2024-03-29T06:36:05Z
http://www.ijitr.com/index.php/ojs/oai
oai:ojs.ijitr.com:article/1
2013-02-21T11:58:31Z
ojs:ART
H2 PRODUCTION FROM BIOMASS GASIFICATIONWITH ENRICHED SYN-GAS BY ABSORPTION METHOD
Tripathy, Rajesh; Department of Chemical Engineering ,
National Institute of Technology, Rourkela
Sahoo, Abanti
Hydrogen-enriched syngas(HESG), addresses two dominant energy and environmental issues: decarbonization and improved energy management. Reducing the CO2 content of syn-gas widens our efforts to build a bridge to an ultra-low carbon world. With HESG, it becomes possible to reduce emissions, improve the efficiency of end-use equipment and lower the overall carbon intensity of syngas in the years to come. Higher CO2 content in the syngas also lowers the calorific value. This work is aimed at reducing the CO2 content in the syngas by absorption process. For this purpose we have taken the help of ASPEN PLUS simulator. The rate-based non-equilibrium, RateFrac, model is used for column design. Mono ethanolamine (MEA) is taken as liquid solvent and various parameters like flow rate and temperature of the solvent and number of segments of the absorption column were varied to test the CO2 absorption efficiency of the solvent. Similarly CaO absorption efficiency was found by experimental methods for gasification process carried out under different conditions like variation in temperature, equivalence ratio and steam to biomass ratio. The efficiency was found to be less than 30% due to ineffective fluidization.
International Journal of Innovative Technology and Research
2013-01-30
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/1
International Journal of Innovative Technology and Research; Vol 1, No 1 (2013): December-January; 001-007
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/9
2013-02-21T11:58:31Z
ojs:ART
NEURAL NETWORK IMPLEMENTATION FOR CHARACTER RECOGNITION
Ravi Kiran, Rajbhure; RGPV, BHOPAL
Pandit, Rakesh
Rajbhure, R.K.
This paper describes a NEURAL NETWORK based technique for feature extraction applicable to segmentation-based word recognition systems. The proposed system extracts the geometric features of the character contour.. The system gives a feature vector as its output. The feature vectors so generated from a training set, were then used to train a pattern recognition engine based on Neural Networks so that the system can be benchmarked. Since, an attempt was made to develop a system that used the methods that humans use to perceive handwritten characters. Hence a system that recognizes handwritten characters using Pattern recognition was developed.Here the data generated by comparison of two images was stored in excel format and then calling that data as an indivual input for generation of simulink diagram. Pattern recognition can be used to model human perception. The mathematics that Pattern recognition requires is extremely fundamental. Thus, any algorithm developed using Pattern recognition would require relatively simple and short calculations. Due to simplicity of calculations, they can be implemented on any hardware or software platform without too much concern for computing power. In this paper first part is about introduction to character Recognition. Then next part giving short introduction to Neuarl network implementaion for image processing using MATLAB.
International Journal of Innovative Technology and Research
2013-01-30
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/9
International Journal of Innovative Technology and Research; Vol 1, No 1 (2013): December-January; 008-012
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/10
2013-02-21T11:58:31Z
ojs:ART
STUDIES ON DEMINERALIZATION OF COAL: FRACTIONAL FACTORIAL DESIGN
choudhury, suman; MTECH
Demineralization of coal from Chitra mines of Jharkhand was investigated by using alkalies and acid of different concentration. Measurements of demineralization using Parr formula have been studied by changing particle size (d), time (t), temperature (T), conc. of alkalies and acids to determined the optimal operating parameters for the reactor, i.e. the experimental condition for which maximum removal of mineral matter occured. The largest mineral matter (MM) removal was attained when the reactor was controlled at temperature about 90 0C, at time of 2h, with particle size of 0.22mm and alkali-acid combination (i.e. NaOH+ HCl). It was observed that below particle size 0.22 mm demineralization decreased for which the range of particle size was maintained within range 0.51-0.22 mm. To validate the experimental findings dimensional and statistical analysis were carried out. Mean deviation and standard deviations indicated that the developed correlations can be used suitably over a wide range of parameters. Combination of NaOH and HCl was found to be most dominant parameter for dematerializing coal samples.
International Journal of Innovative Technology and Research
2013-01-30
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/10
International Journal of Innovative Technology and Research; Vol 1, No 1 (2013): December-January; 013-018
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/11
2013-02-21T11:58:31Z
ojs:ART
HYDRODYNAMIC BEHAVIOUR OF SPOUTED BED USING COARSE / FINE PARTICLES
Sahoo, Pranati; National Institute of Technology, Rourkela, Orissa
Sahoo, A
The characteristics of coarse / fine particles have been studied using a cylindrical spouted bed. The effects of different system parameters (viz. static bed height, particle size, particle density and superficial velocity of the medium) have been analysed to study the bed dynamics such as bed expansion / fluctuation ratio, bed pressure drop and fluidization index of coarse / fine particles. Mathematical expressions have been developed on the basis of dimensionless analysis. Finally calculated values of these bed dynamics have been compared against the experimentally observed values. The comparison results show very good agreement between the experimental and calculated values thereby indicating the application of these correlations over a wide range of parameters.
International Journal of Innovative Technology and Research
2013-01-30
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/11
International Journal of Innovative Technology and Research; Vol 1, No 1 (2013): December-January; 019-027
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/12
2013-02-21T11:58:31Z
ojs:ART
A CRITICAL STUDY ON THE PROBLEMS OF ESL STUDENTS
Peyyala, Raj Kiran; Assistant Professor of English
Department of Basic Sciences and Humanities
Gudlavalleru Engineering College
Gudlavalleru
Andhra Pradesh (India)
Pin: 521356
Second-language instruction has come a long. Still, it has a long way to go. Collecting information from different approaches has been the method followed from the beginning. Probably this is the suitable approach as we propose many styles of learning and events to train the students in a better way. Further, a free approach allows teachers to glean the effective elements from many methods that really work in the classroom. Language learning methodologies worth when they succeed. Working with ESL issues is a bit difficult and tiring and also confusing at times. However, ESL students often show pleasure themselves to work on it. They know that they need to improve their English; usually they are quite well-prepared and show willingness to work. Language acquisition is a slow, painful process, but a bit of effort eventually adds up to fluency or at least a get through in a composition course. Things may move very slowly in the sessions with ESL students as they might work on it slowly till he/she gets a little bit command over it. The teacher needs to spend more time talking to the ESL students than he or she spends with the other students because the teacher needs to focus on the students with much interest and it needs a lot of attention. The paper benefits the teacher as well as the student as it gives a solution for the teachers to teach it in a better and an easy way. It makes easy for the students so that they can find a solution for their problems.
International Journal of Innovative Technology and Research
2013-01-30
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/12
International Journal of Innovative Technology and Research; Vol 1, No 1 (2013): December-January; 028-031
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/13
2013-02-21T11:58:31Z
ojs:ART
SPATIAL MINING SYSTEM FOR DISASTER MANAGEMENT
Nynalasetty, Kameswara Rao; Andhra University
Saradhi Varma, G.P
Nagabhushana Rao, M
Information Systems enable us to capture up to date effects due to disaster .It has been widely recognized that spatial data analysis capabilities have not kept up with the need for analyzing the increasingly large volumes of geographic data of various themes that are currently being collected and archived. Our analysis is on disaster management through spatial Maps. Intelligent application algorithms ideal for finding the rules and unknown information from the vast quantities of computer data. The Intelligence system is to obtain and process the data, to interpret the data, and to design the algorithms for decision makers (Health Companion) as a basis for action. Spatial Map for disaster identification is designed. The Intelligence in each of these algorithms are provided the point and multi-point decision making system to capacitive for evaluation of spreading the dengue. Our contribution in this paper is to design Spatial Maps for Dengue.
International Journal of Innovative Technology and Research
2013-01-30
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/13
International Journal of Innovative Technology and Research; Vol 1, No 1 (2013): December-January; 032-036
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/14
2013-02-21T11:58:31Z
ojs:ART
REACTIVE POWER CONTROL USING FC-TCR
Gupta, Shilpa; EN Dept.
Inderprastha Engineering College
Ghaziabad, INDIA
This paper will discuss and demonstrate how Static Var Compensator (SVC) has successfully been applied to control transmission systems dynamic performance for system disturbance and effectively regulate system voltage.SVC is basically a shunt connected static var generator whose output is adjusted to exchange capacitive or inductive current so as to maintain or control specific power variable. For this a Single Machine Infinite Bus (SMIB) system is modeled. In this paper, simple circuit model of Thyristor Controlled Reactor is modeled and simulated using MATLAB. The simulation results are presented. The current drawn by the TCR varies with the variation in the firing angle. The simulation results are compared with the theoretical results.
International Journal of Innovative Technology and Research
2013-01-30
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/14
International Journal of Innovative Technology and Research; Vol 1, No 1 (2013): December-January; 037-041
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/15
2013-02-21T11:58:31Z
ojs:ART
SVPWM CONTROLLED PERMANENT MAGNET SYNCHRONOUS MOTOR
Angayarkanni, S; Department of Electrical and Electronics Engineering,
M. A. M. School of Engg.,
Trichy, Tamilnadu, INDIA.
Ilango, R
Senthilnathan, A
Multilevel inversion is a power conversion strategy in which the output voltage is obtained in steps. In recent years, the multilevel inverters have drawn tremendous interest in the area of high-power medium-voltage energy control. Several modulation and control strategies have been developed or adopted for multilevel inverters including the following multilevel Sinusoidal Pulse Width Modulation (SPWM), and Space Vector Modulation. In this paper simulation of SVPWM are applied for performance analysis of PMSM using voltage source inverter. The THD and speed torque analysis for PMSM are simulated using MATLAB simulink.
International Journal of Innovative Technology and Research
2013-01-30
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/15
International Journal of Innovative Technology and Research; Vol 1, No 1 (2013): December-January; 042-045
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/16
2013-02-21T11:58:31Z
ojs:ART
HYDROGEN FUELLED IC ENGINE – AN OVERVIEW
Bhaskar, VVN; Associate Professor, Dept. of ME, ACE, Madanapalle,A.P,India
Hari Prakash, R
Durga Prasad, B
Hydrogen as a fuel in Internal Combustion engines is a solution for the near future to realize zero CO2 emissions for traffic applications. The hydrogen fuelled IC engine is ready for that. The storage and production of hydrogen, and to build the necessary infrastructure, are the real shortcomings in the general use of hydrogen in IC engines. This paper gives an overview of the development of hydrogen fuelled IC engines by the most important car manufactures (Ford, BMW etc.). This overview indicates the evolution in the development of hydrogen fuelled engines (different generation of engines). This evolution is also made at Ghent University. Ghent University has been working for nearly 15 years on the development and optimization of hydrogen engines. Several test rigs are in function (all with electronic control management systems and sequential multi-point injection).
International Journal of Innovative Technology and Research
2013-01-30
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/16
International Journal of Innovative Technology and Research; Vol 1, No 1 (2013): December-January; 046-053
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/8
2013-02-21T11:58:31Z
ojs:ART
TRUST EVALUATION BASED SECURITY IN WIRELESS SENSOR NETWORKS
Janani, C; M.E. Computer Science,
SSM College Of Engineering,
Komarapalayam,
Namakkal District.
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multi-hop routing, that has been designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, This project provides trustworthy, time efficient and energy-efficient route. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both implementation and empirical experiments on large-scale WSNs under various scenarios including mobile and RF-shielding network conditions.
International Journal of Innovative Technology and Research
2013-01-30
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/8
International Journal of Innovative Technology and Research; Vol 1, No 1 (2013): December-January; 054-060
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/23
2013-02-21T11:58:31Z
ojs:ART
MICROCONTROLLER BASED SPEED CONTROL OF SINUSOIDAL PWM INVERTER FED THREE PHASE INDUCTION MOTOR
Prabaharan, V; Department of Electrical and Electronics Engg.
M.A.M.School of Engineering
Trichy,India.
Umamaheswaran, R
This paper is concerned with Microcontroller based speed control of Sinusoidal PWM Inverter fed three phase Induction Motor. The Work involves design and fabrication of a variable frequency PWM inverter using MOSFETs, operating from a DC source. The objective is to implement variable frequency sinusoidal PWM inverter in order to control the speed of the Induction Motor using Microcontroller. When it is required to provide wide range of speed control covering about 600rpm to 1500rpm, normal three phase supply at 50Hz with voltage control alone is not successful due to the unstable region in the Torque-Slip characteristics of the motor. Hence it is necessary to go in for variable voltage and variable frequency mode of operation. The main focus of the this paper is the design and fabrication of variable voltage and variable frequency sinusoidal PWM inverter for speed control operation of Induction Motor. This drive system is simulated in MATLAB/Simulink and the simulation results are presented. After integrating the hardware and software the whole setup is tested for satisfactory operation. It is found that the three phase Induction motor is capable of running over a speed range from 600rpm to 1500rpm while driving a fixed load.
International Journal of Innovative Technology and Research
2013-01-30
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/23
International Journal of Innovative Technology and Research; Vol 1, No 1 (2013): December-January; 061-065
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/24
2013-02-21T11:58:31Z
ojs:ART
POWER SYSTEM STABILITY ENHANCEMENT UNDER THREE PHASE FAULT WITH FACTS DEVICES TCSC, STATCOM AND UPFC
Titus, S.; Member, IEEE
Department of EEE
MAM college of Engineering
Trichirappalli, India
Vinothbabu, B.J.; Department of EEE
MAM college of Engineering Trichirappalli, India
Maria Anton Nishanth, I.; Department of EEE
MAM college of Engineering Trichirappalli, India
With the ever increasing complexities in power systems across the globe and the growing need to provide stable, secure, controlled, economic and high quality power especially in the deregulated power market. It is envisaged that FACTS controllers will play a vital role in power systems. This paper investigates the improvement of transient stability of a test system under three phase fault using facts devise. TCSC- Thyristor Controlled Series Capacitor and STATCOM- Static Synchronous Compensator are utilized as a series and shunt compensation respectively. UPFC-Unified Power Flow Controller is considered as a shunt-series compensator.
International Journal of Innovative Technology and Research
2013-01-30
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/24
International Journal of Innovative Technology and Research; Vol 1, No 1 (2013): December-January; 066-073
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/25
2013-02-21T11:58:31Z
ojs:ART
FREQUENCY CONTROL SCHEME USING INTEGRATED GRID INVERTER FOR WIND MILL
Titus, S; Member, IEEE
Department of EEE
MAM college of Engineering
Trichirappalli, India
Vinothbabu, B.J.; Department of EEE
MAM college of Engineering Trichirappalli, India
Maria Anton Nishanth, I.; Department of EEE
MAM College of Engineering Trichirappalli, India
Wind is a copious vital source of energy which is complimentary and a fabulous gift of Mother Nature. The escalating levels of wind generation have resulted in an urgent appraisal of their impact on frequency control of power system. Despite the consequences of wind turbine technology, The main intention of this paper is to counterpart the generated frequency from the existing system along with the GRID side frequency which has an unremitting variation due to the loads connected besides the GRID. This frequency disparity is the major concern in today's renewable energy system and is particularly true in portable wind mill applications connected with the grid. So a frequency control scheme using integrated grid inverter for such wind mill applications is being discussed in this paper.
International Journal of Innovative Technology and Research
2013-01-30
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/25
International Journal of Innovative Technology and Research; Vol 1, No 1 (2013): December-January; 074-078
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/26
2013-02-21T11:58:31Z
ojs:ART
AUTOZEROING CMOS LOW VOLTAGE TRANSCONDUCTANCE AMPLIFIERS
Satyanarayana, BVV; Assistant Professor, Department of ECE,
Regency Institute of Technology, Yanam, UT of Puducherry, India
Satyanarayana, KVV; Assistant Professor, Department of ECE,
Regency Institute of Technology, Yanam, UT of Puducherry, India
Sattibabu, G.; Assistant Professor, Department of ECE,
Regency Institute of Technology, Yanam, UT of Puducherry, India
Naturally simple and parallel low voltage and autozeroing current mode analog circuits Transconductance amplifiers are presented. The low voltage analog circuits are based on low voltage inverters resembling precharge digital logic. These low voltage analog circuits can be operated at supply voltages down to 240mv with rail-to-rial input and output swing. The output current of the low voltage parallelTransconductance amplifier can be quite large. The current headroom is 2.98uA and the supply voltage is 300mv. For supply voltages down to 300mv simulated data shows that the maximum clock frequency is approximately 600MHZ.
International Journal of Innovative Technology and Research
2013-01-30
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/26
International Journal of Innovative Technology and Research; Vol 1, No 1 (2013): December-January; 079-085
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/27
2013-02-21T11:58:31Z
ojs:ART
DESIGN AND IMPLEMENTATION OF WIRELESS BRAINWAVE STIMULATED ACCIDENT PREVENTION SYSTEM
Sattibabu, Gummarekula; Assistant Professor,
Department of ECE,
Regency Institute of Technology,
Yanam, UT of Puducherry, India
Satyanarayana, B.V.V.; Assistant Professor,
Department of ECE,
Regency Institute of Technology,
Yanam, UT of Puducherry, India
Kona, V.V Satyanarayana; Assistant Professor,
Department of ECE,
Regency Institute of Technology,
Yanam, UT of Puducherry, India
Freak accidents are commonly hitting the headlines nowadays due to the moment the driver is careless. Mostly the accidents are common during night time due to the drowsiness of the driver. Adopting this as a major issue we have designed a system to detect the driver’s consciousness every moment and guide him or her throughout the journey. The proposed system is wireless and have been implemented with the help of an embedded processor. Our system picks up the brain signal of the driver every moment and transmitted through wireless transmitter module. In the receiver the signals are compared with different signals already stored in it. According to various threshold level programmed the vehicle is guided whether to drive fast, slow or to stop running. Application software has been developed with the help of high level graphical programming language (visual basic) to generate the prototype of brain waves. This system brings out an efficient solution for road accidents by early detection and alarm method.
