr. Ramesh Kumar Pachar "Power Factor Improvement in Distribution System using DSTATCOM Based on Unit Vector Template Control Algorithm" International Journal of Research and Scientific Innovation-IJRSI vol.4 issue 6s, pp.132-136 2017
Nowadays the use of bank applications have increased and many banking operations are done online .In this paper we proposed a multi banking system using web services(for transactions). It is developed for those customers who are having multiple accounts in various banks .Multi-banking interface is a web based application through which customer can access his/her multiple accounts with single user id and password .The customer does not have to remember all the user id and password for each account he/she has in a banking website. The objective of this application is to allow the Customers of various Banks access their accounts and make transactions using this solution. They need not interact with various bank applications or web sites.The customer can login with single id and password .In addition to this ,the customer has certain privileges such as he/she can view his/her transaction and account details and also make fund transfers from one bank account to other.
- Page(s): 137-141
- Date of Publication: 23 June 2017
- Purnima Ahirao Assistant Professor, Information Technology, K. J. Somaiya College of Engineering, Mumbai, India
- Yogita Borse Assistant Professor, Information Technology, K. J. Somaiya College of Engineering, Mumbai, India
- Deepti PatoleAssistant Professor, Information Technology, K. J. Somaiya College of Engineering, Mumbai, India
References
[1] P.Iyappan, Dr.V.Prasanna, R.Amarnath, L. Noor Mouhammed , A.Selvamani “An Enhanced Smart Multi-Banking Integrated System - Service Oriented Approach,” 26th _28th July 2012, Coimbatore, India. [2] JOHN B. OLADOSU, FUNMILOLA A. AJALA, AND OLUKUNLE O. POPOOLA,” JOHN B. OLADOSU, FUNMILOLA A. AJALA, AND OLUKUNLE O. POPOOLA”,Computer Science and Engineering Department, Ladoke Akintola University of Technology, Ogbomoso, Nigeria. [3] Tony Baer, Ron Schmelzer: “The Elements of Web Services” (Application Development Trends, 2 December 2002), available at http://adtmag.com/articles/2002/11/30/the-elements-of-web services.aspx [4] G. Sree Rekha, and V. K. Agrawal, "An Architecture for Integrated Multi-banking Solution", World Academy of Science, Engineering and Technology, 2011. [5] Andriancs,”Send Email from Yahoo,Gmail,Hotmail (C#),27 September 2013,Malaysia. [6] PhiBui’sBlog,”Simple way to encrypt or decrypt password or data in ASP.NetC#”,March242013. [7] Lakshmi Ananthamurthy (2008): “Introduction to Web Service.” Available at http://www.developer.com/services/article.php/1485821. [8] Suresh Dasari,”Display data in HTML table from database using Asp.Net C#”,Dec212014. [9] Mudassar Khan,”Bind/Fill/Populate dropdown list control from database inAsp.Net C#, 27 Feb 2015 available at http://www.aspsnippets.com/Articles/Bind-Fill-Populate-DropDownList-control-from-database-in-ASPNet-using-C-and-VBNet.aspx [10] Vithal Wadje,”Consuming Web Service in an Asp.Net Application”,June 02 2013 available at http://www.c-sharpcorner.com/UploadFile/0c1bb2/consuming-web-service-in-Asp-Net-web-application/
Purnima Ahirao, Yogita Borse, Deepti Patole "Multi Banking System using Web Services" International Journal of Research and Scientific Innovation-IJRSI vol.4 issue 6s, pp.137-141 2017
Large amount of datasets are at faster rate becoming more important issues in the field of organizations and industrial areas. For example applications like web-based must handle Exabyte of worth data transactions per day and they need to act quickly and efficiently on these data transactions. Hence to provide test-cases for these applications becomes a challenge. In existing system the given automated test-cases may work suitably but not efficiently without the help of guidelines and support. Thus we provide an open subject and possible solutions to test the applications of big data.
