Version-5 (March-April 2017)
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Mango is considered as the king of fruit. It is a leading fruit in our country. It is considered as the national fruit of India. It has good flavour and also provide vitamin C. Mangoes are considered as to be the king of the fruit. India has the richest collection of mango cultivars. This work detects the external bacterial disease in Alphonso mango using image processing technique. The detection of diseases in mango is very difficult by our human naked eyes. It needs more time and cost. The manual detection of bacterial fruit disease is not simple and not accurate. The paper proposes a digital image processing method for the detection of external bacterial disease in Alphonso mango..............
Keywords: Bacterial canker disease detection, segmentation, feature extraction, classification, mango, preprocessing.
[1]. Pushpa B R, MeghanaT K, TripullaK H(2015)"Detection and classification of fungal disease in fruits using imageprocessing technique"in International journalof applied engineering research(IJAER), Vol 10, number 55.
[2]. Shiv Ram Dubey, Anand Singh Jalal (2012) "Adapted Approach for Fruit disease Identification using Images", in International Journal of computer vision and image processing (IJCVIP) Vol 2, no. 3:44-58.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Intelligent Home Using Internet of Things |
Country | : | India |
Authors | : | Zeba Sheikh || Abhishek Kommera || Sana Quazi |
: | 10.9790/0661-1902050913 |
Abstract: Intelligent home minimizes user's involvement in monitoring home and controlling home appliances with the help of Internet of Things. This paper proposes the advancement of an intelligent home application by integrating Internet of things (IOT) with web services and cloud computing. Our approach is to focus on entrenching intelligence into sensors using software and network connectivity. It facilitates interactions with smart things using cloud services. Our approach is more feasible and efficient i.e. it measures the home conditions and monitors the home appliances and controls the Home access.
Keywords: Internet of Things, Cloud, sensors, Intelligent home.
[1]. Diksha Jizilwar, Abhishek Kommera, Ashwini Gaddalwar , A Review on Intelligent Home Using Internet of Things, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 5, Issue 1, January 2017
Links
[2]. https://www.programmableweb.com/api/ubidots
[3]. https://en.wikipedia.org/wiki/Internet_of_things
[4]. https://www.rs-online.com/designspark/thingspeak-a-free-internet-of-things-iot-platform http://www.ebay.com.au/itm/DHT11-TEMPERATURE-AND-RELATIVE-HUMIDITY-SENSOR-TRANSDUCER-MODULE-/131606921333
[5]. http://www.skybitz.com/Portals/0/Documents/DoorSensor-Description.pdf
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Generic Meta-Model for a BIG ERP |
Country | : | Morocco |
Authors | : | Mustapha Hain || Hicham Moutachaouik || Abdelali Zakrani |
: | 10.9790/0661-1902051419 |
Abstract: Enterprise Resource Planning (ERP) is business process management software that integrates all facets of an operation, including product planning, development, manufacturing, sales and marketing. The basic goal of using an ERP system is to provide one central repository for all information that is shared by all the various ERP facets to improve the flow of data across the organization. In contrast, the quality of making decision remains limited by the fact that this central repository is based the transactional and restricted data. In the paper, we propose to enhance this data by using the concept of the technologies.............
Keywords: ERP; Big Data; decision-making; Meta-Model; decision process.
[1]. Akkermans, H., & Van Helden, K. (2002). Vicious and virtuous cycles in ERP implementation: A case study of interrelations between critical success factors. European Journal of Information Systems, 11(1), 35–46.
[2]. Helena Kościelniak (2015), Agnieszka Puto, BIG DATA in decision making processes of enterprises, International Conference on Communication, Management and Information Technology (ICCMIT 2015), © 2015 The Authors. Published by Elsevier B.V.
[3]. Klaus, H., Rosemann, M., & Gable, G. G. (2000). What is ERP? Information Systems Frontiers,2(2), 141–162.
[4]. Moon, Y. B. (2007). Enterprise resource planning (ERP): A review of the literature. International Journal of Management and Enterprise Development, 4(3), 235–264.
