2024-03-28T16:02:32Z
http://ijseat.com/index.php/ijseat/oai
oai:ojs.www.ijseat.com:article/1
2013-09-02T23:43:26Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/1
2013-09-02T23:43:26Z
IJSEAT
Vol 1, No 1 (2013): June; 001-003
Performance Analysis of Ship Tracking using PID/Predictive Controller
Hariprasad, S A
Krishna, M
Vijay Singh, CDR
pathi, Pampa
. N, Sanjay
.K.S, Arunlal
2013-09-02 23:35:14
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/1
computer
PID, Predictive, matrix inversion
en
: Accurate ship navigation is very essential forsaving fuel as well time. In order to achieve accurate tracking inunmanned ship navigation various controllers like PID,Predictive and Adaptive controllers are used. Each one ishaving its own merits and demerits but the Predictive controllerprovides better tracking. The only major limitation ofPredictive and Adaptive controllers is that they arecomputationally heavy. In order to reduce the computationaltime, researches have come up with various matrix inversiontechniques [7]. In this work an attempt is made to evaluate theperformance of PID and Predictive controllers in terms oftracking efficiency and computational time. Computationalresult evaluated using mat lab shows that Predictive controllerwith matrix inversion technique provides better tracking andtakes less time.
oai:ojs.www.ijseat.com:article/2
2013-09-02T23:43:26Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/2
2013-09-02T23:43:26Z
IJSEAT
Vol 1, No 1 (2013): June; 004-016
Study Of Mechanism Used For Automating The Mechanical System
Gurpude, Rahul R; Lecturer Nuva COE
2013-09-02 23:37:24
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/2
Mechanical
automation, mechanization,productivity.
en
Automation will no longer be seen only as automaticproduction, but as a complex of technologies thatguarantee reliability, flexibility, safety, for humans aswell as for the environment. In a world of limitedresources, automation can provide the answer to thechallenges of a sustainable development. Theautomation has the opportunity of making a greaterand even more significant impact on society.In thestudy of project we have discussed about the variousmechanisms used for automating the mechanicalsystem. In today’s competitive world improvement inproductivity has become the need of an hour.Automation is one of the basic tool for improving theproductivity. The same that is the necessity ofautomation and the various mechanisms used forautomating the mechanical systems have beendiscussed. In all 60 mechanisms were studied whichcan be used for automating the mechanical system.These mechanisms categorized as per the conversionof type of motion into another. This categorization ofall above mechanism has been compiled in the formof data base which will help the user for easy accessof mechanisms according to their requirements. Forthis purpose, we make the arrangement by usingsoftware in which the users have to put hisrequirement. These requirements must be in the formof conversion of motion from one form to another; sothat the user will get the output in less time andwithout much effort. Software has been developed inwhich the user can retrieve the mechanism as per therequirement and the conversion of motion from oneform to another.
oai:ojs.www.ijseat.com:article/3
2013-09-02T23:43:26Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/3
2013-09-02T23:43:26Z
IJSEAT
Vol 1, No 1 (2013): June; 017-024
ntra cluster similarity of clique by positive and negative objects
Kar, Raghunath; Roland berhampur
Sahu, Minakshi
Tripathy, Tarini Charan
2013-09-02 23:40:18
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/3
en
Clustering of high dimensional data setsis a challenge in now a days. Finding of goodclusters is a big problem for the researchers. Theoutlier detection of clusters and finalize about thenoisy data also an important thing inhighdimensional data sets. In this paper it isresearched about intracluster similarity of clusterswith respect to occurrence of positive and negativeobjects through RandIndex. There are manymethods are present to find good clusters from thehigh dimensional datasets like BIRCH, CLARA,CLARANS, DBScan, PAM, CLIQUE etc.TheCLIQUE ( Clustering in Quest ) is a dimensionGrowthsubspace clustering method is used to findclusters. Here the process starts at singledimensional subspaces grows upward to higherdimensional ones. After finding the clusters fromCLIQUE, with a user defined threshold value theoccurrence of positive and negative objects arealso found and it compares with the entropy ofpositive and negative objects with the value ofRandIndex.
oai:ojs.www.ijseat.com:article/4
2013-09-02T23:43:26Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/4
2013-09-02T23:43:26Z
IJSEAT
Vol 1, No 1 (2013): June; 025-013
Indian Museums in Community Identity and Development: A Critical Study
Vardhan, V. Ashok; Musieum Associate
2013-09-02 23:42:51
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/4
Sociology
Calture, musem
en
Museums are complexinstitutions of integration of cultures; tangibleand intangible traditions exhibit the man andnature relationship and promote education andresearch activities. And in elaborating manner,the Museums stand for the holistic presentationof various tribal and folk populations in thesystematic way of socio-cultural economic andtechnological aspects. It focuses not justspecifically on a particular community, orsubject; trend or theme; and tradition ortechnology, but always presents the unbiasedaspects of the past and present of the existed andexisting societies. And through its activities,museum plays a vital role in presenting theequality and dignity of all cultures in paralleldevelopmental approach for their preserving thecultural identity. Thus, museums have come upwith people’s aspirations and inspirations interms of promoting and safeguarding the variouscommunities on single platform.
oai:ojs.www.ijseat.com:article/5
2013-09-03T00:04:31Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/5
2013-09-03T00:04:31Z
IJSEAT
Vol 1, No 2 (2013): July; 031-035
A Study of Customer Response to Brand Imitation, in Pune city
Samgir, Harsha B.; KJ Institute’s Trinity Institute’s
of Management and Research,
Pune, India
University of Pune
Sharma, Preeti U.; KJ Institute’s Trinity Institsute
of Management and Research,
Abstract- In this study researcher has find out the
customer response for the banded and imitated product
in the market. It also provides the customer reaction
towards the imitated products and the image of the
branded products. Researcher also gave the effect of the
imitated product on customers and its respective brand.
The image of store depends on existence and
nonexistence of the imitated brand. According to the
author the customer buys the branded product and not
the imitated product. As we know manufacturer and
producer invest on the R&D for a particular product
and the imitators use that readymade information
making copy of the product and selling in cheap rate
and make their profit where the main investors
incurred a huge losses and demotivate the employer,
manufacturer, and producer. But at the same time it
provides the similar product to the customer in low
rate. But this similar product may not have up to the
mark quality.
Keywords: Customer preference, brand imitation,
brand piracy, brand counterfeiting, branded products.
I. INTRODUCTION
As the competition is increasing, brand imitation
or piracy is the one of the major problem for brand
leaders. In the process of Brand imitation is imitators
copies the special attributes of the leading brand such
Pune, India
University of Pune
Sharma, Kanika
2013-09-03 00:02:36
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/5
Customer preference, brand imitation, brand piracy, brand counterfeiting, branded products.
en
In this study researcher has find out thecustomer response for the banded and imitated productin the market. It also provides the customer reactiontowards the imitated products and the image of thebranded products. Researcher also gave the effect of theimitated product on customers and its respective brand.The image of store depends on existence andnonexistence of the imitated brand. According to theauthor the customer buys the branded product and notthe imitated product. As we know manufacturer andproducer invest on the R&D for a particular productand the imitators use that readymade informationmaking copy of the product and selling in cheap rateand make their profit where the main investorsincurred a huge losses and demotivate the employer,manufacturer, and producer. But at the same time itprovides the similar product to the customer in lowrate. But this similar product may not have up to themark quality.
oai:ojs.www.ijseat.com:article/6
2013-09-03T02:20:35Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/6
2013-09-03T02:20:35Z
IJSEAT
Vol 1, No 3 (2013): August; 036-038
A Novel Hybrid Feature Extraction Technique For Face Recognition
Kumar, P Naveen; KITS MARKAPUR
Kumar, B Naresh
Rao, G.srinivasa
2013-09-03 02:13:16
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/6
PCA, LDA,ICA and distance techniques
en
Face recognition is a computer for identifying and retrieving desired images from a large collection on the basis of features(color, texture, shape..).CBIR system is generally used in security, medicine, entertainment…etc. Interesting method for dimensionality reduction is subspace analysis. Images are portioned into sub images by using sub band decomposition or orthogonal transform to detect local features. Shape feature of an image can be represented using various moments. Image representation using moments has desirable properties of rotation invariance, robust to noise, expression efficiency, effective ness, and multi level representation for describing various shapes of patterns. Further in this work different distance measure like Minkowski distance, Manhatten distance, Euclidean distance etc. will be used to test the performance of the proposed methods
oai:ojs.www.ijseat.com:article/7
2013-09-03T02:20:35Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/7
2013-09-03T02:20:35Z
IJSEAT
Vol 1, No 3 (2013): August; 039-044
Spoofing Attacks on Packets And Methods For Detection And Prevention Of Spoofed Packets
Rao, K. Phalguna; PhD Scholar, Dept of Dept. of Computer Science, Nagpur University, M.S, India.
Sasankar, Ashish B.
Chavan, Vinay
2013-09-03 02:15:30
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/7
spoofing, security, decision, malfunctions.
en
In a spoofing attack, the attacker creates misleading context in order to trick the victim into making an inappropriate security-relevant decision. A spoofing attack is like a con game: the attacker sets up a false but convincing world around the victim. The victim does something that would be appropriate if the false world were real. Unfortunately, activities that seem reasonable in the false world may have disastrous effects in the real world. Spoofing attacks are possible in the physical world as well as the electronic one. For example, there have been several incidents in which criminals set up bogus automated-teller machines (ATM), typically in the public areas of shopping malls. The machines would accept ATM cards and ask the person to enter their PIN code. Once the machine had the victim’s PIN, it could either eat the card or “malfunction” and return the card. In either case, the criminals had enough information to copy the victim’s card and use the duplicate. In these attacks, people were fooled by the context they saw: the location of the machines, their size and weight, the way they were decorated, and the appearance of their electronic displays. In this Research we discus spoofing attacks and detection methods of spoofing attacks.
oai:ojs.www.ijseat.com:article/8
2013-09-03T02:20:35Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/8
2013-09-03T02:20:35Z
IJSEAT
Vol 1, No 3 (2013): August; 045-052
Various Power Dissipation Mechanisms and Leakage Current Reduction Techniques in Deep-Submicron Technology
Sudhakar, D.; 1Associate Professor, 2 M.Tech Student , ECE Department, TKR College of Engineering and Technology, Hyderabad, India
Bhavani, R. Durga
2013-09-03 02:16:59
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/8
VLSI, Dynamic power dissipation, Static power dissipation, CMOS inverter, Variable threshold voltage, Power Gating, MTCMOS, Leakage Control Transistor.
en
Power consumption is a major issue in today’s VLSI technology. Earlier power consumption was of secondary concern. In nanometre technology power has become the important issue because increasing transistor count, higher speed of operation, greater leakage currents. Power dissipation is proportional to speed of operation. With shrinking transistor size and technology, reducing power dissipation and over all power management on chip are the key challenges below 100nm. For many designs, reduction of power dissipation is an important issue due to the need to reduce packaging and cooling cost, extended battery life. For power management leakage power also plays an important role in low power VLSI designs. Leakage power increases at a faster rate than dynamic power in technology generation. This paper describes about the various power dissipation methods along with leakage power management techniques for low power VLSI circuits and systems.
oai:ojs.www.ijseat.com:article/9
2013-09-03T02:20:35Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/9
2013-09-03T02:20:35Z
IJSEAT
Vol 1, No 3 (2013): August; 053-057
A Case Study of Clustering Algorithms for Categorical Data sets
Sujitha, V.; Anurag Group of Institutions
hyd
Reddy, B.Venkateshwar
Murthy, G.Vishnu
2013-09-03 02:19:24
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/9
data clustering, categorical data, data mining, scalability
en
The data clustering, an unsupervised pattern recognition process is the task of assigning a set of objects into groups called clusters so that the objects in the same cluster are more similar to each other than to those in other clusters. Most traditional clustering algorithms are limited to handling numerical data. However, these cannot be directly applied for clustering of nominal data, where domain values are discrete and have no ordering. In this paper various categorical data clustering algorithms are going to be addressed in detail. A detailed survey on existing algorithms will be made and the scalability of some of the existing algorithms will be examined.
oai:ojs.www.ijseat.com:article/13
2013-10-03T10:18:05Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/13
2013-10-03T10:18:05Z
IJSEAT
Vol 1, No 4 (2013): September; 058-064
Solutions To Plate Problem With Constant Rigidity Using Singularity Functions
Vivek, Sujatha; R.V.College of Engineering
Jagannath, V
Kumar, Satish
2013-10-03 09:45:47
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/13
Maths
Singularity function, finite difference method.
en
A new and novel method of solving problems of rectangular plates of constant stiffness using singularity functions is proposed. The working methods and manifestations of the use of singularity functions in plate analysis are presented. Use of singularity functions, to represent the loading and reactive forces and moments at the boundary, along with the finite difference equations for plates of constant stiffness, is the new direction of plate analysis proposed. Here for some problems of plates of constant stiffness, the method is to find mathematical solution to the basic partial differential equations (namely,) along with the representation of the load q in terms of singularity function to get a closed form solution is presented. The advantage of the proposed method over finite elements lies in the fact, that the solution can be found without the help of computers, In contrast, the need for a computer for even a simple problem in the finite element method is required. The solution of certain types of problems of plates with constant and variable stiffness for certain types of loading and boundary conditions is included to exemplify the technique of use of singularity functions.
oai:ojs.www.ijseat.com:article/14
2013-10-03T10:18:05Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/14
2013-10-03T10:18:05Z
IJSEAT
Vol 1, No 4 (2013): September; 065-069
A Novel Approach for O (1) Parallel Sorting Algorithm
Andargie, Lamesginew; M.Sc. (Computer Science),
School of Com& Ele Engineering,
IOT, Bahir Dar University,
Ethiopia.
Melkamu, Gizachew
Sreenivasarao, Dr. Vuda
2013-10-03 10:06:58
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/14
Sorting, Parallel Algorithm, O(1) Sorting Algorithm.
en
Sorting is an algorithm of the most relevant operations performed on computers. In particular, it is a crucial tool when it comes to processing huge volumes of data into the memory. There are different types of sorting algorithms: simple sorting algorithms(such as insertion, selection and bubble) and parallel sorting(such as parallel merge sort, Odd-even sorting, Bitonic sort and O(1) parallel sorting ) algorithm. Parallel sorting is the process of using multiple processing units to collectively sort an unordered sequence of data. In this paper is devoted to the discovery of new approach to O (1) parallel sorting algorithm, in which redundant data didn't taken into consideration yet.
oai:ojs.www.ijseat.com:article/15
2013-10-03T10:18:05Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/15
2013-10-03T10:18:05Z
IJSEAT
Vol 1, No 4 (2013): September; 070-076
Fusing Local Patterns Of Gabor Magnitue For Recognition System
Askarunisa, A.; Professor and Head1,
Vickram College of Engineering,
Madurai, Tamilnadu, India.
Ganesh, N.
Athiraja, A.