- Page(s): 142-146
- Date of Publication: July 2017
- A M Chandrashekar Assistant Professor, Dept of Computer Science and Engineering Shri Jayachamarajendra College of Engineering (SJCE), JSS S & T University Mysuru, Karnataka, India
- Bhavana S 2nd Sem, M.Tech, Dept of Computer Science and Engineering Shri Jayachamarajendra College of Engineering (SJCE), JSS S & T University Mysuru, Karnataka, India
References
[1]. A. Alexandrov, C. Br¨ucke, and V. Markl. Issues in big data testing and benchmarking. In Proceedings of the Sixth International Workshop on Testing Database Systems, DBTest ’13, pages 1–5, 2013. [2]. J. H. Andrews, T. Menzies, and F. C. Li. Genetic algorithms for randomized unit testing. IEEE Trans. on Software Engineering, 37(1):80–94, January 2011. [3]. J. Dean and S. Ghemawat. Mapreduce: simplified data processing on large clusters. Communications of the ACM, 51(1):107–113, 2008. [4]. L. Di Geronimo, F. Ferrucci, A. Murolo, and F. Sarro. A parallel genetic algorithm based on hadoop mapreduce for the automatic generation of junit test suites. In Proceedings of the 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation. [5]. G. Fraser and A. Arcuri. Evosuite: automatic test suite generation for object-oriented software. In Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering, ESEC/FSE ’11, pages 416–419, Szeged, Hungary, 2011. ACM. [6]. H. Hemmati, A. Arcuri, and L. Briand. Achieving scalable model-based testing through test case diversity. ACM Transactions on Software Engineering Methodologies. [7]. Web source ‘Test Case Design Techniques’.Posted In Basics of Software testing, Testing best practices, Testing Concepts, Types of testing April 17, 2017". [8]. P. McMinn, C. J. Wright, and G. M. Kapfhammer. The e_ectiveness of test coverage criteria for relational database schema integrity constraints. ACM Transactions on Software Engineering and Methodology, 25(1):8:1{8:49, 2015. [9]. J. H. Holland. Adaptation in Natural and Arti_cial Systems. MIT Press, Cambridge, MA, USA, 1992. [10]. S. Nachiyappan and S. Justus. Getting ready for bigdata testing: A practitioner's perception. In Fourth International. [11]. Bill Franks, Taming the Big Data Tidal Wave: Finding Opportunities in Huge Data Streams with advanced analytics, John Wiley & sons, 2012. [12]. A. M. Chandrashekhar and K. Raghuveer, “Confederation of FCM Clustering, ANN and SVM Techniques of Data mining to Implement Hybrid NIDS Using Corrected KDD Cup Dataset”, Communication and Signal Processing (ICCSP) IEEE International Conference,2014, Page 672-676. [13]. AM. Chandrashekhar and K. Raghuveer , “Improvising Intrusion detection precision of ANN based NIDS by incorporating various data Normalization Technique – A Performance Appraisal”, IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 2, Issue 2, Apr-May, 2014. [14]. A. M Chandrashekhar A M and K. Raghuveer, “Diverse and Conglomerate modi-operandi for Anomaly Intrusion Detection Systems”, International Journal of Computer Application (IJCA) Special Issue on “Network Security and Cryptography (NSC)”, 2011. [15]. A. M. Chandrashekhar and K. Raghuveer, “Amalgamation of K-means clustering algorithem with standard MLP and SVM based neural networks to implement network intrusion detection system”, Advanced Computing, Networking, and Informatics –Volume 2(June 2014), Volume 28 of the series Smart Inovation, Systems and Technologies pp 273-283. [16]. A. M. Chandrashekhar and K. Raghuveer, “Fusion of Multiple Data Mining Techniques for Effective Network Intrusion Detection – A Contemporary Approach”, Proceedings of Fifth International Conference on Security of Information and Networks (SIN 2012), 2012, Page 178-182. [17]. A. M. Chandrashekhar, Jagadish Revapgol, Vinayaka Pattanashetti, “Big Data Security Issues in Networking”, International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Volume 