[5]. Hong, K. K., & Kim, Y. G. (2002). The critical success factors for ERP implementation: An organizational fit perspective. Information and Management, 40(1), 25–40.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An Introduction to Error Detection and Correction |
Country | : | India |
Authors | : | Mr. Nagesh Salimath || Dr. Jitendra Sheetlani |
: | 10.9790/0661-1902052027 |
Abstract: In most correspondence framework whether wired or remote convolutional encoders are utilized and AWGN presents blunders amid transmission. Different blunder adjusting and controlling instruments are available. In this paper all components are contemplated and best system on the premise of exactness, many-sided quality and power utilization is chosen. There ought to be exchange off between many-sided quality of equipment and power utilization in decoder.
Keywords: FEC, Block Codes, Convolutional Codes, ARQ, HARQ, Viterbi Mechanism.
[1]. Sklar, B., 2001. Digital Communications –Fundamentals and Applications. 2nd ed. New Jersey: Prentice Hall
[2]. C. E. Shannon, ―A mathematical theory of –communicat423,623–656, Jul./Oct. 1948.
[3]. T. Richardson and R. Urbanke, Modern Coding Theory. Cambridge University Press, 2007.
[4]. Z. Zhang, V. Anantharam, M. Wainwright,-Tethernet LDPCanddecoderB .designNikol with low error floors,‖-StateCircuits,IEEEvol.45,no . Journal4,pp.843–855,Aprof.2010Solid.
[5]. P. Grover, K. Woyach, and A. Sahai, ―Towards-levelpowera com consumption,‖ IEEE J. Select. –1755,AreasSept.2011Commun.., vol. 29
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Optimization of Wired Genetic Antenna Using Genetic Algorithm |
Country | : | India |
Authors | : | Renu Kumari || Tarak Nath Paul |
: | 10.9790/0661-1902052835 |
Abstract: The essence of the paper is to optimize wired antenna with the help of Genetic Algorithm. Genetic algorithm helps to design new antennas which are in great demand for wireless applications and also used to optimize different parameters of traditional antennas. The new wired antenna has been designed with the concept of self similar geometry of fractal antenna. A self similar geometry provides configuring the whole antenna figure as copies of a specific part of antenna. Due to this geometry, the resultant structures have elevated the characteristics like small size, space filling and multiband.............
Keywords: Wire Antenna, Fractal antenna, Scattering Parameter and Genetic Algorithm.
[1]. Linden D. S., Antenna Design Using Genetic Algorithms, Ph. D Thesis, Ashburn VA , AFIT, 1997.
[2]. Kumari Renu, K. Mamta, Singh R. K., Gain & Bandwidth Enhancement Of Antenna Using Numerical Experimentation, International journal of research science and management, 3(2), 2016, 56-60.
[3]. Kumari Renu, K. Mamta, Network Analysis Of Antenna Based On Scattering Parameters, International Journal of Industrial Electronics and Electrical Engineering, 3(2), 2015, 1-5.
[4]. Paul, T. N., Studies on Shortest Path Using Genetic Algorithm, Ph. D Thesis, University of Burdwan, West Bengal, INDIA, 2014.
[5]. Saxena, N. K., Khan, A., Pourush, P. K. S, Kumar, N., Application of genetic algorithm for optimization of important parameters of magnetically biased microstrip circular patch Antenn, International Journal of Software Engineering and Applications, vol. 4, 2011,129-13.,
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | The Vulnerabilities of Cloud Computing: Security Threats |
Country | : | India |
Authors | : | Mr. Nagesh Salimath || Dr. Jitendra Sheetlani |
: | 10.9790/0661-1902053643 |
Abstract: Clouds give an intense figuring stage that empowers people and associations to perform assortment levels of undertakings, for example, utilization of online storage room, selection of business applications, improvement of tweaked PC programming, and formation of a "practical" system condition. In earlier years, the quantity of individuals utilizing cloud administrations has drastically expanded and loads of information has been put away in Cloud computing situations.............
Keywords: Cloud computing, cloud security threats and countermeasures, cloud service models
[1]. DataLossDB Open Security Foundation. http://datalossdb.org/statistics
[2]. Sophos Security Threat Report 2012. http://www.sophos.com/
[3]. Amazon.com Server Said to Have Been Used in Sony Attack, May 2011. http://www.bloomberg.com/news/2011-05-13/sony-network-said-to-have-been-invaded-by-hackers-using-amazon-com-server.html
[4]. D. Jamil and H. Zaki, "Security Issues in Cloud Computing and Countermeasures," International Journal of Engineering Science and Technology, Vol. 3 No. 4, pp. 2672-2676, April 2011.