International Journal of Innovative Technology and Research
2013-01-30
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/27
International Journal of Innovative Technology and Research; Vol 1, No 1 (2013): December-January; 086-089
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/28
2013-02-21T11:58:31Z
ojs:ART
USING HYDROGEN AS A FUEL IN AUTOMOTIVE ENGINES - AN INVESTIGATION
Premkartikkumar, SR.; Department of Automobile Engg.
MIT Campus, Anna University
Chennai, India
Annamalai, K.; Department of Automobile Engg.
MIT Campus, Anna University
Chennai, India
Pradeepkumar, A.R.; Department of Automobile Engg.
MIT Campus, Anna University
Chennai, India`
In the fast moving world, hydrocarbon based fuels have become significant for a century’s development. The fuels derived from crude oil are critical source of energy for fueling vehicles. However, crude oil based fuels are non renewable. The present investigation of using hydrogen was carried out in a direct injection diesel engine having a compression ratio of 17.5:1 and a capacity of 5.9 kW at a rated speed of 1800 rpm. In this investigation, the hydrogen was fed to the engine through the inlet manifold along with intake air during suction stroke of the engine. In order to maintain safety, the flame trap and flame arrestor were also used in the experimental setup. The results shows that there is an increase in brake thermal efficiency of the engine and reduction in carbon monoxide emission when, the hydrogen is used as a dual fuel, in the operation of the diesel engine.
International Journal of Innovative Technology and Research
2013-01-30
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/28
International Journal of Innovative Technology and Research; Vol 1, No 1 (2013): December-January; 090-093
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/29
2013-02-21T11:58:31Z
ojs:ART
EFFECT OF FIRST NOZZLE PRESSURE ON 100% VISCOSE MURATA TWIN SPUN YARN PROPERTIES
Mhetre, S.B.; D.K.T.E. Society’s Textile and Engg. Institute,
Ichalkaranji, Maharashtra,India
Gulve, A. L.; D.K.T.E. Society’s Textile and Engg. Institute,
Ichalkaranji, Maharashtra,India
In this paper the effect of first nozzle pressure on various yarn properties of Murata twin spun yarn was been studied by keeping second nozzle pressure constant.100% viscose yarn was been prepared on Murata twin spinner with first and second nozzle combinations 1.8 Kg/cm2 & 5Kg/cm2, 2kg/cm2 & 5kg/cm2 and 2.2kg/cm2 & 5kg/cm2 respectively.1 denier viscose fiber of 40 mm was used to prepare the yarn on MTS. The two parallel wounded yarns are then twisted together on TFO. For assessing the effect of nozzle pressure on yarn, various properties like imperfection, breaking elongation and tenacity were been tested.
International Journal of Innovative Technology and Research
2013-01-30
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/29
International Journal of Innovative Technology and Research; Vol 1, No 1 (2013): December-January; 094-098
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/30
2013-02-21T11:58:31Z
ojs:ART
INFLUENCE OF INJECTION TIMING ON EMISSION PARAMETERS OF ADELFA BIODIESEL (NERIUM OIL METHYL ESTER – NOME) FUELLED DI CI ENGINE
Kumar, A R Pradeep; Dept. of automobile engineering,
Anna University (MIT Campus), Chennai, India.
Annamalai, K.; Dept. of automobile engineering,
Anna University (MIT Campus), Chennai, India.
Premkartikkumar, SR; Dept. of automobile engineering,
Anna University (MIT Campus), Chennai, India.
The reports from various researchers across the world show that, biodiesel obtained from Transesterification process would contribute for the extension of the stock of petroleum fuel. Due to the higher viscosity, raw vegetable oil poses problems, such as clogging of fuel nozzle, starting trouble during winter etc. Hence in this experimental investigation, transesterified Adelfa oil (Nerium Oil Methyl Ester – NOME) is used as the test fuel and the results are compared with diesel fuel. Most of the biodiesel show better results as far as the emission parameters are concerned. A kirloskar SV1 model single cylinder, constant speed water cooled engine is used in the experimental setup. In this experimental work, the injection timing is retarded and advanced by 3o, from manufacturer set value of 27o before Top Dead Centre (bTDC). The various emission parameters chosen are hydrocarbon emission, carbon monoxide emission, smoke opacity emission and Oxides of nitrogen emission. Varying the injecting timing show, promising results except for NOx emission. Hence remedial measure has also been discussed.
International Journal of Innovative Technology and Research
2013-01-30
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/30
International Journal of Innovative Technology and Research; Vol 1, No 1 (2013): December-January; 099-102
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/31
2013-02-21T11:58:31Z
ojs:ART
EFFICIENT ROUND ROBIN CPU SCHEDULING ALGORITHM FOR OPERATING SYSTEMS
Ramakrishna, M.; AssistantProfessor
Department of Computer Science and Engineering
Srinivasa Institute of Engineering and Technology,JNTU Kakinada,India
Pattabhi Rama Rao, G.; Student
Department of Computer Science and Engineering
Srinivasa Institute of Engineering and Technology,JNTU Kakinada,India
The main objective of this paper is to develop a new approach for round robin C P U scheduling algorithm which improves the performance of CPU in real time operating system. The proposed Priority based Round-Robin CPU Scheduling algorithm is based on the integration of round-robin and priority scheduling algorithm. It retains the advantage of round robin in reducing starvation and also integrates the advantage of priority scheduling. The proposed algorithm also implements the concept of aging by assigning new priorities to the processes. Existing round robin CPU scheduling algorithm cannot be implemented in real time operating system due to their high context switch rates, large waiting time, large response time, large turnaround time and less throughput. The proposed algorithm improves all the drawbacks of round robin CP U scheduling algorithm. The paper also presents the comparative analysis of proposed algorithm with existing round robin scheduling algorithm on the basis of varying time quantum, average waiting time, average turnaround time and number of context switches.
International Journal of Innovative Technology and Research
2013-01-30
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/31
International Journal of Innovative Technology and Research; Vol 1, No 1 (2013): December-January; 103-109
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/32
2013-02-21T11:58:31Z
ojs:ART
THE HISTORICAL PERSPECTIVE OF LANGUAGE TEACHING – A BRIEF STUDY
Padmaja, D; Research Scholar
The article discusses the various methods in Language Teaching as language plays a pivotal role in this Globalised world. It discusses the historical origin of language teaching and the method which has to be followed in the classroom to improve the communicative skills of the students especially related to the Engineering scenario.
International Journal of Innovative Technology and Research
2013-01-30
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/32
International Journal of Innovative Technology and Research; Vol 1, No 1 (2013): December-January; 110-114
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/48
2018-08-09T00:39:48Z
ojs:ART
TOTAL PRODUCTIVE MAINTENANCE (TPM) IMPLEMENTATION FRAMEWORK FOR CABLE MANUFACTURING COMPANY
Mugwindiri, Kumbi; University of Zimbabwe, Department of Mechanical Engineering,P O Box MP169,Mount Pleasant, Harare, Zimbabwe
Madanhire, Ignatio; University of Zimbabwe, Department of Mechanical Engineering,P O Box MP169,Mount Pleasant, Harare, Zimbabwe
Mukoki, Tendai; University of Zimbabwe, Department of Mechanical Engineering,P O Box MP169,Mount Pleasant, Harare, Zimbabwe
This paper seeksto show that the longer production continues with no interruptions, the higherthe production will be. However and inevitably, as machines continue in use,wear and fatigue become more pronounced with increased frequency. As a result,maintenance is necessary to help restore the machines to a functional state,preferably for as long a time as possible. So at the end of the day, a strategyis necessary to assist the whole operation attain a high plant availability. Inthe process as well, the strategy is not expected to hinder or disturb any otherpolicies that might be in place, such as the environmental policy. Theparticular research sought to determine the strengths and weaknesses of thecurrent maintenance practices at a cable manufacturing company, and thenrecommend possible strategic solutions. The research sought to ascertain thelevel of commitment and involvement of the management in the implementation andsustaining of continuous improvement as well as involvement in strategicchanges such as the implementation of Total Productive Maintenance (TPM) for allemployees. The paper concludes by affirming the possibility of using the holisticTPM approach which is people centred.
International Journal of Innovative Technology and Research
2013-04-04
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/48
International Journal of Innovative Technology and Research; Vol 1, No 2 (2013): February - March; 115-123
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/38
2018-08-09T00:39:48Z
ojs:ART
OPTIMIZATION OF AHU CONTROL STRATEGY
Rajkumar, Venkata; Assistant Professor
E.E.E Department
AIMS.C.E , Mummidivaram, INDIA
P, SrihariDatta Bhimaraju; Assistant Professor
E.E.E Department
R.I.T, Yanam, INDIA
In this paper, an optimal control strategy is designed for an Air handling unit to control the components of an AHU in an efficient manner and compare this strategy with the existing control design to achieve the desired result. An optimized controller is designed to deal mainly with the chilled water control valve and the zone wise temperature control, Because for the chilled water flow and for the zonal wise temperature achieving we don’t have the perfect controllers. In present AHU’s the chilled water was modulating manually to a fixed point and it will not change for a long period. And, for the zonal wise temperature, the temperature is different in different places. So, by designing a control circuits for chilled water and for zonal wise temperature control we can achieve the best results.
International Journal of Innovative Technology and Research
2013-04-04
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/38
International Journal of Innovative Technology and Research; Vol 1, No 2 (2013): February - March; 124-129
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/53
2018-08-09T00:39:48Z
ojs:ART
LOW COST AUTOMATED IRRIGATION CONTROLLER FOR A GREENHOUSE ON AN 8 BIT PIC MICROCONTROLLER USING A RADIATION SENSOR
Munyaradzi, Michael; University of Zimbabwe
Computer Science Department
Nyambo, Benny M.; University of Zimbabwe
Computer Science Department
Mashonjowa, Emmanuel; University of Zimbabwe
Physics Department
Rupere, Taurai; University of Zimbabwe
Computer Science Department
A variety of water use efficiency methods have been proposed for greenhouse irrigation scheduling but most of them have been found to be very expensive and complicated to use. In an effort to address the needs of the low income farmer, we developed a low cost irrigation controller which incorperates cheap and readily available electronic components, less expensive controller and sensor requiring minimal human interaction. We calculated the total cost of the controller inclusive of sensor to be about US$85. To come up with an automated irrigation system, there is need to know the time to irrigate and amount of water required by a plant at every point in time. This can be determined from environmental, soil or plant based factors. This paper presents a strategy to provide an irrigation control system, which uses a cheap 8 bit, small working memory and small storage capacity PIC Microcontroller which requires minimal human-computer interaction and consumes low electrical power. The system uses radiation as the environmental input to detemine the amount of water lost by the plant. The argument we used is that in a controlled environment like a greenhouse, radiation has a linear relationship with transpiration. The measured radiation gave a good estimation of the amount of water lost by the plant and we used this to determine the time to switch on and off the irrigation system.
International Journal of Innovative Technology and Research
2013-04-04
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/53
International Journal of Innovative Technology and Research; Vol 1, No 2 (2013): February - March; 130-135
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/39
2013-04-04T04:02:51Z
ojs:ART
CLOUD INFORMATION ACCOUNTABILITY FOR DATA SHARING
B., Revathi; ME-CSE,GNANAMANI COLLEGE OF TECHNOLOGY,NAMAKKAL
., Kalpana; ASSISTANT PROFESSOR in CSE,GNANAMANI COLLEGE OF TECHNOLOGY,NAMAKKAL
Cloud computing is an Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand. Popularity of cloud computing is increasing day by day in distributed computing environment. Cloud computing technology is that data’s can stored and also data can retrieve from any place and from any computer. There is a growing trend of using cloud environments for storage and data processing needs. Cloud computing infrastructure resides in a large data center and is managed by a third party, who provides computing resources as if it were a utility such as electricity-accessible by anyone, anywhere with an Internet connection. The cloud service is that users’ data are usually processed remotely in unknown machines that users do not own or operate. By the new technology, users’ fears of losing control of their own data can become a significant barrier to the wide adoption of cloud services. To overcome the problem, a highly decentralized information accountability framework is proposed to store the users’ data in the cloud. An object-centered approach that enables enclosing our logging mechanism together with users’ data and policies is proposed. The JAR programmable capabilities is used to create both a dynamic and traveling object, and to check that any access to users’ data will trigger authentication and automated logging local to the JARs.
International Journal of Innovative Technology and Research
2013-04-04
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/39
International Journal of Innovative Technology and Research; Vol 1, No 2 (2013): February - March; 136-141
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/49
2018-08-09T00:39:48Z
ojs:ART
ENHANCING MAINTENANCE AT A CASTING FOUNDRY MANUFACTURING COMPANY: CASE STUDY
Mugwindiri, Kumbi; University of Zimbabwe, Department of Mechanical Engineering,P O Box MP169,Mount Pleasant, Harare, Zimbabwe
Madanhire, Ignatio; University of Zimbabwe, Department of Mechanical Engineering,P O Box MP169,Mount Pleasant, Harare, Zimbabwe
Mhlanga, George; University of Zimbabwe, Department of Mechanical Engineering,P O Box MP169,Mount Pleasant, Harare, Zimbabwe
The research study sought to determine thestrengths and weaknesses of the current maintenance practices at a sandcastings manufacturing company. Casting Co Ltd is principally a ferrous foundrywhich produces grey and white iron. The research suggested good practices whichcould be taken on board and could beimproved. This can be used by other foundry industries to enhance theiroperations for maintenance efficiency to save on resources to improveoperational bottom line.
International Journal of Innovative Technology and Research
2013-04-04
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/49
International Journal of Innovative Technology and Research; Vol 1, No 2 (2013): February - March; 142-154
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/52
2018-08-09T00:39:48Z
ojs:ART
NETWORK ARCHITECTURE TO IDENTIFY SPATIAL KNOWLEDGE FOR DENGUE
Nynalasetty, Kameswara Rao; Assoc.Professor, IT Dept.,
SRKR Engineering College
Saradhi Varma, G.P.; Professor & HOD, IT Dept.
SRKR Engineering College
Nagabhushana Rao, M.; Professor, CSE Dept.,
Swarnandra Engineering College
Recent developments in informationtechnology have enabled collection and processing of vast amounts of personaldata, business data and spatial data. It has been widely recognized thatspatial data analysis capabilities have not kept up with the need for analyzingthe increasingly large volumes of geographic data of various themes that arecurrently being collected and archived. Our study is carried out on the way toprovide the mission-goal strategy (requirements) to predict the disaster. Theco-location rules of spatial data mining are proved to be appropriate to designnuggets for disaster identification and the state-of-the-art and emergingscientific applications require fast access of large quantities of data. Hereboth resources and data are often distributed in a wide area networks withcomponents administrated locally and independently, a framework has beensuggested for the above. Our contribution in this paper is to design networkarchitecture for disaster identification.
International Journal of Innovative Technology and Research
2013-04-04
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/52
International Journal of Innovative Technology and Research; Vol 1, No 2 (2013): February - March; 155-160
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/55
2018-08-09T00:39:48Z
ojs:ART
OPTIMIZATION OF ENERGY HARVESTING
Naga Kalyan, S.; Research Scholar
Raghu Kumar, B.; K L University
Micro-generators produce electrical energy when subjected to acceleration. Three architectures of inertial micro-generator were identified as suitable for implementation using MEMS technology. Two of these architectures, both resonant in nature, have been reported in the existing literature. The third, a non-resonant type, is new. The architectures have been analyzed and compared within a common framework, based on sinusoidal driving signals and a common set of normalization factors. A simple procedure for the design process of micro-generators was established. Within the analytical framework, the non-resonant generator achieved the highest power density of the three architectures when powered from large amplitude motion, making it the most suitable for powering implanted medical devices.
International Journal of Innovative Technology and Research
2013-04-04
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/55
International Journal of Innovative Technology and Research; Vol 1, No 2 (2013): February - March; 161-175
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/44
2013-12-03T16:28:49Z
ojs:ART
NEW CONTROL SCHEME TO ENHANCE THE POWER QUALITY OF INDUCTION GENERATOR USING STATCOM WITH BATTERY STORAGE SYSTEM
R, Krishna Priya.; PG student,Power systems Engineering,Vivekanandha College of engineering for Women
A, Amudha.; Assistant Professor, EEE Department,Vivekanandha College of engineering for Women
Power Quality related issues are one of the major problems in present era. The widespread use of electronic equipment, led to a complete change of electric loads nature. This paper proposes a system based on Self Excited Induction Generator with STATCOM to feed three phase four wire linear or non linear load. STATCOM is a three phase four wire voltage source converter. It is connected to battery storage system with a bi-directional dc-dc converter. A resistive dump load is connected by a chopper to dissipate the excess active power. STATCOM compensate the reactive power, current harmonics and load unbalances and the battery system keeps the active power balance of the complete system. A LCL filter is connected between the half bridge of this dc–dc converter and the energy storage system to reduce output current ripple. A resistive dump load is connected by a chopper to dissipate the excess active power. STATCOM compensate all disturbances in a self-excited induction generator due to three-phase four-wire loads and an improvement of system efficiency. The simulation results show good performance and power quality improvement of the stand-alone system under different loading conditions.
International Journal of Innovative Technology and Research
2013-04-04
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/44
International Journal of Innovative Technology and Research; Vol 1, No 2 (2013): February - March; 176-181
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/50
2018-08-09T00:39:48Z
ojs:ART
AN OPTIMAL NOISE REMOVAL APPROACH FOR LATERAL SKULL IMAGES
Saravanan, P; Research Scholar, Manonmanium Sundaranar University, Trinelveli, TN, India
Lakshmi, M.; Research Scholar, Department of Computer Science and Engineering, Manonmanium Sundaranar University, Trinelveli, TN, India
We are using medical imagingdevices to scan the organs of human to identify the different diseases. Thediseases are diagnosed by medical images which are produced by various medicaldevices like Ultra Sound, Magnetic Resonance Image, Computed Tomography (CT),Ultra sound and X ray Medical devices. Images are prone to different types ofnoises due medical devices. Poison noiseis commonly found in X ray images. The filters namely, Unsharp, Mean, Median,Gaussian and Weiner are used for comparative study analysis. The computedRadiography CR image qualities are improved by our comparative study offilters. The aim of this paper is to identify the best poison noise removal filterfrom the comparative study analysis of five filters. The best filter isestimated by calculating Peak Signal Noise Ratio(PSNR), Root Mean Square Error(RMSE) and Means Square Error(MSE).
