International Journal for Research in Applied Science and Engineering Technology (IJRASET)

International Journal for Research in Applied Science and Engineering Technology (IJRASET)

Basic info

  • Publisher: International Journal for Research in Applied Science and Engineering Technology (IJRASET)
  • Country of publisher: india
  • Date added to EuroPub: 2017/May/21

Subject and more

  • LCC Subject Category: Engineering, Applied Linguistics
  • Publisher's keywords: Applied Science, Engineering Technology
  • Language of fulltext: english
  • Full-text formats available: PDF

Publication charges

  • Article Processing Charges (APCs): Yes 50 USD
  • Submission charges: No
  • Waiver policy for charges? No

Editorial information

Open access & licensing

  • Type of License: CC BY-NC
  • License terms
  • Open Access Statement: Yes
  • Year open access content began: 2013
  • Does the author retain unrestricted copyright? False
  • Does the author retain publishing rights? False

Best practice polices

  • Permanent article identifier: DOI
  • Content digitally archived in: Nopolicy
  • Deposit policy registered in: None

This journal has '5163' articles

Study of Various Performance Parameters of Wire Electrical Discharge Machining For H11 Using Taguchi L16 Array

Study of Various Performance Parameters of Wire Electrical Discharge Machining For H11 Using Taguchi L16 Array

Authors: Harshdeep, Ishu Monga
( 19 downloads)
Abstract

The main goals of wire electrical discharge machine manufacturers and users are to achieve a better stability and high productivity of the process with desired accuracy and minimum surface damage and experimentally study the response of various input parameters like pulse on time, pulse off time, wire feed, wire tension and peak current on the performance parameters like material removal rate, surface flatness and wire wear ratio. In the present experimental work, Experiments were performed as per Taguchi’s L’16 mixed orthogonal array. All experiments were performed under different working conditions by changing the values of pulse on time, pulse off time, wire feed and wire tension, peak current. H11 steel grade was selected as a work material. The study concludes that the wire electrical discharge machining process parameters can be adjusted to achieve better metal removal rate, wire wear ratio and good surface flatness.

Keywords: WEDM, MRR, WRR, SF, Mean of Mean, Taguchi L16 OA, Zinc coated wire
Performance Metrics and Analysis for Node Clone Detection Schemes in Wireless Sensor Networks

Performance Metrics and Analysis for Node Clone Detection Schemes in Wireless Sensor Networks

Authors: K. Vijayalakshmi, Dr.P. Marikkannu
( 19 downloads)
Abstract

Wireless sensor networks are now-a-days rapidly developing in the field of science and technology. And it promises to have a large number of applications in next generation networks (NGN). The wireless sensor networks can be easily attacked from various sides and one of the serious attacks faced by the wireless sensor networks is the node clone attack. The node clone attack acts as the basic method to mount a huge insider attack. The cloned nodes must be detected in order to minimize the damages caused by them to the network. To protect the network from the clone attacks is to prevent an adversary from extracting the secret key materials from the captured node. Thus, various protocols were proposed to detect the cloned nodes in the network. To detect the cloned nodes from the network two existing protocols were addressed named as RM (randomized multicast) and XED (extremely efficient detection). In RM, each node broadcasts a location claim to its one-hop neighbors. Then, each neighbor selects randomly witness nodes within its communication range and forwards the location claim with a probability to the nodes closest to chosen locations by using geographic routing. At least one witness node is likely to receive conflicting location claims according to birthday paradox when replicated nodes exist in the network. The key idea of XED is to detect clones by providing the random numbers to the other nodes and asking for random number while meeting the node again. Thus, the cloned nodes will be detected by using the above mentioned protocols.

Keywords: Wireless, Networks
Multipath Routing Using Neuro Fuzzy in Wireless Sensor Network

Multipath Routing Using Neuro Fuzzy in Wireless Sensor Network

Authors: R.Pon Rohini, S. Shirly, D.C. Joy Winnie Wise
( 20 downloads)
Abstract

In this project, neuro fuzzy mulipath routing protocol around connectivity holes is developed. The neuro fuzzy multipath routing protocol is mainly used as a apparatus to sense and route around connectivity shacks. The neuro fuzzy first calculates all the possible routes and identifies is there is any holes in the routes.It also find multiple path without any holes.It routes the transmission in the best route without any holes in it, by rejecting the routes with the holes. It is an better energy effective protocol,which gives better presentation. Dynamic secret key is used to improve the security. It is used for secure connection.