[5]. K. Zunnurhain and S. Vrbsky, "Security Attacks and Solutions in Clouds," 2nd IEEE International Conference on Cloud Computing Technology and Science, Indianapolis, December 2010.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Grid Based Sensor Deployment Technique for Localization in WSN |
Country | : | India |
Authors | : | Priyanka Rajput || Prof. Madhukar Dubey |
: | 10.9790/0661-1902054450 |
Abstract: Localization is broadly exploited in wireless sensor networks (WSNs) to recognize the existing locality of the sensor nodes. A WSN include to multiple nodes which create the installation GPS on all sensor node costly and furthermore GPS will not confer exact localization outcome in an indoor atmosphere. Manually configuring location reference on all sensor nodes is not likely in the case dense network. This gives grow to an issue where the sensor nodes must identify its existing locality without exploiting any special h/w like GPS and without the aid of manual configuration..............
Keywords: WSN;Localization
[1] RavichanderJanapati, Ch. Balaswamy ,K.Soundararajan, U.Venkanna4, "Indoor Localization Of Cooperative WSN Using PSO
Assisted AKF With Optimum References"Doi: 10.1016/J.Procs.2016.07.357/ 2016 Published By Elsevier.
[2] G. Karthiga, C. Preethi, R. DelshiHowsalya Devi, "Localization In Wireless Sensor Network Based On Mobile Anchor And Chord
Selection", 978-1-4799-6266-2/14 © 2014 IEEE.
[3] Youngbae Kong, Younggoo Kwon, Jeungwon Choi, JonghwanKo, Gwitae Park, "Density Adaptive Localization For Irregularly
Deployed Wireless Sensor Networks", Http://Dx.Doi.Org/10.1016/J.Aeue.2012.05.006 © 2012 Elsevier.
[4] Ronald Beaubrun, Methods For Node Localization In Wireless Sensor Networks", 978-1-4799-6036-1/14 © 2014 IEEE
[5] HaidarSafa, "A Novel Localization Algorithm For Large Scale Wireless
SensorNetworks",Http://Dx.Doi.Org/10.1016/J.Comcom.2014.03.020/17 March 2014
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Parallel Algorithm for Factorization of Big Odd Numbers |
Country | : | China |
Authors | : | Dongbo FU |
: | 10.9790/0661-1902055154 |
Abstract: The article puts forward an algorithm to factorize a big odd number by means of subdividing the searching interval into finite independent subintervals. A divisor of a big odd number can be found in one of the subintervals. Owing to the independency of the subintervals, the algorithm can be performed in either sequential computing or parallel computing. Experiment shows that the algorithm is valid and practically applicable.
Keywords: Subdivision, Parallel, Searching Algorithm, Factorization
[1]. Sonal Sarnaik, Dinesh Gadekarand Umesh Gaikwad, An overview to Integer factorization and RSA in Cryptography, International Journal for Advance Research in Engineering and technoloy,2014,2(9):21-26
[2]. Jianhui LI, Algorithm Design and Implementation for a Mathematical Model of Factoring Integers,IOSR Journal of Mathematics,2017,13(I Ver. VI):37-41
[3]. Aldrin W, Wanambisi Shem Aywa, Cleophas Maende, etc, Factorization of Large Integers, International Journal of Mathematics and Statistics Studies,2013,1(1):39-44
[4]. Xingbo WANG, Genetic Traits of Odd Numbers With Applications in Factorization of Integers, Global Journal of Pure and Applied Mathematics,2017,13(2) 493-517
[5]. Ulrich H Kurziweg,Factoring Large Composite Numbers, http://www2.mae.ufl.edu/~uhk/ FACTORING-LARGE-COMPOSITE-NUMBERS.pdf
- Citation
- Abstract
- Reference
- Full PDF
Abstract: A digital forensics process aims to analyze digital evidence of storage unit of computer or other storage devices. But when a crime is committed is a social media the social media platform holds the evidence not necessarily the storage device used by the victim of the criminal. Moreover, the extensive use of social media and the huge amount of data shared through the social media has made the traditional investigation process gradually made it ineffective. Though the 'verifiable limited disclosure' protocol addresses this problem, it is also a reactive approach. Here we introduce 'proactive verifiable limited disclosure' for handling and investigating digital evidence in police investigation. This protocol also uses the storage of social media for storing evidence of crimes occurred in the social media, which minimize the problem of 'resource overhead'.[1]
Keywords: Digital Forensics, Proactive Investigation, Digital Privacy, Cyber Crime, Adaptive Forensics, Social Media
[1] R. E. Overill, J. A. Silomon, and K. A. Roscoe, "Triage template pipelines in digital forensic investigations," Digital Investigation, vol. 10, no. 2, pp. 168 – 174, 2013.