Manickam, S.Vignesh
2013-10-03 10:09:08
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/15
histogram, face recognition, Gabor feature extraction.
en
Face recognition is a process of analyzing (or) comparing face with the previously stored face images. Training phase involves the collection of images and checking it for the presence of noise. A testing phase is a selection of particular image and testing with predefined images and the result shows whether the person is authorized (or) not. Histogram equalization is a process of minimizing the contrast of the image and normalizing which smoothens the image pixels. A Gabor feature extraction is an orientation process which gets the image based on head position changes and it can seen through discrete fourier transform. Pixel selection is the process of selecting 8 neighbourhood pixels based on the center pixels, and it is represented on the blocks. Image is tested (or) compared with predefined images stored on the database and selects corresponding correct image. Compared with previous technique it provides better performance.
oai:ojs.www.ijseat.com:article/16
2013-10-03T10:18:05Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/16
2013-10-03T10:18:05Z
IJSEAT
Vol 1, No 4 (2013): September; 077-079
Enhanced Protection for Multi-axle Vehicles
Revathi, P.; M.E Applied Electronics
K.S.Rangasamy College of Technology
Thiruchengode, Tamil Nadu, India
e-mail: revathipalanivel.91@gmail.com
Shanmugapriyan, S.; M.E Applied Electronics
K.S.Rangasamy College of Technology
Thiruchengode, Tamil Nadu, India
e-mail: spriyanece03@gmail.com
2013-10-03 10:16:19
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/16
cost effective solution, multilevel safety technology, entrepreneur in transport and logistics, improve the economy of our government and circumstance.
en
The world is flourishing with new innovation in the field of science and technologies. We are very proud of this technical growth. It’s become true, but sometimes these technologies are misused for destructions. The transportation plays a major role in our country. Heavy vehicle owners and drivers in our country face a lot of problems in day to day life. They impose a huge socio-economic cost in terms of untimely deaths, injuries and loss of economic growth. The main aim of my work is to provide a cost effective solution, to become entrepreneur in transports and logistics also provide a multilevel safety technology in safeguarding the lives. It helps to improve the economy of our circumstances and government.
oai:ojs.www.ijseat.com:article/11
2013-10-03T10:19:39Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/11
2013-10-03T10:19:39Z
IJSEAT
Vol 1, No 4 (2013): September; 080-085
Design of Spiral Helix Antenna for Broadband Applications
http://ijseat.com/index.php/ijseat/article/download/11/33
Kumar, Dhupam Arun; ANDHRA UNIVERSTIY
2013-10-03 10:17:37
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/11
en
The Aim of the paper is to design and develop a tapered spiral helix antenna covering the frequency range 1-18GHz. Tappered spiral helix antenna is a compact state-of-the-art circularly polarized antenna, which works over multi-octave frequency bandwidth(1-18GHz). The antenna size has been reduced by 50 percent with respect to conventional spiral antenna used for same frequency band. This antenna adequately satisfies all of the generally standardized physical constraints and limitations placed upon airborne platforms.
oai:ojs.www.ijseat.com:article/19
2013-11-10T20:43:42Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/19
2013-11-10T20:43:42Z
IJSEAT
Vol 1, No 5 (2013): October; 086-090
Convergence Of Iterative Newton’s Method For The Solution Numerical Equations
Kumari, Kusuma; GIET
2013-11-05 09:50:30
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/19
en
Abstract:In this paper an Iterative Newton’s method for the solution of simple and multiple roots of an equation f(x)=0 is given and it is proved that this method has second order convergence.
oai:ojs.www.ijseat.com:article/21
2013-11-10T20:43:43Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/21
2013-11-10T20:43:43Z
IJSEAT
Vol 1, No 5 (2013): October; 091-094
Higher Image Retrieval Efficiency Using Color Features
Kumar, K. Ajay
Koteswararao, M.
Veeraswamy, K.
2013-11-05 11:12:17
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/21
en
Image retrieval techniques are useful in many image processing applications. Content based image retrieval systems works with whole images and searching is based on comparison of the query. In this paper we present a novel frame work for the color information and achieve higher retrieval efficiency using dominant color feature. An image is partitioned into sub blocks of equal size as a first step. Color of each sub block is extracted by using the RGB color space. A one to one matching scheme is used to compare the query and target images. Minkowski distance is used to retrieving the similar images. The experimental results demonstrate the efficiency of the method.
oai:ojs.www.ijseat.com:article/24
2013-11-10T20:43:43Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/24
2013-11-10T20:43:43Z
IJSEAT
Vol 1, No 5 (2013): October; 095-102
Scalable Coding of PRNG Encrypted Images
Sridhar, Y.; ECE Dept., GITAS, Piridi, Bobbli, Vijayanagaram
Panda, Bighneswar
2013-11-05 11:15:00
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/24
en
This paper proposes a unique scheme of scalable coding for PRNG encrypted images. In the encryption stage, the original pixel values are masked by a modulo-256 addition with pseudorandom numbers that are resulting from a secret key. After decomposing the encrypted data into a down sampled sub image and some data sets with a multiple-resolution construction, an encoder quantizes the sub image and the Hadamard coefficients of each data set to condense the data quantity. Then, the data of quantized sub image and coefficients are observed as a set of bit streams. At the receiver side, while a sub image is decrypted to provide the uneven information of the original content, the quantized coefficients can be used to reconstruct the detailed content with an iteratively updating procedure. Because of the hierarchical coding mechanism, the principal original content with advanced resolution can be reconstructed when more bit streams are received.
oai:ojs.www.ijseat.com:article/22
2013-11-10T20:43:43Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/22
2013-11-10T20:43:43Z
IJSEAT
Vol 1, No 5 (2013): October; 013-110
Wireless Protocols for Anti Cloning and Security
Gupta, Saurabh
Singh, R. K.
Singh, K. B.
2013-11-05 11:16:58
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/22
RFID, Authentication, Privacy, Scalability, Counterfeiting, Cloning.
en
RFID system (Radio-Frequency Identification) is a technology for automated identification of objects and people. Human beings are smart enough to identify an object under a variety of challenge circumstances. RFID systems are emerging as one of the most pervasive computing technologies. But there are still a large number of problems that are to be addressed. One of the fundamental issues still to be addressed is privacy, which concludes association threat, location threat, preference threat, constellation threat, transaction threat, action threat and breadcrumb threat (Kim, J., Yang, C, Jeon, J,2007). Misbehaviours of both readers and tags will lead to attacks to the system. The common attacks on the readers, tags and the air interface between them comprise: Tracking or Tracing, Tamper, Clandestine Scanning, Counterfeit Tags, Cloning Tags, Eavesdropping, Replay, man-in-the-middle attack, Spoofing, Differential power analysis, Timing Attacks, Denial of Service, Physical Attacking and so on (P. Cuenca and L. Orozco-Barbosa, 2006.),(Kim, J., Yang, C, Jeon, J, 2007). Due to scarceness of resources most of the proposed protocols were designed using symmetric key cryptographic algorithms. However, it has been shown that it is inevitable to use public-key cryptographic algorithms to satisfy these requirements. A number of mechanisms have been devised to overcome the problems related to security and privacy issue of RFID systems. In this paper we propose three anonymous RFID authentication protocols and prove that they are secure in the traditional cryptographic framework. Our model allows most of the threats that apply to RFIDs systems including, denial of service, impersonation, malicious traceability, information leakage through power analysis and active man-in-the middle attacks. Our protocols are efficient and scalable.
oai:ojs.www.ijseat.com:article/23
2013-11-10T20:43:43Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/23
2013-11-10T20:43:43Z
IJSEAT
Vol 1, No 5 (2013): October; 111-117
A Performance Analysis of Face Recognition Based on Artificial Neural Network
Rao, Vuda Sreenivasa; School Of Computing And Electrical Engineering, Bahir Dar University, Bahir Dar
Debasu Mengistu, Abrham
2013-11-05 11:18:42
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/23
Face recognition, Logistic Sigmoid activation function and tanh function.
en
Face recognition is bearing in mind and recognizing a face of individual, like a visual pattern recognition that enables the system to verify or identify individual faces that is taken from imaging system. In this paper we tried to show that a face recognition that uses a tanh activation function would have a better or lower mean squared error instead of using the Logistic Sigmoid activation function. The network was trained several times on different ideal input and noisy images that are taken from imaging devices like camera. In this case training a network on different sets of noisy images forced the network to learn how to deal with noise image by using a tanh activation function.
oai:ojs.www.ijseat.com:article/25
2013-11-10T20:43:43Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/25
2013-11-10T20:43:43Z
IJSEAT
Vol 1, No 5 (2013): October; 118-125
A Grid Connected Wind Energy System’s Power Quality Improvement By Using D-Statcom
Reddy, M.Somi; 1M.Tech Scholar, Aditya Engineering College, Surampalem
Rao, V.Srinivasa
2013-11-06 03:44:18
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/25
International electro-technical commission (IEC), power quality, wind generating system (WGS), D-Statcom (Distributed Static Synchronous Compensator).
en
Now a day’s one of the Main issue is Power Quality. The modern device performance is very sensitive with the power supply quality and makes it’s an important aspect. Power Quality problem occurs when the voltage, current and frequency become nonstandard and end use equipment gets damage. The harmonics, compensation of reactive power and power factor is a main problem dealt here. According to the guideline specified in International Electro-technical Commission standard, IEC-61400, by the measurements and norms specified can determine the performance there by power quality of a wind turbine. The active power, reactive power, voltage changes, flicker, harmonics, electrical behavior of switching operation are the concerning power quality measurements by the effect of the wind turbine in the grid system. These quantities are measured based on national/international guidelines. The power electronic switching devices such as Flexible AC Transmission System (FACTS) have been developed; introduction of customs power devices and the technology of emerging branch provide a modern control capability of power system. The paper study describes how the wind turbine installation creates power quality problem in grid system. In the proposed system in order to solve the power quality issues a battery energy storage system (BESS) connected by STATIC COMPENSATOR (STATCOM) at a common point coupling. The real power source under fluctuating wind power is sustained by the integrated battery energy storage. For the power quality improvement of a grid connected wind energy generation system a STATCOM control scheme is simulated using MATLAB /SIMULINK in power system block set. Finally the proposed scheme is applied to a balanced linear load, unbalanced liner load, balanced non linear load and unbalanced non linear load.
oai:ojs.www.ijseat.com:article/26
2013-11-10T20:43:43Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/26
2013-11-10T20:43:43Z
IJSEAT
Vol 1, No 5 (2013): October; 126-132
A High Speed 16*16 Multiplier Based On Urdhva Tiryakbhyam Sutra
Satish, D.V.; KIET KORANGI
Ratna Raju, B
2013-11-08 23:32:33
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/26
Electronics
- booth multiplier, FFT, DSP, propagation delay.
en
It is an ancient methodology of Indian mathematics as it contains a 16 SUTRAS (formulae). A high speed complex 16 *16 multiplier design by using urdhva tiryakbhyam sutra is presented in this paper. By using this sutra the partial products and sums are generated in one step which reduces the design of architecture in processor’s. By using this sutra we can reduce the time with high extent when compare to array and booth multiplier. It can be implemented in many Digital Signal Processing (DSP) applications such as convolution, Fast Fourier Transform(FFT) filtering and in microprocessors. By using this method we reduce the propagation delay in comparison with array based architecture and parallel adder based implementation which are most commonly used architectures .The main parameters of this paper is propagation delay and dynamic power consumption were calculated and found reduced.
oai:ojs.www.ijseat.com:article/27
2013-11-10T20:45:37Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/27
2013-11-10T20:45:37Z
IJSEAT
Vol 1, No 5 (2013): October; 131-141
A Project On Analysis Of Bi-Directional Dc-Dc Converter With Closed Loop Control
Babu, I.Mahesh
Mohammed, Firozali
2013-11-10 20:43:06
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/27
cse
Bidirectional dc–dc converter, coupled inductor.
en
A novel bidirectional dc–dc converter is presented in this paper. The circuit configuration of the proposed converter is very simple. The proposed converter employs a coupled inductor with same winding turns in the primary and secondary sides. In step-up mode, the primary and secondary windings of the coupled inductor are operated in parallel charge and series discharge to achieve high step-up voltage gain. In step-down mode, the primary and secondary windings of the coupled inductor are operated in series charge and parallel discharge to achieve high step-down voltage gain. Thus, the proposed converter has higher step-up and step-down voltage gains than the conventional bidirectional dc–dc boost/buck converter. Under same electric specifications for the proposed converter and the conventional bidirectional boost/buck converter, the average value of the switch current in the proposed converter is less than the conventional bidirectional boost/buck converter. The operating principle and steady-state analysis are discussed in detail. Finally, a 14/42-V prototype circuit is implemented to verify the performance for the automobile dual-battery system.
oai:ojs.www.ijseat.com:article/29
2013-12-04T18:02:13Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/29
2013-12-04T18:02:13Z
IJSEAT
Vol 1, No 6 (2013): November; 142-148
A Study on Goodness of Fit For The Linear Model of Index Numbers of Jute Productivity In India
Subrahmanyam, S. V.; Department of Mathematics, K. L. University, Guntur-522502, Andhra Pradesh
Prasad, Dhaneshwar
Panda, S S
2013-11-20 22:43:37
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/29
Mathematical Model, Closeness of fit, Correlation coefficient, Chi-square test of goodness of fit, t-test, and z-test.
en
A linear trend is fitted to the index numbers of Jute productivity in India from 1993-94 to 2011-12. The line is tested for its goodness of fit by studying standard error, closeness of fit, confidence region, and some sampling distribution techniques such as chi-square test, t-test, z-test. As a result, it is concluded that there is no significant difference between the observed and estimated index numbers of Jute productivity in India from 1993-94 to 2011-12 and hence the regression line is a good fit.
oai:ojs.www.ijseat.com:article/30
2013-12-04T18:02:13Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/30
2013-12-04T18:02:13Z
IJSEAT
Vol 1, No 6 (2013): November; 149-155
Maximum Data Rate Determination of a Telephone Transmission Channel
Raghavendra, M V; Professor , Department of Electrical and
Computer Engineering ,
Adama Science & Technology
University
2013-11-20 22:46:18
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/30
Bandwidth, Data Rate, Symbol Rate, Transmission Channel
en
The transmission channel is a medium that transfers the information from the source to the destination. So many forms of media are available; some of them are pair of wires, a coaxial cable, a radio path, or an optical fiber. Every channel presents some amount of attenuation or loss, so, the transmitted power decreases progressively with increasing distance. Information signal is also distorted in the channel because of different attenuations at different frequencies. Signals usually contain components at many frequencies and if some are attenuated and some are not, the shape of the signal changes. This change is known as distortion. Note that a transmission channel often includes many speech or data channels that are multiplexed into the same cable pair or fiber. In this paper we present the determination of maximum data rate of a telephone channel.
oai:ojs.www.ijseat.com:article/31
2013-12-04T18:02:13Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/31
2013-12-04T18:02:13Z
IJSEAT
Vol 1, No 6 (2013): November; 156-164
Recognition of characters in document images using morphological operation
Babu, P. Eswara; KIET, KAKINADA
Kumar, K. Ravi; Assoc. Professor
Dept. of Computer Science and Engineering,
Kakinada Institute of Engineering & Technology, Korangi, E.g.