2, Issue 1, JAN-2016. [18]. Puneeth L Sankadal, A. M Chandrashekhar, Prashanth Chillabatte, “Network Security situation awareness system” International Journal of Advanced Research in Information and Communication Engineering(IJARICE), Volume 3, Issue 5, May 2015. [19]. P. Koushik, A.M.Chandrashekhar, Jagadeesh Takkalakaki, “Information security threats, awareness and cognizance” International Journal for Technical research in Engineering(IJTRE), Volume 2, Issue 9, May 2015. [20]. A.M.Chandrashekhar, Yadunandan Huded, H S Sachin Kumar, “Advances in Information security risk practices” International Journal of Advanced Research in data mining and Cloud computing (IJARDC), Volume 3, Issue 5, May 2015. [21]. A. M. Chandrashekhar,Muktha G, Anjana D, “Cyberstalking and Cyberbullying: Effects and prevention measures”, Imperial Journal of Interdisciplinary Research (IJIR), Volume 2, Issue 2, JAN-2016. [22]. A.M.Chandrashekhar, Syed Tahseen Ahmed, Rahul N, “Analysis of Security Threats to Database Storage Systems” International Journal of Advanced Research in data mining and Cloud computing (IJARDC), Volume 3, Issue 5, May 2015. [23]. A.M.Chandrashekhar, K.K. Sowmyashree, RS Sheethal, “Pyramidal aggregation on Communication security” International Journal of Advanced Research in Computer Science and Applications (IJARCSA), Volume 3, Issue 5, May 2015. [24]. A.M.Chandrashekhar, Rahil kumar Gupta, Shivaraj H. P, “Role of information security awareness in success of an organization” International Journal of Research(IJR), Volume 2, Issue 6, May 2015. [25]. A.M.Chandrashekhar, Huda Mirza Saifuddin, Spoorthi B.S, “Exploration of the ingredients of original security” International Journal of Advanced Research in Computer Science and Applications(IJARCSA), Volume 3, Issue 5, May 2015. [26]. A.M.Chandrasekhar, Ngaveni Bhavi, Pushpanjali M K, “Hierarchical Group Communication Security”, International journal of Advanced research in Computer science and Applications (IJARCSA), Volume 4, Issue 1,Feb-2016. [27]. A. M Chandrashekhar A M and K. Raghuveer, “Hard Clustering Vs. Soft Clustering: A Close Contest for Attaining Supremacy in Hybrid NIDS Development”, Proceedings of International Conference on Communication and Computing (ICCC - 2014), Elsevier science and Technology Publications.
A M Chandrashekar, Bhavana S "Extending Search based Software Testing techniques to Big Data Applications" International Journal of Research and Scientific Innovation-IJRSI vol.4 issue 6s, pp.142-146 2017
Cloud environment is an important platform today in IT industry. It deals with several industry aspect and data storage for the information access. Security is always an concern along with the data usage and proper storage using hashing technique in cloud data center. Integrity verification helps in detecting authenticity of data. Various techniques for the security protocol is proposed such as RSA, AES, Blow fish, ECC and many other approach for security encryption. Hashing technique such as MD4, MD5 and other SHA signature were also proposed to verify the data integrity. Existing paper used ECC for the security along with key generation, verification approach with group key management. In this paper our discussion is performed the work derived in existing approach as well as the limitation may associate with the existing paper work. Our proposed algorithm makes use of new encryption technique which is matrix based transmission. Our approach also use efficient group key management and file sharing for the multiple group level file sharing in industry. An advance hashing scheme SHA-2 is integrated in the system for data integrity verification. Our Experiment performed with Java Apache 2 with Data center storage which proves the efficiency of proposed work in terms of computation time, computation cost and overall performance using proposed technique.