[2] G. Palmer, "A Road Map for Digital Forensic Research," Air Force Research Lab, Rome, DFRWS Technical Report DTR-T001-01, 2001.
[3] Thein Tun, Blaine Price, Arosha Bandara, Yijun Yu and Bashar Nuseibeh, "Verifiable Limited Disclosure: Reporting and Handling Digital Evidence in Police Investigations", 1st International Workshop on Requirements Engineering for Investigating and Countering Crime, 12th September 2016, Beijing, China.
[4] L. Pasquale, Y. Yu, M. Salehie, L. Cavallaro, T. T. Tun, and B. Nuseibeh, "Requirements-driven adaptive digital forensics", 21st IEEE International Requirements Engineering Conference. IEEE Computer Society, 2013, pp. 340–341.
[5] S.Y. Willassen, "Using Simplified Event Calculus in Digital Investigation," in Proc. of the Symp. on Applied Computing, 2008, pp. 1438–1442.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Conventional energy are tapped and used abundantly at present. Keeping in observance a way of precaution is taken to upturn the use of non-conventional energy. Decreasing the use of conventional energy, a two way (or twin) hybrid mobile charger is taken in consideration for implementing both solar energy and wind energy, as the renewable sources of energy. The proposed innovative two way hybrid mobile charger can be used both all through day time and night time, while travelling by possessing the device near the vehicle window panel or motorcycle handle. Energy harvesting is explored, with a device relying on the solar panel........
Keywords: Wind energy, Solar energy, Rechargeable battery, Energy harvesting, Green computing.
[1]. Shafiur Rahman, Dr.M.G.Patil, "Development of wind powered mobile charger", International Journal of Research in Aeronautical and Mechanical Engineering, ISSN (Online): 2321-3501, Vol. 3, Issue 11, November 2015, Pages: 26-39.
[2]. Saikumar.P, Thamaraikannan.D, Yuvaraj.G, Yuvaraj.C, "Wind Energy Based Mobile Battery Charging and Battery Applications", International Journal for Research and Development in Engineering (IJRDE), ISSN: 2279-0500 Special Issue: pp- 006-011.
[3]. Pawan Vijay, Tanuj Manglani, Pankaj Kumar, Ramkishan Meena, Anita Khedia, "Wind And Solar Mobile Charger", International Journal of Recent Research and Review, Vol. VII, Issue 4, December 2014, ISSN 2277 – 8322.
[4]. Kharudin Ali, Wan Syahidah Wan Mohd, Damhuji Rifai, Muaz Ishtiyaq Ahmed, Asyraf Muzzakir and Tg Ammar Asyraf, "Design And Implementation of Portable Mobile Phone Charger using Multi-directional Wind Turbine Extract", International Journal of Science and Technology, Vol. 9(9), DOI: 10.17485/ijst/2016/v9i9/88711, March 2016, ISSN(Print): 0974-6846, ISSN(Online):0974-5645.