International Journal of Innovative Technology and Research
2013-04-04
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/50
International Journal of Innovative Technology and Research; Vol 1, No 2 (2013): February - March; 182-186
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/51
2018-08-09T00:39:48Z
ojs:ART
MULTI VARIANT ANALYSIS AND VALIDATION STUDY ON MASTOID TRIANGLE PROCESS FOR SEX DETERMINATION
Siva Kumar, Janaki; Research Scholar,PRIST University,Tanjore, TamilNadu
Yassir, Ammar; Department of Information Technology, CMJ University, Shillong, India
Thangavelu, K.; Head of ComputerScience,Periyar University,,Salem, TamilNadu
The major objectives of this paper are (1) address thefactors influencing sexing the human skull through a review of the literature(2) list the general techniques andmethods used for sex determination (3) address the mastoid process method indetermining sex (4) address therelevance of this information to computational forensic science research andapplications. This paper is a summary of findings of Mastoid process sexdetermination that will give the knowledge that how far skull biometric isuseful in determination of sex for unique identification and verification ofhuman. From the available literature inthis topic, analysis was done and most relevant accurate method for sexdetermination was identified. The existing techniques in sex determination arecomprehensively reviewed and discussed. Validation of mastoid process approachis done with Matlab (2007) and sex determination was performed with sampledatabase. Experimental results show the effectiveness of this approach inperformance.
International Journal of Innovative Technology and Research
2013-04-04
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/51
International Journal of Innovative Technology and Research; Vol 1, No 2 (2013): February - March; 187-190
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/58
2018-08-09T00:39:48Z
ojs:ART
OPTIMAL WAVELET FILTER MAXIMIZES THE CROSS CORRELATION COEFFICIENT WITH AN ECG SIGNAL
Kumari, Aaushi; Department of Electronics and communication, Lovely Professional University, Phagwara 144401, India
Bisht, Megha; Department of Electronics and communication, Lovely Professional University, Phagwara 144401, India
Since over the years Electrocardiogram (ECG) signal has been used to assess the cardiovascular condition of humans. In practice, the real time acquisition and transmission of the ECG may contain noise signals. In general, the signal processing algorithms employed for denoising provide optimal performance and eliminate the high frequency noise between any two beats contained in a continuous ECG signal. Despite their optimal performance, the signal processing algorithms significantly attenuate the peaks of characteristics wave of the ECG signal. This paper presents a selection of optimal wavelet which maximize cross correlation coefficient. Cross correlation with different wavelet filters has been computed on MATLAB TOOL.
International Journal of Innovative Technology and Research
2013-04-04
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/58
International Journal of Innovative Technology and Research; Vol 1, No 2 (2013): February - March; 191-193
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/60
2018-08-09T00:39:48Z
ojs:ART
MIMO TECHNOLOGY FOR WIRELESS COMMUNICATION AND WIRELESS COMPUTER NETWORKING
Raut, Pravin W.; Research Scholar, HOD ET Dept, Shri Datta Meghe Polytechnic, Nagpur
Badjate, S. L.; Vice Principal & Professor, S. B. Jain Institute of Technology, Management. & Research, Nagpur
The demand of wireless communication in the field of Wireless Computer networking and mobile phones(communications) is constantly growing and need the tether less connectivity. The major limitations to this growth is the disadvantages of traditional wireless communication System due to the limitations of available frequency resources, Bandwidth, channel capacity, complexity, reliability, transmission data rate and physical areas. This paper addresses the overview of new technology Multi-Input-Multi-Output (MIMO) for wireless Communication and Wireless Computer networking system will be much more efficient to meet the heavy demand of Wireless communication in available limited frequency resources. MIMO channel is frequency selective (multipath) and is known to boost channel capacity for high-data rate transmissions, low power implementation, sophisticated signal processing algorithm. The FPGA based coding techniques will reduce the size, complexity and increase the reliability of connectivity.
International Journal of Innovative Technology and Research
2013-04-04
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/60
International Journal of Innovative Technology and Research; Vol 1, No 2 (2013): February - March; 194-200
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/59
2018-08-09T00:39:48Z
ojs:ART
NIGHT COOKING SOLAR COOKER USING MOLTEN SODIUM CHLORIDE AS PHASE CHANGE MATERIAL
Parida, Omprakash; Silicon Institue of Technology
Bhubaneswar,India
Tripathy, Swastik; Silicon Institue of Technology
Bhubaneswar,India
Dash, Jitendra Kumar; Silicon Institue of Technology
Bhubaneswar,India
Solar cooking technology has to undergo a sea change if at all it’s to be accepted as the main source of cooking Energy. This is why a better model that incorporates both the traditional heat trapping cum concentrator mechanism and the latest techniques like that which uses a solar battery (phase change materials with high heat retention capability) can be used as the basic idea for the purpose. A multi-purpose hybrid solar cooker using locally available materials can be used for night as well as day cooking. It will have two way supply of heat directly from sun during day time for cooking and from the phase change material during night time. This cooker preferably provides indoor cooking and it can have two arrangements, namely Grill and Oven, for cooking various Indian foods. Sufficient care was taken for selecting the materials to be used in this solar cooker with price and availability constraints across rural India. The design ideally can cook two traditional meals a day for a family of five. All assumptions for the design are based on this basic aim.
International Journal of Innovative Technology and Research
2013-04-04
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/59
International Journal of Innovative Technology and Research; Vol 1, No 2 (2013): February - March; 201-206
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/57
2018-08-09T00:39:48Z
ojs:ART
REFLECTANCE PERCEPTION MODEL BASED FACE RECOGNITION IN DISSIMILAR ILLUMINATION CONDITIONS
keyan, karthik; Department of ECE, SVS College of Engineering, Coimbatore-109, Tamilnadu, India
Vijayalakshmi, V. J.; Department of EEE, SKCET, Coimbatore - 46 Tamilnadu, India
Jeyakumar, P.; Student, Department of ECE, Karpagam University, Coimbatore-105
Reflectance Perception Based Face Recognition in different Illuminating Conditions is presented. Face recognition algorithms have to deal with significant amounts of illumination variations between gallery and probe images. Many of the State-of-the art commercial face recognition algorithms still struggle with this problem. In this projected work a new algorithm is stated for the preprocessing method which compensated for illumination variations in images along with a robust Principle Component Analysis (PCA) based Facial Feature Extraction is stated which is used to improve and reduce the dimension of the image by removing the unwanted vectors by the weighted Eigen faces. The proposed work demonstrates large performance improvements with several standard face recognition algorithms across multiple, publicly available face databases.
International Journal of Innovative Technology and Research
2013-04-04
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/57
International Journal of Innovative Technology and Research; Vol 1, No 2 (2013): February - March; 207-210
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/82
2013-06-01T04:41:38Z
ojs:ART
EVALUATION OF FLASH LEARNING MANAGEMENT SYSTEM
Haghshenas, Maryam; Young Researchers and Elites club, Science and Research Branch, Islamic Azad University, Tehran, Iran
Khademi, Maryam; South Tehran Branch, Islamic Azad University, Tehran, Iran
E-Learning; Authoring Tools; E-content; FLMS
To create a proper course for E-learning, you need authoring tools to facilitate this work. E-learning authoring tools enable trainers to integrate an array of media to create professional interactive training content, and make possible repurposing learning objects from an existing course for reuse in a new one. Flash Learning Management System (FLMS) is a software platform for E-learning. This system is designed to create basic E-learning courses and support a variety of media and file types, such as text, graphics, video, and audio. Most include assessment and test creation features. In This paper, we examine an evaluation of FLMS developed with Investigation methods in the Dejcom Company in Iran. A questionnaire which consists of 25 questions divided in two sections was developed. The questionnaire uses Likert 5-point scale format for sections. The first section contains some questions about creating of content based on standard, while the next ones include interaction questions between user and system. The evaluation of the system is made during its trials in the Dejcom Company in Iran. 200 users are asked to fill in the questionnaire after using the system via the internet. Finally the analysis of results of the evaluation shows that the flash learning management system is quite based on standard and Interactive.
International Journal of Innovative Technology and Research
2013-06-01
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/82
International Journal of Innovative Technology and Research; Vol 1, No 3 (2013): APRIL - MAY; 201-204
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/83
2013-06-01T04:41:38Z
ojs:ART
A METHOD TO IDENTIFY DUPLICATE REFRESH RECORDS WITH CONTINUOUS QUERY BASED MULTIPLE WEB DATABASES
., Sudhakar; HOD – CSE
MKCE Karur
Vasudevan, Shriram K; Assistant.Professor,Cse
Amrita University
., Sivaraman; R/Technical Faculty
Amrita University
Vighneshwar, Jai; J/Mnc
Coimbatore
Duplicate detection, SVM classifier, user instant query, Continuous queries, document streams
Record matching, which identifies the records that represent the same real world entity is an important step for data integration. In information retrieval, one of the main problems is to retrieve a set of documents that is semantically related to a given user query. Most existing work requires human-labelled training data (positive, negative, or both), which places a heavy burden on users. Existing supervised record matching methods require users to provide training data and therefore cannot be applied for web databases where query results are generated on-the-fly. A new record matching method named Unsupervised Duplicate Refresh Elimination (UDRE) is proposed for identifying and eliminating duplicates among refresh records in dynamic query results. The idea of this research is to adjust the weights classifier record fields in calculating similarities among refresh records. Three classifiers namely weight component similarity summing time bound classifier, support vector machine classifier and threshold-based support vector machine classifier are iteratively employed with UDRE where the first classifier utilizes the weights concentrated on string similarity measures for comparing records from different data sources. We also design a new record alignment algorithm that aligns the attributes in Identify Duplicate Refresh Records.
International Journal of Innovative Technology and Research
2013-06-01
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/83
International Journal of Innovative Technology and Research; Vol 1, No 3 (2013): APRIL - MAY; 205-208
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/68
2013-06-01T04:41:38Z
ojs:ART
PRODUCTION AND CHARACTERIZATION OF FISH OIL METHYL ESTER
Tanwar, Deepak; Rajasthan State Pollution Control Board, Kishangarh
Tanwar, Ajayta; Government Polytechnic College, Ajmer 305001
Sharma, Dilip; Malaviya National Institute of Technology, Jaipur 302004
Mathur, Yogesh Prakash; Malaviya National Institute of Technology, Jaipur 302004
Khatri, Kamal Kishore; Malaviya National Institute of Technology, Jaipur 302004
Soni, Shyam Lal; Malaviya National Institute of Technology, Jaipur 302004
Gupta, Ragini; Malaviya National Institute of Technology, Jaipur 302004, India5
Limited availability of edible oils prevents it from being used as viable source of Biodiesel. Low cost and abundantly found fish oil produced from soap stock could be a better option for biodiesel processing. Such type of fish oil contains a higher amount of moisture and FFA and requires a pre-treatment prior to biodiesel production. In this study, refining of raw oil, optimization of process variables of transesterification, qualitative as well as quantitative aspects of fish oil methyl ester (FOME) has been evaluated. With optimized production process, it was found that almost complete conversion of fish oil to methyl ester has taken place. The fuel properties of FOME were found to be in accordance with the ASTM, IS and EN standards.
International Journal of Innovative Technology and Research
2013-06-01
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/68
International Journal of Innovative Technology and Research; Vol 1, No 3 (2013): APRIL - MAY; 209-217
en
http://www.ijitr.com/index.php/ojs/article/download/68/149
http://www.ijitr.com/index.php/ojs/article/download/68/150
http://www.ijitr.com/index.php/ojs/article/download/68/151
http://www.ijitr.com/index.php/ojs/article/download/68/152
http://www.ijitr.com/index.php/ojs/article/download/68/153
http://www.ijitr.com/index.php/ojs/article/download/68/154
http://www.ijitr.com/index.php/ojs/article/download/68/155
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/84
2013-06-01T04:41:38Z
ojs:ART
ANCILLARY SERVICES IN RESTRUCTURED ENVIRONMENT OF POWER SYSTEM
Rahi, O. P.; Electrical Engineering Department, National institute of Technology, Hamirpur, India
Thakur, Harish Kumar; Electrical Engineering Department, National institute of Technology, Hamirpur, India
Singh, Abhash Kumar; Electrical Engineering Department, National institute of Technology, Hamirpur, India
Gupta, Shashi Kant; Electrical Engineering Department, National institute of Technology, Hamirpur, India
Active power, black start capability, operating reserve, power system, reactive power, restructured electricity markets.
In a restructured power market, apart from the firm transaction of the energy and power, independent system operator (ISO) make arrangement for certain additional services to maintain the reliability and quality of power supply. Such additional services are required for maintaining active and reactive power balance, variation in frequency and voltage with in allowable limits in event of emergency handling of power system such as black start capability etc. In monopolistic market structure, these services have been integral part of the electricity company where as in restructured electricity markets a separate mechanism exists for such services named as ancillary services. The present paper has investigated into various ancillary services and their necessity to ensure safe and secure operation of power system.
International Journal of Innovative Technology and Research
2013-06-01
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/84
International Journal of Innovative Technology and Research; Vol 1, No 3 (2013): APRIL - MAY; 218-225
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/69
2013-06-01T04:41:38Z
ojs:ART
MICROCONTROLLER BASED SPWM GENERATOR: A CONVENTIONAL DESIGN PERSPECTIVE THROUGH GRAPHICAL ORIENTED APPROACH
Fazil Rahman, Ahmad Shukri; Universiti Malaysia Perlis
@Marzuki, Muzaidi Othman; Universiti Malaysia Perlis
Abdul Razak, Abdul Rahim; Universiti Malaysia Perlis
Hasan, Syafruddin; Universiti Malaysia Perlis
Ismail, Baharuddin; Universiti Malaysia Perlis
Syed Hassan, Syed Idris; Universiti Malaysia Perlis
SPWM; PWM; sinusoidal; triangular; modulation; carrier; excel; Proteus; inverter
In this paper, a comprehensive design strategy was proposed and implemented for the design of a single phase sinusoidal pulse width modulation (SPWM) waveform. Excel software was used to generate the timing sequence, and then fed to a microcontroller unit (PIC16F877A). Through Excel, complex programming effort could be avoided and the whole data arrays can be presented graphically. The effectiveness of the timing sequence was validated by using PROTEUS software. The simulation result shows that the SPWM waveform achieved the desired goals.
International Journal of Innovative Technology and Research
2013-06-01
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/69
International Journal of Innovative Technology and Research; Vol 1, No 3 (2013): APRIL - MAY; 226-232
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/71
2013-06-01T04:41:38Z
ojs:ART
EMPIRICAL EVALUATION ON K MEANS CLUSTERING WITH EFFECT OF DISTANCE FUNCTIONS FOR BANK DATASET
Awasthi, Rekha; Disha College, Raipur, India
Tiwari, Anil K; Disha College, Raipur, India
Pathak, Seema; Disha College, Raipur, India
Simple K Means, Euclidean Distance, Manhattan Distance, Sum of Squared Errors.
Cluster analysis is one of the major data analysis method in data Mining. It is the art of detecting groups of similar objects in large datasets without having specified groups by means of explicit features. K Means algorithm is a popular approach to finding clusters due to its simplicity of implementation and fast execution. In this paper the K Means clustering algorithm for bank data is studied and the "bank data" available in comma-separated format bank-data.csv here appropriate data preprocessing has been performed and various distance function such as Euclidean distance and Manhattan distance function is used for analyzing the result of number of iterations, run time and within sum of squared error on Bank data .
International Journal of Innovative Technology and Research
2013-06-01
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/71
International Journal of Innovative Technology and Research; Vol 1, No 3 (2013): APRIL - MAY; 233-235
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/73
2013-06-01T04:41:38Z
ojs:ART
DISTRIBUTED HIGH PERFORMANCE WEB CRAWLER
Patel, Payal
Hasan, Mosin
Tanawala, Bhavesh
List server;Crawler manager;Distributed crawler
Single crawlers are no longer sufficient to run on the web efficiently as explosive growth of the web pages. So, distributed crawlers come into the picture. Here we present a distributed high performance crawler which is used for crawling internet web pages. In that List server, Crawler manager and Crawlers are there. At the crawler side Yioop! is going to be used. Yioop! is php search engine which produces the index of web page. List server is useful for maximizing the efficiency. The crawler manager can easily communicate with the different list server. Likewise, the system will work like focused crawler as well as distributed crawler. The architecture of the system and the function of every module are described in detail which can be extended to other fields easily.
International Journal of Innovative Technology and Research
2013-06-01
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/73
International Journal of Innovative Technology and Research; Vol 1, No 3 (2013): APRIL - MAY; 236-239
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/85
2013-06-01T04:41:38Z
ojs:ART
JOINT CALL ADMISSION CONTROL FOR MULTI-MODE TERMINALS IN HETEROGENEOUS CELLULAR NETWORKS
Reddy, T Varun Kumar; VIT University
Teja, Ponnada S S Siva; VIT University
heterogeneous networks, multi-mode terminals, modality, Call admission control, Terminal Support Index, blocking probability, dropping probability
The heterogeneous networks are the Next Generation Wireless Networks (NWGN).The presence of heterogeneous networks leads to the necessity of multi-mode terminals i.e. single mode, dual mode, triple mode, quad-mode etc. based on number of RATs in the heterogeneous networks which results in varying mobile capability. The main problem with the heterogeneous networks is the unfairness in allocation of radio resources. In the same heterogeneous network single-mode terminals (Low-capability mobile terminals) experience high blocking probability compared to quad-mode terminals (High-capability mobile terminals) in the same network. To reduce this problem of unfair allocation of radio resources a Terminal Modality Based Joint Call Admission Control (TJCAC) Algorithm has been proposed. In this proposed algorithm the call admission decisions take into account modality (capability) of the mobile terminal, Load on each RAT and Terminal Support Index of each RAT during resource allocation. We have proposed an analytical model to evaluate the performance of the algorithm and show that there is a decrease in the call blocking and dropping probabilities.