Devi, G. Lavanya
2013-11-20 22:47:48
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/31
Document image analysis; Document image rectification; Optical character recognition; Morphological image processing; ASCII code set.
en
In this paper, we deal with the problem of document image rectification from image captured by digital cameras. The improvement on the resolution of digital camera sensors has brought more and more applications for non-contact text capture. It is widely used as a form of data entry from some sort of original paper data source, documents, sales receipts or any number of printed records. It is crucial to the computerization of printed texts so that they can be electronically searched, stored more compactly, displayed on-line, and used in machine processes such as machine translation, text-to-speech and text mining. Unfortunately, perspective distortion in the resulting image makes it hard to properly identify the contents of the captured text using traditional optical character recognition (OCR) systems. In this work we propose a new technique; it is a system that provides a full alphanumeric recognition of printed or handwritten characters at electronic speed by simply scanning the form. Optical character recognition, usually abbreviated as OCR is the mechanical or electronic conversion of scanned images of handwritten, typewritten or printed text into machine-encoded text. OCR software detects and extracts each character in the text of a scanned image, and using the ASCII code set, which is the American Standard Code for Information Interchange, converts it into a computer recognizable character. Once each character has been converted, the whole document is saved as an editable text document with a highest accuracy rate of 99.5 per cent, although it is not always this accurate. The basic idea of Optical Character Recognition (OCR) is to classify optical patterns (often contained in a digital image) corresponding to alphanumeric or other characters.
oai:ojs.www.ijseat.com:article/32
2013-12-04T18:02:14Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/32
2013-12-04T18:02:14Z
IJSEAT
Vol 1, No 6 (2013): November; 165-173
Texture Based Image retrieval using Human interactive Genetic Algorithm
Rao, S.Sreenivas; KIET KAKINADA
Kumar, K.Ravi
Devi, G. Lavanya
2013-11-20 22:50:13
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/32
content-based image retrieval (CBIR), human–machine interaction, interactive genetic algorithm (IGA), color attributes, low-level descriptors.
en
Content-based image retrieval has been keenly calculated in numerous fields. This provides more active management and retrieval of images than the keyword-based method. So the content based image retrieval has become one of the liveliest researches in the past few years. As earlier, we were using the text-based approach where it initiate very boring and hard task for solving the purpose of image retrieval. But the CBIR is the method where there are several methodologies are available and the task of image retrieval becomes well easier. In this, there are specific effective methods for CBIR are discussed and the relative study is made. However most of the proposed methods emphasize on finding the best representation for diverse image features. Here, the user-oriented mechanism for CBIR method based on an interactivegenetic algorithm (IGA) is proposed. Color attributes likethe mean value, the standard deviation, and the image bitmap of a color image are used as the features for retrieval. In addition, the entropy based on the gray level co-occurrence matrix and the edge histograms of an image are too considered as the texture features.
oai:ojs.www.ijseat.com:article/33
2013-12-04T18:02:14Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/33
2013-12-04T18:02:14Z
IJSEAT
Vol 1, No 6 (2013): November; 174-180
Direct Power Control By Using Matrix Converter Based UPFC
Reddy P, Ravikumar
Mohammed, Firoz Ali
2013-12-03 21:17:10
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/33
DPC, UPFC, MC, reactive power, Power control.
en
This paper describes direct power control (DPC) by using Matrix converter based Unified power flow controller (UPFC). The basic problems of UPFC’s are discussed, however this paper proposes an alternative solution for direct power control using a direct ac-ac converter called a matrix converter. The pulse width modulation control technique developed and presented in this paper is based on space vector approach. This paper presents the complete space vector model of a three phase to three phase matrix converter topology. Theoretical principles of direct power control (DPC) based on sliding mode control techniques are established for a matrix converter based UPFC dynamic model including the input filter. Matrix converters (MCs) allow the direct ac-ac power conversion without dc energy storage links, matrix converter is a bidirectional power flow converter that uses semi converter switches arranged in the form of matrix array. Therefore, the matrix converter based unified power flow controller (MC-UPFC) has reduced cost, capacitor power losses and volume with higher reliability By selecting an appropriate matrix converter switching state, line active and reactive power, together with ac supply reactive power, can be directly controlled, and guaranteeing good steady-state and dynamic responses. The line active and reactive power linear controllers based on a modified Venturini high-frequency PWM modulator compared with direct power controller (DPC) by using MC-UPFC; guarantee faster responses without overshoot , presenting no cross-coupling in dynamic and steady-state responses and no steady state error. Experimental results of direct power controllers for MC based UPFC shows decoupled active and reactive power control and fast response times.
oai:ojs.www.ijseat.com:article/34
2013-12-04T18:02:14Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/34
2013-12-04T18:02:14Z
IJSEAT
Vol 1, No 6 (2013): November; 181-185
Facial expressions recognition based on dimensionality reduction techniques
Hrushikesh, Y.
Rao, M.Koteswara
Veeraswamy, K.
2013-12-04 17:57:59
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/34
PCA, ICA, LDA and distance measures
en
Interest in image retrieval has increased in large part due to the rapid growth of the World Wide Web. The traditional text based search and retrieval has its own limitations and hence we move to a facial expressions images are search and retrieval system. In this paper we present a facial expression retrieval system that takes an image as the input query and retrieves images based on image content. Face recognition system is recognizing based on dimensionality reduction derived image features. Facial expressions recognition is the application of computer vision to the image retrieval problem. In this recognition context might refer colours, shapes, textures, or any other information that can be derived from the image itself.
oai:ojs.www.ijseat.com:article/35
2014-01-05T10:58:55Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/35
2014-01-05T10:58:55Z
IJSEAT
Vol 1, No 7 (2013): December; 186-190
Implementation of An Efficient Gate Level Modified Square-Root Carry Select Adder Using HDL
Kumari, K.Surya
Kumar, K.Hemanth
2013-12-23 18:15:24
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/35
FPGA(Field Programmable Gate Array), Area efficient CSLA
en
Contribution of this work is reduce the area and power of the CSLA by a simple gate level modification. Based on this modification CSLA architecture have been developed and compared with the regular SQRT CSLA architecture. Carry Select Adder is one of the best adders used in many data processing processors to perform fast and robust arithmetic functions. It reduces the area and power consumption and became a reputed one. As co pared to the SQRT CSLA it is increased in delay. In this work we have evaluated the performance based delay, area and power with logical effort and through FPGA design by using Xilinx tool for synthesis and simulation for graphical verification by using Modelsim tool. The result analysis shows that the proposed CSLA structure is better than the regular SQRT CSLA.
oai:ojs.www.ijseat.com:article/36
2014-01-05T10:58:55Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/36
2014-01-05T10:58:55Z
IJSEAT
Vol 1, No 7 (2013): December; 191-195
Designing Of Bidirectional Dc-Dc Converter For High Power Application With Current Ripple Reduction Technique
Gandhi, Vemu.
Ahamad Khan, Sadik
2013-12-23 18:37:41
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/36
Bidirectional converter, dc/dc converter.
en
This paper presents the design of bidirectional dc/dc converter with three bridges. In this configuration, only a single bridge is used for bidirectional control and two bridges are used for electrical isolation and for a gain of constant. RMS currents in the source and link capacitor can be improved by capacitor division and paralleling the operation of both stages. This simple arrangement provides the better control scheme and eliminates the snubber circuitry, so the switching frequency and efficiency of the system can be obtained.
oai:ojs.www.ijseat.com:article/37
2014-01-05T10:58:55Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/37
2014-01-05T10:58:55Z
IJSEAT
Vol 1, No 7 (2013): December; 196-202
A Static Time Analysis of 1-bit to 32-page SCA architecture for Logic Test
Kumari, K.Surya
Joseph, Sneha.M.
Brahmanandam.K, V.N.M.
2013-12-25 04:08:45
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/37
At-speed testing, low-power testing, on-chip signal visibility, Clock-Gating, BIST, XC3s1600e-5fgg484.
en
This research proposes the Static Time Analysis of 32 page Single cycle access (SCA) architecture for Logic test. The timing analysis of each and very path of Logic test are observed that is setup and hold timings are calculated. It also eliminates the peak power consumption problem of conventional shift-based scan chains and reduces the activity during shift and capture cycles using Clock-Gating technique. This leads to more realistic circuit behavior during at-speed tests. It enables the complete test to run at much higher frequencies equal or close to the one in functional mode. It will be shown, that a lesser number of test cycles can be achieved compared to other published solutions. The test cycle per net based on a simple test pattern generator algorithm without test pattern compression is below 1 for larger designs and is independent of the design size. The structure allows an additional on-chip debugging signal visibility for each register. The method is backward compatible to full scan designs and existing test pattern generators and simulators can be used with a minor enhancement. It is shown how to combine the proposed solution with built-in self-test (BIST) and massive parallel scan chains. The results are observed on Xilinx XC3s1600e-5fgg484
oai:ojs.www.ijseat.com:article/38
2014-01-05T10:58:55Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/38
2014-01-05T10:58:55Z
IJSEAT
Vol 1, No 7 (2013): December; 203-210
Supervision of DC Link Pi Control In A D-Statcom Based on Fuzzy Logic
Sudheer, M.
Mohammed, Firozali
2013-12-25 04:12:35
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/38
DC link voltage control, DSTATCOM, Fuzzy supervisor, PI controller, transient response, VSI.
en
PI controller with control algorithms are used for load compensation and voltage regulation in D-STATCOM. Because of variation in dc capacitor voltage, load changes might affect the compensation. In this paper, a fuzzy logic based supervisory method is proposed to improve the transient performance of the dc link. Proportional and integral gains of the PI controller varies the transient period time immediately after the load variation. PI gains using expert knowledge of system behavior and higher sampling during the transient period improves the performance of the controller. Error in dc link reduces capacitor voltage during load change compared to normal PI controller. Efficiency and settling time of voltage is also fast, will be proved using this proposed approach with MATLAB simulation results.
oai:ojs.www.ijseat.com:article/39
2014-01-05T10:58:55Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/39
2014-01-05T10:58:55Z
IJSEAT
Vol 1, No 7 (2013): December; 211-218
Detection and classification of brain tumor using Artificial Neural Network from EEG Images
.S, Shashi Kiran; Assistant Professor, JNN College of Engineering, Shimoga, Karnataka, India
thunisa, Liyaka
2013-12-25 04:15:33
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/39
Artificial Neural Network (ANN), Brain tumor, Classification, electroencephalogram (EEG), MLP, Wavelet Transform.
en
Brain tumor is an abnormal intracranial growth caused by cells reproducing themselves in an uncontrolled manner. Curing cancer has been a major goal of medical researchers for decades. The early detection of cancer can be helpful in curing the disease completely. In this paper we propose an ANN base approach to identify brain tumor from electroencephalogram (EEG) signals. It mainly consists of three stages; they are pre-processing, feature extraction and classification. The pre-processing involves resizing so that the further processing is easier. Feature Extraction involves extracting the features. The classification stage involves Artificial Neural network. Raw EEG signals are valuable in brain tumor diagnosis. On this basis, a brain tumor identification system is developed to analyze those features to judge whether brain tumor is present or not.
oai:ojs.www.ijseat.com:article/40
2014-01-05T10:58:55Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/40
2014-01-05T10:58:55Z
IJSEAT
Vol 1, No 7 (2013): December; 219-223
Data Integrity in Multi Cloud Storage
Rao, K. Venkat
Atchyuta Rao, Avala
2013-12-25 04:18:51
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/40
PDP,CPDP, Multi cloud, Storage Security, computational error.
en
Data integrity in cloud is became an acceptable challenge in the research community because of its vast application and usability in common people. This paper given an idea and ensure the secure and less loss in data during sharing with different user residing worldwide. We have introduced a new scheme called PDP (Provable Data Possession) scheme for distributed cloud storage to support the scalability of service and data migration. Here we have the existence of multiple cloud service providers to cooperatively store and maintain the clients’ data. We also introduce an another scheme called (CPDP) i.e. cooperative PDP which is based on homomorphic verifiable response and hash index hierarchy. We prove that the proposed scheme is minimizing the computational error as well as decrease the communication overhead as compare with existing methods.
oai:ojs.www.ijseat.com:article/41
2014-01-05T10:58:55Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/41
2014-01-05T10:58:55Z
IJSEAT
Vol 1, No 7 (2013): December; 224-232
Power Quality Improvement in Utility Grid using Single Phase Micro Sources, DSTATCOM and Distributed Generators
Kumar P, Ajay
Basha, Sk Gouse
Reddy P, Ravi Kumar
2013-12-29 22:04:38
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/41
en
This paper proposes to improve the power quality in autility connected grid by using converter based singlephase micro sources. T he voltage unbalance can besevere if single-phase rooftop mounted PVs aredistributed randomly between the households.Moreover, there can also be single-phase nonlinearloads present in the system. The cumulative effect ofall these will cause power quality problem at theutility side. To counteract this problem, we haveproposed t wo different schemes. In this firstscheme a distribution static compensator (DSTATCOM) is connected at the utility bus toimprove the power quality. The DSTATCOM onlysupplies reactive power and no real power. In thesecond scheme, a larger three-phase convertercontrolled DG is placed that not only supplies thereactive power but also provides active power. Theefficacies of the controllers have been validatedthrough simulation for various operatingconditions using MATLAB/SIMULINK.
oai:ojs.www.ijseat.com:article/42
2014-01-05T10:58:56Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/42
2014-01-05T10:58:56Z
IJSEAT
Vol 1, No 7 (2013): December; 234-238
Power Quality Improvement Features For A Distributed Generation System Using Grid Interface Inverter
Srinu, Badavath
Ahamad Khan, Sadik
P, Subrahmanyam
2013-12-29 22:08:15
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/42
en
This paper presents that, the renewable energy resources are being increasingly connected to distribution systems by utilizing power electronic converters. And it presents a novel control strategy for achieving maximum benefits from these grid-interfacing inverters when installed in 3-phase 4-wire distribution systems. It is controlled to perform as a multi-function device by incorporating active power filter functionality. The inverter can thus be utilized as: power converter to inject power generated from RES to the grid, and shunt APF to compensate current unbalance, load current harmonics, load reactive power demand and load neutral current. All of these functions may be accomplished either individually or simultaneously. With such a control, the combination of grid-interfacing inverter and the 3-phase 4-wire linear/non-linear unbalanced load at point of common coupling appears as balanced linear load to the grid.
oai:ojs.www.ijseat.com:article/43
2014-01-05T10:58:56Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/43
2014-01-05T10:58:56Z
IJSEAT
Vol 1, No 7 (2013): December; 239-246
A New Topology For Hybrid Wind-Solar Energy System
Jainulabdin, Shaik
Mohammad, Firoz Ali.
2013-12-29 22:09:33
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/43
Boost Converter, inverter, Fuel cell unit, Photovoltaic system, Wind plant.
en
Preventing Environmental pollution is becoming a tough task to the scientist. This paper presents a new system configuration which allows the two sources to supply the load separately or simultaneously depending on the availability of the energy sources. The inherent nature of this Cuk fused converter, additional input filters are not necessary to filter out high frequency harmonics. Harmonic content is detrimental for the generator lifespan, heating issues, and efficiency. The structure proposed is a fusion of the buck and buck-boost converter. The systems in literature require passive input filters to remove the high frequency current harmonics injected into wind turbine generators. The harmonic content in the generator current decreases its lifespan and increases the power loss due to heating .In this project, an alternative multi-input rectifier structure is proposed for hybrid wind/solar energy systems. The proposed design is a fusion of the Cuk converter.
oai:ojs.www.ijseat.com:article/44
2014-01-05T10:58:56Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/44
2014-01-05T10:58:56Z
IJSEAT
Vol 1, No 7 (2013): December; 247-252
Correction of Power Factor by Using Static Synchronous Compensator (STATCOM)
Nagi Reddy, V.Veera
Hidayathulla, Patnam
Ahammad Vali, Shaik
2013-12-29 22:10:54
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/44
PFC Boost Converter, Diode Rectifier.
en
In this paper we introduced a new control scheme which uses one PFC Boost Converter connected in shunt with a diode rectifier to recover the harmonic current drawn by the single phase diode rectifier. The line current command is derived from a dc link voltage regulator and an output power estimator. The hysteresis current controller is used to track the line current command. In absence of diode rectifier (Non-linear Load), the PFC boost converter draws purely sinusoidal current from source. In presence of diode rectifier the PFC boost converter draws current in such a way that the total current drawn from source becomes purely sinusoidal. Merits of the proposed converters include higher power density, simpler control strategy, less harmonic control contents, nearly unity power factor and unidirectional power flow.
oai:ojs.www.ijseat.com:article/45
2014-01-05T10:58:56Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/45
2014-01-05T10:58:56Z
IJSEAT
Vol 1, No 7 (2013): December; 253-258
FPGA Implementation of Floating Point Reciprocator Using Binomial Expansion Method
Mahesh, B.; Sai Aditya
Sridevi, G.