[5]. N Raghu Ram Reddy, Yeshala Sreekanth, Dr.M.Narayana, "Mechanical and Electrical Mobile Charger", N Raghu Ram Reddy al. Int. Journal of Engineering Research and Applications, ISSN: 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1705-1708.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Effect of Ca EDTA and Fe EDTA on Micro and Macro Nutrients uptake by Black gram |
Country | : | India |
Authors | : | A.A. Jilani |
: | 10.9790/0661-1902056669 |
Abstract: Chelates such as EDTA and DTPA are often used to increase micronutrient solubility, but micronutrients complexed by these chelates are not readily taken up by plants. A field experiment was conducted to assess the effect of the application of EDTA on black gram crop. The aim of this study was to identify the interaction of Na, Ca, Mg, Fe, Cu and Zn when the black gram was planted on the test soil and to evaluate the effect of Ca EDTA and Fe EDTA of these metals. It was found from the study that by applying increased the organic carbon, organic matter, micronutrient i.e. Fe, Ca and Zn in the soil............
Keywords: Ca EDTA, Fe EDTA, Interaction, Fe, Ca, Zn, Micronutrients
[1]. Aleksandra Sobkowska, Maria Basińska, Flame photometry determination of Na, K, Li, and Ca traces in Cr-Ni steel, Microchimica Acta, 64,1975,227-234
[2]. Gupta, A.P., Neue, H.U. and Singh, V.P. Phosphorus determination in rice plants containing variable manganese content by the phospho‐molybdo‐vanadate (yellow) and phosphomolybdate (blue) colorimetric methods, Communications in Soil Science and plant Analysis (11-12), 1993, 1309-1318
[3]. Blaylock, M.J., Dushenkov, D.E., Zakharova, S., Gussman, O., Kapulnik, C.,Ensley, Y. Raskin, B.D., Enhanced accumulation of Pb in Indian mustard by soil-applied chelating agents. Environmental Science and Technology, 64, 1997, 489–496
[4]. Bucheli-Witschel, M., Egli, T., Environmental fate and microbial degradation of aminopolycarboxylic acids. FEMS Microbiol. Rev.2001, 25, 69–106.
[5]. Cakmak, I,Enrichment of cereal grains with zinc: Agronomic or genetic biofortification Plant and Soil 302, 2008, 1-17
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Big Data Analysis on Heterogeneous Distributed Systems using Remote Method Invocation |
Country | : | India |
Authors | : | Dr. Mamta C. Padole |
: | 10.9790/0661-1902057075 |
Abstract: Big Data Analysis has become very essential for organizations to arrive at timely decisions, for progressive growth and keeping with the competition. To analyse huge amount of data generated through various business processes, require High Performance Computing machines. But, owning HPC machines and maintaining them, requires large investment and experienced skill set. Moreover, it is difficult to install any proprietary and customized software, on special purpose HPC machines............
Keywords: Big Data Analysis, Heterogeneous Distributed Systems, Remote Method Invocation, Java RMI
[1] Turn Big Data into Big Value, A Practical Strategy, Intel White Paper, 2013.
[2] A. Garg, M. Padole, Big Data: A Stimulus in Business Analytics, IOSR Journal of Computer Engineering (IOSR-JCE), 18(5), 2016, 61-67
[3] M. Schroeck, R. Shockley, J. Smart, D. Romero-Morales, and P. Tufano, Analytics: the real-world use of big data: How innovative enterprises extract value from uncertain data, Executive Report, IBM Institute for Business Value and Said Business School at the University of Oxford, 2012.
[4] Topcuoglu, S. Hariri, and M.Y. Wu., Performance-Effective and Low – Complexity Task Scheduling for Heterogeneous Computing, IEEE Trans. Parallel and Distributed Systems, 13(3), 2002, 260 – 274
[5] M. C. Padole, Distributed Computing for Structured Storage, Retrieval and Processing of DNA Sequencing Data, International Journal of Internet and Web Technology, 38(1), 2013, 1113-1118
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Online shopping payment scheme is one of the popular in recent years. During payment process the attackers aim to stealing the customer data by targeting the Point of Sale (PoS) system. Increasing malware that can steal card data as soon as they are read by the device. As such, in cases where customer and vendor are steadily or intermittently disconnected from the network and there is no secure during on-line payment. We proposed work is to provide secure fully off-line work is interactivity between multiple client - server. This server is identified from legal to illegal control is provided to customer key approach............
Keywords: Secure payments, PoS system, erasable PUFs, fraud resilience, cybercrime.