International Journal of Innovative Technology and Research
2013-06-01
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/85
International Journal of Innovative Technology and Research; Vol 1, No 3 (2013): APRIL - MAY; 240-248
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/86
2013-06-01T04:41:38Z
ojs:ART
BEHAVIOR OF OFDM SYSTEM USING MATLAB SIMULATION
Ghorpade, S.S.; Department of Electronics, DYPCOE, Kolhapur
Sankpal, Dr.Mrs. S.V.; Department of Electronics, DYPCOE, Kolhapur
FFT, IFFT, OFDM, QAM
Orthogonal Frequency Division Multiplexing ( OFDM ) is mainly designed to Combat the effect of multipath reception, by dividing the wideband frequency selective fading channel into many narrow flat sub-channels.OFDM offers flexibility in adaptationto time varying channel condition by adopting the parameters at each subcarriers accurately.To avoid ISI due to multi-path,successive OFDM path, successive OFDM symbols are separated by guard band. This makes the OFDM system resistant to multi-path effects. The idea of using parallel data transmission by FDM was published in mid 60s.However, recentlythe attention toward OFDM has grown rapidlyin the field of wireless and wired communication systems. This is reflected by the adoption of this technique in applications such as digital audio/video broadcast (DAB / DVB), wireless LAN (802.11a and HiperLAN2), broadband wireless (802.16) and xDSL.In this paper design of OFDM system transmitter and receiver is introduced and simulation is done using using MATLAB.
International Journal of Innovative Technology and Research
2013-06-01
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/86
International Journal of Innovative Technology and Research; Vol 1, No 3 (2013): APRIL - MAY; 249-252
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/87
2013-06-01T04:41:38Z
ojs:ART
MOBILE BANKING WITH LOCATION TRACKING OF NEAREST ATM CENTER USING GPS
A, Gugapriya; PG Student Bharathidasan Institute of Technology,Anna University, Thiruchirappalli
J, Vaitheki; PG Student Bharathidasan Institute of Technology,
Anna University, Thiruchirappalli
S, Kaviyarasi; PG Student Bharathidasan Institute of Technology,
Anna University, Thiruchirappalli
Android, GPS, ATM, e-banking
The android mobile banking is attractive because it allows people to do banking anytime, anywhere. In this proposed work, banking application is integrated in android mobiles. It explores the opportunities of using mobile technology in the electronic banking (e-banking) sector to enhance existing banking services by moving toward m-banking using mobile devices and wireless media that can provide opportunities for ubiquitous access to the banking services as mobile technologies can be used at anytime and from anywhere. In the user interface part, banking facility is provided to the user through the mobile device to implement banking transactions and transferring of funds. Here, the Location Based Service is used to identify location and navigates you to the directions to the Nearest Bank or ATM. The Global Positioning System (GPS) is a space-based satellite navigation system. Nearest Location details intimates in Alert Message Service
International Journal of Innovative Technology and Research
2013-06-01
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/87
International Journal of Innovative Technology and Research; Vol 1, No 3 (2013): APRIL - MAY; 253-255
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/76
2013-06-01T04:41:38Z
ojs:ART
POWER MINIMIZATION OF LOGICAL CIRCUIT THROUGH TRANSISTOR STACKING
Nagar, Ankita; Assistant Professor,Electronics and Communication Department,Dronacharya College of Engineering,Greater Noida, India
Kumar V, Sampath; Professor,Electronics and Communication Department,JSS Academy of Technical Education,Noida, India
Kaushik, Payal; Assistant Professor,Electronics and Communication Department,JSS Academy of Technical Education,Noida, India
Low Power, Propagation Delay, Power Dissipation, Sub-threshold current, stacking effect.
This paper deals with the reduction of power dissipation in the basic logic circuit like NAND gate and NOR gate by using transistor stacking technique. The logic gates are designed using 130nm technology parameter and are simulated using PSPICE. The input vector combinations are compared with the simulated result on the basis of propagation delay and power consumption. It is found that when the number of low input increases in case of NAND gate the power dissipation decreases but the delay increases and for NOR gate power dissipation decreases with the increase in high input vector combinations.
International Journal of Innovative Technology and Research
JSS ATE, NOIDA
2013-06-01
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/76
International Journal of Innovative Technology and Research; Vol 1, No 3 (2013): APRIL - MAY; 256-260
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/78
2013-06-01T04:41:38Z
ojs:ART
DESIGN AND PERFORMANCE ANALYSIS OF AN OPTICAL CDMA SYSTEM FOR 2-D PERFECT DIFFERENCE CODES USING SHIFTED SINE FUNCTIONS
Arora, Neetika; Electronics & communication Department,Dronacharya College of Engineering,Gr. Noida,Greater Noida, India
Agrawal, Rakhi; Electronics & communication Department,Dronacharya College of Engineering,Gr. Noida,Greater Noida, India
Multiple Access Interference or Multiuser Interference (MUI), Optical Code Division Multiple Access (CDMA.), Optical fiber Communication Systems, 2-D perfect difference codes, 2-D M matrices codes, Shifted Sine Functions.
A Dynamic Optical Code Division Multiple. Access (DOCDMA) communication system for Two Dimensional (2-D) Perfect Difference codes using Shifted Sine Functions (SSFs) is proposed here. The performance analysis for this OCDMA system has been done. This system is modeled and analyzed taking into account Multiple Access Interference (MAI) or Multiuser interference (MUI), Thermal Noise and Phase Induced Intensity (PIIN) noise. The performance of this system is compared to that of a DOCDMA system using SSFs as functional codes, Noncoherent spatial / spectral OCDMA system with 2-D perfect difference codes and OCDMA system for 2-D M-matrices codes. The results show that the proposed system improves the bit error rate (BER) performance for large number of users. Furthermore, it is found that for low values of the effective power for each user, the BER performance improves manifold. So, BER can be kept to very low values for lower power levels and hence, the system is more robust.
International Journal of Innovative Technology and Research
2013-06-01
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/78
International Journal of Innovative Technology and Research; Vol 1, No 3 (2013): APRIL - MAY; 261-264
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/96
2013-06-01T04:41:38Z
ojs:ART
OBJECT VISUAL TRACKING USING WINDOW-OBJECT TECHNIQUES AND KALMAN FILTERING
Sirisha, K.; Associate Professor,B V C College of Engineering,Amalapuram
Patnaik, Dr.Ramesh; Andhra University, Visakhapatnam
Visual Tracking,Kalman filter
This paper deals with the visual object tracking using window matching technique. Visual tracking used to determine the image configuration of a target region of a moving object. The visual tracking process consists on matching the target region in successive frames of a sequence of images taken at closely spaced intervals. Visual tracking has become an important process on various applications as: vision-based control, industrial robotics, biomedicine, aerial target tracking aircraft and car traffic monitoring and control, vehicle tracking system, determination of velocity for a moving object.
International Journal of Innovative Technology and Research
2013-06-01
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/96
International Journal of Innovative Technology and Research; Vol 1, No 3 (2013): APRIL - MAY; 265-269
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/97
2013-06-01T04:41:38Z
ojs:ART
MANAGEMENT INFORMATION SYSTEM: FEW TIPS BEFITTING SMALL BUSINESSES TO AVERT ID THEFT CRITICAL OF ILLICIT TECHNOLOGY
Lehobye, Nafta Mokate; Tshwane University of Technology, State Artillery Road, Pretoria-West,Republic of South Africa
Simha, Dr. K. Sreenivasa Vijaya; Researcher,Andhra Pradesh,South India
Entrepreneurialism; ID Theft; Management Information Systems; Legal Positioning
Carrying large sums of money everywhere has long been seen cumbersome and provocative practice to criminals. Later this practice was viewed unprofessional within business and corporate practice and was thus replaced by cheques and lately by bank cards loosely referred to as plastic money. Despite all, one-man small businesses should also use a cheque to withdraw money from their current bank accounts like macro businesses; it still makes a lot of real sense when they use bank cards just for a start for their cash withdrawals. Given these, all entrepreneurial efforts taken when establishing these businesses to avoid legal and financial risks, there is still much out there to look out for to protect their cash when effecting deposits and withdrawals using black stripped bank cards. These entrepreneurial management strategies are tailor-made to help small firms which have just been established as they have not as yet fully established themselves evade ID theft. In order to achieve to avert this kind of crime, this paper will then provide few tips as management strategies befitting small firms to rather circumvent the said crime. This paper also takes cognisance of what the South African (SA) law actually says to protect small firms from this particular financial risk brought about by this crime.
International Journal of Innovative Technology and Research
2013-06-01
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/97
International Journal of Innovative Technology and Research; Vol 1, No 3 (2013): APRIL - MAY; 270-277
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/99
2013-06-01T04:41:38Z
ojs:ART
DATA VALIDATION AND RELIABILITY PROOF IN CLOUD STORAGE
Srinivas, P.; MCA Student, Dept of MCA, DRK College of Engineering and Technology, Hyderabad, Andhra Pradesh, India
Krishnaiah, Dr.R. V.; PG Coordinator, Dept of CSE, DRK Group of Institutions, Hyderabad, Andhra Pradesh, India
Data Validation, Reliability, Cloud Storage, Service Level Agreement, Data Centers.
To the rising storage costs of IT Enterprises, the cloud computing has been envisioned as the de-facto solution. For enterprises to frequently update their hardware with the high costs of data storage devices as well as the rapid rate at which data is being generated it proves costly. A part from decrease in storage costs data outsourcing to the cloud also helps in sinking the safeguarding. User does not have any control as they are remotely located and cloud storage moves the user’s data to large data centers. However, this exclusive feature of the cloud poses many new safety challenges which need to be clearly unspoken and resolved. To assure the customer of the integrity i.e. correctness of his data in the cloud is one of the important concerns that need to be addressed is. To check if the reliability of his data is maintained or is compromised as the data is physically not accessible to the user the cloud should provide a way for the user. In this paper, to check the correctness of data in the cloud, a scheme which gives a proof of data integrity in the cloud which the customer can employ is proposed here. Both the cloud and the customer and can be incorporated in the Service level agreement (SLA) and this proof can be agreed. This method ensures that the storage space at the client side is negligible which will be valuable for thin clients.
International Journal of Innovative Technology and Research
2013-06-01
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/99
International Journal of Innovative Technology and Research; Vol 1, No 3 (2013): APRIL - MAY; 278-280
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/100
2013-06-01T04:41:38Z
ojs:ART
AN APPROACH TOWARDS EFFICIENT VIDEO DATA HIDING USING PROHIBITED ZONE
Radhika, V.; MCA Student, Dept of MCA, DRK Institute of Science and Technology, Hyderabad, Andhra Pradesh, India
Krishnaiah, Dr.R.V.; PG Coordinator, Dept of CSE, DRK Group of Institutions, Hyderabad, Andhra Pradesh, India
Video Data Hiding, Prohibited Zone, Broadcast, Selective Embedding.
The process of embedding information into a host medium is a data hiding. In general, due to their wide presence and the tolerance of human perceptual systems involved visual and arual media are preferred. The methods vary depending on the nature of such media and the general structure of data hiding process does not depend on the host media type. Due to the design complexities involved video data hiding is still an important research topic. A new video data hiding method that makes use of removal correction capabilities of replicate accumulate codes and advantage of prohibited zone data hiding is proposed in this paper. To determine host signal samples suitable for data hiding selective embedding is utilized in the proposed method. In order to withstand frame drop and insert attacks a temporal synchronization scheme is contained in this method. By typical broadcast material against MPEG- 2, H.264 compression, frame-rate renovation attacks, as well as other renowned video data hiding methods the proposed framework is tested here. For typical system parameters the decoding error values are reported. The imitation results specify that the frame can be effectively utilized in video data hiding applications.
International Journal of Innovative Technology and Research
2013-06-01
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/100
International Journal of Innovative Technology and Research; Vol 1, No 3 (2013): APRIL - MAY; 281-283
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/98
2013-06-01T04:41:38Z
ojs:ART
DISTRIBUTED DETECTION OF SAFE NODE CONFINE ATTACKS IN WIRELESS SENSOR NETWORKS
Mamatha, Y.; MCA Student, Dept of MCA, DRK College of Engineering and Technology, Hyderabad, Andhra Pradesh, India
Bandreddi, Jyothsna; Assistant Professor, Dept of CSE, DRK College of Engineering and Technology, Hyderabad, Andhra Pradesh, India
Safe Node, Confine Attacks, Wireless Sensor Networks, Data Privacy, Data Aggregation, Secret Key
In hierarchical data aggregation a severe safety hazard is originated by node confine attacks, where a hacker achieves full control over a sensor node through direct physical access in wireless sensor networks and it makes a high risk of data privacy. For hierarchical data aggregation in wireless sensor networks a securing node capture attacks is proposed in this paper. Each cluster is headed by an aggregator and the aggregators are directly connected to sink as network is separated into number of clusters. To the selected set of nodes in first round of data aggregation, the aggregator by identifying the detecting nodes selects a set of nodes randomly and broadcast an exclusive value which contains their validation keys. To relocate the data when any node within the group needs it transfers portion of data to other nodes in that group this is encrypted by individual validation keys. Each receiving node decrypts, sums up the portions and transfers the encrypted data to the aggregator. The data with the shared secret key of the sink and forwards it to the sink as the aggregator aggregates and encrypts. In the second round of aggregation the set of nodes is reselected with new set of authentication keys. The proposed technique resolves the security threat of node capture attacks is demonstrated by simulation results.
International Journal of Innovative Technology and Research
2013-06-01
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/98
International Journal of Innovative Technology and Research; Vol 1, No 3 (2013): APRIL - MAY; 284-286
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/107
2013-07-30T05:39:58Z
ojs:ART
FEEDING EFFECT OF MICROSTRIP PATCH ANTENNAARRAY IN THE Q-BAND
Youssef, Rhazi; System and Telecommunications Engineering Decision Laboratory, Ibn Tofail University,Sciences Faculty of Kenitra, B.P. 133 – Morocco
Bri, Seddik; Electrical Engineering Department, High School of Technology: ESTM
Moulay Isamil University, B. P 3103, Meknès – Morocco
Touahani, Rajaa; System and Telecommunications Engineering Decision Laboratory, Ibn Tofail University,Sciences Faculty of Kenitra, B.P. 133 – Morocco
Patch antenna array, Q-band Design, HFSS v13, Uniplanar corner fed, coaxial feed
In this paper, we present the simulation results of two types of patch antenna feeding in Q-band. The conception of these patch antennas is realized by software HFSS v13 "Ansoft-High Frequency Structure Simulator". The first type offeeding uses a uniplanar corner-fed patch antenna presented with single-point microstrip. The second uses the coaxial feed. The used antennas (single element antennaand the antenna arrays) are tested with the same parameters of feeding. According to the configuration of the antenna arrays, we used two and eight radiating elements antenna arrays. This work consists in modelling a rectangular patch antenna in order to find the best way of excitement either for a single element antennaor for an antenna array. Thus, we found the optimal position of feeding that permits to increase the return loss. The series of simulation results demonstrates the efficiency and the reliability of the proposed approach.
International Journal of Innovative Technology and Research
2013-07-30
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/107
International Journal of Innovative Technology and Research; Vol 1, No 4 (2013): JUNE - JULY; 278 - 282
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/117
2013-07-30T05:39:59Z
ojs:ART
A STUDY ON THE COMPARISON OF AHP AND FUZZY AHPEVALUATIONS OF PRIVATE TECHNICAL INSTITUTIONS IN INDIA
Chatterjee, Debmallya; Research scholar in the department of applied mathematics in Indian School of Mines, Dhanbad, India
Mukherjee, Bani; Professor, Department of Applied Mathematics, Indian School of Mines, Dhanbad, Jharkhand, India
Analytical hierarchy process, Fuzzy analytical hierarchy process, technical institutions, comparative study
The numbers of private technical institutions in India are increasing rapidly in the recent decade. Today there are thousands of private self-financed technical institutions most of which are compromising with their quality of education. Analytical hierarchy process (AHP) and its fuzzy extension (FAHP) are two of the efficient tools by which one can evaluate such institutions. There are ample numbers of studies in literature that discussed the efficiencies of the AHP and FAHP separately. This present piece of work makes an attempt to study and quantify the difference, if any in the applications of AHP and FAHP on the evaluation of self-financed private technical institutions in India.
International Journal of Innovative Technology and Research
2013-07-30
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/117
International Journal of Innovative Technology and Research; Vol 1, No 4 (2013): JUNE - JULY; 283 - 291
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/123
2013-07-30T05:39:59Z
ojs:ART
A NEW CO-OPERATIVE KEY GENERATION TECHNIQUE FOR SYMMETRIC ENCRYPTION
Nanda Kumar, DR.V.; Computer Centre,Alagappa University
Karaikudi, Tamil Nadu, India
Co-operative keys, Encryption, Symmetric Encryption, CKE, Block Cipher
This paper proposes a new method for generating symmetric keys. The keys are based on a co-operative key simulation model with participation from the sender and receiver. Since this method uses a secret key, it enjoys the benefits of the private key cryptography, using two 64-bit keys in parallel for generating a single 128-bit temporary key. The efficiency of the algorithm is proved on a mathematical basis.
