T R A C K       P A P E R

Login Panel

Close tab

Password Meter

Volume 2 Issue 6 (June 2015)

S.No. Title & Authors Page No View
1

Title : HMI Architecture and Bluetooth Phonebook Design in Car Infotainment

Authors : Archana Bhat

Click Here For Abstract

Download Certificate
Abstract :

Abstract— Mobile devices are today a crucial part in many people’s lives. Whether its accessing emails, streaming music or managing contacts - such scenarios are now expected to be fully accessible and functional in automotive environ­ments. The automotive industry is a steadily growing market for Bluetooth technology, with Bluetooth enabled hands-free calling systems now included as standard equipment on millions of new cars and trucks. Safety concerns and new hands-free driving laws spurred the explosion in hands-free calling systems. Any driver doesn’t want to fiddle with his phone while driving, so you need some way to get the names and numbers of your contacts from the phone into your car's infotainment system where they can be safely browsed or used in voice commands. Phone Book Access Profile (PBAP) gives your car's hands-free system access to your phone's address book for syncing. To access the phone book, HMI (Human Machine Interface) is used as the car display in the head unit. This paper explains about the architecture of HMI used in car Infotainment and downloading the phone book stored in the mobile devices to the car radio through Bluetooth (BT) connection. It briefly explains the flow of information in the downloading process from the BT system side to HMI.

1-6
2

Title : Predictive Modelling of Osmotic Dehydration of Food Materials

Authors : Duduyemi Oladejo, Oluoti K.O, Adedeji K.A., Raji N.A.

Click Here For Abstract

Download Certificate
Abstract :

Abstract— During osmotic dehydration of food materials, water and/or other substances are removed from the material with molecular infiltration; shrinkage follows depending on the extent of net mass loss. Molecular diffusion is one of the generally accepted and necessary tools for finding simple predictive models that describe mass transfer across plant membranes. The mass transfer resistances across a semi-permeable medium were investigated with Fickian molecular diffusion model and a combined molecular and convective model. The effects of intercellular and trans-membrane resistances studied with two-parameter kinetic models described the behaviours of solute impregnation and dewatering processes of osmotic dehydration.  Predicted depth of solute impregnation in an imaginary food matrix was 4.0 mm with satisfactory deduction that combined molecular and convective model is a better description of the transport models. The solutions of the models also revealed that concentration gradient across the membranes depends linearly on process variables and the influences of membranous resistance were not negligible.

7-14
3

Title : Application of Osmotic Dehydration for Shelf Life Extension of Fresh Poultry Eggs

Authors : Duduyemi Oladejo, Ade-Omowaye B.I.O., Popoola Olabisi

Click Here For Abstract

Download Certificate
Abstract :

Abstract- This research work was aimed at applying osmotic dehydration which had suffice the treatment of agricultural produce especially fruits and vegetables with sustained organoleptic qualities. The effect of sucrose solution concentrations (16, 32, 42 and 54oBrix) at ambient temperatures of 30±2 oC for periods of 180min was investigated on fresh poultry eggs. Treated sample of eggs exposed to a worst scale of unstable environmental conditions 30±2 oC were monitored with candling and a control experiment in water glass solution. The investigation achieved extended shelf life of over 66 days without modifications to their internal and external structures, and taste using a six point hedonic scale. The effect of sucrose concentration and time of immersion were observed to be inversely dependent on effective periods of preservation of the poultry eggs by osmotic dehydration evaluated in percentage weight loss. 

15-19
4

Title : Security of Aggregated Data in Wireless Sensor Network

Authors : Surabhi Singhal

Click Here For Abstract

Download Certificate
Abstract :

Abstract— A Wireless Sensor Network can be defined as a group of sensors which are distributed spatially to monitor physical or spatial conditions such as temperature, volcano, fire monitoring, sound, urban sensing, pressure etc. In a large WSN, the data aggregation significantly reduces communication overhead and energy consumption. In order to pass data, although data in-network aggregation was used and it reduced the problem of communication overhead and transmission loss but failed in computing double-counting sensitive aggregates at the Base Station. The research community proposed synopsis diffusion to eliminate this problem but it did not helped in securing the network against the problem of attacks caused by the compromised nodes, resulting in the false  computation of aggregate. In this paper, synopsis diffusion is being made secure against the attacks by compromised nodes. To do so, an algorithm is being presented which can securely compute aggregates in the presence of such attacks. This algorithm is named as Attack-Resilient algorithm. The attack-resilient algorithm computes the true aggregate by filtering out the contributions of compromised nodes in the aggregation hierarchy.Extensive studies and performance analysis have shown that the proposed algorithm i.e. Attack-Resilient algorithm is more effective and outperforms other existing approaches.