[1]. Vanesa Daza, Roberto Di Pietro, Flavio Lombardi, And Matteo Signorini "Frodo: Fraud Resilient Device For Off-Linmicro-Payments", Dependable And Secure Computing, IEEE Transactions On (Volume:PP , Issue: 99 ), 12 June 2015
[2]. R. L. Rivest, "Payword and micromint: two simple micropayment schemes," in CryptoBytes, 1996, pp. 69–87.
[3]. W. Chen,G. Hancke,K. Mayes,Y. Lien, and J.-H. Chiu,"Using 3G network components to enable NFC mobile transactions and authentication," in IEEE PIC '10, vol. 1, Dec 2010, pp. 441 –448.
[4]. T. Nishide and K. Sakurai, "Security of offline anonymous electronic cash systems against insider attacks by untrusted authorities revisited,"ser. INCOS'11.Washington, DC, USA: IEEE Comp. Soc., 2011, pp.656–661.
[5]. M. A. Salama, N. El-Bendary, and A. E. Hassanien, "Towards secure mobile agent based e-cash system," in Intl. Workshop on Security and Privacy Preserving in e-Societies. New York, NY, USA: ACM, 2011, pp. 1–6.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Protecting Location Privacy in Sensor Networks against a Global Eavesdropper |
Country | : | India |
Authors | : | Radhika Shetty D. S || Roopa G K |
: | 10.9790/0661-1902058083 |
Abstract: While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such contextual information can be exploited by an adversary to derive sensitive information such as the locations of monitored objects and data sinks in the field. Attacks on these components can significantly undermine any network application. Existing techniques defend the leakage of location information from a limited adversary who can only observe network traffic in a small region. However, a stronger adversary, the global eavesdropper, is realistic and can defeat these existing techniques.............
Keywords: Global Eavesdroppers, Location Privacy, Protection in WSN,WSN
[1]. Kiran Mehta, Donggang Liu, Member, IEEE, and Matthew Wright, "Protecting Location Privacy In Sensor Networks Against A Global Eavesdropper", IEEE Transactions On Mobile Computing, Vol. 11, February 2012.
[2]. T. Wang, "Supporting Anonymous Location Queries in Mobile Environments with Privacygrid," Proc. Int'l Conf. World Wide Web (WWW '08), 2008.
[3]. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, "Enhancing source-location privacy in sensor network routing" in Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS), June 2005.
[4]. C. Ozturk, Y. Zhang, and W. Trappe, "Source-location privacy in energy constrained sensor network routing," in Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks (SASN), October 2004.
[5]. Y. Ouyang, Z. Le, G. Chen, J. Ford, and F. Makedon, "Entrapping Adversaries for Source Protection in Sensor Networks," Proc. Int'l Conf. World of Wireless, Mobile, and Multimedia Networking (WoWMoM '06), June 2006.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Automatic Identification of Spoken Language |
Country | : | India |
Authors | : | Tanusree Sadhukhan || Shweta Bansal || Atul Kumar |
: | 10.9790/0661-1902058489 |
Abstract: Spoken language identification is the process of mapping continuous speech to the language itbelongs to. Applications of spoken language identification include front-ends for multilingual speech recognition systems, retrieval of web data, automatic customer routing in call centers.This paper present the development of spoken language identification system for under resource Indian languages i.e Hindi and Manipuri.The system which has been designed is able to identify the languages with a great accuracy.
[1]. Comparison of :Four Approaches to Automatic Language Identification of Telephone Speech,IMarc A. Zissman, Member, IEEE.[ 1, JANUARY 1996]
[2]. AUTOMATIC SPOKEN LANGUAGE IDENTIFICATION, Liang Wang [2008]
[3]. Automatic Language dentification for Natural Speech Processing Systems Student Research Paper of Michael Heck At the Department of Informatics Institute of Anthropomatics (IFA) Interactive Systems Laboratories (ISL) Supervisors: Prof. Dr. Alex WaibelDr. Sebastian Stüker Duration: 01. June 2011 – 01. September 2011.