International Journal of Innovative Technology and Research
2013-07-30
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/123
International Journal of Innovative Technology and Research; Vol 1, No 4 (2013): JUNE - JULY; 292 - 294
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/113
2013-07-30T05:39:59Z
ojs:ART
STUDY ,MODIFICATION AND ANALYSIS OF INCENTIVE SCHEME OF A LARGE HEAVY ENGINEERING INDUSTRY
Adhwarjee, Dilip Kumar; DR B.C.Roy Engineering College, Durgapur, West Bengal University of Technology, INDIA
Incentive, Wage, Productivity, Credit, Debit, Standard
Incentive is an motivational reward to all industrial workmen who are covered by Factories Act and guided by certified standing orders of the corporation. An incentive scheme may be defined as, ”a system of wage payment under which the earnings of an employee, or a group of employees , or all employees in an organisation is directly related to the output of an acceptable quality and over and above a standard laid down by means of predetermined formula” . The author here discusses only the financial incentive scheme.
International Journal of Innovative Technology and Research
2013-07-30
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/113
International Journal of Innovative Technology and Research; Vol 1, No 4 (2013): JUNE - JULY; 295 - 297
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/115
2013-07-30T05:39:59Z
ojs:ART
MULTI POSITIONAL TRACK AND MULTI MANAGEMENT IP TRACEBACK USING ANGLE BASED RECKONING SAMPLING PROCESS (ARSP)
ShyamalaDevi, V.; Associate Professor / Department of MCA, KSRCT,Tiruchengode , Tamilnadu
Umarani, Dr. R.; Associate Professor / Department of MCA, Saradha Womens College, Salem, Tamilnadu
DDoS, Direction based Segment Ratio, ARP, ICMP, ARSP
DistributedDenial of Service (DDoS) is a major issue for the availability of internetservices. The vast number of insecure machines available in the Internetprovides a fertile ground for attackers to compromise them and create attackzombies. Attack , mitigation and traceback of perpetrators is extremelydifficult due to a large number of attacking machines, the use ofsource-address spoofing or modifying IP address and the similarity betweenlegitimate and attack traffic. IPtraceback has been proposed where one attempts to reconstruct the entire attackpath, the attack packets have traversed or focusing only on the source ofattack packets, no matter which path they take for assault. IP Traceback (IPT)based on the geographical information, rather than the traditional IP addressinformation, has come to vogue. In this paper Multipositional view and Multi management IP Traceback mechanism for defense againstDistributed Denial of Service attacks”, has been addressed. This paper proposesa Multi dimensional representation with d(n) directions, where d(n) is theneighborhood direction ratio set generating function using the Angle basedReckoning Process (ARP) and also mitigates the Impossibilityof ensuring adequate space in the packet header during its flight, by the Anglebased Reckoning Sampling Process. To demonstrate the entire process and analyticallysimulate that the proposed mechanism react quickly blocking attack trafficwhile achieving high survival ratio for legitimate traffic.
International Journal of Innovative Technology and Research
2013-07-30
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/115
International Journal of Innovative Technology and Research; Vol 1, No 4 (2013): JUNE - JULY; 298 - 303
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/116
2013-07-30T05:39:59Z
ojs:ART
POTENTIAL HOSPITAL LOCATION SELECTION USING FUZZY-AHP: AN EMPIRICAL STUDY IN RURAL INDIA
Chatterjee, Debmallya; Research scholar in the department of applied mathematics in Indian School of Mines, Dhanbad, India
Mukherjee, Bani; Professor, Department of Applied Mathematics, Indian School of Mines, Dhanbad, Jharkhand, India
Hospital location, FAHP, multi criteria decision making, pair wise comparison, selection, expert opinion
Selection of a location for a potential hospital is a strategic issue and often decides the fate of such a facility. It is thus important to evaluate the locations from multiple dimensions including subjective and objective factors before selecting a site as the decision cannot be reverted in case it goes wrong. This paper makes an attempt to perform a multi criteria evaluation of potential hospital locations using Fuzzy Analytical Hierarchy process (FAHP) using a case of three potential rural sites in India. Three major factors and eleven sub factors are considered for the location selection evaluation. Findings show that among the sub factors, cost of land, population density and proximity to public transport evolved as the three most significant sub factors.
International Journal of Innovative Technology and Research
2013-07-30
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/116
International Journal of Innovative Technology and Research; Vol 1, No 4 (2013): JUNE - JULY; 304 - 314
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/112
2013-07-30T05:39:59Z
ojs:ART
STABILITY ANALYSIS OF VARIABLE FREQUENCY TRANSFORMER PARK USING ADVANCED CONTROLLING SCHEME
Thomas, Chinchu
Dyaneswaran, A.
Floquet theory, limit cycle method, sequential Continuation scheme, stability analyses, variable-frequency transformer (VFT), wound-rotor induction machine, Fuzzy controller, particle swarm optimization
This paper deals with stability analysis of Variable Frequency Transformer (VFT). To determine the stability of a VFT, a new approach based on Sequential Continuation Scheme, Floquet theory and the Limit Cycle Method is presented in this paper.VFT park model is proposed in this paper is to allow the simulation of multi unit VFT for increasing power transfer between two electric networks. Each VFT unit consists of round rotor synchronous machine, Dc motor and a control system. Here Fuzzy controllers are used for the control of power and speed, this action is controlled by Particle Swarm Optimization. Stability diagram are reported for changes of the VFT parameter, power transfer and frequency on both sides of the asynchronous link.
International Journal of Innovative Technology and Research
2013-07-30
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/112
International Journal of Innovative Technology and Research; Vol 1, No 4 (2013): JUNE - JULY; 315 - 320
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/109
2013-07-30T05:39:59Z
ojs:ART
MAGNETO-HYDRODYNAMICS BOUNDARY LAYER FLOWS OVER A STRETCHING SURFCE WITH RADIATION IN POROUS MEDIUM
Mukherjee, Bani; Dr Bani Mukherjee, Professor, Department of Applied Mathematics, ISM, Dhanbad, Jharkhand, India
Prasad, Nrayan; Research Schooler, Department of Applied Mathematics, ISM, Dhanbad, Jharkhand, India
Boundary layer, Unsteady flow, Stretching surface, Porous medium, Thermal Radiation, Heat source or sink
The aim of this paper is to investigate the effect of thermal radiation and heat transfer on two dimensional unsteady flow of viscous, incompressible fluid on a continuous stretching surface embedded in porous medium under the influence of transverse magnetic field and the presence of heat source or shrink. Roseland’s approximation is used to model the radiative heat transfer. The governing boundary layer equation containing permeability parameter, magnetic field parameter, source or shrink parameter, Prandlt number, and unsteadiness parameter are transferred to ordinary differential equations by using suitable similarity variables. These equations are solved by applying Nechtshein-Swinger shooting iteration technique together with Runge Kutta fourth order scheme. The velocity profile, the skin friction-co-efficient and the rate of heat transfer are computed, discussed and have been graphically represented for various value of different parameter.
International Journal of Innovative Technology and Research
2013-07-30
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/109
International Journal of Innovative Technology and Research; Vol 1, No 4 (2013): JUNE - JULY; 321 - 326
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/124
2013-07-30T05:39:59Z
ojs:ART
AN INNOVATIVE ANGLE IN THE APPLICATION OF CRYPTOGRAPHY TO NETWORK SECURITY
Khan, H. Mohammed; Lecturer,Department of Computer Science,Shaqra University,Shaqra,K.S.A
Chandran, Dr.J.George Chellin; Principal,C.S.I College of Engineering,Ooty,Tamilnadu,India
Kingsly, C.Sahaya; Research Scholar,Manonmanium Sundaranar University,Tirunelveli.India
Cryptographic Algorithm, Network Security, Communication security.
Network Security is protecting data transmitted over a network and privacy is of utmost importance. Rapid developments in information technology makes Data Security a challenging issue of data communications in the global networked world. Vital information of offices and organizations has to be guarded from unauthorized persons who may tamper with the information. Sensitive information is exposed to threats like masquerades, corruption or denial of services [1, 2]. Secure systems need to maintain integrity and privacy of data [3]. Designing an appropriate security system to protect proprietary information requires developing a set of appropriate solutions for specific risk scenarios. One important tool to protect information is the use of cryptography for hiding contents of a message and Confidentiality of network communications. The applications of cryptography go beyond networks, business and customers. This paper suggests a new direction in using cryptography for network security.
International Journal of Innovative Technology and Research
2013-07-30
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/124
International Journal of Innovative Technology and Research; Vol 1, No 4 (2013): JUNE - JULY; 327 - 330
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/138
2013-07-30T05:39:59Z
ojs:ART
MITIGATION OF HARMONICS BY USING STATCOM
Kadam, D. P.; Department of Electrical Engineering,K. K. Wagh Institute of Engineering Education & Research,Panchawati, Nasik 422003, M.S., India
Kushare, Prof. Dr. B. E.; Department of Electrical Engineering,K. K. Wagh Institute of Engineering Education & Research,Panchawati, Nasik 422003, M.S., India
Synchronous generator; PSCAD; Wind Turbine Generator (WTG); Static Synchronous Compensator (STATCOM); harmonics analysi
This paper discusses the modeling of linear and nonlinear load used in wind power plant.Harmonis analysis of the wind farm system is essential to study the behavior of equipments connected in the non sinusoidal system environment for designing and optimal location of STATCOM. Simulation models are developed for linear and nonlinear load. Analysis of voltage and current harmonics is performed for these loads individually. Wind turbine connected to synchronous generator is modelled using PSCAD simulation software to analyse the said issues where STATCOM is introduced as an active voltage and reactive power supporter to increase the power system stability. STATCOM can significantly mitigate the harmonis issues.STATCOM unit is developed to inject reactive power for mitigation of harmonis issues and to get stable grid operation.
International Journal of Innovative Technology and Research
2013-07-30
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/138
International Journal of Innovative Technology and Research; Vol 1, No 4 (2013): JUNE - JULY; 331 - 335
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/132
2013-07-30T05:39:59Z
ojs:ART
MATHEMATICAL MODELLING OF DYNAMIC INDUCTION MOTOR HAVING BEARING FAULT IN MATLAB SIMULINK
Kamal, Ashish; Department of Electrical,Madan Mohan Malviya Engineering College,Gorakhpur, Uttar Pradesh, India
Giri, Dr. V.K.; Department of Electrical,Madan Mohan Malviya Engineering College,Gorakhpur, Uttar Pradesh, India
Induction Motor, Bearing Fault, Current Spectrum, Matlab, Simulink
In this paper the modelling of 3 phase induction motor having bearing fault is being carried out with the help of dq0 axis transformation. The theory of axis transformation is widely used to create such model because it reduces the complexities of time-varying variables. In this paper, a step by step Simulink implementation of an induction machine using dq0 axis transformations of the stator and rotor variables in the arbitrary reference frame. For this purpose, the relevant equations are derived and stated at the beginning, and then a generalized model of a three-phase induction motor is developed and implemented in an easy to follow way.
International Journal of Innovative Technology and Research
2013-07-30
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/132
International Journal of Innovative Technology and Research; Vol 1, No 4 (2013): JUNE - JULY; 336 - 340
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/129
2013-07-30T05:39:59Z
ojs:ART
IMPLEMENTATION OF CLOUD COMPUTING IN E-GOVERNANCE – A GREEN REVOLUTION
Mathew, Saju; Lecturer, Dept. of Information Technology, Al Khawarizmi International College, Abu Dhabi, U.A.E.
Cloud computing, service-oriented architecture, e-governance, e-government, benefits.
Cloud computing is one of the most popular, exciting and emerging technologies in the area of information technology. It has gained its popularity due to three important features 1) cost-effectiveness, 2) flexibility and 3) access to vast variety of pool of resources. Cloud computing mostly works through Internet and due to recent developments in Internet; it has become one of the promising and interesting technologies to be used by various organizations, institutions for learning purposes etc. Many government organizations are now trying to adopt the cloud computing technologies and trying to render their services through clouds. To adapt to these technologies special service-oriented architecture (SOA) has to be developed than the traditional used structure. This paper tries to describe that by implementing the cloud computing model and architecture a good e- governance strategy and framework can be developed for e-government. It also discusses about SOA, challenges of e-governance and benefits of using cloud computing in e- governance.
International Journal of Innovative Technology and Research
2013-07-30
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/129
International Journal of Innovative Technology and Research; Vol 1, No 4 (2013): JUNE - JULY; 341 - 345
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/137
2013-07-30T05:39:59Z
ojs:ART
STUDENT-CONTROLLED SOCIAL NETWORKS FOR PROMOTING HOLISTIC DEVELOPMENT FROM THE PRESPECTIVES OF STUDENT COACHES
SO, Joseph Chi Ho; Hong Kong Community College,The Hong Kong Polytechnic University, HKSAR, China
LAM, Siu Yuen; Hong Kong Community College,The Hong Kong Polytechnic University, HKSAR, China
Facebook; Learning Support; Social Networks; E-learning Platforms; Virtual Communication; Student Holistic Development, Student Coaches
Many previous research works have studied the impact of online social networks for educational purposes. We examine in particular how Facebook is being used as a platform to communicate among students of an on-going student development project run by a local tertiary institute in Hong Kong so as to facilitate promotion and foster participation and interaction. The study focuses on the perspectives from student coaches and evaluate on the facilitation and difficulties in promoting self-initiated holistic development via Facebook. The study shows that instant interaction between participants and student coaches via Facebook can lead to information circulation in a much faster and effective manner compared with traditional communication channels such as email or bulletins. However, limitations are found on the lack of proactive discussions initiated by participants, and the difficulties in establishing active interactions between coaches and participants. This has undermined the effectiveness of promoting to participants’ in self-initiated holistic development.
International Journal of Innovative Technology and Research
2013-07-30
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/137
International Journal of Innovative Technology and Research; Vol 1, No 4 (2013): JUNE - JULY; 346 - 359
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/139
2013-07-30T05:39:59Z
ojs:ART
AUTOMOTIVE SEAT DESIGN CONSIDERATIONS THROUGH COMPARATIVE STUDY OF ANTI WHIPLASH INJURY CRITERIA
Chavare, Ajay Prabhakar; Walchand Institute of Technology, Solapur, Solapur University, Maharashtra, India
Sarawade, Dr. Sunil; Walchand Institute of Technology, Solapur, Solapur University, Maharashtra, India
Jatkar, Dr. K.H.; Walchand Institute of Technology, Solapur, Solapur University, Maharashtra, India
Automobile Passive safety, Backset, BioRID, Euro-NCAP, GTR7, Head Restraint Measurement Device (HRMD), Hybrid III Dummy, IIHS, Injuries in rear accidents, RCAR, Seat head restraint, Whiplash injuries
Although whiplash injuries can occur in any kind of crash, an occupant's chances of sustaining this type of injury are greatest in rear-end collisions. When a vehicle is struck from behind, typically several things occur in quick succession to an occupant of that vehicle. An objective for this research paper is to compare the relation between the anti whiplash criteria, their effectiveness & possibility of verifying the defined performance limits by various consumer rating groups, insurance agencies, and regulatory authorities. This research paper describes work done by different OEMs worldwide on Whiplash injuries. It focuses on methodologies, test requirements; instrumentation and setup defined in protocol by different groups on passive safety i.e. GTR7, EuroNCAP, IIHS and RCAR. This research was carried with methodology / process specified in GTR 7 i.e. use of dynamic sled testing and static measurements by R point and H point methods using HPM with HRMD and other different protocols. Lastly we observed significant contribution of seat backset parameter to whiplash injuries in dynamic sled test. Means higher the backset more is relative head rotation v/s torso leading to whiplash injuries. Seat system design parameters such as R / H point, Seating Torso angle and Head restraint profile, seat geometry govern Backset dimension.
International Journal of Innovative Technology and Research
Walchand Institute of technology, Solapur, Maharashtra, India
2013-07-30
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/139
International Journal of Innovative Technology and Research; Vol 1, No 4 (2013): JUNE - JULY; 360 - 367
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/143
2013-11-17T17:02:26Z
ojs:ART
ESTABLISHMENT OF STANDARD TIME IN DIFFERENT SECTIONS/ DEPARTMENTS OF A LARGE HEAVY ENGINEERING INDUSTRY
Adhwarjee, Dilip Kumar; DR B.C.Roy Engineering College, Durgapur, West Bengal University of Technology, INDIA
Allowances, Observed time, Normal time, Standard time, Performance rating
To establish the standard time work measurement techniques are applied. First of all the actual time taken in completing the job or desired task is noted down. This time is called the Observed time. Then we rate the worker under performance rating scale. Including this rating we calculate the Normal time. Adding the allowances to the normal time we establish the Standard time for the job under study.
International Journal of Innovative Technology and Research
2013-09-29
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/143
International Journal of Innovative Technology and Research; Vol 1, No 5 (2013): August -September; 368 - 372
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/149
2013-11-17T17:02:26Z
ojs:ART
ANALYSIS OF PROXY MOBILE IPv6 BASED ON MULTIHOMING TECHNOLOGY
Mathi, Indu; National College of Engineering,Maruthakulam,TamilNadu,India
Vathani, Dr.D.Shalini Punitha; Government College of Engineering,Tirunelveli,Tamilnadu,India
PMIPv6,F-PMIPv6, transient binding, multi-homing, LR, m-LMA, u-BCE, m_MAG, handover
This document specifies the problems of multihoming in Proxy Mobile IPv6(PMIPv6) and analysis the solutions of multihoming problem with various multihoming protocols in PMIPv6.In this paper provides the analysis between are PMIPV6,FPMIPv6(Fast Handovers for PMIPv6) PMIPv6 with TRANSIENT BINDING. Proxy Mobile IPv6 (PMIPv6) is a protocol for building a common and access technology independent of mobile core networks, accommodating various access technologies such as WiMAX, 3GPP, 3GPP2 and WLAN based access architectures. Fast Handover for Proxy MIPv6 (F-PMIPv6), introduced in RFC 5949, performs an efficient handover by reducing the delay and minimizing packet loss without involving the MN in signaling to comply with the main goal of PMIPv6 [2], [22]. This protocol is based on establishing a bidirectional tunnel between the Previous MAG (PMAG) that the MN is handing over from and the NMAG that the MN is handing over to and performing context transfer between them. Transient Binding is a mechanism applicable to the mobile node's inter-MAG handover while using a single interface or different interfaces. The extension of Proxy Mobile IPv6 with transient binding will support multi-homing and optimizes the handover. Here the handover problem in multihoming is reduced by transient binding by using modified Local Mobility Anchor (m-LMA) with its updated Binding Cache Entry (u-BCE). Also this mechanism efficiently supports the uplink and downlink packets between mobile nodes, so it avoids superfluous packet forwarding delay and packet loss.