- Page(s): 147-149
- Date of Publication: July 2017
- Rashi Mehra Rajeev Gandhi Prodyogiki Vishwvidhyalaya, RGPV, Bhopal, India
- Ravindra Patel Rajeev Gandhi Prodyogiki Vishwvidhyalaya, RGPV, Bhopal, India
- Varsha Sharma Rajeev Gandhi Prodyogiki Vishwvidhyalaya, RGPV, Bhopal, India
References
[1]. “Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud,” IEEE Transactions on Services Computing, VOL. X, NO. X, XXXX 2014, accepted. [2]. Shaohua Tang, Xiaoyu Li, Xinyi Huang, Yang Xiang, and Lingling Xu,” Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing”, IEEE 2016. [3]. Y.-L. Lin and C.-L. Hsu, “Secure key management scheme for dynamic hierarchical access control based on ECC,” J. Syst. Softw., vol. 84, no. 4, pp. 679–685, 2011. [4]. https://www.tbs-certificates.co.uk/FAQ/en/sha256.html [5]. Tiantian LIU, Tongkai JI, Qiang YUE, Zhenchu TANG “G-Cloud: A Highly Reliable and Secure IaaS Platform” IEEE, 2015. [6]. Kadam Prasad,Jadhav Poonam,Khupase Gauri, N. C. Thoutam “Data Sharing Security and Privacy Preservation in Cloud Computing” IEEE, 2015. [7]. N. Shanmugakani, R. Chinna “An Explicit Integrity Verification Scheme for cloud Distributed systems” ICSO, IEEE, 2015. Nivedita Simbre, Priya Deshpandey “Enhancing Distributed Data Storage security for cloud computing using TPA and AES algorithm” IEEE, 2015. [8]. Naithik Shah, NisargDesai,ViralVashi,” Efficient Cryptography for Data Security”,2014 International Conference on Computing for Sustainable Global Development (INDIACom). [9]. M. Yamuna, S. Ravi Rohith, Pramodh Mazumdar, Avani Gupta ”Text Encryption Using Matrices ”, International Journal of Application or Innovation in Engineering & Management (IJAIEM)Volume 2, Issue 3, March 2013. [10]. Devendra Prasad,Govind Prasad Arya, Chirag Chaudhary, Vipin Kumar, “A Text Encryption and Decryption Technique Using Substitution-Transposition and Basic Arithmetic and Logic Operation ”,International Journal of Computer Science and Information Technologies, Vol. 5 (2), 2014. [11]. Udepal Singh, UpasnaGarg,” An ASCII value based text data encryption System”, International Journal of Scientific and Research Publications, Volume 3, Issue 11, November 2013 1 ISSN 2250-3153.
Rashi Mehra, Ravindra Patel, Varsha Sharma "A Matrix Based Encryption with Advance Hashing Scheme Over Cloud" International Journal of Research and Scientific Innovation-IJRSI vol.4 issue 6s, pp.147-149 2017
Phishing is a procedure of fraud in which the attacker tries to get data within cybercriminals. It is a procedure of texting in which an attacker pretends to be someone else in order to obtain sensitive information. The attacker creates a situation where people believe that they are dealing with an extreme change. Phishing is considered as a planning attack rather than targeted one. This paper surveys the literature on the detection of phishing attacks. Various types of phishing attacks such as Deceptive Phishing, E-mail spoofing, Malware Based Phishing, Tab nabbing, Session Hijacking, Search Engine Phishing, DNS-based Phishing, Phone Phishing, etc. are described. The mechanics of phishing, various techniques used in attack of phishing, characteristics of phishing attack, how to prevent phishing attack and also provide the advantages and disadvantage of the phishing attack. With increase in number of trusting users of internet the chances of getting enclosed in phishing attacks is quite a possible thing.