2014-01-01 11:15:44
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/45
Floating Point Reciprocator, Field Programmable Gate Array(FPGA), Single Precision Floating Point and Double Precision Floating Point.
en
Floating-point support has become a mandatory feature of new micro processors due to the prevalence of business, technical, and recreational applications that use these operations. In these operations Floating-point division is generally regarded as a low frequency, high latency operation in typical floating-point applications. So due to this not much development had taken place in this field. But nowadays floating point divider has become indispensable and increasingly important in many scientific and signal processing applications.In this paper we implement floating point reciprocator for both single precision and double precision floating point numbers using FPGA. Here the implementation is based on the binomial expansion method. By comparing with previous works the modules occupy less area with a higher performance and less latency. The designs trade off either 1 unit in last-place (ulp) or 2 ulp of accuracy (for double or single precision respectively), without rounding, to obtain a better implementation.
oai:ojs.www.ijseat.com:article/46
2014-01-05T10:58:56Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/46
2014-01-05T10:58:56Z
IJSEAT
Vol 1, No 7 (2013): December; 259-265
Automatic Traffic Lights Control Using ARM7 Based On CO2 Emissions
Jyothi, S.L.Siva
Rajasekhar, K.
Harika, P.
Mohan rao, M.S.Madhan
2014-01-03 10:31:24
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/46
Intelligent Transportation Systems (ITS), Traffic Light Controller (TLC), CO2, Zigbee, Global System for Mobile Communications (GSM).
en
Monitoring and controlling of city traffic is becoming a difficult task in most of the city. With the ever increasing number of vehicles on the road, the Traffic Monitoring Authority has to find new methods of overcoming such a problem. Present Traffic Light Controllers (TLCs) is based on microcontroller and microprocessor which have limitations because it uses the pre-defined hardware, which is functioning according to the program that does not have the flexibility of modification on real time basis Due to the fixed time intervals of green, orange and red signals the waiting time is more and vehicle uses more fuel. This proposed project makes use of Networks along with Embedded Technology. This paper aims to design a safe and efficient traffic flow by reducing the effect of CO2 emitted from vehicles at that region and assign the right way which minimizes the delay or waiting time at road. The CO2 level emitted from vehicles in all directions will be transmitted through CO2 sensor we used in our system which is to sense the Carbon di-oxide emissions from the vehicles. The receiver at the TLC will receive the information. The information from all directions is transmitted and received through the Zigbee wireless communication. Based on CO2 levels, the traffic light indication will be given in the appropriate directions. The status will be shown in LCD and SMS alert will be sent to the Traffic Control Room using Global System for Mobile Communications (GSM).
oai:ojs.www.ijseat.com:article/47
2014-01-05T10:58:56Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/47
2014-01-05T10:58:56Z
IJSEAT
Vol 1, No 7 (2013): December; 266-270
Digital Signature and Key Agreement
Kant, Krishna; Research Scholar, B. R. Ambedkar University, Muzaffarpur, India,
Iqbal, Fahim
Irshad Alam, Md
2014-01-05 10:50:39
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/47
Digital signature standard, Diffie exchange algorithm, Random number, Key agreement, Diffie-Hellman protocol, Public key cryptography.
en
Diffie Hellman key exchange protocol is the most commonly used protocol. This protocol is used to exchange keys in a network. But it has bit m to exchange keys over a network but it has some drawbacks. This is the first proposed algorithm through which parties can exchange information without knowing each other. This algorithm permits exchange even over a insecure networks. Hellman algorithm was introduced by Martin Hellman and Whitfield Diffie in 1976. It is useful over a large number of authenticated protocols. Moreover, it works on transport layers too. In this research efforts are being made to declare new agreement protocol based on key confirmation and Diffie Hellman algorithm as well. This work also ensures the digital signature standard (DSS) with the help of Diffie-Hellman key exchange protocol by making use of two integers randomly. This protocol also performs on the elliptic curve cryptography in asymmetric encryption.
oai:ojs.www.ijseat.com:article/48
2014-01-05T10:58:56Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/48
2014-01-05T10:58:56Z
IJSEAT
Vol 1, No 7 (2013): December; 271-276
Challenging Issues in Face Recognition
Gupta, Saurabh
Singh, R. K.
Balwant Singh, Kumar
2014-01-05 10:53:55
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/48
face recognition, 3d 2d embeding,
en
This paper provides a concise & up-to-date review of research efforts in face recognition techniques based on 2D and 3D images. Recent research has also demonstrated that the fusion of different imaging modalities and spectral components can improve the overall performance of face recognition. The majority of face recognition methods have been developed by scientists with a very technical background such as biometry, pattern recognition and computer vision methods using 3D shape applied to data embodying facial expressions. Different strategies to deal with expressions are presented. The underlying concepts and practical issues relating to the application of each strategy are given, without going into technical details. The discussion clearly articulates the justification to establish archival, reference databases to compare and evaluate different strategies.
oai:ojs.www.ijseat.com:article/49
2014-02-05T09:50:04Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/49
2014-02-05T09:50:04Z
IJSEAT
Vol 2, No 1 (2014): January; 001-007
Reduction of Torque Ripple in Direct Torque Control of Induction Machines by Use of all Voltage Vectors of Matrix Converters
Rajesh Babu, Kanchana.
Ahamad Khan, Saidk
2014-01-19 09:57:39
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/49
Direct Torque Control (DTC), Induction Motor, Matrix Converter (MC), Torque Ripple.
en
This paper proposes the use of all voltage vectors of matrix converters to reduce the electromagnetic torque ripple which is one of the most important drawbacks of direct torque control for induction motors using matrix converters. The standard look up table for direct torque control by matrix converters is improved in order to include the small, medium and large voltage vectors of matrix converters. With the new look-up table and new hysteresis comparator with seven levels of output the system will differentiate between small, medium and large torque errors and consequently reduce the electromagnetic torque ripple and output current THD. The simulation results demonstrate the effectiveness of this novel control strategy.
oai:ojs.www.ijseat.com:article/52
2014-02-05T09:50:04Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/52
2014-02-05T09:50:04Z
IJSEAT
Vol 2, No 1 (2014): January; 015-021
Design & Simulation of 11-level Cascaded H-bridge Grid-tied Inverter for the application of Solar Panels
Chakravarthi I, K Rama
Basha, Sk Gouse
2014-01-20 19:15:55
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/52
DC/AC, Grid,SPWM, Maximum powerpoint tracking
en
This paper presents, the design and simulation of 11-level Cascaded H-bridge DC-AC Grid-tied Inverter for the application of solar panels. A 200w solar panel connected to each inverter bridge. OPALRT lab was used as the hardware in the loop (HIL) real-time control system platform where a Maximum Power Point Tracking (MPPT) algorithm was implemented based on the inverter output power to assure optimal operation of the inverter when connected to the power grid as well as a Phase Locked Loop (PLL) for phase and frequency match. A novel SPWM scheme is proposed in this paper to be used with the solar panels that can account for voltage profile fluctuations among the panels during the day. The experiment is clearly verified with simulation results.
oai:ojs.www.ijseat.com:article/51
2014-02-05T09:50:04Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/51
2014-02-05T09:50:04Z
IJSEAT
Vol 2, No 1 (2014): January; 008-014
Renewable Energy System with High performance Hybrid Cascaded Inverter
Shaik, Azaruddin
Gouse Basha, Sk
M, Prasanthi
Kumar Reddy P, Ravi
2014-01-20 19:14:03
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/51
en
In this paper, Renewal energy system with high performance Hybrid cascaded inverter is proposed. It is based on two kinds of power devices those are MOSFET and IGBT and also the cascaded inverter consists of three H-bridges. The DC voltage of each H-bridge meets the proportional relationship of 1:2:4 and the three modules are connected in series at the AC side. The low voltage bridge is composed of MOSFETs, while the medium and high voltage bridges are composed of IGBTs. This hybrid cascaded inverter can output at most 15 voltage levels at the AC side with rather low switching frequency. At the same time, it can fully exhibit the advantages of different power devices and make the inverter operation flexible. Voltage gradational and PWM carrier modulation methods are adopted in this paper. With different combination of switching states, the distribution of input active power in each H-bridge can be adjusted. As a result, for renewable energy system, larger control freedom is provided and the need of power balance is satisfied. The inverter system is verified with simulation results.
oai:ojs.www.ijseat.com:article/53
2014-02-05T09:50:04Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/53
2014-02-05T09:50:04Z
IJSEAT
Vol 2, No 1 (2014): January; 022-030
DC-DC Energy Conversion with Novel loaded Resonant Converter
Garapati, Chiranjeevi
Gouse Basha, Sk
Reddy P, Ravikumar
2014-01-20 19:17:55
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/53
en
This paper presents the direct current (dc)-to-dc energy conversion with novel loaded-resonant converter. Energy shortages and increasing oil prices have created the demand for a high energy conversion efficiency and performance. The growing electronic product market has increased the demand for high energy conversion efficiency and high power density of dc-to-dc energy power converters. The soft switching scheme is the most attractive dc-to-dc energy conversion topology in recent years. The soft-switching method can reduce switching losses and EMI of the switch-mode converter. Among the many advantages that resonant power conversion has over conventionally adopted pulse-width modulation include a low electromagnetic interference, low switching losses, small volume, and light weight of components due to a high switching frequency, high efficiency, and low reverse recovery losses in diodes owing to a low di/dt at switching instant. The proposed topology comprises a half-bridge inductor-capacitor inductor (L-C-L) resonant inverter and a bridge rectifier. Output stage of the proposed loaded-resonant converter is filtered by a low-pass filter. A prototype dc-to-dc energy converter circuit with the novel loaded-resonant converter designed for a load is developed and tested to verify its analytical predictions. The measured energy conversion efficiency of the proposed novel loaded-resonant topology reaches up to 88.3%. Moreover, test results demonstrate a satisfactory performance of the proposed topology. Furthermore, the proposed topology is highly promising for applications of switching power supplies, battery chargers, uninterruptible power systems, renewable energy generation systems, and telecom power supplies. The experimental results are clearly verified by simulation results.
oai:ojs.www.ijseat.com:article/54
2014-02-05T09:50:05Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/54
2014-02-05T09:50:05Z
IJSEAT
Vol 2, No 1 (2014): January; 031-036
Novel DTC-SVM for an Adjustable Speed Sensorless Induction Motor Drive
Ahammad S, Nazeer
Ahamad Khan, Sadik
Kumar Reddy P, Ravi
M, Prasanthi
2014-01-20 19:19:31
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/54
en
This paper presents, the direct torque control (DTC) based space vector modulation (SVM) for an adjustable speed sensorless induction motor (IM) drive. This proposed system will give a clear study about DTC and SVM and the motor drive is supplied by a two-level SVPWM inverter. Based on input-output feedback linearization control the inverter reference voltage is obtained, using the IM model in the stator D–Q axes reference frame with stator current and flux vectors components as state variables. Moreover, a robust full-order adaptive stator flux observer is designed for a speed sensorless DTC-SVM system and a new speed-adaptive law is given. By designing the observer gain matrix based on state feedback H control theory, the stability and robustness of the observer systems is ensured. The speed adaptive stator flux observer stability guaranteed also by the gain matrix in very low speed. The experimental results are proved by simulation results.
oai:ojs.www.ijseat.com:article/55
2014-02-05T09:50:05Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/55
2014-02-05T09:50:05Z
IJSEAT
Vol 2, No 1 (2014): January; 037-043
Sensorless Speed Control Scheme for Induction Motor Drive Using DC link Measurements
C, Yesupadam
Gouse Basha, Sk
Kumar Reddy P, Ravi
2014-01-20 19:21:23
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/55
en
The controlled induction motor drives without mechanical speed sensors at the motor shaft have the attractions of low cost and high reliability. To replace the sensor, the information on the rotor speed is extracted from measured stator voltages and currents at the motor terminals. Vector controlled drives requires estimating the magnitude and spatial orientation of the fundamental magnetic flux waves in the stator or in the rotor. Open loop estimators or closed loop observers are used for this purpose. They differ with respect to accuracy, robustness and sensitivity against model parameter variations. This paper presents a new control strategy for three-phase induction motor which includes independent speed &torque control loops and the current regulation thereby overcoming the limitation (i.e. sluggish response) of volts per hertz controlled industrial drives. For closed-loop control, the feedback signals including the rotor speed, flux and torque are not measured directly but are estimated by means of an algorithm. The inputs to this algorithm are the reconstructed waveforms of stator currents and voltages obtained from the dc link and not measured directly on stator side. The proposed drive thus requires only one sensor in the dc link to implement the close-loop speed and torque control of a three-phase induction motor.
oai:ojs.www.ijseat.com:article/56
2014-02-05T09:50:05Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/56
2014-02-05T09:50:05Z
IJSEAT
Vol 2, No 1 (2014): January; 044-050
Power Quality Improvement in 3P4W System Using Unified Power Quality Conditioner (UPQC) with P-Q Theory
M, Prasanthi
Ali Mohammad, Firoz
Kumar Reddy P, Ravi
2014-01-20 19:23:38
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/56
en
Unified power quality conditioners (UPQCs) allow the mitigation of voltage and current disturbances that could affect sensitive electrical loads while compensating the load reactive power. Diverse control techniques have been proposed to evaluate the instantaneous output voltage of the series active power filter of the UPQC but, in most cases, these controllers only can compensate a kind of voltage disturbance. This paper presents a Unified Power Quality conditioner (UPQC) Design connected to three phase four wire system (3P4W). The neutral of series transformer used in the fourth wire for the 3P4W system. The neutral current that may flow toward transformer neutral point is compensated by using a four-leg voltage source inverter topology for shunt part. The series transformer neutral will be at virtual zero potential during all operating conditions. In this simulation we observe the power quality problems such as unbalanced voltage and current, harmonics by connecting non linear load to 3P4W system with Unified Power Quality conditioner. A new control strategy such as unit vector template is used to design the series APF to balance the unbalanced current present in the load currents by expanding the concept of single phase P-Q theory. The P-Q theory applied for balanced three phase system. And also be used for each phase of unbalanced system independently.
oai:ojs.www.ijseat.com:article/57
2014-02-05T09:50:05Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/57
2014-02-05T09:50:05Z
IJSEAT
Vol 2, No 1 (2014): January; 051-057
Designing of Double Input Integrated Buck-Boost Converter
Prasanth, G.D.V.; BVC
2014-01-23 03:28:17
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/57
Two-input integrated dc-dc converter, photovoltaics, maximum power tracking.
en
In this paper, two-input integrated dc-dc converter analysis and control strategies useful to photovoltaic (PV) applications is presented. This dc-dc converter is basically combination of individual buck and buck-boost converters supplying for a common dc bus. Here one inductor is sufficient enough for power conversion in both the converters. Buck-boost converter, with maximum power tracking, eradicates the complete power from the PV source and supplies to the load, while the remaining load power demand is drawn from the stand-alone dc source, which is equipped with single-loop voltage-mode controller for dc bus voltage regulation. Closed-loop converter performance of this converter is simulated and compared with the theoretical calculations. Simulation studies are presented here for constant resistive and battery type of loads. The load power distributions among the sources are proved.
oai:ojs.www.ijseat.com:article/58
2014-02-05T09:50:05Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/58
2014-02-05T09:50:05Z
IJSEAT
Vol 2, No 1 (2014): January; 058-071
Green Approach To Corrosion Inhibition Of Aluminium By Senna Auriculata Leaves Extract In 1 N NaOH Solution
Sirajunnisa, A.; Dept. of Chemistry, Periyar Maniammai University, Thanjavur-613 403, India.