Keywords: Neuro fuzzy, dynamic secret key, multipath routing, connectivity holes
Standardisation of Medical Images and Mimosa Model

Standardisation of Medical Images and Mimosa Model

Authors: Lalitha Lakshmi.C, Subha Ranjitha.S
( 20 downloads)
Abstract

This paper mainly deals with the standardisation of medical images and picture archiving and communication system (PACS). PACS manages the image related documents and reports. Though PACS made a huge revolution in the medical field it failed to satisfy the need of the medical community requirements. This was because PACS mainly focused on the technical solutions and little on the management of the image itself. To solve these problems, the only solution was modelling. This paved the way for the medical image management in an open system architecture (MIMOSA) model. Its contribution is explained in detail along with importance of PACS and need for standardisation in medical images. Emphasis is put on architectural issues and methodology of MIMOSA. This paper also deals with the relevance of the Digital Imaging and Communications in Medicine (DICOM) standard with respect to image management issues to be assessed, highlighting some current limitations of this standard and proposing extensions. Thus a survey on MIMOSA finally reveals that it can bring solutions to the standardisation of medical imaging.

Keywords: MIMOSA, PACS, and standardisation
Secure and Efficient Data Retrieval Using Attribute-Based Encryption in Distributed System

Secure and Efficient Data Retrieval Using Attribute-Based Encryption in Distributed System

Authors: Mandar Parande, Manoj Shukla, Jay Patel, Prof.Vijaya Sagvekar
( 19 downloads)
Abstract

Attribute-based encryption (ABE) is a public-key based one-to-many encryption that allows users to encrypt and decrypt data based on user attributes. A promising application of ABE is flexible access control of encrypted data stored in the distributed system, using access polices and ascribed attributes associated with private keys and cipher text. One of the main efficiency drawbacks of the existing ABE schemes is that decryption involves expensive pairing operations and the number of such operations grows with the complexity of the access policy. To overcome this drawback we have proposed a method in which we will provide rich expressiveness of index terms by exploiting ABE, thus providing data security. The data will be stored in the form of trie structure, which will reduce the search complexity and will support one upload many download feature because of use of attribute based encryption.

Keywords: CipherText,Encyrption,Cryptography
Simulation and Analysis of Microstrip Patch Antenna Using AN-SOF Professional

Simulation and Analysis of Microstrip Patch Antenna Using AN-SOF Professional

Authors: Puthanial. M, Shubhashini. R, Pavithra. K, Priyanka Raghu, Dr. P.C.Kishore Raja
( 20 downloads)
Abstract

In this modern era, the development in wireless technology has caused a drastic change in size and weight of antenna used for communication. This paper shows the simulation of Microstrip patch antenna using AN-SOF PROFESSIONAL VERSION 3.5 software. After the simulation process, by analyzing the performance, the simulation results show that the antenna has provided a considerable gain of 5.61d Bi with better efficiency at a frequency 2.4GHZ that can be used for wireless communication.

Keywords: Microstrip Patch antenna, AN-SOF Professional, Gain, Wireless Communication
Wind Energy Power System Simulation for a Remote Area Power Supply

Wind Energy Power System Simulation for a Remote Area Power Supply

Authors: K. Sathish Kumar, Prof. P. Pradeepa
( 19 downloads)
Abstract

This work focuses on the designing and analysis of a wind energy power system for a Remote Area Power Supply (RAPS). The system introduces a three phase ac-ac converter with an isolated high frequency-link for a wind energy conversion system. The galvanic isolation is provided by the HF transformer. The transformer is having the magnetizing inductance which improves power transfer capability. The capacitors are designed on both sides of the transformer to realize ZVS for semiconductor devices and in addition to that it gives passive clamping. The design provides a reduced switch count in order to reduce the losses. The power flow is bi-directional and thus power-flow can be reversed. The operation of the three phase ac-ac converter is explained in eight modes of operation. The performance of the system is analysed using MATLAB/ SIMULINK environment.