- Page(s): 150-153
- Date of Publication: July 2017
- Bhumika P Patel Department of Information Technology, Shri S’ad Vidya Mandal Institute of Technology, Bharuch, India
- Ghanshyam I PrajapatiDepartment of Computer and Information Technology, Shri S’ad Vidya Mandal Institute of Technology, Bharuch, India
References
[1]. IsredzaRahmi, A Hamid and Jemal H. Abawajy, “Profiling Phishing Email Based on Clustering Approach,” IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2013. [2]. Melad Mohamed, Al-Daeef and Nurlida Basir and Madihah Mohd Saudi, “A Method to Measure the Efficiency of Phishing Emails Detection Features”, IEEE, 2014. [3]. Shivam Aggarwal, Vishal Kumar and S D Sudarsan, “Identification and Detection of Phishing Emails Using Natural Language Processing Techniques”, ACM, 2014. [4]. Luong Anh Tuan Nguyen, Ba Lam To, Huu Khuong Nguyen and Minh Hoang Nguyen, “An Efficient Approach for Phishing Detection Using Single-Layer Neural Network”, International Conference on Advanced Technologies for Communications, IEEE, 2014. [5]. Pradeepthi. K V and Kannan. A, “Performance Study of Classification Techniques for Phishing URL Detection”, Sixth International Conference on Advanced Computing (ICoAC), IEEE, 2014. [6]. Routhu Srinivasa Rao and Syed Taqi Ali, “A Computer Vision Technique to Detect Phishing Attacks”, Fifth International Conference on Communication Systems and Network Technologies, IEEE, 2015. [7]. Lakhita, Surendra Yadav, Brahmdutt Bohra and Pooja, “A Review on Recent Phishing Attacks in Internet”, IEEE, 2015. [8]. Vimal Kumar and Rakesh Kumar, “Detection of Phishing Attack Using Visual Cryptography in Ad hoc Network”, peer-reviewed, IEEE ICCSP, 2015. [9]. Priyanka Singh, Yogendra P.S. Maravi and Sanjeev Sharma, “Phishing Websites Detection through Supervised Learning Networks”, IEEE, 2015. [10]. Ahmet Selman Bozkir and Ebru Akcapinar Sezer, “Use of HOG Descriptor in Phishing Detection”, International Symposium on Digital Forensics and security, IEEE, 2016. [11]. Mahmoud Khonji, Youssef Iraqi, Andrew Jones, “Phishing Detection: A Literature Survey”, IEEE Communications Surveys & Tutorials, VOL-15, IEEE-2013. [12]. Xing Fang, Nicholas Koceja, Justin Zhan, Gerry Dozier, Dasgupta Dipankar, “An Artificial Immune System for Phishing Detection”, IEEE World Congress on Computational Intelligence, Brisbane, Australia, June, 2012. [13]. Samuel Marchal, Kalle Saari, Nidhi Singh, N. Asokan, “Know Your Phish: Novel Techniques for Detecting Phishing Sites and their Targets”, IEEE 36th International Conference on Distributed Computing Systems, 2016. [14]. Zheng Dong, Apu Kapadia, Jim Blyth, L. Jean Camp, Beyond the Lock Icon: Real-time Detection of Phishing Websites Using Public Key Certificates, IEEE, 2015. [15]. Weibo Chu, Bin B. Zhu, Feng Xue, Xiaohong Guan, Zhongmin Cai, “Protect Sensitive Sites from Phishing Attacks Using Features Extractable from Inaccessible Phishing URLs”, IEEE Communication and Information Systems Security Symposium (IEEE ICC), 2013. [16]. Yanhui Du, Fu Xue, “Research of the Anti-Phishing Technology Based on E-mail Extraction and Analysis”, International Conference on Information Science and Cloud Computing Companion, IEEE, 2014. [17]. K. Nirmal, B. Janet, R. Kumar, “Phishing - The threat that still exists”, IEEE, 2015.
Bhumika P Patel, Ghanshyam I Prajapati "Phishing Attacks and its Detection" International Journal of Research and Scientific Innovation-IJRSI vol.4 issue 6s, pp.150-153 2017
Use of natural materials and developing a by-product that are most beneficial for use in construction industry generates employment in rural areas. Though use of natural materials such as coir fibers is well established, there extent of use in construction field is limited by the fact that these are biodegradable materials. In this context, the objective the present study is to surface treat the coir fibers, making it hydrophobic. Model footing tests using these surface treated randomly distributed coir reinforced sand bed was conducted. The results indicate that the surface treatment of coir products is beneficial in increasing the strength of reinforced soil when compared with untreated coir fibers.