Mohamed, M.I.Fazal
Subramania, A.
Venkatraman, B.R.
2014-02-05 09:49:08
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/58
Chemistry
Aluminium corrosion, Corrosion inhibitors, Senna auriculata leaves extract, Langmuir adsorption isotherm, Mixed type inhibitor.
en
Corrosion inhibition of aluminium in 1N NaOH by leaves extract of Senna auriculata (SL) was studied using chemical and electrochemical techniques at 30-60°C. It was found that the leaves of Senna auriculata inhibited the base induced corrosion of aluminium.The inhibition efficiency increases with increase in concentration of SL extract and reached the maximum of 76.2% but decrease with rise in temperature. The adsorption of SL on metal surface obeyed Langmuir adsorption isotherm. Polarization measurements showed that SL extract acted as mixed type inhibitor. The surface morphology of aluminium, in the absence and presence of SL extract in 1N NaOH solution, was studied using scanning electron microscopy. Results obtained from chemical and electrochemical techniques were in good agreement. Thermodynamic parameters such as activation energy and free energy of adsorption were calculated and given in kJ/mol.
oai:ojs.www.ijseat.com:article/60
2014-03-07T00:00:04Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/60
2014-03-07T00:00:04Z
IJSEAT
Vol 2, No 2 (2014): February; 072-078
Secured and Smart Electronic voting system
Kumar, B.Ravi; BVC
Rao, T.V Janardhana
Sharma, Dr.N.S. Murthy
Harika, P.
2014-02-24 18:56:35
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/60
touch panel interface; electronic voting system; assistive information technology.
en
Now a days various displays are becoming available for implementing a new kind of human computer interaction (HCI) method. Among them, touch panel displays have been used in wide variety of applications and are proven to be a useful interface infrastructure. We exemplify our approach through the design and development of secured & smart ectronic voting system. As the Supreme Court recently ordered to include the “Reject” option, so that the voter can reject if he is not interested in any party. This touch screen based electronic voting system provides confirmation after selecting a party from the list. A beep sound will be generated when the voter presses the confirmation so that the vote will be casted successfully to a right party. This type of electronic voting systems allow easy confirmation and casting of vote without any assistance. This system also provides security by entering the voter ID whether it is correct or not. We also conducted a preliminary evaluation to verify the effectiveness of the system.
oai:ojs.www.ijseat.com:article/61
2014-03-07T00:00:04Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/61
2014-03-07T00:00:04Z
IJSEAT
Vol 2, No 2 (2014): February; 079-086
Area reduction in CSLA with efficient delay management
Gayatri, Ch; avanthi
Naveen, D
2014-02-26 07:05:16
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/61
CSLA, BEC, processor. SQRT CSLA
en
Adders play a key role in the arithmetic processors. There are many ways to design an adder. The major disadvantage of digital adders are that its speed is limited due to delay occurred in carry propagation. Carry select adder (CSLA) is one of the fastest adders used in many computational systems to improve the carry propagation delay by independently generating multiple carries and then select a carry to generate the sum. But the area of CSLA increases with the use of dual RCAs. A CSLA with Binary to Excees-1 Converter (BEC) is designed to reduce the area of the CSLA, but the delay over head is increasing. To further decrease the area and to keep the delay constant or equal as basic CSLA, an add one circuit can be used to design a CSLA. This work proposes the design of 8-bit, 16-bit, 32-bit, 64-bit and 128-bit square root CSLA (SQRT CSLA) using BEC with significant reduction in area.
oai:ojs.www.ijseat.com:article/62
2014-03-07T00:00:04Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/62
2014-03-07T00:00:04Z
IJSEAT
Vol 2, No 2 (2014): February; 087-091
Effective Scheduling of Jobs Using Reallocation of Resources Along With Best Fit Strategy and Priority
Ibrahim. S, Jafar Ali; Anna University, chennai
Affir. A, Mohamed
2014-02-27 23:24:48
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/62
Grid Computing, Grid Scheduler (GS), Shortest Job First (SJF), Best Fit (BF), Priority, Grid Resource Broker (GRB).
en
Grid computing let the devices to distribute the job across different environment, where the resources are heterogeneous in nature. It is a collection of resources from different states in order to attain common goal. Scheduling of jobs is one of the major crises that play a vital role nowadays. So, this paper proposes a scheduling algorithm where the resources can be effectively allocated. Grid Scheduler plays a vital role in allocating the jobs to the resources. Before the job arrives, the function of the Grid Scheduler is to reassemble the memory by its size. When the job arrives, the Shortest Job First algorithm along with the best fit strategy is applied to allocate the job effectively to the resources in order to reduce the wastage of memory. If same sized jobs arrive at the scheduler priority rule is applied to allocate the job. If the job size is not as same as the resource size, at that case the Grid Scheduler locates the resources that are nearby equal to the job size and allocate the resources for that job. The free space that is remaining in those resources is likewise combined with all the free spaces that are remaining in all of the resources, so that these spaces can be combined and used as resource for some other job allocation. The memory wastage is managed at this situation. Here Grid Resource Broker is used for combining all the free memory space. Through this approach scheduling can be performed effectively.
oai:ojs.www.ijseat.com:article/63
2014-03-07T00:00:04Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/63
2014-03-07T00:00:04Z
IJSEAT
Vol 2, No 2 (2014): February; 092-095
Advanced Security System For Railways Using ARM7
sandheep, Kolli; BVC
Madhanmohan, M.S
Sridevi, CH.
sekhar, A.P Chandra
2014-02-28 23:52:16
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/63
Multi-core Embedded Processors (MCEP), Wireless Sensor Nodes (WSN), Train Automation (TA), Train Parameters, and Electric Locomotive Engine (ELE).
en
In this paper we have discussed about the automotive control and communication systems of the train using High Performance Multi-core Embedded Processors (MCEP). This method has been developed based on the disadvantages of the existing system such as detecting cracks at rails, monitoring distance between rails, compartments monitoring, fire and smoke monitoring in compartments, and controlling of motors, transformers, pantograph etc. by manual operations. As Wireless Sensor Nodes (WSN) and High- energy laser based ultrasonic approach are available in the recent techniques, Train Automation (TA) can be resourcefully done for managing train parameters and monitoring any abnormal conditions in real-time without delays and accidents. All parameters will be processed, controlled, and managed at Electric Locomotive Engine (ELE) with help of advent of wireless technologies. To speed up the operations, all received data will be quickly processed by Multi-core Embedded Processors (MCEP) with help of Multi-core Embedded Software. From the point of view of energy efficiency, train automation is an interesting approach to the challenges of traffic fluidity control, energy efficient driving, regenerative braking, and managing power consumption in electrical devices in trains. To reduce human errors and get the fast response, TA will be a wonderful one with help of MCEP.
oai:ojs.www.ijseat.com:article/64
2014-03-07T00:00:04Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/64
2014-03-07T00:00:04Z
IJSEAT
Vol 2, No 2 (2014): February; 096-100
Weighted contrast enhancement based enhancement for remote sensing images
Kumar Dakarapu, Ashok; BVC
Anuragh, V.
Kumar, G Sravan
Sarma, N.S.Murthy
2014-03-06 23:56:27
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/64
DWT, high intensity layers, bLL.
en
This paper discuss a novel approach based on dominant brightness level analysis and adaptive intensity transformation to enhance the contrast for remote sensing images. In this approach we first perform discrete wavelet (DWT) on the input images and then decompose the bLL sub band into low-, middle-, and high-intensity layers using the log-average luminance. After estimating the intensity transformation, the resulting enhanced image is obtained by using the inverse DWT. The proposed algorithm overcomes this problem using the adaptive intensity transfer function. The experimental results show that the proposed algorithm enhances the overall contrast and visibility of local details better than existing techniques.
oai:ojs.www.ijseat.com:article/65
2014-03-07T00:00:05Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/65
2014-03-07T00:00:05Z
IJSEAT
Vol 2, No 2 (2014): February; 101-106
Performance Analysis of Wavelet Packet Based SPHIT Algorithm
Suneel Kumar, Kakara; bvc
Pravin, A.
Sankar Phani, T. Siva
Babu, G.Sudeer
2014-03-06 23:59:30
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/65
Image compression, Wavelet Packet Transforms, Zero trees.
en
The necessity in image compression continuously grows during the last decade. An image compression algorithm based on wavelet packet transform is introduced. This paper introduces an implementation of wavelet packet image compression which is combined with SPIHT (Set Partitioning in Hierarchical Trees) compression scheme. The image compression includes transform of image, quantization and encoding. This paper describes the new approach to construct the best tree on the basis of Huffman coding for further compression. In this method the tree are known as zero trees and they are efficiently represented by separating the root from the tree to make compression more. Through Experiments (SPIHT Algorithm)we have shown that the image through the wavelet transforms, the wavelet coefficients are generally small value in high frequency region. A large number of experimental results are shown that this method saves a lot of bits in transmission, further enhanced the compression performance.
oai:ojs.www.ijseat.com:article/67
2014-04-03T03:22:08Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/67
2014-04-03T03:22:08Z
IJSEAT
Vol 2, No 3 (2014): March; 107-111
Network Intrusion Detection Systems Using Genetic Algorithm
kumar, sabbithi suresh; KIET, Koringa,Andhra Pradesh,INDIA
Prasad, T Rajendra; KIET, Koringa,Andhra Pradesh,INDIA
2014-04-01 21:35:54
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/67
IDS, GA, RBS, TCP/IP
en
Intruder Detection system is so important implementations which considers all network information like temporal and spatial which make the system to build the rule for IDS. This helps for the administrator to detect complex anomalous behaviors of the system. This work is focused on the TCP/IP network protocols. Genetic Algorithm is used to generate dynamic IP for the network to avoid unauthorized data transfer and prevent from attack. The Intrusion Detection System can be viewed as a rule-based system (RBS) and Genetic Algorithm can be viewed as a tool to help generate knowledge for the RBS. This project shows how network connection information can be modeled as chromosomes and how the parameters in genetic algorithm can be defined in this respect.
oai:ojs.www.ijseat.com:article/68
2014-04-03T03:22:08Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/68
2014-04-03T03:22:08Z
IJSEAT
Vol 2, No 3 (2014): March; 112-115
Design and Implementation of home security system with feedback and control of electric gadgetry
Vijay, B.Kanna; BVC Engineering college, Odalaravu
Dhanaraj, V.
Pavani, K.
2014-04-03 03:12:19
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/68
LPC 2148, HLK-RM04, GSM-SIM300, home security, feedback and control.
en
An embedded system is designed for providing security to home, as the home security is the more prior among all other aspects which are among to home. The system has two sections, one is main station and other is feedback and control section. The main station consists LPC 2148, HLK-RM04, and feedback and control system consists HLK-RM04, GSM-SIM300, and data processing module.
oai:ojs.www.ijseat.com:article/69
2014-04-03T03:22:08Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/69
2014-04-03T03:22:08Z
IJSEAT
Vol 2, No 3 (2014): March; 116-119
Studies on Dynamic Mechanical Analysis and Morphology of Carbon Soot Filled Un saturated Polyester Graded Composites
Nigrawal, Archana; ADVANCED MATERIALS AND PROCESSES RESEARCH INSTITUTE (AMPRI), BHOPAL
Chand, Navin
2014-04-03 03:21:13
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/69
Chemistry
carbon soot, un saturated polyester, DMA,Storage modulus,Activation energy.
en
Dynamic mechanical behaviour of carbon soot filled polyester graded composites was determined with reference to carbon soot concentration present at different positions of the graded composites. At lower temperatures ,E’ values are maximum for unsaturated polyester resin whereas above Tg E’ values of graded composites are higher than the pure polyester resin . The loss modulus peaks values decreased on increasing the carbon soot concentration .Tg values increased with increase in sootconcentration . Apparent activation energy of the relaxation process of different composites were analysed
oai:ojs.www.ijseat.com:article/70
2014-05-10T21:39:44Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/70
2014-05-10T21:39:44Z
IJSEAT
Vol 2, No 4 (2014): April; 121-124
Token Based Fair Queuing Algorithms for Wireless Networks
Ravindra R Patil, Ravindrax
2014-05-10 21:15:10
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/70
QoS, scheduling, Fairness, time bound
en
Token Based Fair Queuing (TBFQ) algorithm has been proposed for single carrier Time Division Multiple Access (TDMA) systems, to suit WINNER Orthogonal Frequency Division Multiple Access (OFDMA) air-interface. This algorithm takes Quality of Service (QoS) attributes such as priorities, interflow fairness, and time bound constraints into account. We use a token-based scheduler to determine which packet should be scheduled to transmit in the next frame. By selecting the user terminals (UTs) in a certain prioritized manner derived from QoS attributes, the performance of the UTs, suffering from high interference, can be improved. In This paper, TBFQ algorithm has been simulated in a multicell environment in the presence of intercell interference by comparing with reference Score Based (SB) algorithm. The simulation results show that the presented algorithm provide a better fairness at a lower implementation at all level implementation complexity while simultaneously achieving comparable network utilization by considering time bound associated to particular packets. Keywords: QoS, scheduling, Fairness, time bound.
oai:ojs.www.ijseat.com:article/71
2014-05-10T21:39:44Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/71
2014-05-10T21:39:44Z
IJSEAT
Vol 2, No 4 (2014): April; 125-130
Analysis of Hyoid Structured And Perforated Pinfin Heat Sink In Inline And Staggered Flow
Therisa, T.
Srinivas, B.
Ramakrishna, A.
2014-05-10 21:32:32
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/71
Heat transfer, perforated fins, Hyoid pin fin heat sink, Base plate, inline and staggered.
en
The usage of the electronic goods has been increased tremendously; hence it is the challenging task to improve the cooling for such devices. The heat dissipation rate should be maximized in the electronic devices like integrated CPUs, chipset and hard disk drives with the help of heat sinks, fans and other forms like liquid cooling in order to protect the device due to overheating,as overheating results in reducing the life or damaging the device, hence it is necessary to modify the heat sink design in various vital parameters like fin height, fin length, fin thickness, number of fins, number of perforations, base plate thickness, fin spacing, material etc. The main objective of this present paper is to present the modified model of the heat sink with above mentioned geometrical parameters, and both flow types of inline and staggered with and without perforations of C/H=0, C/H=0.333, and C/H=1; =1.308, 500 < Re < 42,000; 1.208 < Sy/D < 3.417, 0 < C/H < 1 and observing the heat flow rate in the Hyoid (U-shaped) pin fin heat sink. The results revealed improved heat dissipation characteristics
oai:ojs.www.ijseat.com:article/72
2014-05-10T21:39:44Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/72
2014-05-10T21:39:44Z
IJSEAT
Vol 2, No 4 (2014): April; 131-135
Dynamic Performance Analysis of BLDC Motor with Adaptive Neuro Fuzzy Controller Under Critical Load Condition
Bheemeswara Reddy, T.