Keywords: Wind energy power system, ZVS, HF transformer, Remote Area Power System, RB-IGBT
An Implemented approach of VANET using Location Information based Technique for safe city and vehicle

An Implemented approach of VANET using Location Information based Technique for safe city and vehicle

Authors: Aanchal Walia, Pushparaj Pal
( 18 downloads)
Abstract

VANET is an important technique that provides communication between vehicles over the wireless link. There are many protocol proposed for VANET that provide many type of the services to the network but they cannot provide service according to location of the vehicle for packet forwarding. This paper proposed Location information based routing technique that provide better path according to vehicle location when a vehicle meets accident on the path. This protocol broadcast the information packet in which direction that path go to the city or vehicle near by the city or control room of the city to provide quick response for the accidental vehicle. This protocol reduce flooding of the packet over the network and provide efficient path to get better and quick service required by the accidental vehicle.

Keywords: VANET, MANETs, AODV, Neighbour, HLAR, GPS
A Novel Proposed Approach to find an Optimal Path in DSR

A Novel Proposed Approach to find an Optimal Path in DSR

Authors: Arashdeep Singh, Pushparaj Pal, Sachin Gupta, Harbhinder Singh
( 17 downloads)
Abstract

Mobile Ad-hoc Network (MANET) is a collection of independent mobile nodes that can communicate with each other via radio waves. The mobile nodes that are in radio range of each other can directly communicate, whereas others need the aid of intermediate nodes to route their packets in multi-hop fashion. MANETs are used in disaster recovery, rescue operations, military communication and many other applications. In multi-hop wireless ad hoc networks, designing energy-efficient routing protocols is critical since nodes have very limited energy, computing power and communication capabilities. Existing on-demand ad hoc network routing protocols continue using a route until a link breaks. Dynamic Source Routing (DSR) protocol provide better path from source to destination but it does not consider the quality of the path. Due to lake of quality like available bandwidth and power path break during the transmission. In this paper, we use bandwidth and hop count as quality factor of the path to reduce the path brake during transmission.

Keywords: DSR, Optimal Path
slugEmphysema Detection usingRegion Growing based Active Contour ModelSegmentation

slugEmphysema Detection usingRegion Growing based Active Contour ModelSegmentation

Authors: R.Ambiga, C.M.Sujatha
( 18 downloads)
Abstract

Emphysema has large prevalence rate and remain as a healthcare challenge worldwide . Computer Aided Diagnosis (CAD) has become a major research interest in diagnostic radiology and medical imaging diagnostics. The basic goal of CAD is to provide a computer output as a second opinion to assist the technicians by reducingimage interpretation timeand improving diagnostic accuracy. In this work region growing based active contour segmentation technique is attempted for e xtracting the lung parenchyma in the CT lung images in order to detect emphysema . The active contour method provide s an effective way for segmentation, in which the boundaries of the objects are detected by evolving curves. In this work region growing output image is used as the mask for the active contour model and then texture features are extracted and the extracted features are classified using Extreme learning Machine classifier. Result shows that the automated method can detect emphysema efficiently.

Keywords: Emphysema, Region Growing, Active Contour Model, ELM Classifier
slugClustering of Answers of Keyword Search on Graph

slugClustering of Answers of Keyword Search on Graph

Authors: Jyoti Devi, Vinod Saroha
( 17 downloads)
Abstract

Keyword search on graph data returns answers that are represented as a set of tree structures. These are referred as answer - trees. It was observed that when following exhaustive breadth - first search strategy many answers of a user search are found to have the common set of keyword - nod es and the root - node, but the paths to root - node from keyword nodes are different. Often thousands of answers get generated with the same set of keyword - nodes and the root - node. However there exist various kinds of similarities in the result trees. The pap er present various techniques to cluster the trees which unable efficient analysis of the results and one can drive interesting relationships among the answers.