- Page(s): 154-157
- Date of Publication: July 2017
- Sachin PatilAssistant Professor, Civil Engineering Department, Rao Bahadur Y Mahabaleshwarappa Engineering College, Ballari-583104, India
- Dr. H.M.Somasekharaiah Professor, Civil Engineering Department, Rao Bahadur Y Mahabaleshwarappa Engineering College, Ballari-583104, India
- T.H.PatelProfessor, Civil Engineering Department, Rao Bahadur Y Mahabaleshwarappa Engineering College, Ballari-583104, India
References
[1]. MadhaviLatha G, VidyaS.Murthy (2007).Effects of reinforcement form on the behaviour of geosynthetic reinforced soil, Geotextiles and Geomembranes. [2]. Vinod P, Ajitha, B.Bhaskar, S.Sreehari (2009). Behaviour of a square model footing on loose sand reinforced with braided coir rope, Geotextiles and Geomembranes. [3]. MadhaviLatha, G., Amit Somwanshi (2009).Effect of reinforcement form on the bearing capacity of square footings on sand, Geotextiles and Geomembranes. [4]. Diambra , E. Ibraim, D. Muir Wood, (2010). Fibre reinforced sands: Experiments and modelling, Geotextiles and Geomembranes. [5]. Murad Abu-Farsakh, Qiming Chen, Radhey Sharma (2013). An experimental evaluation of the behaviour of footings on geosynthetic-reinforced sand, Soils and Foundations. [6]. H.P. Singh (2013). Effects of Coir Fiber on CBR Value of clayey Soil International Journal of Current Engineering and Technology. [7]. Parag M. Chaple, A I. Dhatrak (2013). Performance of Coir fiber Reinforced Clayey Soil. The International Journal of Engineering and Science (IJES). [8]. Mohanty A.K, Mishra .M, and Drzalc L.T. (2001). Surface modifications of natural fibers and performance of the resulting bio-composites: An overview. Composite Interfaces.
Sachin Patil, Dr. H.M.Somasekharaiah, T.H.Patel "Effect of Surface Treatment on Settlement of Randomly Distributed Coir Fiber Reinforced Sand" International Journal of Research and Scientific Innovation-IJRSI vol.4 issue 6s, pp.154-157 2017
The aim of this project is to optimize an Arithmetic Logical Unit with BIST capability. Arithmetic Logical Unit is used in many processing and computing devices, due to rapid development of technology the faster arithmetic and logical unit which consume less power and area required.Due to the increasing integration complexities of IC‘s the Optimized Arithmetic Logical Unit implement sometimes may mal-function, so testing capability must be provide and this is accomplished by Built-In-Self-Test (BIST).So this project has been done with the help of Verilog Hardware Description Language, Simulated by Xilinx10.1 Software and is synthesized by cadence tool. After synthesis Area and power are reduced by 31% and 42% respectively.