Satyanarayana, K.
2014-05-10 21:37:20
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/72
en
Brushless DC (BLDC) motors have been widely used in many fields of drives for their high power/weight, high torque, high efficiency, long operating life, noiseless operation, high speed ranges and ease of control. In this paper, a Adaptive Neuro-Fuzzy Controller (ANFC) based on supervisory learning is presented for the speed and torque control of BLDC motors to enhance high control performance of the drive under transient and steady state conditions. This controller is combination of Neural Networks (NNs) and Fuzzy Logic (FL), therefore has parallel processing and learning abilities of NNs and inference capacity of FL. For improvement the performance of leaning algorithm and there upon increase efficiency of drive, a fuzzy based back propagation algorithm is employed. The proposed controller has simple structure and also due to its modest fuzzy rule in rule-base is relatively easy for implementation. This controller has high accuracy, suitable performance, high robustness and high tracking efficiency. In order to demonstrate the NFC ability to tracking reference speed and torque and also test of robustness and rejection ability of controller against undesired disturbances or suddenly changes in speed and torque, these designs are simulated with MATLAB/SIMULINK. Results are compared with that of a conventional PID controller and other designs.
oai:ojs.www.ijseat.com:article/75
2014-06-05T19:01:52Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/75
2014-06-05T19:01:52Z
IJSEAT
Vol 2, No 5 (2014): May; 136-144
A SPWM Full Bridge Inverter With Transformerless PV Grid Connected Inverter
Ravikumar, K
Vidyasagar, K.E.Ch.
Patnam, Hidayathulla
Ramakrishna, Ponnaganti Siva
2014-06-02 22:56:31
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/75
SPWM, transformer less, unipolar
en
Unipolar sinusoidal pulse width modulation (SPWM) full-bridge inverter brings high-frequency common-mode voltage, which restricts its application in transformer less photovoltaic grid-connected inverters. In order to solve this problem, an optimized full-bridge structure with two additional switches and a capacitor divider is proposed in this paper, which guarantees that a freewheeling path is clamped to half input voltage in the freewheeling period. Sequentially, the high-frequency common mode voltage has been avoided in the Unipolar SPWM full-bridge inverter, and the output current flows through only three switches in the power processing period. In addition, a clamping branch makes the voltage stress of the added switches be equal to half input voltage. The operation and clamping modes are analyzed and the total losses of power device of several existing topologies and proposed topology are fairly calculated. Finally, the common mode performance of these topologies is compared by a universal prototype inverter rated at 1 KW.
oai:ojs.www.ijseat.com:article/76
2014-06-05T19:01:52Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/76
2014-06-05T19:01:52Z
IJSEAT
Vol 2, No 5 (2014): May; 145-149
A Novel Approach of FPGA Implementation of Transceiver System
rao, P.Lokaranjan
Babu, K.Supreem
2014-06-05 18:56:35
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/76
RLE, SPI, HDLC, FPGA
en
This work given a innovative model to design an efficient wireless system which helps to integrate this with other technologies at a low cost. The system read analogue information by a biomedical sensor which is attached to the patient. The recorded data are converted digitally using analogue-to-digital converter and sent to transmitter through field programmable gate arrays (FPGAs). VHDL has been used to implement the required functions of the FPGA, such as bus interfacing, data buffering, compression and data framing. The compression of data is done with RLE and it is so efficient. On the other hand, Simulink software has been used to model and simulate FPGA transmitter/receiver. The overall performance of the system has been verified by a well developed simulation model.
oai:ojs.www.ijseat.com:article/77
2014-07-06T07:47:35Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/77
2014-07-06T07:47:35Z
IJSEAT
Vol 2, No 6 (2014): June; 150-153
Radiaton Pattern Reconfiguration Using Parasitic Elements
http://ijseat.com/index.php/ijseat/article/download/77/0
Jangam, Aniket Ashok; Dr. Babasaheb Ambedkar Technological University, Lonere
Rakibe, Sumit V.
Nandgaonkar, A. B.
2014-07-05 09:17:21
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/77
Antenna
Reconfiguration, Beam Steering, Microstrip antenna, Parasitic layer, Antenna array, Radiation pattern.
en
A parasitic surface based reconfiguration technique for microstrip antenna beam steering has been presented and discussed in this paper. This concept can be used in reconfigurable antennas without additional modification on the basic design of an antenna. This paprasitic layer based antenna is designed using array of 5 by 5 pixel surface which can be connencted or disconnected depending upon required configuration so as to steer antenna beam in particular direction such as -30°, 0° and +30°.
oai:ojs.www.ijseat.com:article/78
2014-07-05T09:34:17Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/78
2014-07-05T09:34:17Z
IJSEAT
Vol 2, No 6 (2014): June; 154-157
A new Security approach for integrating wireless adhoc network using octant bit computation and routing test
Silwal, Sushmita
Sharma, Anu
2014-07-05 09:33:23
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/78
Ad-hoc Network, Security threats, virtual path, computational.
en
Ad hoc networks are a kind of network that has no centralized body and in order to communicate with the nodes it has no fixed topology.In this paper we propose to use binary masking of octant bits and shared cryptography to secure message communication in ad-hoc network and we have proposed a minimized computational security scheme for wireless ad-hoc network based on shared information between source host and destination host .We also can focus on routing test before transferring packet because , no of packet increases due to binary masking technique. With the help of this method we make the virtual path between source and destination. That makes it more effective in energy saving distributed environment where battery driven low end processors are used and security is also a major challenge.
oai:ojs.www.ijseat.com:article/79
2014-08-23T03:06:42Z
ijseat:ART
ijseat:ec_fundedresources
v2
http://ijseat.com/index.php/ijseat/article/view/79
2014-08-23T03:06:42Z
IJSEAT
Vol 2, No 7 (2014): July; 158-164
Ergonomic Evaluation of Workstations in an IT Industry
Math, Mahantesh Malayya; RVCE
2014-08-05 02:05:41
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/79
Mechanical Industrial Engineering
Ergonomic
Mahantesh M Math VTU University RV college of Engineering Iem Department
English
In the Information Technology (IT) industry an individual spends most of time in front of their computers working for more than 7 to 8 hours per day. This continuous sitting in the same postures has been the reason for many musculoskeletal disorders (MSDs) and repetitive strain injuries (RSIs). The paper focuses on the finding the different body parts that suffer strain and discomfort. A questionnaire was designed to evaluate the different parts of the body suffering from pain and to evaluate the different aspects of the five workstation elements considered. The questionnaire was subjected to a Reliability test to measure the consistency of the questions and their responses. From the data collected it was found that the chair was the element that caused most discomfort. The major body parts that the employees had pain frequently were the neck, shoulder, upper back and lower back. The reliability test conducted showed that all the questions in the questionnaire were consistent and reliable. High correlation was found between the body parts affected and aspects of the chair.
oai:ojs.www.ijseat.com:article/81
2014-08-23T03:06:42Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/81
2014-08-23T03:06:42Z
IJSEAT
Vol 2, No 7 (2014): July; 165-167
Reliability of Chandrapur-Padghe HVDC Line (Chapad) ±500kv HVDC Link
M.Gimonkar, Ravindra
2014-08-05 02:28:16
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/81
HVDC link, padge, Vidarbha, power crisis.
en
This paper presents an over view of the present status of the reliability model of HVDC link in between CHANDRAPUR & PADGE terminal stations. It is well known fact that it is well-known fact that major generating stations in Maharashtra are located in its Eastern region; where as its major load-centers are located in the Western region. Now because of the increase of the power it crises many major TPPs (Tiroda) with total generation capacity (5000 MW) are coming up in Eastern region of Maharashtra i.e. Vidarbha. For this I have selected the HVDC link in between above 2 terminal station and proved the reliability of this HVDC system in more than 97%.
oai:ojs.www.ijseat.com:article/82
2014-08-23T03:06:42Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/82
2014-08-23T03:06:42Z
IJSEAT
Vol 2, No 7 (2014): July; 168-175
Cryptography Based on DNA Using Random key Generation Scheme
Varma, P.Surendra; Department of Computer Science and Engineering
Srinivasa Institute of Engineering and Technology, Cheyyeru
Raju, K.Govinda; Srinivasa Institute of Engineering and Technology, Cheyyeru
2014-08-11 06:08:37
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/82
DNA, DNA computing, DNA cryptography, Matrix manipulation, Key generation
en
With the growth of technological advancements, the threats dealt by a user grow exponentially. The 21st century is a period of information explosion in which information has become a very important strategic resource, and so the task of information security has become increasingly important in data storage and transmission. As traditional cryptographic systems are now vulnerable to attacks, the concept of using DNA Cryptography has been identified as a possible technology that brings forward a new hope for unbreakable algorithms. A new field of cryptography is emerging based on DNA computing due to high storage capacity, vast parallelism and exceptional energy efficiency of biological DNA. This field is in initial stage so a lot of research has to be done yet. This paper analyzes the different approach on DNA Cryptography based on matrix manipulation and secure key generation scheme.
oai:ojs.www.ijseat.com:article/83
2014-08-23T03:06:42Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/83
2014-08-23T03:06:42Z
IJSEAT
Vol 2, No 7 (2014): July; 176-183
Low Complexity Reliability Based Message Passing Decoder Architecture For Non Binary LDPC Codes
Kranthi Kiran, Maddirala; Srinivasa Institute of Science And Technology, kadapa
mkranthi440@gmail.com
Karthik, G Venkata
2014-08-11 10:06:45
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/83
mkranthi440@gmail.com
en
Non-binary low-density parity-check (NB-LDPC) codes can achieve better error-correcting performance than their binary counterparts at the cost of higher decoding complexity when the codeword length is moderate. The recently developed iterative reliability-based majority-logic NB-LDPC decoding has better performance complexity tradeoffs than previous algorithms. This paper first proposes enhancement schemes to the iterative hard reliability-based majority-logic decoding (IHRB-MLGD). Compared to the IHRB algorithm, our enhanced (E)-IHRB algorithm can achieve significant coding gain with small hardware overhead. Then low-complexity partial-parallel NB-LDPC decoder architectures are developed based on these two algorithms. Moreover, novel schemes are developed to keep a small proportion of messages in order to reduce the memory requirement without causing noticeable performance loss. In addition, a shift-message structure is proposed by using memories concatenated with variable node units to enable efficient partial-parallel decoding for cyclic NB-LDPC codes. our proposed decoders have at least tens of times lower complexity with moderate coding gain loss.
oai:ojs.www.ijseat.com:article/84
2014-08-23T03:06:43Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/84
2014-08-23T03:06:43Z
IJSEAT
Vol 2, No 7 (2014): July; 184-190
Automation System to Control the Movement of the Inlet Conveyor to the Boiler Furnace and the Exhaust Draft
Harish, Pulluri; Department of Power Plant Engineering and Energy Management
Turbo Machinery Institute of Science and Technology
Goutham, V.
Nagaraju, M.
2014-08-11 10:08:31
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/84
automation, material wastage, wireless demand.
en
Records the particular commercial parameter similar to temp, wetness, and communicates the idea in order to pc, in the event that any kind of these valuations will not be throughout restriction next pc communicates wireless demand to be able to management the idea. Industrial Control Systems are typically used in industries such as electrical, water, oil, gas and data. Based on information received from remote stations, automated or operator-driven supervisory commands can be pushed to remote station control devices, which are often referred to as field devices. Field devices control local operations such as opening and closing valves and breakers, collecting data from sensor systems, and monitoring the local environment for alarm conditions. In this project we made a prototype of such system. We use this automated system to manage the furl inlet of the thermal station and also the exhaust system to avoid material wastage
oai:ojs.www.ijseat.com:article/85
2014-08-23T03:06:43Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/85
2014-08-23T03:06:43Z
IJSEAT
Vol 2, No 7 (2014): July; 191-196
Investment Casting Of Torpedo Nozzle
Vishwanath, S.; Turbo Machinery Institute of Science and Technology
Mahatma Gandhi Institute of Technology,
Reddy, S.Moulali
Harish, Pulluri
2014-08-11 10:09:57
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/85
torpedo,investmentcasting,cm 247lc,inc 718
en
Investment Casting is also known as Lost Wax process. Investment casting process is generally used to produce intricate and complex shaped products. The primary objective of the project work is to produce Torpedo Nozzle by investment casting. Nozzles are manufactured by investment casting process consisting of wax injection, ceramic coating, wax removal, metal casting, and finishing. The creep strength of the product should be enhanced as we go to higher temperature application. Super Alloys (Ni-based) satisfy the above condition and are hence used for the production of components used at elevated temperatures. Earlier IN 718 was used in the manufacture of Torpedo nozzles by mechanical working and machining the alloy to obtain the final product. Machining of the nozzle was difficult as it involved intricate shape internally and also as found to be eroding during its service. This alloy also can not be used above 700°C because the strengthening precipitates will coarsen. Hence, we produced the nozzles by Investment Casting process, using CM 247 to overcome the limitations of IN 718. CM 247 can withstand higher temperatures (1000°C - 1100°C) and has better mechanical properties over IN 718. The focus of this experimental work was on the several stages of investment casting process and the microstructures were also studied.
oai:ojs.www.ijseat.com:article/86
2014-08-23T03:06:43Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/86
2014-08-23T03:06:43Z
IJSEAT
Vol 2, No 7 (2014): July; 197-200
Biometric System Based Electronic Voting Machine with security algorithm and password protection on ARM Microcontroller and GSM
Venkateswarlu, Muni; Assistant professor,
QIS institute of technology. Ongole
kumar, Y.V.Vijay
2014-08-11 10:11:39
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/86
e- voting, DRE, counting ballots
en
Electronic voting meant for casting vote and counting votes electronically. This voting technology include punch cards, optical scan voting systems and Direct-recording electronic (DRE) voting systems. It can also involve transmission of ballots and votes via telephones, private computer networks, or the Internet. Electronic voting systems has much more advantages compared to other voting techniques. An electronic voting system can be involved in any one of a number of steps in the setup, distributing, voting, collecting, and counting of ballots, and thus may or may not introduce advantages into any of these steps. The main aim of this project is develop a Electronic Voting Machine with maximum security facilities.
oai:ojs.www.ijseat.com:article/88
2014-08-23T03:06:43Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/88
2014-08-23T03:06:43Z
IJSEAT
Vol 2, No 7 (2014): July; 201-208
Design And Analysis Of Machining (Hydraulic) Fixture For AVTEC Transmission Case Component
Reddy, S.D.V.V.S.B.; Prasiddha College of Engineering & Tech
Anathavaram, Amalapuram
Reddy, P. Satish
Subrahmanyam, V
2014-08-23 03:04:40
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/88
jigs, fixture, Design,Ansys
en
In order to have interchangeable parts in mass production, jigs and fixtures play a vital role in manufacturing process. A fixture is a special tool designed for specific purpose and for specific component for operation. The present work deals with the design of machining fixture for milling and drilling operations for a crank case. The cutting forces involved in the operations are taken into consideration for designing the fixture. The present fixture designed is hydraulic operated and used for operation like face milling, drilling, Tapping, Rough &Finish Boring of the crank case. Design standards are taken from Makino for designing this machining fixture. In the design process based on the geometry of the component to be machined, the machine, the table layout and corresponding clamping slot positions are then selected. Since the final component cannot be produced by a single operation it is necessary to plan for various operations to get the final shape. The fixture is then designed by considering all the clamping forces from various cutting operations.