International Journal of Innovative Technology and Research
2013-09-29
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/149
International Journal of Innovative Technology and Research; Vol 1, No 5 (2013): August -September; 373 - 379
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/152
2013-11-17T17:02:26Z
ojs:ART
SIMULATION AND IMPLEMENTATION OF A SEVEN-LEVEL MULTISTRING INVERTER FOR FUEL CELL APPLICATIONS
R., Seyezhai; Associate Professor,Department of EEE, SSN College of Engineering, Kalavakkam-603110, Tamilnadu, India
B, Savitha; UG Student,Department of EEE, SSN College of Engineering, Kalavakkam-603110, Tamilnadu, India
Gomathi, A.Priyaa; UG Student,Department of EEE, SSN College of Engineering, Kalavakkam-603110, Tamilnadu, India
Multistring inverter; multireference PWM; fuel cell & THD
Multi string inverter is a suitable topology for converting DC to AC power which is designed for high voltage DC inputs. Using this, many fuel cell systems are wired in series, rather than in parallel. The panels are arrayed in a "string" to produce the same amount of total power but at higher voltages thus lowering the current. This paper presents a novel seven-level multistring inverter suited for fuel cell applications. The proposed inverter requires eight switches that are connected back to back compared to twelve switches in the conventional multilevel inverter topology. A new multicarrier PWM technique with variable amplitude carrier has been introduced for the chosen topology. The seven-level multi-string inverter with fuel cell as the DC source has been simulated in MATLAB/SIMULINK with filter. It is found that the proposed multicarrier PWM technique gives a lower THD compared to multi reference. A prototype of the multistring inverter is built using IGBTs and gating signals are generated using PIC microcontroller. The simulation results are verified experimentally.
International Journal of Innovative Technology and Research
2013-09-29
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/152
International Journal of Innovative Technology and Research; Vol 1, No 5 (2013): August -September; 380 - 385
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/154
2013-11-17T17:02:26Z
ojs:ART
SOLID WASTE MANAGEMENT AND KOLKATA MUNICIPAL CORPORATION- A GIS AND MIS APPROACH
Maity, S K; West Bengal University of Technology
Bhattacharyay, B K; Department of Mechanical Engineering, BESUS
Bhattacharyya, B; Department of Production Engineering, Jadavpur University
about the reformation in the concepts of the data management and the analysis carried with the help of GIS. Once the waste management department is aware of the total function of the GIS system, it will get acquainted with its effectiveness. Then there will be an entire record of all the things related to the waste management and suitable logistic management and spatial planning can be achieved. This can be done with the help of GIS analysis on the different layers for practical implementations. By applying the functions like overlaying, applying buffer for proximity analysis or by applying queries through a structured query language (SQL) the required information can be extracted. • Demographic map can be used to know the more waste generating areas. • The category of waste like domestic, industrial, commercial etc can be found out easily with the help of the land use map. • Existing location of the waste bins and the street maps will provide the proximity of the bins to the waste collection service routes. In case of any inconveniency for the waste collecting crew the bins can be re located. • A map showing the current waste generated and the waste generated in different wards, sectors and along the roads, streets and junctions. These above enlisted points are said to be an important exercise to begin with. The points overall covers many waste management issues, but they are very generalize and require a lot of data and proper analysis using the GIS software. There will be a requirement to develop several models to apply all those points on the real time data.
International Journal of Innovative Technology and Research
2013-09-29
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/154
International Journal of Innovative Technology and Research; Vol 1, No 5 (2013): August -September; 389 - 393
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/153
2013-11-17T17:02:26Z
ojs:ART
X-RAY PLASMON SATELLITES IN LANTHANIDE COMPOUNDS
Singh, Ajay Vikram; Associate Professor, Rajarshi Rananjay Sinh Institute of Management & Technology, Amethi , CSJ Nagar, U.P. , India
Vikram Singh, Dr. Ajay; Associate Professor, Rajarshi Rananjay Sinh Institute of Management & Technology, Amethi , CSJ Nagar, U.P. , India
Kesri, Deepak; Research Scholar , C-56 sector 'O' Aliganj lucknow
This Paper is devoted to Investigate and study to X-ray Plasmon Satellites in Lanthanide compounds ( La , La2O3 , LaF3 , La(OH)3 , Ce(OH)3 )
International Journal of Innovative Technology and Research
2013-09-29
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/153
International Journal of Innovative Technology and Research; Vol 1, No 5 (2013): August -September; 386 - 388
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/156
2013-11-17T17:02:26Z
ojs:ART
MOBILE INFORMER BASED COLANDER SCHEME FOR DATA DISSEMINATION IN WIRELESS SENSOR NETWORKS
Sree, S. Rama; Associate Professor & HOD,Computer Science & Engineering Department, Aditya Engineering College
Gopal Reddy, P.S.S.
Wireless Sensor networks are composed of huge number of motes having less energy, memory and computational resources. They are having short range of transmission or communication deployed in hostile environments such as battlefields to monitor the activities of adversaries. Incorporation of security protocols in such networks is a challenging task due energy constrained environment. So that sensor networks are vulnerable to various types of malicious attacks. One such attack is false report injection, in which attackers inject false data reports of events those are never occur, tampered readings and duplicate readings. These type cause false alarms at the base station and drain out the energy at redirector nodes. Therefore, it is very important to design a dynamic quarantine scheme to filter these attacks or at least alleviate their impact on wireless sensor networks. Proposed system addressing the some of the issues related to the false report generation, detection and reduction. A novel mobile informer mechanism is introduced at network administrator level to cross check the behaviour of the base station and other nodes at each level. The simulation results show the reduction in the false report generation and increased detection capabilities and isolation of compromised nodes.
International Journal of Innovative Technology and Research
2013-09-29
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/156
International Journal of Innovative Technology and Research; Vol 1, No 5 (2013): August -September; 394 - 397
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/157
2013-11-17T17:02:26Z
ojs:ART
CHANCE CONSTRAINED MIXED ALLOCATION
Ahsan, M. J.; Department of Statistics & Operations Research
Naz, Farha; Department of Statistics & Operations Research
Ahsan et al. (2005) introduced the idea of “Mixed Allocation” in stratified sampling. In the present paper the work of Ahsan et al. (2005) has been extended when the per unit measurement costs in various strata are random variables and there is a small probability of violation of the cost constraint. The problem of obtaining the optimum allocation in the stated situation is formulated as a Nonlinear Chance Constrained Programming Problem. A solution procedure is developed by converting the Chance Constraint in an equivalent deterministic form. A numerical example is also presented to illustrate the computational details.
International Journal of Innovative Technology and Research
2013-09-29
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/157
International Journal of Innovative Technology and Research; Vol 1, No 5 (2013): August -September; 398 - 401
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/159
2013-11-17T17:02:26Z
ojs:ART
COMPARATIVE STUDY OF NETWORK CODING SCHEMES FOR EFFICIENT ERROR RECOVERY IN UWSN
Balamurugan, S.; M.S.U (Research scholar), Department of Information Technology, Rajiv Gandhi College of Engineering & Technology, Puducherry
Saraswathi, Dr.S.; Professor, Department of Information Technology, Pondicherry Engineering College, Puducherry
Jayadhrini, J.; Student, Department of Information Technology,MIT (chrompet Chennai)
Hadamard , FEC,PDR, Error efficiency,UWSN
Underwater wireless sensor networks have been made a practical solution for wide range of application areas such as search of energy resources, environmental monitoring , early warning of natural disasters and military uses like surveillance ,mines, intruders .The most significant challenge in sensor networks is to overcome the energy constraints since individual sensor nodes has limited energy to consume. We believe that Hadamard code works with promising network coding scheme for providing efficient error recovery. So far hadamard code is not used in underwater wireless sensor networks. In this paper, we implement and compare the hadamard code with forward error correction (FEC) using network coding for efficient error recovery and also to enhance the efficiency of the network. In order to compare hadamard code with forward error correction we consider certain constraints such as throughput, total overhead, packet delivery ratio(PDR),etc.. Hence we implement these two codes through simulation in NS-2 and estimate their performance rate. Here we evaluate the performance of these two codes and prove that Hadamard code can be used for efficient error recovery in wireless sensor networks when compared to other coding techniques like FEC and ARQ and also this research work helps with the systems which use FEC having high error rate, can be replaced by the introduction of hadamard code in that system for better error efficiency.
International Journal of Innovative Technology and Research
2013-09-29
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/159
International Journal of Innovative Technology and Research; Vol 1, No 5 (2013): August -September; 402 - 410
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/161
2013-11-17T17:02:26Z
ojs:ART
EMPIRICAL MODELING AND ANALYSIS OF LASER BEAM CUTTING
Sowjanya, M.; PG Student, ME Department, MITS, Madanapalle
Harinath Gowd, Dr.G.; Professor, ME Department, MITS, Madanapalle,
Laser Beam Cutting; Inconel 600; RSM .
Laser Beam cutting (LBC) process is a widely used advanced cutting technique in Automotive, Aerospace, Electronic and Heavy manufacturing industries to cut a variety of metals and alloys with ease. The precision levels and edge quality achieved with laser cutting machines are better than traditional cutting methods. However the quality of cut depends upon the proper selection of input process parameters. Improperly selected process parameters may result in the loss of the quality of the cut. In this paper, the development of mathematical equations using a three factor 5- level factorial technique to predict the geometry of laser cut of INCONEL 600 plate sheet of 1.7mm thickness are presented. The overall goal of this research is to model Laser beam cutting process. The LBC process involves large number of control variables namely pulse frequency, pulse width, cutting speed, energy. However, after conducting a few numbers of trail experiments and through literature survey it was found that the parameters, pulse frequency, pulse width, cutting speed, energy, has significance effect on the output parameters Kerf width (KW) and MRR. Hence they are considered as the control parameters in the present work. After conducting the experiments as per the DOE, RSM is applied for modeling i.e to predict the accurate models between the input variables and the output measures. The need in developing the mathematical relationship is to relate the machining responses to the cutting parameters there by facilitating the optimization of the machining process. Then these mathematical models were used for subsequent optimization by the NGSA-II algorithm.
International Journal of Innovative Technology and Research
2013-09-29
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/161
International Journal of Innovative Technology and Research; Vol 1, No 5 (2013): August -September; 411 - 416
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/163
2013-11-17T17:02:26Z
ojs:ART
INVENTIVE TRANSPORTATION SYSTEM BY A TECHNOLOGY OF SENSOR INTERFACED NETWORK
Santhan, Perisetty Naga; jntu university ,hyderabad.
Krishnaiah, Dr.R.V.; Principal, Dept of ECE, DRK-Institute of Science & Technology, Hyderabad, A.P
Sensor network, System based transportation, Intelligent system, Data authentication, Alert based accident oriented strategy respectively.
Here with rapid advancement in the technology related to the wireless based approach related to the field of the communication based approach in a well oriented fashion respectively. Here there is a huge advancement in the usage of the sensor oriented strategy where is an accurate retrieval of the data in automated fashion related to the sensor oriented strategy where there is an accurate detection of the data in a well oriented approach respectively. Here these particular type of the approach is generally use in the many of the applications and some of them includes system based on the transportation, Military oriented analysis followed by the civil aviation, Bio medical based analysis that is the applications related to the field of the bio medical oriented strategy followed by the communication, Automation oriented strategy, Smart grids followed by the smart homes in a well oriented fashion respectively. Here is a huge research related to the applications oriented with respect to the industrial based automation oriented strategy in a well efficient manner even though there is not much changes in the strategy related to the environmental oriented aspects of the physical strategy in a well oriented fashion respectively. There is a revolution related to the technology oriented with respected to the information based aspect there is a huge research based analysis is going on the present strategy where it is completely based on the implementation followed by the development approach in a well effective manner respectively. Experiments have been conducted on the present technique where the evaluation of the analysis in an accurate fashion followed by the evaluation of the performance oriented strategy is shown in a well accurate fashion respectively.
International Journal of Innovative Technology and Research
2013-09-29
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/163
International Journal of Innovative Technology and Research; Vol 1, No 5 (2013): August -September; 417 - 422
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/150
2013-11-17T17:02:26Z
ojs:ART
OPTIMUM ALLOCATION IN MULTIVARIATE TWO STAGE SAMPLING: A COMPARISON OF TWO APPROACHES
Iftejhar, Sana; Research Scholar, "Aligarh Muslim University"
Multivariate Two-Stage Sampling; Multi objective Programming Problem; Goal Programming; Fuzzy Programming.
In this paper, an attempt has been made to solve the problem of optimum allocation in a Multivariate Two-Stage Sampling Design. The problem is formulated as a Multiobjective Nonlinear Programming Problem. The solution to this problem is obtained using Goal Programming and Fuzzy Programming separately. Both of the approaches needs an aspiration level for each objective. These aspiration levels are determined by the decision maker. A numerical example is presented to illustrate the relationship between the two approaches.
International Journal of Innovative Technology and Research
fellowship; University Grant Commission
2013-09-29
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/150
International Journal of Innovative Technology and Research; Vol 1, No 5 (2013): August -September; 423 - 426
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/164
2013-11-17T17:02:26Z
ojs:ART
OBSERVATIONS ON TRIANGULAR PRISM NUMBER
Gopalan, M. A.; Professor, Dept.of Mathematics,Srimathi Indira Gandhi College,Trichy-2
Sangeetha, V.; Asst. Professor,Dept.of Mathematics,National College,Trichy-1,
Somanath, Manju; Asst. Professor,Dept.of Mathematics,National College,Trichy-1,
Polygonal number,Pyramidal number,Centered Polygonal number, Centered Pyramidal number,Prism number,Special numbers.
We obtain different relations among Triangular Prism Number and other two,three and four dimensional figurate numbers
International Journal of Innovative Technology and Research
2013-09-29
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/164
International Journal of Innovative Technology and Research; Vol 1, No 5 (2013): August -September; 427 - 432
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/166
2013-11-17T17:02:26Z
ojs:ART
FIELD-ORIENTED CONTROL OF PERMANENT MAGNET SYNCHRONOUS MOTOR DRIVE SYSTEM USING MATRIX CONVERTER
Naresh, Anyam; PG Scholar, Electrical and Electronics Engineering Department, Nimra College of Engineering and Technology (NCET), Vijayawada.
Mohammed, Firozali; Associate Professor, Electrical and Electronics Engineering Department, Nimra College of Engineering and Technology (NCET), Vijayawada.
Durga Devi, Gunnam; PG Scholar, Electrical and Electronics Engineering Department, Nimra College of Engineering and Technology (NCET), Vijayawada.
Bhimaraju, P.S.D.; Assistant Professor, Electrical and Electronics Engineering, Regency Institute of Technology, Pondicherry University.
Field-Oriented Control, matrix converter, PMSM, hysteresis current control
In this paper a Field-Oriented Control of permanent magnet synchronous motor (PMSM) drive system using adapted hysteresis current control based on matrix converter is presented. The matrix converter is an arrangement of controlled semiconductor switches that connects directly the three-phase source to the three-phase load. This converter has several attractive features that have been research in the last two decades. To increase use of input voltage assets, input voltages are split into 12 divisions within one cycle. A adapted current controller collected of two nested current hysteresis control is evaluate in details. According to the outputs of current controller and division of input voltages, a proper input voltage must be selected to increase or decrease output current of matrix converter. The division table is evaluate and moderately deduced. Finally, simulation system is designed. Simulating results illustrate that Field-Oriented Control of PMSM drive system using adapted hysteresis current control based on matrix converter has the quality of practicability and efficiency, which brings out theoretical fundamentals of experimentation.
International Journal of Innovative Technology and Research
2013-09-29
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/166
International Journal of Innovative Technology and Research; Vol 1, No 5 (2013): August -September; 433 -437
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/169
2013-11-17T17:02:26Z
ojs:ART
CASCADED H-BRIDGE MULTI LEVEL CONVERTER POWER BALANCE ANALYSIS BY DC LINK VOLTAGES
Devi, Gunnam Durga; PG Scholar,NCET, Vijayawada.
Basha, S K Gouse; Assistant Professor,NCET, Vijayawada.
Mohammed, Firozali; Associate Professor,NCET, Vijayawada.
Naresh, Anyam; PG Scholar,NCET, Vijayawada.
cascaded hybrid bridge inverters, two cell bridges
Multi-level converters have tremendous applications in the power industry and specially cascaded H-bridge (CHB) converters have a vital role in high power applications. They present a new set of features that are well suited for real and reactive power compensation. The distinctive feature of the multilevel inverters is to provide high switching frequencies with low switching losses. In this paper, power balance analysis of single phase cascaded H bridge converter is presented. Power delivering from source to load or load to grid is analyzed by required ac output voltage and from de link voltages. Detailed power balance analysis of this converter has been carried out using MATLAB/SIMULINK and simulation results are shown.
International Journal of Innovative Technology and Research
2013-09-29
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/169
International Journal of Innovative Technology and Research; Vol 1, No 5 (2013): August -September; 438 - 443
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/146
2013-11-17T17:02:26Z
ojs:ART
MANAGING CONTEMPORARY NETWORKS OF IPV4 AND IPV6 OVER VARIOUS TRANSITION TECHNIQUES
Radley, Sheryl; Research Scholar,Department of CSE
Government College of Engineering,Tirunelveli.
Punithavathani, D. Shalini; Principal Department of CSE
Government College of Engineering-Tirunelveli,
IPv4/6 transition, tunnelling, Dual Stack Lite, 6rd, Softwire mesh, NAT444.