20-24
5

Title : Cathodic Protection of Corroded Pre-stressing Tendon by CFRP Sheets

Authors : Astha Verma, Shweta Goyal

Click Here For Abstract

Download Certificate
Abstract :

Abstract— Reinforced concrete is one of the most commonly used construction materials in civil engineering but its durability problems have been obsessing people. The worst of these problems is caused by corrosion of steel in concrete which includes early deterioration of concrete infrastructures. Cathodic Protection is a reduction/elimination of corrosion by making the material a cathode by impressing a DC current. A new development in repair and rehabilitation of R.C structures is the use of carbon fibre reinforced polymers (CFRP) which provide a barrier layer that is expected to impede further corrosion of steel and prevents dislodging of concrete cover. The present paper describes the protection of the strand achieved by using surface bonded carbon FRP. The electrically conductive carbon fibre is used as anode while the pre-stressing tendon is used as cathode in the present active protection. Specimens were exposed to highly corrosive environment for specified time. It is observed that the active protection technique is very effective in retarding the corrosion of strand.

25-28
6

Title : High Security of Data in Cloud Computing

Authors : Deepak Kumar

Click Here For Abstract

Download Certificate
Abstract :

Abstract— Now a days, large scale distributed systems such as cloud computing applications are becoming increasingly popular. But the challenges with these applications like transferring, storing and computation of data have to be dealt with. The most prevalent distributed file systems to deal with these challenges are the Hadoop File System (HDFS) which is a variant of the Google File System (GFS). However HDFS has two potential problems. The first one is that it depends on a single name node to manage almost all operations of every data block in the file system. As a result it can be a bottleneck resource and a single point of failure. The second potential problem with HDFS is that it depends on TCP to transfer data. As has been cited in many studies TCP takes many rounds before it can send at the full capacity of the links in the cloud. This results in low link utilization and longer download times. Our work develops a mechanism of Triple security which uses a light weight front end server to connect all requests with many name nodes. Our work proposes a new distributed file system which will overcome these problems of HDFS. 

29-32
7

Title : A Practical Study For a New Measuring Tool For EHV Bus Bar Fault Detection

Authors : Ali M. El-Rifaie, Rania M. Sharkawy, Sherif Haggag

Click Here For Abstract

Download Certificate
Abstract :

Abstract— This paper introduces both theoretical and practical application of the Cos-Sin fault detection technique with EHV busbars. A digital relay with multiple operating criteria is being implemented based on the Cos-Sin technique. The relay is being theoretically tested on the 500 KV unified Egyptian network where the grid simulation is done using ATP whereas the technique was programmed by the Matlab. On the other hand, the relay is being practically tested against different fault cases on a constructed lab model of a simple network with typical parameters to the actual grid while the protection mechanism was loaded on the LabVIEW. The simulation results indicate the capability of the Cos-Sin based relay for the detection and discrimination of all types of busbar faults besides differentiating between close up faults and bus ones.

33-38
8

Title : Analysis of Direct Torque Controlled Techniques for Induction Motor Drives with Two Level Inverter

Authors : Abhishek Verma, Yogesh Kumar Chauhan

Click Here For Abstract

Download Certificate
Abstract :

Abstract— The objective of the present work is to obtain the reduced torque ripples, harmonics distortion. Duty Ratio Control has been developed to improve the torque performance and to obtain the voltage space vector required to compensate the flux and torque errors. In conventional Direct Torque Control (DTC), the selection of flux linkage and electromagnetic torque errors are made within the respective flux and torque hysteresis bands, in order to obtain fast torque response, low inverter switching frequency and low harmonic losses. However, DTC drives utilizing hysteresis comparators suffer from high torque ripple and variable switching frequency. As in duty ratio control technique, instead of applying a voltage vector for the entire switching period, it is applied for a portion of the switching period and the zero switching state is applied for the rest of the period the ripples is considerably reduced. In this paper the simulation of different DTC schemes (Conventional DTC and Duty Ratio Control DTC) has been carried out using MATLAB/SIMULINK and the results are compared.