oai:ojs.www.ijseat.com:article/89
2014-08-23T03:06:43Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/89
2014-08-23T03:06:43Z
IJSEAT
Vol 2, No 7 (2014): July; 209-214
3D Modelling & Detailing of Silumin Piston With Static Analysis
Paluri, Vijay Kumar
Reddy, P Satish
2014-08-23 03:06:25
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/89
Components, Silumin, Design, Analysis
en
Piston is the part of engine which converts heat and pressure energy liberated by fuel combustion into mechanical work. Engine piston is the most complex component among the automotives. Weight reduction has been gaining importance in automobile field because reducing in weight decreases load on the engine. As we all Know that Piston is made of Aluminium Alloy Such that its weight is less. The automobile industry has shown increased interest in replacing the Piston with the material having high strength to weight ratio. Therefore the objective of this project is to present a general study on the performance comparison of Silumin Piston and Aluminium Alloy Piston. Dimensions and specifications used in modelling are collected from the actual Piston of Hero-Honda Splendor Bike. The analysis is carried out in the commercially available software Solid Works
oai:ojs.www.ijseat.com:article/94
2014-09-22T18:46:31Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/94
2014-09-22T18:46:31Z
IJSEAT
Vol 2, No 8 (2014): August; 215-219
Haze-Assisted Confidentiality Conserving Mobile Health Monitoring
Reddy, R Konda; Department of CSE,PBR Visvodaya Institute Of Technology & Science,Kavali
Subramanyam, Aluru
2014-08-27 10:16:47
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/94
Mobile health (mHealth), Healthcare,Confidentiality, Outsourcing decryption, Key private Proxy re encryption.
en
Haze-assisted mobile health (mHealth) monitoring, which applies the prevailing mobile communications and Haze computing technologies to provide feedback decision support, has been considered as a revolutionary approach to improving the quality of healthcare service while lowering the healthcare cost. Unfortunately, it also poses a serious risk on both clients Confidentiality and intellectual property of monitoring service providers, which could deter the wide adoption of mHealth technology. This paper is to address this important problem and design a Hazeassisted Confidentiality Conserving mobile health monitoring system to protect the Confidentiality of the involved parties and their data. Moreover, the outsourcing decryption technique and a newly proposed key private proxy re-encryption are adapted to shift the computational complexity of the involved parties to the Haze without compromising clients’ Confidentiality and service providers’ intellectual property. Finally, our security and performance analysis demonstrates the effectiveness of our proposed design.
oai:ojs.www.ijseat.com:article/95
2014-09-22T18:46:31Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/95
2014-09-22T18:46:31Z
IJSEAT
Vol 2, No 8 (2014): August; 220-222
Easing Operative User Steering through Website Construction Development
Reddy, R Konda; Department of CSE,PBR Visvodaya Institute Of Technology & Science,Kavali
Balakrishna, Konduru
2014-08-27 10:24:48
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/95
Website design, user Steering, web mining, mathematical programming
en
Designing well-Construction websites to facilitate Operative user Steering has long been a challenge. A primary reason is that the web developers’ understanding of how a website should be Construction can be considerably different from that of the users. While various methods have been proposed to re link web pages to improve navigability using user Steering data, the completely reorganized new Construction can be highly unpredictable, and the cost of disorienting users after the changes remains unanalyzed. This paper addresses how to improve a website without introducing substantial changes. Specifically, we propose a mathematical programming model to improve the user Steering on a website while minimizing alterations to its current Construction. Results from extensive tests conducted on a publicly available real data set indicate that our model not only significantly improves the user Steering with very few changes, but also can be Operatively solved. We have also tested the model on large synthetic data sets to demonstrate that it scales up very well. In addition, we define two evaluation metrics and use them to assess the performance of the improved website using the real data set. Evaluation results confirm that the user Steering on the improved Construction is indeed greatly enhanced. More interestingly, we find that heavily disoriented users are more likely to benefit from the improved Construction than the less disoriented users.
oai:ojs.www.ijseat.com:article/96
2014-09-22T18:46:31Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/96
2014-09-22T18:46:31Z
IJSEAT
Vol 2, No 8 (2014): August; 223-227
A Load Harmonizing Standard Based On Cloud Segregating For The Public Cloud
Reddy, D. Srujan Chandra
Nishitha, Kandagadla
2014-08-27 18:55:32
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/96
load Harmonizing Standard; public cloud; cloud partition; game theory
en
Concept of Harmonizing Load in cloud computing has an important effect on the performance. A cloudcomputing system which does not use load Harmonizing has numerous drawbacks. Now-a-days the usage of internet and related resources has increased widely. Due to this there is tremendous increase in workload. So there is uneven distribution of this workload which results in server overloading and may crash. In such systems the resources are not optimally used. Due to this the performance degrades and efficiency reduces. Cloud computing is made more efficient by better load Harmonizing methods. User satisfaction also improves. This paper introduces a better load Harmonizing Standard for the public cloud based on the cloud Segregating concept. A switch mechanism is introduced here to choose different strategies for different situations. The public cloud is divided into cloud partitions and different strategies are applied to balance the load on clouds. This paper introduces a system which has main controller, balancers and servers. The main controller selects the appropriate balancer for a particular job. The balancer further selects the server having minimum load. Hence, this system will help dynamically allocate jobs (data) to the least loaded server which will result in an efficiently balanced cloud system.
oai:ojs.www.ijseat.com:article/97
2014-09-22T18:46:31Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/97
2014-09-22T18:46:31Z
IJSEAT
Vol 2, No 8 (2014): August; 228-234
Confidentiality-Conserving Community Auditing For Protected Haze Storing
Reddy, D. Srujan Chandra
Venkaiah, Kareti
2014-08-27 23:04:21
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/97
Data Storing, Confidentiality-Conserving, Community auditability, cryptographic protocols, Haze computing ,independent resource pooling, rapid resource
en
Using Haze Storing, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data Storing and maintenance. However, the fact that users no longer have physical possession of the outsourced data makes the data integrity protection in Haze Computing a formidable task, especially for users with constrained computing resources. Moreover, users should be able to just use the Haze Storing as if it is local, without worrying about the need to verify its integrity. Thus, enabling Community auditability for Haze Storing is of critical importance so that users can resort to a third party auditor (TPA) to check the integrity of outsourced data and be worry-free. To Protectedly introduce an effective TPA, the auditing process should bring in no new vulnerabilities towards user data Confidentiality, and introduce no additional online burden to user. In this paper, we propose a Protected Haze Storing system supporting Confidentiality-Conserving Community auditing. We further extend our result to enable the TPA to perform audits for multiple users simultaneously and efficiently. Extensive security and performance analysis show the proposed schemes are provably Protected and highly efficient
oai:ojs.www.ijseat.com:article/98
2014-09-22T18:46:31Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/98
2014-09-22T18:46:31Z
IJSEAT
Vol 2, No 8 (2014): August; 235-238
Gusts of Alteration From Hawker To Meta Cloud
Reddy, N.Srinath
Sudhakar, G
2014-08-28 00:03:52
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/98
meta cloud, gusts, data lock in
en
The emergence of yet more cloud offerings from a multitude of service providers calls for a meta cloud to smoothen the edges of the jagged cloud landscape. This meta cloud could solve the vendor lock-in problems that current public and hybrid cloud users face. The cloud computing paradigm has achieved widespread adoption in recent years. Its success is due largely to customers’ ability to use services on demand with a pay-as-you go pricing model, which has proved convenient in many respects. Low costs and high flexibility make migrating to the cloud compelling. Despite its obvious advantages, however, many companies hesitate to “move to the cloud,” mainly because of concerns related to service availability, data lock-in, and legal uncertainties. Lock in is particularly problematic. For one thing, even though public cloud availability is generally high, outages still occur. Businesses locked into such a cloud are essentially at a standstill until the cloud is back online.
oai:ojs.www.ijseat.com:article/99
2014-09-22T18:46:31Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/99
2014-09-22T18:46:31Z
IJSEAT
Vol 2, No 8 (2014): August; 239-245
Secrecy Stabilizing for Cloud Storage With Assessing Of Third Party
Ramana, K Venkata; Department Of CSE,GOKULA KRISHNA COLLEGE OF ENGINEERING & TECHNOLOGY,SULLURPET
Harsha, Murram Sree
2014-09-05 00:21:27
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/99
Data storage, privacy-preserving, public auditability, cryptographic protocols, cloud computing
en
Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the outsourced data makes the data integrity protection in Cloud Computing a formidable task, especially for users with constrained computing resources. Moreover, users should be able to just use the cloud storage as if it is local, without worrying about the need to verify its integrity. Thus, enabling public auditability for cloud storage is of critical importance so that users can resort to a third party auditor (TPA) to check the integrity of outsourced data and be worry-free. To securely introduce an effective TPA, the auditing process should bring in no new vulnerabilities towards user data privacy, and introduce no additional online burden to user. In this paper, we propose a secure cloud storage system supporting privacy-preserving public auditing. We further extend our result to enable the TPA to perform audits for multiple users simultaneously and efficiently. Extensive security and performance analysis show the proposed schemes are provably secure and highly efficient.
oai:ojs.www.ijseat.com:article/100
2014-09-22T18:46:31Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/100
2014-09-22T18:46:31Z
IJSEAT
Vol 2, No 8 (2014): August; 246-252
Modeling And Biomechanical Analysis Of Human Knee Joint
Kumar, V Jeevan
Reddy, P Satish
Murthy, N Guru
2014-09-05 04:02:12
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/100
Knee Joint, Mechanical Behavior, Design, Analysis, Solid Works
en
The main objective of the present work is to implement the computer aided technology to study the biomechanical behavior of human knee joint which consists of Femur, Tibia, Patella, Menisci, Posterior Cruciate Ligament (PCL), Anterior Cruciate Ligament (ACL), Medial Collateral Ligament (MCL), and Lateral Collateral Ligament (LCL). Three-Dimensional (3D) model of knee joint was created. The Mechanical properties like young’s modules, Poisson’s ratio of the human bones will vary from person to person, in general according to age, weight, gender, and feeding habits. We considered for this work to create a 3D model using cadaver bones of male 30years old, 1.70m tall, and weight was 66kg.which is collected from Anatomy Department of SRM Medical College and Research Institute, Kattankulathur. The individual bones femur, tibia and patella are modeled using Solid Works. The biomechanical behavior of individual bone, assembly model and flexion angles under varying loading conditions are studied.
oai:ojs.www.ijseat.com:article/101
2014-09-22T18:46:31Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/101
2014-09-22T18:46:31Z
IJSEAT
Vol 2, No 8 (2014): August; 253-262
Performance Analysis of PV Standalone System with High-Power DC–DC Converter Application to Induction Machine Drive
Johny Begam, Shaik A
Jyothi, G.
2014-09-05 04:06:52
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/101
DC-DC converter, Zero-voltage switching, average and rms device currents, High power density, Soft-switching operation, Galvanic isolation.
en
This paper presents a steady-state analysis of the bidirectional dual active bridge (DAB) dc–dc converter. This paper also presents the analysis of zero-voltage switching (ZVS) boundaries for buck and boost modes while considering the effect of snubber capacitors on the DAB converter is also presented. This is the new model for producing the equations for average and rms device currents. The proposed model can be used to predict the converter efficiency at any desired operating point. The proposed model was built for an aerospace energy storage application. The results obtained from the model under various voltages, currents and power transients verify converter operation and validate the proposed controller performance during bidirectional power transfer. Finally in this project the proposed converter is applied for standalone PVcell applications. The simulations results are carried by using MATLAB/SIMULINK SOFTWARE.
oai:ojs.www.ijseat.com:article/102
2014-09-22T18:46:31Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/102
2014-09-22T18:46:31Z
IJSEAT
Vol 2, No 8 (2014): August; 263-267
Genetically Optimized Pre coders Transceiver Design for Double STBC System
Satyanarayana, K.N.V.
Mohan, D.V.R.
Kumar, B.H.K.Bhagat
2014-09-06 04:04:54
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/102
Orthogonal space-time block coding (OSTBC), dirty paper coding (DPC), Tomlinson-Harashima precoding (THP), peak-to-average power ratio (PAPR), maximum likelihood decision (MLD)
en
Wireless communications depends on multiple-input-multiple-output (MIMO) techniques for high data rates. Feedback of channel information can be used in pre-coding to use the strongest channel mode and improve MIMO performance. The DPC system is interference free on multi-user or multi-antenna. The STBC transceiver can provide the transmit diversity. Due to the benefits about the STBC and DPC system, we propose a new scheme called STBC-DPC system. The transceiver design involves the following procedures. First, the ordering QR decomposition of channel matrix and the maximum likelihood (ML) one-dimensional searching algorithm are proposed to acquire a reliable performance. Next, the channel on/off assignment using water filling algorithm is proposed to overcome the deep fading channel problem. Finally, the STBC-DPC system with the modulus operation to limit the transmit signal level, i.e., Tomlinson-Harashima precoding (THP) scheme, is proposed to retain low peak-to-average power ratio (PAPR) performance. Simulation results confirm that the proposed STBC-DPC/THP with water filling ML algorithm can provide the low PAPR and excellent bit error rate (BER) performances.
oai:ojs.www.ijseat.com:article/103
2014-09-22T18:46:31Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/103
2014-09-22T18:46:31Z
IJSEAT
Vol 2, No 8 (2014): August; 268-275
A Simplified Space -Vector Pwm For Three Level Inverters Applied To Passive And Motor Load
Dusari, Abhinav
Ram, T Bhargav
2014-09-16 03:58:58
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/103
en
Increase in renewable energy resources like solar , fuel cells had created a need for inverters which can work on higher operating voltages efficiently Advances in power electronics technology allowed the vide investigation of multilevel converters that provide high safety voltages ,less harmonic components ,utilization of more input voltage and flexibility in switching the legs compared to the two-level structures .and digital implementation is also very easy .In multilevel inverters space vector modulation (SVPWM) has become the most popular technique for three phase voltage source converters for the control of ac/dc drives and Flexible ac transmission application(FACT) controllers. In this paper a simplified SVPWM is being implemented . SVPWM for more than two levels is difficult because for them no. Of switching states is very high. In simplified SVPWM timing calculation is required for only one sector and therefore calculations are tremendously reduced and the same could be applied to different types of multilevel inverters like flying capacitor and cascaded h bridge. By using simplified SVPWM a passive RL load and motor load are being simulated in the MATLAB/SIMULINK.
oai:ojs.www.ijseat.com:article/104
2014-09-22T18:46:31Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/104
2014-09-22T18:46:31Z
IJSEAT
Vol 2, No 8 (2014): August; 276-279
Data Protection as a service in Cloud
Ashok, Yemineni
Bhargav, J.
2014-09-16 04:01:31
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/104
en
Cloud computing enable highly scalable services to be easily consumed over the internet as and when needed. A major feature of the cloud services is that users’ data are usually processed remotely in unknown machines that users do not own or operate. Providing a strong data protection to cloud users while enabling rich applications is a challenging task. We explore a new cloud platform architecture called Data Protection as a Service, which dramatically reduces the per-application development effort required to offer data protection, while still allowing rapid development and maintenance.
oai:ojs.www.ijseat.com:article/105
2014-09-22T18:46:31Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/105
2014-09-22T18:46:31Z
IJSEAT
Vol 2, No 8 (2014): August; 280-285
Wireless sensor networks for civil structure health monitoring using GPS and GSM module
Sridhar, B.S Sai
Javeed Mehdi, Md.