IPv4/IPv6 transition rolls out several challenges to the world of internet. IETF proposes various transition techniques including dual stack, translation and tunnelling transition mechanisms. Transition techniques enables a smooth transition to the new version of IP. Out of the three mechanisms Tunneling proves to be most effective in the study which has been done as it keeps the end-to-end model that the Internet is built on. The 6rd mechanism that is used for IPv4/IPv6 transition mechanism permits an IPv6 mobile node to roam into IPv4 based network and get serviced besides roaming in IPv6 based network. The swot shows the positive usage of one of the primary technologies which includes NAT444, NAT6, Dual stack Lite and stresses why the 6rd should be a priority and a wide scale. This shows a steady deployment and spread in use of IPv6.
International Journal of Innovative Technology and Research
2013-09-29
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/146
International Journal of Innovative Technology and Research; Vol 1, No 5 (2013): August -September; 444 - 451
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/171
2013-11-17T17:02:26Z
ojs:ART
CLUSTERING ORIENTED APPROACH BASED ON ENSEMBLE METHOD
Pyata, Keerthana; M.Tech Student,Dept of CSE,Gokaraju Rangaraju Institute of Engineering and Technology,Nizampet, A.P, India
Sampathi Rao, Govinda Rao; Assistant Professor,Dept of CSE,Gokaraju Rangaraju Institute of Engineering and Technology,Nizampet, A.P, India
Feature extraction, Data classification, Clustering, Fusion based similarity score, Distance measure.
With the rapid increase in the technology there should be some effectiveness has to be maintained from the user perspective respectively. Where the grouping of the data related to the similarity in their property takes place. Here for the purpose of the grouping of the data there is an extreme method for the accurate classification of the data which is mainly used for the effective retrieval based priority respectively. Therefore for the effective grouping based strategy there is a method called clustering is used. Here clustering is one of the advanced technique for the effective classification purpose. Clustering is one of the advanced technique in the classification of the data. It is the extended version of the segmentation followed by the feature extraction based on the morphological operation involved in it. The main definition of the clustering is dividing the data and grouping them based on the similarity of the neighboring interdependent properties involved in it. Here in the present method clustering based on the ensemble method is used for the effective classification of the data respectively. Even though there are huge number of the clustering techniques this method is effective and efficient in terms of the performance based strategy followed by the accurate analysis with respect to the ensemble applications involved in it. Experiments are conducted where the analysis is done for the effective performance based strategy.
International Journal of Innovative Technology and Research
2013-09-29
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/171
International Journal of Innovative Technology and Research; Vol 1, No 5 (2013): August -September; 452 - 454
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/172
2013-11-17T17:02:26Z
ojs:ART
QUERY CONSTRUCTION BASED INCREMENTAL KEYWORD
Sravya, Mothe; M.Tech Student,Dept of CSE,Padmasri Dr.B.V.Raju Institute of Technology,Narsapur, A.P, India
Babu, Ramesh; Assistant Professor,Dept of CSE,Padmasri Dr.B.V.Raju Institute of Technology,Narsapur, A.P, India
Data retrieval, Similarity score fusion, Query data, Database, Scheme oriented probability, Effective measure.
In the increased technology there is a huge demand for the application based on the web oriented scenario. Where now a day’s search engines are playing a vital role for the effective retrieval of the data respectively depending on the users choice. There is a huge advancement in the search engines based on the web strategy where it provides the services in an effective fashion for the accurate retrieval of the data based on the query of the user on his requirement. There is a big task for the implementation of the huge database and is a tedious oriented phenomena. Where a lot of the existing techniques who is working o the present system is a quite failure one. As before retrieval of the data takes place by the help of the images or audio respectively. Due to the advancement in the technology there is an improvement in the performance of the system with respect to the retrieval of the data based on the meta data oriented aspect. Here extraction of the data takes place by the typing of an accurate keyword that is in the form of the raw fashion depending on this strategy there is an effective retrieval of the data takes place. Therefore a system is designed in this proposed method where the effective retrieval of the data takes place where the correlation has to be shown between the keyword that is from the demand of the user that is from the query based side followed by the data in the database the exact correlation has to be takes place by the effective algorithm which is perfect in the implementation of the distance metric based strategy respectively in an oriented fashion. Where the proposed method is implemented on the following phenomena such as the effective process of the data based on the information of the query oriented aspect, An algorithm for the design of the construction oriented query followed by the incremental analysis of the query based phenomena respectively. Many of the experiments have been conducted to measure the performance of the system respectively.
International Journal of Innovative Technology and Research
2013-09-29
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/172
International Journal of Innovative Technology and Research; Vol 1, No 5 (2013): August -September; 455 - 457
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/173
2013-11-17T17:02:26Z
ojs:ART
AUTOMATICALLY CREATION OF PROFILE BASED USER BEHAVIOR
Sushma, Y.; M.Tech Student,Dept of CSE,QIS College of Engineering & Technology,Ongole, Prakasam Dist, A.P, India
Ramesh, J.; Assistant Professor,Dept of CSE,QIS College of Engineering & Technology,Ongole, Prakasam Dist, A.P, India
Model based user, Rule oriented fuzzy based scenario, System oriented fuzzy evolution, Logic based fuzzy.
Now a day’s there is a huge requirement of the knowledge on the computer respectively. Where the search based phenomena and the access oriented criteria takes place respectively. Therefore at the time of the suggesting of the data takes place there should be an minimum knowledge on the system is very much beneficiary in this particular aspect respectively. Here the main strategy of the system is easily and efficiently identify the behavior the user in such a way that which is very robust for the implementation of the system respectively. Therefore here in the present scenario for the implementation of the present system there is an heavy challenge for the purpose of the implementation of the system respectively. Where involvement of the automatic recognition of the data followed by the identification based on the choice of the query based scenario with respect to the strategy oriented aspect respectively. Here the totally the implementation is based on the commands usage followed by the verification purpose respectively. Here the identification of the behavior takes place where the effective retrieval performance oriented strategy as before analyzed data will be stored and the comparison will be made and then after depending n that particular aspect the behavior of the user is got studied respectively. Where for the accurate classification of the data respectively in an combined oriented fashion where the present algorithm is combined with the above strategy where the retrieval performance is completely improved in order to meet the performance of the system. Experiments have been conducted on the present system for the effective analysation of the behavior of the based criteria respectively.
International Journal of Innovative Technology and Research
2013-09-29
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/173
International Journal of Innovative Technology and Research; Vol 1, No 5 (2013): August -September; 458 - 460
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/175
2013-11-17T17:02:26Z
ojs:ART
DATA OUTSOURCING BASED SIMILARITY FUSION
Pradeep Kumar Reddy, S.; M.Tech Student, Dept of CSE,Holy Mary Institute of Technology & Science,Keesara, R.R Dist, A.P, India
Raghavendra Rao, M.; Associate Professor, Dept of CSE,Holy Mary Institute of Technology & Science,Keesara, R.R Dist, A.P, India
Processing of the data related query; Security based aspect; Privacy control; Data authentication and integration respectively;
There is a lot of advancement in the internet based strategy in a well efficient fashion respectively. Here the advancement is related to the computation of the cloud in a well oriented approach respectively. There is a lot of demand for this particular aspect from the user based aspect in a well oriented fashion respectively. Many of the users are getting attracted to this particular strategy in a well efficient fashion respectively. Here there is a user friendly oriented access of the environment followed by the quite reliable fashion respectively. There is a major problem with respect to this particular oriented strategy is the security is the major problem due to the wireless based communication of the data in a well oriented fashion respectively. Here the service provider based on the outsourcing oriented data plays a major role in the system based aspect in which query based similarity measure followed by the data metric oriented outsourcing in a well oriented fashion respectively. Here there is a provision has to be maintained in the present design oriented technique is rather well efficient format in which depending on the requirement of the user the data is directly provided for the user based access but not for the mediator oriented strategy by the dealer. Here there is a huge analysis is made n the system that is the mutual agreement is made between the user followed by the well effective service provider based fashion in which there would be maintained with the privacy or not and also the agreement involves the terms and conditions oriented aspect followed by the terms of the use with respect to the cost and the bandwidth allocation and everything there is a proper trade off followed by the negotiation based phenomena. Experiments have been conducted on the present designed technique and it performance based strategy followed by the entire system outcome is displayed in a very efficient fashion respectively.
International Journal of Innovative Technology and Research
2013-09-29
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/175
International Journal of Innovative Technology and Research; Vol 1, No 5 (2013): August -September; 461 - 463
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/189
2013-11-17T17:02:26Z
ojs:ART
CHANNEL EVALUATION FOR MULTIPLE INPUT MULTIPLE OUTPUT SCHEMES IN STABLE WIRELESS APPLICATIONS
Raju, K. Ratna; M.Tech Student, Dept of ECE,Sri Sunflower College of Engineering and Technology,Challapalli, A.P, India
Suresh, P.; Associate Professor & HOD, Dept of ECE,Sri Sunflower College of Engineering and Technology,Challapalli, A.P, India
wireless systems; Multiple Input Multiple Output - Orthogonal Frequency Division Multiplexing arrangement; third Generation Partnership Project - Long Term Evolution;
In the forthcoming wireless systems, the data rate necessities have amplified, but the requirement for power efficient and low complication solutions still exists. Orthogonal Frequency Division Multiplexing is a high performance applicant for wireless communication systems remaining to its numerous benefits, particularly its presentation in frequency-selective waning networks. Communication of independent data streams from numerous antennas in spatial multiplexing Multiple Input Multiple Output systems frequently causes inter-antenna interference. Moreover Multiple Input Multiple Output transceiver design has probable to progress the system capability and Collective Multiple Input Multiple Output - Orthogonal Frequency Division Multiplexing arrangement is predicted to encounter the difficulties of quickly growing quantity of requests on wireless mobile networks. Multiple Input Multiple Output - Orthogonal Frequency Division Multiplexing is a promising technique for reaching high data rates targeted in the third Generation Partnership Project - Long Term Evolution. The performance-complexity transaction of various soft-output Multiple Input Multiple Output - Orthogonal Frequency Division Multiplexing detectors is analyzed for application in developing subsequent generation cellular standards and these systems channel state data is important for the recognition and equalization. The reference signals used in channel estimation are placed in the Orthogonal Frequency Division Multiplexing arrangement time-frequency grid at certain intervals. The pilot overhead increases with the number of Multiple Input Multiple Output streams. Additionally, channel estimation based on only pilot symbols does not utilize the channel information available in the data decisions.
International Journal of Innovative Technology and Research
2013-09-29
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/189
International Journal of Innovative Technology and Research; Vol 1, No 5 (2013): August -September; 464 - 466
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/190
2013-11-17T17:02:26Z
ojs:ART
AN EFFECTIVE MODELLING OF THE SYSTEM BASED ON THE AUTO REGRESSION OF NON LOCAL PHENOMENA
Babu, K. Satish; M.Tech Student, Dept of ECE,Sri Sunflower College of Engineering and Technology,Challapalli, A.P, India
Kishore, J.; Assistant Professor, Dept of ECE,Sri Sunflower College of Engineering and Technology,Challapalli, A.P, India
Suresh, P.; Associate Professor & HOD, Dept of ECE,Sri Sunflower College of Engineering and Technology,Challapalli, A.P, India
Modeling of auto regression; Interpolation of the data; Image processing; Aggressive model of the non local strategy; Strategy of the super resolution basis; Regression model of the non local phenomena respectively;
There is a huge challenge for the system in terms of the representative implementation oriented analysis in a respective fashion with relative to the structural aspect of the scenario based on the well effective strategy of the resolution based on the super image with respect to the low resolution strategy plays a crucial role in its representation respectively. Here the system is modeled by the help of the resolution of the lower based analysis in terms of the structural aspects in terms of the down sampling plays a crucial role in its responsiveness blurring after the counterpart of the scenario relative to the high resolution strategy in a well efficient manner respectively. Here in order to overcome the above problems a new technique is implemented with a perfect algorithm oriented implementation in a well efficient manner relative to the particular analysis of the system in terms of the scenario based on the strategy of the interpolation of the image based SRM plays a crucial role in its representation of the non local similarity respectively. Simulations have been conducted on the present method where there is a lot of analysis takes place on the large number of the data sets in a well oriented fashion and there is an well effective strategy for the implementation of the analysis based perspective of the different environments in a well oriented fashion respectively. There is an accurate analysis of the system in terms of the entire outcome respectively.
International Journal of Innovative Technology and Research
2013-09-29
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/190
International Journal of Innovative Technology and Research; Vol 1, No 5 (2013): August -September; 467 - 469
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/191
2013-11-17T17:02:26Z
ojs:ART
EFFICIENT IMPLEMENTATION OF CHANNEL CODING AND INTERSPERSING IN MIMO-OFDM SYSTEMS
Rao, M. Koteswara; M.Tech Student, Dept of ECE,Sri Sunflower College of Engineering and Technology,Challapalli, A.P, India
Pavan Kumar, P.U.V.; Associate Professor, Dept of ECE,Sri Sunflower College of Engineering and Technology,Challapalli, A.P, India
Suresh, P.; Associate Professor & HOD, Dept of ECE,Sri Sunflower College of Engineering and Technology,Challapalli, A.P, India
MIMO; Bit Error Rate; Wi MAX; Interleaving Schemes; Channel Coding; OFDM;
The standards for high speed data communications in wireless LAN and MAN such as Worldwide Interoperability for Microwave Access (Wi MAX) is mainly used by Orthogonal Frequency Division Multiplexing (OFDM). An analysis of the different channel coding and interleaving schemes is presented in this paper which is used in MIMO-OFDM systems. Based on the bit error rate (BER) performance and hardware implementation issues a comparison of these schemes is presented. An examination is done on the effects of four different types of channel coding and interleaving schemes which are being used. The Wi MAX or IEEE 802.16 is used as a reference for imitation, execution, and analysis. The cross-antenna coding and per-antenna interleaving systems perform better under all signals to noise ratio (SNR) conditions for all modulation schemes which is shown from the above coding and interleaving schemes which are studied. The data rates for IEEE 802.16 are doubled for 2x2 MIMO systems without using the transmit diversity using the proposed schemes.
International Journal of Innovative Technology and Research
2013-09-29
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/191
International Journal of Innovative Technology and Research; Vol 1, No 5 (2013): August -September; 470 - 472
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/199
2013-11-17T17:02:26Z
ojs:ART
DESIGN OF EMBEDDED SYSTEMS USING LOW POWER CONSUMPTION FLIP-FLOP
Prabhallika, D.; PG Student, Department of E.C.E, R.G.M College of engineering and technology Nandyal, Andhra Pradesh
Ramanjaneyulu, N.; Associate Professor, Department of E.C.E, R.G.M College of engineering and technology Nandyal, Andhra Pradesh
Designing of Flip-flop; Power consumption; Triggering flip-flop;
In Each and every electronic component, the Flip flop is the one of the major component in VLSI Low power circuits. In this flip flop design, each and every clock cycle dissipation will occurs. This is the major drawback of the vlsi design. The delay of the flip-flops is to be reduced for economical Implementation. There’s a large choice of flip-flops. Several up to date microprocessors by selection use master-slave and pulsed-triggered flip-flops. Ancient master-slave single-edge flip-flops, for instance, transmission gated flip-flop, square measure created from 2 stages, one master and one slave. However edge Triggered flipflop is that based on SAFF. All of those exhausting edged-flip-flops square measure characterized by a positive setup time, inflicting giant D-to-Q delays. or else, pulse-triggered flip-flops cut back the 2 stages into one stage and measure characterized by the soft edge property. In this paper we tend to measure planning with reduced range of delay parts. This results in low power consumption.
International Journal of Innovative Technology and Research
2013-09-29
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/199
International Journal of Innovative Technology and Research; Vol 1, No 5 (2013): August -September; 473 - 477
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/200
2013-11-17T17:02:26Z
ojs:ART
SENTIMENT ANALYSIS USING SEMI-SUPERVISED NAIVE BAYES CLASSIFIER
Shashi Kishore, P.Y.; M.Tech Student, Dept of CSE,Sreenidhi Institution of Science and Technology,Ghatkesar, R.R. Dist, A.P
Brahma Naidu, K.; Assistant Professor, Dept of CSE,Sreenidhi Institution of Science and Technology,Ghatkesar, R.R. Dist, A.P
Opinion mining and sentiment analysis (OMSA); stop words; Natural language processing; SSNB; summary generation;
With the rapid growth of internet technology since early 19th century, there was a tremendous change in the global communication from all over the world. Technology advancements in world wide web has lead a great influence on people communication, as people started communicating in social websites, forums, blogs to express their behavior on particular issue, which showed direct or indirect affect on marketing strategies of an organization, political issues, movie reviews etc., Thus research in this area progressed very rapidly from early mid 90`s . Several techniques, methodologies have been addressed to study the sentiment of people behavior over the internet. The popularity of research in opinion mining and sentiment analysis involved the study of several natural language processing (NLP) techniques. Thus opinion mining is a concept of implementing NLP techniques on the user input given to computer via internet sources. Whereas, Sentiment analysis is used to extract emotions, to extract subject on the issue, and to find out impact on user quoted mined opinions. As NLP techniques used in opinion mining and sentiment analysis addresses many issues like parts of speech tagging-POS, negation rules, word sentiment classification. Hence this paper addresses the following aspects, important for mining opinions and classifying them using semi-supervised naive bayes classifier.