39-44
9

Title : G2C Factor Based Rating System

Authors : Basavaraju S, Dr. J Meenakumari

Click Here For Abstract

Download Certificate
Abstract :

The development of the city where citizens are living in, is important in all aspects.  The standard of the city can be evaluated on various factors and services which the citizens of that city enjoy.  The system helps citizens to rate their cities and location on various factors.  These ratings given by the citizens of that area will help government bodies to allocate the budget and resources for those areas where there is a high need. The system taking into account various factors like General Cleanliness, Public Parks, Drainage System, Availability of dust bins, Availability of essential services, Rain water harvesting, Availability and maintenance of footpaths, Road conditions, Constructions and maintenance of bus stops and auto stands, Availability and maintenance of health centers which allows citizens to rate their experience on number scale for these factors.  The average rating for each factor will be calculated on the basis of category wise, district wise, area wise, gender wise and age wise.  Based on these average rating the overall rating area will be decided.  The area which score low in overall rating will be given a priority by government bodies for allocation of budgets and resources. By giving a proper user name and password the registered citizens can log into the system and rate their cities on category wise by providing valid identification number which is provided by the government like voterid, adhar card number, pan card etc. 

45-48
10

Title : Human Interactions Recognition using Bag of Words

Authors : R.Newlinshebiah, S.P.Sivasubbu, V.Sivasankar

Click Here For Abstract

Download Certificate
Abstract :

A video surveillance system can be defined as a technological tool that assists humans by providing an extended perception and capability of capturing interesting activities in the monitored scene. This paper describes a methodology for automated recognition of one to one human interactions such as handshake, kicking and hugging. The frame work consists of background subtraction followed by feature extraction (Speed Up Robust Features) and action classification using SVM classifier. It is computationally efficient and invariant to occlusion, lightning. The method produces good categorization accuracy and precision. Human behaviour recognition has various applications such as human-computer interfaces; content based video retrieval, Visual monitoring & surveillance.

49-52
11

Title : Digital Beam Forming Using Software Defined Radio Based Adaptive Algorithm

Authors : P. Ragasudha, B. R. Vikram, K. Sridhar

Click Here For Abstract

Download Certificate
Abstract :

This paper presents the development of an Adaptive Digital Beam Forming (ADBF) application on Software Defined Radio Platform using Open Source GNU Radio software. Adaptive beam formers for sensor arrays are widely used in RADAR, SONAR and communications applications. This is to increase the directivity of the sensor system to the target, while suppressing the interfering signals having a direction of arrival different from that of a desired signal. Array beam forming techniques can yield multiple beams that are simultaneously available. The beams can be made to have controlled beam width or high gain and low side lobe levels.Beam-forming techniques dynamically adjust the array pattern to optimize some characteristic of the received signal. Antenna arrays using beam-forming techniques can reject interfering signals having a direction of arrival different from that of desired signal. The principal reason of interest is their ability to automatically steer nulls into undesired sources of interferences, thereby reducing output noise and enhancing the detection of desired signal. Beam forming and beam scanning are generally accomplished by phasing the feed to each element of an array so that signals received from all the elements will be in phase in particular direction. Digital beam forming is thus a powerful technique for boosting the antenna performance. The work reported in this paper is purely a software based approach where all the waveform-specific processing is implemented on host CPU. The results supporting the presented work are furnished in this paper.

53-58
12

Title : Cloud Security using Blowfish and Key Management Encryption Algorithm

Authors : B.Thimma Reddy, K.Bala Chowdappa, S.Raghunath Reddy

Click Here For Abstract

Download Certificate
Abstract :

In the present days security is the major goal in all applications. For securing data in cloud computing there are lot of techniques available. Various disadvantages in cloud are like security, data protection, network security, privacy concerns and are also prone to a variety of attacks like Denial of Service, IP spoofing etc. To overcome these attacks, we can use authentication, authorization, access control and encryption techniques. A user can access cloud services as a utility service and begin to use them almost instantly. The fact that services are accessible any where any time lead to several risks. Some of the concerns are lack of confidentiality, integrity and authentication among the users of cloud and service providers. Main goal of my proposal is to provide security in cloud and protecting the data transmitted through various secure channels by providing security using encryption. The cryptographic algorithms like DES, AES, GOST 28147-89, CAST, RC6, SERPENT, and TWOFISH can be adopted for the optimization of data security in cloud computing.

59-62
13

Title : Deplorable Message Refining system from OSN User Timeline

Authors : Shubham Yelne, Swati Dalne, Rupali Tomar

Click Here For Abstract

Download Certificate
Abstract :

The main drawback of Online Social Networking (OSN) services is the lack of privacy for the user’s own private space. The users can’t have the access to direct control to prevent the undesired messages posted on their own private walls. The propose  system allowing OSN users to have a direct control on the messages posted on their walls.The main task of this system is the content based filtering and short text classifier.A system that allows users to customize the filtering criteria to be applied to their walls.