2014-09-20 21:01:26
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/105
Structure monitoring, wireless sensor networks, damage detection, GPS, GSM.
en
A structural health monitoring system has become an important research problem which has the potential to monitor and ensure the performance and safety of civil structures. The SHM system is designed, implemented, and tested using Wireless Sensor Networks (WSN). Structural Health monitoring system is the implementation of improving the maintenance of any structures like buildings and bridges. It encompasses damage detection and identification of structures from natural disasters like earth quake, fire breakouts and gas leakage threats etc . This project mainly consists of four sensors, depending on the type of damage the input from the corresponding sensor is transmitted to the ARM-7 microcontroller the GPS module receives the sensor input value and transmits it through GSM module in the form of an message to the user’s mobile phone to alert the user.
oai:ojs.www.ijseat.com:article/106
2014-09-22T18:46:31Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/106
2014-09-22T18:46:31Z
IJSEAT
Vol 2, No 8 (2014): August; 286-291
Automatic Measuring And Recompense System For Monitoring Health Management Process For Automobiles
Nakirikanti, Pavan Kumar
Valiveti, Hima Bindu
2014-09-22 18:45:53
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/106
en
In this projected project work, numerous physical systems detector readings will be measured and by standardization different system performs will be foreseeable. The project uses to ARM core with a will bus communication. From the engine half ARM core, the detector readings are unendingly transmitted to the dash board half ARM core. In dash board, the brink comparisons are done and detector failure also can be known. Victimization reserve and also the engine speed, we expected distance to that the vehicle will go. If any hardware system is failing within the vehicle means that, by load current we will establish the fault. . The dash board show provides hassle shooting info to the user. By this project work we will maintain the health of Associate in Nursing automobile system to increase level.
oai:ojs.www.ijseat.com:article/108
2014-10-20T22:07:41Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/108
2014-10-20T22:07:41Z
IJSEAT
Vol 2, No 9 (2014): September; 292-296
Contribution Of Information Sharing In Wireless Sensor Network With Prune Delay
Sastry N, Jacob
Rao .G, Anantha
2014-10-05 21:34:32
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/108
peer-to-peer, store-carry-forward, discover predict-deliver, interaction, recommendation.
en
: The increase in the number of smart phone users has lead to the increase in the peer-to-peer adhoc content sharing. Traditional data delivery schemes are not suitable for such networks due to intermittent connectivity between smart phones. Thus new content sharing mechanisms should be proposed. To share the contents in such a scenario, researchers have proposed store-carry-forward as an efficient content sharing scheme where a node stores a message and carries it for certain duration until a communication opportunity arises and then delivers it to the destination. Previous works in this field focused on whether two nodes would encounter each other and the place and time of encounter and did not consider the activities of malicious peers. This paper proposes discover-predict-deliver as efficient content sharing scheme that enable peers to share contents and also presents distributed algorithms that enable a peer to reason about trustworthiness of other peers based on past interactions and recommendations. Interactions and recommendations among peers are evaluated based on importance, recentness and peer satisfaction parameters.
oai:ojs.www.ijseat.com:article/107
2014-10-20T22:07:41Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/107
2014-10-20T22:07:41Z
IJSEAT
Vol 2, No 9 (2014): September; 297-301
Quantify and Examined of video distribution sites for appreciative links
Sravani, Devaki
Rao .G, Anantha
2014-10-05 21:40:28
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/107
en
Videos are an integral part of current information technologies and the snare. The demand for efficient retrieval rises with the increasing number of videos, which is equally true for video annotation techniques as matadata is the primary source of most retrieval systems. - Recently, many video distribution sites provide external links so that their video or audio contents can be embedded into external snare sites. Online social networks (OSNs) have become popular desti- nations for connecting friends and distribution information. Recent statistics suggest that OSN users regularly share con-tents from video sites, and a significant amount of requests of the video sites are indeed from them nowadays. These behaviors have substantially changed the workload of on line video services.In this paper, we provide a comprehensive quantify study and examined source on these external links to answer these two questions. With the traces together from two major video distribution sites, YouTube and Youku of China, we show that the external links have various impacts on the popularity of the video distribution sites. The social video proposed system provides information that is directed and personalized for the user overriding the content rather than the point of view of the user posting the content. The tradeoff in our case being that users have to sacrifice privacy and have to trust the recommendation system provider with their private data.
oai:ojs.www.ijseat.com:article/109
2014-10-20T22:07:41Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/109
2014-10-20T22:07:41Z
IJSEAT
Vol 2, No 9 (2014): September; 302-305
Society Dissemination Based Propagation For Data Spreading In Mobiles Social Networks
Ayesha, Shaik Mohammad
Sultana, SK. Mubeena
2014-10-05 21:46:04
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/109
Mobile social networks, data dissemination, broadcasting, geography, community, acknowledgement.
en
In mobile ad hoc networks, nodes are dynamically changing their locations. MOBILE ad hoc networks (MANETs) consist of a collection of mobile nodes which can move freely. These nodes can be dynamically self-organized into arbitrary topology networks without a fixed infrastructure. A mobile ad hoc network consists of wireless hosts that may move often. Movement of hosts results in a change in routes, requiring some mechanism for determining new routes. Several routing protocols have already been proposed for ad hoc networks. MSNets can be viewed as a kind of socially aware Delay/ Disruption Tolerant Networks (DTNs). Thanks to the popularization of smart phones (e.g., iPhone, Nokia N95,and Blackberry), MSNets have begun to attract more attention. However, intermittent and uncertain network connectivity make data dissemination in MSNets a challenging problem. Broadcasting is the operation of sending data from a source user to all other users in the network. Most of the envisioned services (ranging from safety applications to traffic management) rely on broadcasting data to the users inside a certain area of interest. For example, location-based services (product prices, tourist points of interest, etc.) can be advertised from salesmen to near-by users. In this paper The objective is to broadcast data from a superuser to other users in the network. There are two main challenges under this paradigm, namely 1) how to represent and characterize user mobility in realistic MSNets; 2) given the knowledge of regular users' movements, how to design an efficient superuser route to broadcast data actively. We first explore several realistic data sets to reveal both geographic and social regularities of human mobility, and further propose the concepts of geocommunity and geocentrality into MSNet analysis.
oai:ojs.www.ijseat.com:article/110
2014-10-20T22:07:41Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/110
2014-10-20T22:07:41Z
IJSEAT
Vol 2, No 9 (2014): September; 306-310
Strewn Effective Hiding In Shared Wireless Networks
Havila, Kotari
Rajesh, A
2014-10-05 21:49:27
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/110
cooperative cache; cost-optimal policies; distributed search engines; selfish users
en
This paper introduces cooperative caching techniques for reducing electronic content provisioning cost in Social Wireless Networks (SWNET).SWNETs are formed by mobile devices, such as modern cell phones etc. sharing common takings in electronic content, and actually meeting together in public places. Electronic object caching in such SWNETs are shown to be able to reduce the content provisioning cost which depends heavily on the service and pricing dependences among various stakeholders including content providers (CP), network service providers, and End Consumers (EC).This paper develops practical network, service, and pricing models which are then used for creating two object caching strategies for reducing content provisioning costs in networks with homogenous and heterogeneous object demands. The paper develops analytical and simulation designs for analysing the proposed caching strategies in the presence of selfish users that deviate from network-wide costoptimal policies. It also reports results from an Android phone based prototype SWNET, validating the presented analytical and simulation results.
oai:ojs.www.ijseat.com:article/111
2014-10-20T22:07:41Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/111
2014-10-20T22:07:41Z
IJSEAT
Vol 2, No 9 (2014): September; 311-314
Sheltered Compound Vendor Data Apportioning For Vibrant Clusters In The Cloud
Rao, A Madhusudhana
Srinivas, O
2014-10-05 22:20:55
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/111
Cloud Computing, dynamic groups, data sharing, reliability, integrity, scalability, privacy-preserving
en
Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. Sharing data in a multiowner manner while preserving data and identity privacy from an untrusted cloud is still a challenging issue, due to the frequent change of the membership. To preserve data privacy, a basic solution is to encrypt data files, and then upload the encrypted data into the cloud. In this paper we are further extending the basic MONA by adding the reliability as well as improving the scalability by increasing the number of group managers dynamically. This paper proposes how user can access data after the time out. The storage overhead and encryption computation cost of our scheme are independent with the number of revoked users.
oai:ojs.www.ijseat.com:article/113
2014-10-20T22:07:41Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/113
2014-10-20T22:07:41Z
IJSEAT
Vol 2, No 9 (2014): September; 315-317
Peripatetic Shared TV Using Cloud
Tabitha, Kotari
Sultana, SK. Mubeena
2014-10-05 22:26:21
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/113
Scalable Video Coding, Adaptive Video Streaming, Computing
en
While demands on video traffic over Portable networks have been souring, the wireless link capacity cannot keep up with the traffic demand. The gap between the traffic demand and the link capacity, along with time-varying link conditions, results in poor service quality of video streaming over Portable networks such as long buffering time and intermittent disruptions. Leveraging the cloud computing technology, we propose a new Portable video streaming Structure, dubbed AMES-Cloud, which has two main parts: AMoV(adaptive Portable video streaming) and ESoV(efficient social video Distribution). AMoV and ESoV construct a private agent to provide video streaming services efficiently for each Portable user. For a given user, AMoV lets her private agent adaptively adjust her streaming flow with a scalable video coding technique based on the feedback of link quality. Likewise, ESoV monitors the social network interactions among Portable users, and their private agents try to prefetch video content in advance. We implement a prototype of the AMES-Cloud Structure to demonstrate its performance. It is shown that the private.
oai:ojs.www.ijseat.com:article/114
2014-10-20T22:07:41Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/114
2014-10-20T22:07:41Z
IJSEAT
Vol 2, No 9 (2014): September; 318-325
An Effective Utilization of Passive and Motor Loads By Using Three Level Inverter with Simplified Space Vector Modulation Technique
Dusari, Abhinav
Ram, T Bhargav
2014-10-05 22:52:04
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/114
en
Increase in renewable energy resources like solar , fuel cells had created a need for inverters which can work on higher operating voltages efficiently Advances in power electronics technology allowed the vide investigation of multilevel converters that provide high safety voltages ,less harmonic components ,utilization of more input voltage and flexibility in switching the legs compared to the two-level structures .and digital implementation is also very easy .In multilevel inverters space vector modulation (SVPWM) has become the most popular technique for three phase voltage source converters for the control of ac/dc drives and Flexible ac transmission application(FACT) controllers. In this paper a simplified SVPWM is being implemented. SVPWM for more than two levels is difficult because for them no. of switching states is very high. In simplified SVPWM timing calculation is required for only one sector and therefore calculations are tremendously reduced and the same could be applied to different types of multilevel inverters like flying capacitor and cascaded h bridge. By using simplified SVPWM a passive RL load and motor load are being simulated in the MATLAB/SIMULINK.
oai:ojs.www.ijseat.com:article/115
2014-10-20T22:07:41Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/115
2014-10-20T22:07:41Z
IJSEAT
Vol 2, No 9 (2014): September; 326-331
A Novel Control Strategy of PV Generation System with LPC for Loading Balance of Distribution Feeders
Anudeep, Bhatraj
Ram, T Bhargav
2014-10-05 23:19:55
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/115
en
To reduce the power loss and power flow over loading in a distribution system. Proper loading balance of distribution feeders is important. In this paper, a loop power controller (LPC) is applied for the control of real power and reactive power flows by adjusting voltage ratio and phase shift so that the loading balance of distribution feeders can be obtained. And also photovoltaic (PV) power generation is incorporated in balancing the feeder loading. For achieving the proper loading balance and load transfer line impedance of distribution feeders are used to derive the voltage ratio and phase shift of the LPC. Matlab simulations indicated that loading balance can be achieved in distribution feeders with large PV system installation by using loop power controllers according to the variation of solar energy and power loading of study feeders. By using LPC proper loading of feeders is being achieved and the power loss is being reduced as simulated in this paper.
oai:ojs.www.ijseat.com:article/116
2014-10-20T22:07:41Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/116
2014-10-20T22:07:41Z
IJSEAT
Vol 2, No 9 (2014): September; 332-341
Design and Simulation of Typical Island Systems Linked With Voltage Source Converter - HVDC Links
D, Goutham
L, Murali Krishna
2014-10-05 23:27:10
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/116
en
This paper proposes modeling and control of VSC-HVDC links connected to island systems. The recently proposed power-synchronization control for grid-connected voltage-source converters (VSCs) has been shown to be a feasible solution for high-voltage direct-current (HVDC) transmission connected to high-impedance weak ac systems. In this paper, power-synchronization control is investigated for VSC-HVDC links connected to another type of weak ac system, i.e., low-inertia or island systems. As an example, a linear model of a typical island system feeding by a VSC-HVDC link, including a synchronous generator, an induction motor, and some passive loads, is developed for tuning the control parameters of the VSC-HVDC link. Time simulations in MATLAB demonstrate that VSC-HVDC systems using power-synchronization control are flexible for various network conditions, such as large-ac-system connection, island systems, or passive networks.
oai:ojs.www.ijseat.com:article/118
2014-10-20T22:07:41Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/118
2014-10-20T22:07:41Z
IJSEAT
Vol 2, No 9 (2014): September; 342-352
A Voltage Oriented Control Method for PV - Grid Interfaced Inverter by Using Advanced MPPT Algorithm
T, Bhargav Ram
S, Hima Bindu
2014-10-05 23:28:37
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/118
en
The output power of PV module varies with module temperature, solar irradiation and loads. And in order to quickly and accurately track the sun, it is necessary to track the maximum power point (MPP) all the time. An improved maximum power point tracking (MPPT) with better performance based on voltage-oriented control (VOC) is proposed to solve a fast changing irradiation problem. In VOC, a cascaded control structure with an outer dc link voltage control loop and an inner current control loop is used. The MPPT controller is applied to the reference of the outer loop control dc voltage photovoltaic (PV). In this project, the main component of the single-stage grid connected PV system is the three-phase voltage source inverter (VSI). The voltage-oriented control (VOC) method used for VSI employs an outer dc link voltage control loop and an inner current control loop to achieve fast dynamic response. The performance of the power flow depends largely on the quality of the applied current control strategy. In this project, the current control has been implemented in a rotating synchronous reference frame d, q because the controller can eliminate a steady-state error and has fast transient response by decoupling control. The robust tracking capability under rapidly increasing and decreasing irradiance is verified in simulations. Simulation results on a large-scale grid-connected PV system show the effectiveness of the proposed control scheme in terms of delivering maximum power into the grid under variable conditions.
oai:ojs.www.ijseat.com:article/119
2014-10-20T22:07:41Z
ijseat:ART
v2
http://ijseat.com/index.php/ijseat/article/view/119
2014-10-20T22:07:41Z
IJSEAT
Vol 2, No 9 (2014): September; 353-363
Simulation of an Inverter-Based Dg System by Using Voltage Control of DC Link for Islanding Detection
Kumar, V praveen
2014-10-05 23:29:24
To The Editor-in-Chief, IJSEAT 2. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 3. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJSEAT, or his designated publisher. 4. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 5. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
url:http://ijseat.com/index.php/ijseat/article/view/119
en
This paper presents a novel strategy for islanding detection of distributed generation (DG). During islanding condition the main idea of this paper is to change the dc-link voltage considering the PCC voltage changes. A simple islanding detection scheme has been designed based on this idea. The proposed method has been studied under multiple-DG operation modes and the UL 1741 islanding tests. The simulations results are carried out in MATLAB/SIMULINK environment. The proposed method is capable of detecting islanding accurately within the minimum standard time and it has a small non detection zone as simulated in the paper
388c71873c58904873bd80c7c492b964