- Page(s): 158-161
- Date of Publication: July 2017
- Ravi L.S Assistant Professor, Dept. of ECE, RIT, Hassan, Karnataka, India
- Chitra C P Student, Dept. of ECE, RIT, Hassan, Karnataka, India
- Chandana C Student, Dept. of ECE, RIT, Hassan, Karnataka, India
References
[1]. Saha, S.; Rahman, M.A.; Thakur, A., "Design and implementation of a BIST embedded high speed RS-422 utilized UART overFPGA," Computing, Communications and Networking Technologies (ICCCNT),2013 Fourth International Conference on , vol., no., pp.1,5, 4-6 July 2013. [2]. Veeramachaneni, S.; Srinivas, M.B., "Design of optimized arithmetic circuits for multiplier realization," Microelectronics and Electronics (PrimeAsia), 2013 IEEE Asia Pacific Conference on Postgraduate Research in, vol., no., pp.219,224, 19-21 Dec. 2013. [3]. J.Ren and V. K. Semenov, “Progress with physically and logically reversible superconducting digital circuits,” IEEE Trans. Appl. Superconduct,vol. 21, no. 3, pp. 780–786, Jun. 2011. [4]. Gurjar, P.; Solanki, R.; Kansliwal, P.; Vucha, M.,”VLSI implementation of adders for high speedALU,” India Conference (INDICON), 2011 Annual IEEE , vol., no., pp.1,6, 16-18 Dec. 2011. [5]. Voyiatzis, I.,”An ALU-Based BIST Scheme for Word-Organized RAMs,” Computers, IEEE Transactions on, vol.57, no.5, pp.577,590, May 2008 [6]. Le Blanc, C.; Colinet, E.; Juillard, J.; Anghel, L., "Digital Implementation of a BIST Method based on Binary Observations,"DigitalSystem Design Architectures, Methods and Tools, 2008. DSD'08. 11th EUROMICRO Conference on, vol., no., pp.709,713, 3-5 Sept. 2008. [7]. Seongmoon Wang, "A BIST TPG for Low Power Dissipation and High Fault Coverage," Very Large Scale Integration (VLSI) Systems, IEEE Transactions on , vol.15, no.7,pp.777,789,July2007. [8]. Bartlett, V.A.; Dempster, A.G., "Using carry-save adders in low-power multiplier blocks," Circuits and Systems, 2001. ISCAS 2001. The 2001 IEEE International Symposium on, vol.4, no., pp.222,225 vol. 4, 6-9 May 2001.
Ravi L.S, Chitra C P, Chandana C "Optimized ALU with BIST Implementation Using Cadence Encounter Platform" International Journal of Research and Scientific Innovation-IJRSI vol.4 issue 6s, pp.158-161 2017
Farming is undergoing a digital revolution. The result of precision agriculture is the accumulation of large sets of farm data, which must be managed efficiently for use. This paper pre-sents the approach and methodology of precision agriculture in collecting, managing and analysing large data sets using big data analysis tools that contribute to the productivity. A Cloud based IoT and Big Data solution to precision agriculture is discussed that implements M2M architecture to provide end to end solu-tion. Finally we focus on the problems faced by agriculturists in India to carry out modern agricultural practices and also present a survey of new amendments that have been done in the country.
- Page(s): 162-166
- Date of Publication: July 2017
- Bharath GDepartment of CSE, R V College of Engineering, Bengaluru, Karnataka, India
- Anala M RDepartment of CSE, R V College of Engineering, Bengaluru, Karnataka, India
References
[1]. www.datasciencecentral.com [2]. Megan Stubbs. “Big Data in U.S. Agriculture”. Congressional Research Service, pp. 2-8. January 6, 2016 [3]. S.Shibusawa and C.Haché. “Data Collection and Analysis methods for Data from Field Experiments”. Encyclopedia of Life Support Systems. ISBN : 978-1-84826-583-7 [4]. Chandra Sukanya Nandyala and Haeng-Kon Kim. “Big and Meta Data Management for U-Agriculture Mobile Services”. International Journal of Software Engineering and Its Applications. Vol. 10, No. 2 (2016), pp. 257-270 [5]. F. Bonomi, R. Milito, J. Zhu, and S. Addepalli. "Fog computing and its role in the internet of things." In Proceedings of the first edition of the MCC workshop on Mobile cloud computing, pp. 13-16. ACM, 2012. [6]. G. Suciu, S. Halunga, O. Fratu, A. Vasilescu, and V. Suciu. "Study for renewable energy telemetry using a decentralized cloud