63-66
14

Title : Thermal performance analysis of EAHE with and without fins arrangements

Authors : Rahul Rathee, Dr. Atul lanjewar

Click Here For Abstract

Download Certificate
Abstract :

An Earth air heat exchanger(EAHE) uses  the earth as the thermal source and sink for economical, energy efficient, space heating and cooling. The temperature of earth at a certain depth about 4m the  temperature  of  ground  remains nearly constant throughout the year.This  constant temperature is called the undisturbed temperature of earth  which  remains  higher than the outside temperature  in  winter  and  lower  than  the  outside temperature in summer.When air is passing throught buried pipes it will become hot in winter and cold in summer as compared to outside temperature.EAHE generally uses for passive heating or cooling.This paper presents effect of temperature drop or rise due to fins in horizontal arrangement. In this paper comparsion of COP v/s Reynolds number,temp difference v/s Reynolds number and Nusselt number v/s  Reynolds number will be done.

67-71
15

Title : Disperse and Cationic Dyeable Tertiary Polyblend Fibres of Polypropylene: Cationic Dyeable Polyester: Polystyrene

Authors : M.D.Teli, P.V. Desai

Click Here For Abstract

Download Certificate
Abstract :

Polypropylene (PP) based polyblend fibres are made disperse and cationic dyeable by melt blending PP with cationic dyeable polyester (CDPET) and polystyrene (PS). The polyblend fibres were characterized for their thermal, mechanical and dyeability properties. Thermal analysis showed that the blend fibres are formed with reduced crystallinity favouring the dyeability of the fibres. The polyblend fibres were evaluated for disperse and cationic dyeing. The disperse dyeability increased in the range of 1050 to 1300%, while cationic dyeability in the range of 1300 to 1700% with excellent wash and light fastness. The increase in dyeability with respect to changes in the internal structure of the fibres is studied and optimal level of blending was predicted keeping in view of tenacity and thermal stability of melt blend fibres. 

72-75
16

Title : Result of Digital Image Sharing By Diverse Image Media

Authors : Mayuri Sonkusare, Prof. Nitin Janwe

Click Here For Abstract

Download Certificate
Abstract :

A natural-image-based VSS scheme (NVSS scheme) that shares secret images. A natural-image-based secret image sharing scheme (NSISS) that can share a color secret image over n - 1 arbitrary natural images and one noise-like share image. Instead of altering the contents of the natural images, the encryption process extracts feature images from each natural image. In order to protect the secret image from transmission phase. (n, n) - NVSS scheme shared secret image over n-1 natural share. The natural shares will be digital image and printed image. By extracting the features of natural shares we can prepare noise-like share. After that encryption carried out with noise-like share and secret image. Propose possible ways to hide the noise like share to reduce the transmission risk problem for the share. In this paper Initially Feature Extraction process has been performed for Natural Shares. Here Digital image and Printed image have been used as Natural Shares. With that extracted features secret image will be encrypted by (n, n) - NVSS scheme where process carried by (n-1) natural shares. This Encrypted result will be hided using Share-Hiding Algorithm where generated the QR code. In the Recovering of the secret image will be done by Share Extraction Algorithm and also decryption algorithm. Finally the secret image with all pixels has been obtained. This proposed possible ways to hide the noise like share to reduce the transmission risk problem for the share.

76-78
17

Title : River Morphology and Riparian Vegetation at the Tributary of Seongdong, Korea

Authors : Man Kyu Huh, Byoung-Ki Choi

Click Here For Abstract

Download Certificate
Abstract :

The purpose of this study is to investigate river morphology, riparian vegetation, and water quality on the tributary of Seongdong River in Korea during four seasons. There were not significant differences for river structure according to the river morphology and river naturality according to the environment of river at three regions (upper, middle and low areas). The portion of BOD and COD in the river increased exponentially along the upper-down gradient. The surveyed region was a total of 57 taxa, including 23 families, 50pecies, and 7varieties. Naturalized plants were 18species.