International Journal of Innovative Technology and Research
2013-09-29
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/200
International Journal of Innovative Technology and Research; Vol 1, No 5 (2013): August -September; 478 - 482
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/201
2013-11-17T17:02:26Z
ojs:ART
AN EFFECTIVE STRATEGY OF SPOT ANALYSIS OF COMPROMISED NETWORK DETECTION
Rama Krishna, S.Shiva; M.Tech Student, Dept of CSE,Sreenidhi Institute of Science and Technology,Ghatkesar, R.R Dist, A.P
Ramachandra, M.; Assistant Professor, Dept of CSE,Sreenidhi Institute of Science and Technology,Ghatkesar, R.R Dist, A.P
Machines of compromised phenomena; Spamming zombie; Machine algorithms of the compromised detection respectively;
Here the machines related to the compromised strategy by which one of the major challenges in the field of an internet is a primary concern where the security is a primary challenge apart from the users respectively. Here by the help of the above analysis there is a lot of improvement in the system oriented analysis in which attacks of the various security aspects have been launched in which related to the well efficient phenomena of the malware spreading and spamming and the theft identity followed by the DDOS in a well oriented analysis respectively. Here the main key role of the present system oriented with respect to the well known aspect of the spamming is to detect the machine in a well effective manner oriented with the compromised phenomena respectively. Here there is a huge concentration takes place in the system where the implementation of the system is well associated with a well effective analysis of the detection of the machines oriented with the compromised phenomena plays a major role which is included in the activities of spamming respectively. Here a network is designed with a well effective framework oriented strategy for the monitoring of attacks of the system based spamming based scenario in which messages oriented with respect to the outgoing analysis is a major concern respectively. Here the desired method is designed by the name of the analysis related to the SPOT plays a crucial role in its implementation analysis which plays a key role and it is analyzed by the statistical scenario in a well efficient fashion followed by the ratio test of the sequential probability is a major concern respectively. Here then after the performance evaluation takes place in the system in a well stipulated role with respect to the analysis of the SPOT that is the designed method respectively. Simulations have been conducted implemented system method large amount of analysis takes place on the huge number of the data set in an accurate manner where there is an improvement in the designed method with respect to the well efficient strategy of the performance followed by the outcome of the entire system in a well respective scenario.
International Journal of Innovative Technology and Research
2013-09-29
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/201
International Journal of Innovative Technology and Research; Vol 1, No 5 (2013): August -September; 483 - 484
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/214
2013-11-17T17:02:26Z
ojs:ART
A NOVEL TECHNIQUE FOR GROUND BOUNCE NOISE REDUCTION IN DEEP SUB MICRON CIRCUITS
Reddy, K Ashok; M.Tech (VLSI),Mannan Institute of Science & Technology
Kumar, B.Sunil; Associate Professor & HOD,Mannan Institute of Science & Technology
As low power circuits area unit we have a tendency toll liked preferred most well-liked} currently a days because the scaling increase the leak powers within the circuit conjointly will increase chop-chop therefore for removing these quite leakages and to produce a stronger power potency we area unit exploitation many sorts of power gating techniques. during this paper we tend to area unit aiming to analyze totally different the various} varieties of flip-flops using differing types of power gated circuits exploitation low power VLSI style techniques and that we area unit aiming to show the comparison results between different micromillimetre technologies. The simulations were done exploitation Micro wind Layout Editor & DSCH software package and therefore the results got below.
International Journal of Innovative Technology and Research
2013-09-29
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/214
International Journal of Innovative Technology and Research; Vol 1, No 5 (2013): August -September; 485 - 490
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/215
2013-11-17T17:02:26Z
ojs:ART
KNOWLEDGE GAINED FROM QUERY BASED ON RANKING SEARCH
Abdullah, Mohd; M.Tech Student, Dept of CSE,Aurora's Technological and Research Institute,Parvathapur, Uppal, Hyderabad, A.P
Padmaja, T.; Assistant Professor, Dept of CSE,Aurora's Technological and Research Institute,Parvathapur, Uppal, Hyderabad, A.P, India
User based search history, history of the user, Search engine oriented web based strategy, Reformulation of the query, Identification of the task.
: There is a huge enhancement in the system and there is a desired goal oriented strategy in a well efficient manner. Its respect to the increasing in the complexity in the well perusing strategy related to the web plays a major role and some of them includes arrangements of the travel making, Financial management, Purchases of the planning in a well oriented fashion respectively. Here by the end of the analysis, we come across the well effective phenomena of the tasks oriented with respect to the break down analysis followed by the steps oriented with respect to the co-dependent samples in well oriented fashion by which queries of the multiple issues plays a major role related to the repeated steps for large amount of the aspect in a well oriented fashion respectively. For the users oriented with the better support oriented phenomena related to the well known aspect of the quest information of the long term strategy followed by the track of the queries of the search engines, plays a crucial role of the click oriented online search and plays a major role in its implementation respectively. Here a technique is presented with a well effective algorithm oriented strategy related to the scenario of organizing of the problems related to the queries of the historical users in a well oriented means which takes place in the system by the automated fashion of the dynamic groups in a well oriented scenario respectively. Automatic query group identification plays a major role for the components of the search engines and its applications in a well oriented fashion with respect to the strategies including suggestions of the query based aspect, Ranking of the result oriented phenomena and Iteration of the query in a well effective manner which plays a major role in the system considerably. Research have been done on the present approach where a lot of analysis has taken place in the large number of the data sets in a well oriented fashion with respect to the randomized environments and there is a precise examination of the outcome of the system in terms of the performance followed by the outcome in a well oriented fashion respectively.
International Journal of Innovative Technology and Research
2013-09-29
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/215
International Journal of Innovative Technology and Research; Vol 1, No 5 (2013): August -September; 491 - 493
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/216
2013-11-17T17:02:26Z
ojs:ART
A MODELLING ADVANCE FOR INFORMATION RECOVERY
Uddin, Mohd Aleem; M.Tech Student, Dept of CSE,Aurora's Technological and Research Institute,Parvathapur, Uppal, Hyderabad, A.P
Sekhar, K.Chandra; Associate Professor, Dept of CSE,Aurora's Technological and Research Institute,Parvathapur, Uppal, Hyderabad, A.P
: Retrieval of the information, Machines of the support vector phenomena, Rank of the learning, Adaptation domain, Model of the ranking respectively.
With the advancement of the search oriented domains related to the well efficient strategies of the emergence of the vertical phenomena plays a major role in its implementation scenario. With respect to the ranking model of the well effective broad based strategy in its application play a crucial role and the responsibility related to the several different domains which is not desired. Due to their differences in their strategy oriented aspects at the time of the construction of the ranking model in a well oriented unique fashion by the integrated fashion of the both data labeling and the model training where it is a time consuming process respectively. Here a new technique is proposed based on the well effective phenomena of the algorithm oriented with respect to the strategy of the regularization plays a major role of the SVM oriented adaptation ranking system in a well desired fashion respectively. Here the present method is implemented by the help of the improvement in the performance followed by the reduction of the cost based strategy plays a major role in the well effectual implementation of the method in a well oriented manner considerably. There is a huge requirement to the data sets related to the predicted strategy of the ranking models of the existed phenomena in a well effectual means considerably. There is no matter related to the implementation of the well effective phenomena related to the aspects of the auxiliary domain of the data related to the internal aspects in a well oriented manner considerably. Research have been performed on the current system and a lot of analysis taken place on the system with respect to the accurate analysis in terms of the performance subsequent to the result of the whole system in a well oriented fashion respectively. Here the analysis takes space on a large number of the datasets with respect to the unknown environments where the identification of the capability plays a major role in its implementation aspect respectively.
International Journal of Innovative Technology and Research
2013-09-29
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/216
International Journal of Innovative Technology and Research; Vol 1, No 5 (2013): August -September; 494 - 496
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/217
2013-11-17T17:02:26Z
ojs:ART
PI AND SLIDING MODE CONTROL FOR PERMANENT MAGNET BRUSHLESS DC MOTOR
Sowjanya, P.; Department of Electrical& Electronics Engineering,JNTU College of Engineering,Kukatpally, Hyderabed
Andhra Pradesh
Tarakalyani, Dr. S.; Department of Electrical& Electronics Engineering,JNTU College of Engineering,Kukatpally, Hyderabed
Andhra Pradesh
Direct Current Motors, Speed Control, Proportional plus Integral Controller, Sliding Mode Control
This paper will compare properties of Sliding Mode Controlled (SMC) and classical Proportional Integral (PI) controlled brushless DC motor (BLDC) in applications. It is the simple strategy required to achieve good performance in speed or position control applications. This paper addresses controlling of speed of a BLDC motor which remains among the vital issues. A BLDC motor is generally controlled by Proportional plus Integral (PI) controller. PI controller is simple but sensitive to parameter variations and external disturbance. Due to this reasons, Sliding Mode Control (SMC) is proposed in this paper. This control technique works against parameters variations and external disturbances, and also its ability in controlling linear and nonlinear systems. Performance of these controllers has been verified through simulation using MATLAB/SIMULINK software. The simulation results showed that SMC was a superior controller than PI controller for speed control of a BLDC motor
International Journal of Innovative Technology and Research
2013-09-29
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/217
International Journal of Innovative Technology and Research; Vol 1, No 5 (2013): August -September; 497 - 502
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/218
2013-11-17T17:02:26Z
ojs:ART
DESIGN & IMPLEMENTATION OF 64-POINT FFT USING RADIX-4
Ramanjaneyareddy, Boilla; M.Tech(DECS),Gurunanak Institute Of Technical Campus
Naresh, D.; Asst. Professor,Gurunanak Institute Of Technical Campus
FFT, radix- 4
In, this paper a design of FFT processor was implemented on FPGA.FPGA was majorly used to develop the ASIC IC’s to which was implemented. Here we simulated and synthesized the 64- point FFT with radix-4 using VHDL coding and for Hardware implementation we designed code using System C Coding. Finally, the pipelined 64-point FFT processor can be completely implemented within 20.093ns.
International Journal of Innovative Technology and Research
2013-09-29
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/218
International Journal of Innovative Technology and Research; Vol 1, No 5 (2013): August -September; 503 - 508
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/219
2013-11-17T17:02:26Z
ojs:ART
EFFICIENT IMAGE COMPRESSION USING SPIHT AND HUFFMAN CODING BASED ON DWT THROUGH TRANSMITTING OFDM CHANNEL
Pasula, Venkat Narayana; M. Tech (DECS), Department of ECE,Gurunanak Institutions Technical Campus
Rao, C Hemasundhara; Professor, Department of ECE,Gurunanak Institutions Technical Campus
Image. DWT. Huffman, SPIHT, OFDM
:- In this paper we tend to gift associate energy saving approach to transmission of separate moving ridge transformation primarily based compressed image frames over the OFDM channels. Supported channel state data at the Transmitter, the descriptions so as to the method of excellent channels utilized in Huffman and SPHIT encryption. Analysis in analysis of the system in terms of chance of error is disbursed in a very subtle wireless optical channel. As per planned system shows promising results for a high speed optical wireless channel and that we demonstrate the quality of our planned theme in terms of system energy saving while not compromising the received quality in terms of peak signal-noise quantitative relation. Despite victimization a lot of range of carriers rather than set of carriers is usable for made knowledge transmission and allowing the re-transmission of lost packets. Transmitted image and its received versions at totally different PSNRs then it'll improve additionally. The enhancements which will be accomplished in varied performance parameters in a very data communication system victimization moving ridge transformation method. Parameters like MSE PSNR COMPRESSION RATIO power spectral density and Real, notional elements of the OFDM signal Verification of Efficiency analysis. Huffman and SPIHT decoding of embedded encoder. In this technique reduce the number of encoding bits and reduce the system power consumptions.
International Journal of Innovative Technology and Research
2013-09-29
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/219
International Journal of Innovative Technology and Research; Vol 1, No 5 (2013): August -September; 509 - 513
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/224
2013-11-17T17:02:26Z
ojs:ART
ADVANCEMENT TOWARDS NYMBLE FOR OBSTRUCTING AND TRACKING OF THE HACKING USER
Kiranmayee, A.; M.Tech Student,Dept of CSE,Joginpally BR Engineering College, Hyderabad, A.P
Seshagiri, T.; Associate Professor,Dept of CSE,Joginpally BR Engineering College, Hyderabad, A.P
Krishna, J.Venkata; Associate Professor,Dept of CSE,Joginpally BR Engineering College, Hyderabad, A.P
Tor; Anonymizing Networks; Sybil attacks; Blacklists; Nymble;
Tor is an unlock system that assist us to protect in opposition to a form of network management that intimidates entity autonomy and privacy and associations and it is moreover open software. Tor client software is directed by internet traffic and is used to volunteer worldwide complex of servers in order to obscure a client locality or convention from whichever one conducting network surveillance or traffic analysis. Usually for disabling access to hacking clients the website manager depends upon the IP address jamming. The servers can blacklist hacking client thus jamming users devoid of concession of their ambiguity in a scheme of Nimble. In Nymble, a special type of false name users acquires an ordered collection of nymbles, to connect to Websites and is a protected system, which makes available all the subsequent functions unidentified validation, backward unlink capacity, biased blacklisting, fast verification speeds; rate limited unidentified connections, revocation auditability, and also deal with the Sybil attack to construct its use realistic.
International Journal of Innovative Technology and Research
2013-09-29
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/224
International Journal of Innovative Technology and Research; Vol 1, No 5 (2013): August -September; 514 - 516
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/225
2013-11-17T17:02:26Z
ojs:ART
DESIGN OF THE SQL BASED DATA AGGREGATION AND DATA SETS PREPARATION
Krishna Reddy, Chintam V; M.Tech Student, Dept of CSE,Nagole Institute of Technology & Science, Nagole, Hyderabad, A.P
Rajitha, N.; Associate Professor, Dept of CSE,Nagole Institute of Technology & Science, Nagole, Hyderabad, A.P, India
Mining of data; Dataset preparation; Aggregation of horizontal strategy; SQL, Preparation of the data; Data pivoting and construct of CASE respectively
Here in the analysis of the preparation of the sets of the data there is a huge complexity lies in the system in the application oriented implementation of the mining of the data of the complexity in the queries of the SQL plays a crucial role and the table oriented with the joining strategy and the columns of the aggregation plays a major role in the implementation point of view in a well oriented fashion respectively. Here there is a huge effort is required for the process of the data in a well efficient manner for the sets oriented with respect to the process of the data building plays a crucial role in the requirement of the layout related to the basis of the horizontal strategy plays a crucial role in a well oriented fashion respectively. Here in order to overcome the above problem a new technique is proposed for the well efficient code generation of the strategy related to the SQL plays a crucial role in the implementation poinr of view oriented with respect to the development of the design of the horizontal layout in the table based fashion takes place in the system oriented implementation and the analysis point of view respectively. Experiments have been conducted on the present method where there is a lot of analysis takes place in the system and here the experiments have been conducted on the large number of the datasets in a well oriented fashion with respect to the unknown environments in a well oriented fashion respectively. Here there is an accurate analysis takes place in the system in terms of the improvement in the performance followed by the outcome of the entire system in a well stipulated fashion respectively.
International Journal of Innovative Technology and Research
2013-09-29
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/225
International Journal of Innovative Technology and Research; Vol 1, No 5 (2013): August -September; 517 - 518
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/167
2015-12-02T13:42:52Z
ojs:ART
USING MOBILE DEVICES TO IMPROVE LEARNING TECHNOLOGIES
Haghshenas, Maryam; Young Researchers and Elites club, Science and Research Branch, Islamic Azad University, Tehran, Iran
Jeddi, Khadijeh Yousefpour; Department of IT Management, Science and Research Branch, Islamic Azad University, Tehran, Iran
E-learning, M-learning, D-learning, PDA, mobile devices
Learning via mobile devices is widely accepted by the learner community. Learners are interested in using all available resources through mobile phones and PDAs to access information anytime and anywhere. The aim of mobile learning is to provide an educational environment in which learners can learn without any limitation of time, place, or device, thereby realizing a more creative and learner-cantered educational process. Mobile devices like laptops, PDA and mobile phones can accompany the learner into the field and can at the same time exploratory activities, for instance by enabling learners to sense and record aspects of the local environment. With use of mobile devices, learners learn as if they are in a real classroom environment. Learning technologies provided a very wide range of learning activities, in order to attract students from higher education. This paper describes the effects of using mobile devices to improve learning technologies.
International Journal of Innovative Technology and Research
2013-11-30
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/167
International Journal of Innovative Technology and Research; Vol 1, No 6 (2013): October-November; 519 - 523
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
oai:ojs.ijitr.com:article/187
2015-12-02T13:42:52Z
ojs:ART
A COMPARATIVE STUDY ON IFA DIVINATION AND COMPUTER SCIENCE
F.O, Alamu; Department of Computer Science and Information Technology, Bowen University Iwo
H.O, Aworinde; Department of Computer Science and Information Technology, Bowen University Iwo
W. I, Isharufe; Department of Computer Science and Information Technology, Bowen University Iwo
The Ifa divination system is a set of divination acts done by a professional that has been granted authority (a babalawo) to create and make use of set of rules to communicate with the gods so as to solve people’s problems. It is mostly carried out in the Yoruba community. Most people doubt the authenticity of this system and are not even aware of its similarities with Computer Science. Further to this there are a few literature in this area of study. In this work effort was made to bring out salient similarities between the field of computer science and the act of ifa divination. An extensive explanation of the divination system was made, what it means and its origin and why people seek after it. We have presented an extensive explanation of the Ifa divination system, proved its existence and authenticity, given and explained its similarities with Computer Science and presented a reference data for future work in this study.
International Journal of Innovative Technology and Research
2013-11-30
Peer-reviewed Article
application/pdf
http://www.ijitr.com/index.php/ojs/article/view/187
International Journal of Innovative Technology and Research; Vol 1, No 6 (2013): October-November; 524 - 528
en
To The Editor-in-Chief, IJITR 1. I understand that the Editor-in-Chief may transfer the Copyright to a publisher at his discretion. 2. The author(s) reserve(s) all proprietary rights such as patent rights and the right to use all or part of the article in future works of their own such as lectures, press releases, and reviews of textbooks. In the case of republication of the whole, part, or parts thereof, in periodicals or reprint publications by a third party, written permission must be obtained from the The Editor-in-Chief IJITR, or his designated publisher. 3. I am authorized to execute this transfer of copyright on behalf of all the authors of the article named above. 4. I hereby declare that the material being presented by me in this paper is our original work, and does not contain or include material taken from other copyrighted sources. Wherever such material has been included, it has been clearly indented or/and identified by quotation marks and due and proper acknowledgements given by citing the source at appropriate places.
21c488b800058b3dd48520a1917c3169