M2M system." In IEEE Wireless Personal Multimedia Communications (WPMC), 16th International Symposium on, pp. 1-5, 2013 [7]. W. Saad, H. Abbes, M. Jemni, and C. Cérin. "Designing and implementing a cloud-hosted saas for data movement and sharing with slapos." International Journal of Big Data Intelligence 1, no. 1, pp. 18- 35, 2014. [8]. EXALEAD – Dassault Systemes, www.3ds.com/productsservices/Exalead [9]. George Suciu, Alexandru Vulpe, Octavian Fratu. “M2M Remote Telemetry and Cloud IoT Big Data Processing in Viticulture”. R mania International Symposium on, pp. 1-5, 2013 [10]. www.businessinsider.com/big-data-and-farming [11]. www.icar.org.in [12]. Vivek Talwar, Nrupesh Mastakar and B. Bowonder. “ICT Platform for Enhancing Agricultural Productivity: The case study of Tata Kisan Kendra”, International Journal of Services Technology and Management (IJSTM), Vol. 6, No. 3/4/5, pp. 1-15,2005
Bharath G, Anala M R "Big Data Analytics in Precision Agriculture: A Survey" International Journal of Research and Scientific Innovation-IJRSI vol.4 issue 6s, pp.162-166 2017
One of the most important tasks of today modern technology is to minimize the power consumption used in day-to-day domestic application [1]. In this paper, the aim is to minimize power consumption used by domestic applications such as lighting and fan of smart home by maximizing energy saving through Bluetooth technology [2]. In today’s culture use of renewable energy to power the battery is extensively used and this paper also uses the technology to minimize the use of electricity in par with smart home for its reliable performance with modern software (MPLAB IDE) In this paper detailed explanation is given about smart home the proposed lighting system where different sensors are used to detect the surrounding temperature, light intensity, room occupancy etc., for automatically controlling the switching-dimming action of LED and speed variations of fan. The prototype model clearly demonstrates the results with more comfortable, secure, economical and it is flexible, reliable for the smart home in minimizing the energy consumption.
- Page(s): 167-169
- Date of Publication: July 2017
- Malashree. G Assistant Professor, Dept. of EEE, HKBK College of Engineering, Nagawara, Bengaluru-45, Karnataka, India
- Gnaneshwari. V Assistant Professor, Dept. of EEE, HKBK College of Engineering, Nagawara, Bengaluru-45, Karnataka, India
- Vinay Shreyas K. V Assistant Professor, Dept. of EEE, HKBK College of Engineering, Nagawara, Bengaluru-45, Karnataka, India
- Ubaidulla Assistant Professor, Dept. of EEE, HKBK College of Engineering, Nagawara, Bengaluru-45, Karnataka, India
- Satish Kumar JAssistant Professor, Dept. of EEE, HKBK College of Engineering, Nagawara, Bengaluru-45, Karnataka, India
References
[1]. Sachin Kishor Khadke, “Home Appliances Control System Based On Android Smartphone”, IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) Volume 9, Issue 3, (May - Jun. 2014) [2]. Tripurantaka Swamy Garlapati, P.S.H.S. Lakshmi “Smart Home Automated Control System Using Bluetooth Based on Solar Panel” International Journal of Science, Engineering and Technology Research (IJSETR), Volume 4, Issue 11, November 2015, [3]. “Microcontroller Based Home Automation System Using Bluetooth, GSM, Wi-Fi and DTMF”, 17-19 December, 2015, Dhaka, Bangladesh, Neaz Md. Morshed, G.M. Muid-Ur-Rahman, Md. Rezaul Karim and Hasan U. Zaman Department of ECE, North South University, Dhaka, Bangladesh [4]. “A Bluetooth Based Sophisticated Home Automation System Using Smartphone”, 2016 International Conference on Intelligent Control Power and Instrumentation (ICICPI), Sukhen Das and Sanjoy Ganguly, Department of Electrical Engineering Techno India College of Technology, Rajarhat
Malashree. G, Gnaneshwari. V, Vinay Shreyas K. V, Ubaidulla, Satish Kumar J "Renewable Based Smart Home Control using Modern Technology" International Journal of Research and Scientific Innovation-IJRSI vol.4 issue 6s, pp.167-169 2017