79-84
18

Title : Modified Non-Local Means De-noising With Patch and Edge Patch Based Dictionaries

Authors : Rachita Shrivastav, Prof. Varsha Namdeo, Dr. Tripti Arjariya

Click Here For Abstract

Download Certificate
Abstract :

Digital image processing remains a challenging domain  of programming.  All  digital  images  contain  some  degree  of noise.  Often  times  this  noise  is  introduced  by  the  camera when a picture is taken. Image denoising algorithms attempt to remove this noise from the image. In this paper the method for image denoising based on the nonlocal means (NL-means) algorithm has been implemented and results have been developed   using   matlab   coding.   The   algorithm,   called nonlocal means (NLM), uses concept of Self-Similarity. Also images taken from the digital media like digital camera and the image taken from the internet have been compared. The image that is taken from the internet has got aligned pixel than the image taken from digital media. Experimental results are given to demonstrate the superior denoising performance of the     NL-means denoising technique over various image denoising benchmarks.

85-88
19

Title : Water Pollution in Balochistan Province of Pakistan

Authors : Safoora Kanwa, Muhammad Kamran Taj, Shagufta saddozai, Imran Taj, Ferhat Abbas, Zafar Ahmed, Abdul Samad, Irfan Shahzad Sheikh, Muhammad Zahid Mustafa, Zohra Samreen, Taj Muhammad Hassani

Click Here For Abstract

Download Certificate
Abstract :

Water pollution is one of the main environmental issues in Balochistan. This serious environment issue leads to many deaths in Balochistan. In most of the places of Balochistan clean and safe water is now totally converted to polluted water. Drinking water sources, both surface and groundwater are contaminated with coliforms, toxic metals and pesticides throughout the Balochistan. Various drinking water quality parameters set by WHO are frequently violated. Human activities like improper disposal of municipal and industrial effluents and indiscriminate applications of agrochemicals in agriculture are the main factors contributing to the deterioration of water quality. Microbial and chemical pollutants are the main factors responsible exclusively or in combination for various public health problems. People of these areas are drinking polluted water due to unavailability of clean water. Drinking of polluted water can causes major health disease. Major diseases connected with polluted drinking water in Balochistan are diarrhea, gastroenteritis, typhoid, cryptosporidium infections, giardiasis intestinal worms, some strains of hepatitis and infant deaths are caused by waterborne diarrhea in Balochistan.

89-90
20

Title : Some Classications of Ditopological Texture Spaces via Cardinal Functions

Authors : Kadirhan Polat, Tamer Ugur

Click Here For Abstract

Download Certificate
Abstract :

In this paper we study under which conditions equality of some pairs of dicardinal functions such as weight-coweight and densification-codensification, holds. We obtain some useful results on “bounds of S", the set P of all p-sets and the set Q of all q-sets by choosing the class of all ditopological texture spaces or the subclass satisfying axiom T0.

91-94
21

Title : Simulation & Performance Evaluation of Optimal LEACH Subject to other Protocols in Wireless Sensor Network

Authors : Miss. Priyanka k kharalkar, Dr. Sudhir Akojwar

Click Here For Abstract

Download Certificate
Abstract :

Advance wireless sensor network (WSN) technology is Low- power electronics and Low-power radio frequency design has enabled the development of small, relatively inexpensive & low-power sensor technology. The important challenges in design of network are three key resource1) Energy 2) Communication bandwidth 3)coverage area . LEACH (Low Energy Adaptive Clustering Hierarchical) is a hierarchical clustering algorithm. It is more efficient than proactive n reactive protocol. LEACH  protocol have some disadvantage. To overcome disadvantage we improved LEACH protocol by using optimal path forwarding algorithm and multihop technique i.e O-LEACH protocol. O-LEACH is more efficient than LEACH protocol and it uses static deployment technique. The paper is concluded by mentioning valuable observations made from analysis of results about  AODV and LEACH and Optimal LEACH  protocols.

95-98
22

Title : 3D Modeling of Temperature Distribution for Absorber Tube of Parabolic Trough Collector

Authors : Mya Mya Mon, Myat Myat Soe, Maw Maw Htay

Click Here For Abstract

Download Certificate
Abstract :

Solar Parabolic Trough Collectors (PTCs) are currently used for the production of electricity and applications with relatively higher temperature. In this work, temperature distribution of absorber tube for fluid flow in a parabolic trough collector is studied. Three dimensional temperature distribution of the absorber tube due to uniform heat flux is analyzed by numerically. This heat flux is determined based on 21st December of Mandalay which has the tropical climate in Upper Myanmar. Soltrace software is used to check the theoretical results of heat flux. Three types of fluid are used as heat transfer fluid and simulations are carried out k-ε model using Computational Fluid Dynamics CFD, COMSOL Multiphysics® 4.3b, for constant flow rate of fluid. It is observed that fluid is higher in temperature at the exit end of absorber tube with fluid flow rate of 0.5 m/s and solar flux condition of 938 W/m2.

99-103