Keywords: keyword search, hashing, tree clustering, tree edit distance.
slugAloe-Vera: A Green Corrosion Inhibitor

slugAloe-Vera: A Green Corrosion Inhibitor

Authors: Pallav Shah, Shruti Agarwal
( 18 downloads)
Abstract

Corrosion is a major problem in industries so corrosion control is technically, economically and aesthetically important. Corrosion inhibitors provide protection to metals and alloy against corrosion, but organic inhibitors are toxic in nature whereas green inhibitors are biodegradable and no toxic compound are promoted, they are inex pensive, readily available and are renewable. The paper discusses the effect of aloe - vera as green inhibitor on Galvanised iron in HCl and H 2 SO 4 solution. The paper also compares the result in two solutions.

Keywords: Corrosion inhibitor s, HCl , H 2 SO 4 , Aloe - V era , Biodegrable , Galvanised Iron.
slugA Review of Automatic License Plate Detection Using Edge Detection Methods

slugA Review of Automatic License Plate Detection Using Edge Detection Methods

Authors: THOMAS K T, VAIJAYANTHIMALA J
( 18 downloads)
Abstract

Vehicle plate recognition is a valuable image processing system employed for detecting and recognizing license plates thereby categorizing and identifying vehicles. Of late several researchers around the globe have initiated exploring license plate recogni tion using various methods. ALPR - Automatic License Plate Recognition systems have become a central part in various security and traffic management systems across various countries. Automatic toll management, Speed control and access control etc are some a reas where ALPR is found very successful. In this paper we are comparing three popular methods suggested for vehicle license plate detection (LPD algorithms).The key focal point of these schemes is on proposing a non complex yet robus t solution to get to t he bottom of the common issues in license plate recognition. Edge detection methods are popularly used in license plate detection algorithms. In this paper we are presenting a review of mechanisms using Canny operator, Sobel Operator and a comparatively ne w algorithm called VEDA - Vertical Edge detection Algorithm.

Keywords: Image Processing, Edge Detection, License Plate Detection, License Plate Recognition.
slugA Survey on Image Retargeting Techniques

slugA Survey on Image Retargeting Techniques

Authors: Libsy Ann Merin Baby
( 18 downloads)
Abstract

The technique of adapting images to display devices with various as pect ratios and sizes is called image retargeting. The key requirement behind content aware retargeting is to minimize visual distortion. Several i mage retargeting techniques have been developed to fit images to devices of different sizes. This work review s different techniques for content aware retargeting i.e. , retargeting an image while taking its content into consideration to preserve important regions and minimize distortions . Only selected works are included in the survey. The advantages and disadvant ages of the different techniques are also included.

Keywords: Image retargeting, mesh, salient object, patch
slugStudy of Multicast Key Distribution with Reduced Method

slugStudy of Multicast Key Distribution with Reduced Method

Authors: Sarita K. Tiwari, Jayant P. Mehare
( 18 downloads)
Abstract

many emerging web and Internet applications are based on a group communications model. Thus, securing group communications is an important Internet design issue. The Key Distribution is major problem of communication and network security. Group communication can benefit from IP multicast to achieve scalable exchange of messages. However, there is a challenge of effectively controlling access to the transmitted data. IP multicast by itself does not provide any mechanisms for preventing no group members to have access to the group communication. In this paper, we present new method for making scheme for efficient computation. In which we include MDS code which is related to the problem of efficient information updates. We also include the efficient re - keying of large groups with dynamic membership: minimizing the overall time it takes for the key server and the group members to process the re - keying message. Specifically, we concentrate on re - keying algorithms and minimize the longest sequence of encryptions and decryptions that need to be done in a re - key ing operation, then we provide an optimal schedule of re - keying messages. We propose a new scheme for a scalable multicast key distribution scheme. It focuses explicitly on the issue of snowballing member removal and presents an algorithm that minimizes the number of messages required to distribute new keys to the remaining group members

Keywords: MDS Algorithm, Rekeying Multicasting, Group Key Management, Key tree, Group Controller, Complexit

About Europub

EuroPub is a comprehensive, multipurpose database covering scholarly literature, with indexed records from active, authoritative journals, and indexes articles from journals all over the world. The result is an exhaustive database that assists research in every field. Easy access to a vast database at one place, reduces searching and data reviewing time considerably and helps authors in preparing new articles to a great extent. EuroPub aims at increasing the visibility of open access scholarly journals, thereby promoting their increased usage and impact.