[4]. A Vector Space Modeling Approach to Spoken Language Identification Haizhou Li, Senior Member, IEEE, Bin Ma, Senior Member, IEEE, and Chin-Hui Lee, Fellow, IEEE
[5]. http://practicalcryptography.com/miscellaneous/machine-learning/guide-mel-frequency-cepstral-coefficients-mfccs/
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Thispaper presents a novel method for electroencephalography (EEG) based motor imagery classification for brain computer interface (BCI) implementation using the potential features extracted band-specific common spatial pattern (CSP). The recorded EEG signal is bandpass-filtered into multiple subbands to capture the related rhythmic components of brain signals. The CSP features are then extracted from each of these bands. The linear discriminant analysis (LDA) based classifier is subsequently used to classify the relevant subband of EEG using the features extracted by CSP. Then the highest discrimination score among all the subbands is used as the norm for overall EEG classification. The experimental results show that the proposed method yields comparatively superiorclassification performance compared to prevailing methods.
Keywords: Brain computer interface (BCI), electroencephalography, common spatial pattern, filterbank.
[1]. B. Rebsamen, E. Burdet, C. Guan, H. Zhang, C. L. Teo, Q.Zeng, C.Laugier, and M. H. Ang Jr., "Controlling a Wheelchair Indoors UsingThought," IEEE IntelligentSystems, vol. 22, no. 2, pp. 18-24, 2007.
[2]. N. Birbaumer, "Brain-computer-interface research: Coming of age," Clin. Neurophysiol., vol. 117, no. 3, pp. 479-483, 2006.
[3]. J. R. Wolpaw, N. Birbaumer, D. J. McFarland, G. Pfurtscheller and T. M. Vaughan, "Brain-computer interfaces for communication andcontrol,"Clin. Neurophys., vol. 113, pp. 767-791, 2002.
[4]. E. Niredermeyer and F. Lopes da Silva, Electroencephalography: BasicPrinciples, Clinical Applications and Related Fields, 5th ed., Baltimore,MD, USA: Lippincott Williams Wilkins, 2004.
[5]. G. Pfurtscheller, C. Neuper, D. Flotzinger, andM.Pregenzer, "EEG baseddiscrimination between imagination of right and left hand movement,"Electroencephalography Clin. Neurophysiol., vol. 103, pp. 642–651, Dec.1997.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: There are multiple reasons for the evolution as well as the presence of noise over transmitted GSM
signal. In spite of various approaches towards noise cancellation techniques, there are less applicable
techniques for controlling noise in acoustic GSM signal. Therefore, the proposed manuscript presents an
integrated modelling which performs modelling of noise identification that could significantly assist in
successful noise cancellation. The proposed system uses three different approach viz. i) stochastic based
approach for noise modelling, ii) analytical-based approach where allocated power acts as one of the
prominent factors of noise, and iii......
Keywords: Optimise GSM
[1] Q. S. Mahdi, et al., "Availability analysis of GSM network systems," Antennas Propagation and EM Theory (ISAPE), 2010 9th
International Symposium on. IEEE, 2010.
[2] Gu G. and Peng G., "The survey of GSM wireless communication system," In Computer and Information Application (ICCIA),
2010 International Conference on, IEEE, pp. 121-124, Dec 2010.
[3] Škrbić M., et al., "Web-based service implementation via GSM network," In Telecommunications Forum Telfor (TELFOR), 2014
22nd, IEEE, pp. 252-255, 2014.
[4] V. P. Venkatesan, "Architectural Pattern of Health Care System Using GSM Networks," arXiv preprint arXiv:1312.2323, 2013.
[5] N. Rekha and F. Jabeen, "Study on approaches of noise cancellation in GSM communication channel," Commun. Appl. Electron,
vol/issue: 3(5), pp. 5-11, 2015..
- Citation
- Abstract
- Reference
- Full PDF
Abstract: To compare the different result of optimization of a hybrid energy system. A hybrid renewable energy
system (HRES) is the combination of renewable and non-renewable sources which is playing a very important
role for rural area electrification when grid extension is not possible or excessively expensive. Non renewable
sources like diesel power generator (optional) are used in a HRES for backup when renewable energy supply is
not sufficient. While the HRES is very important due to the smallest natural and physical contact compared to
non renewable sources, this work proposed a comparison outcome with the help of different component by using
HOMER software and get best optimize result for the model. This paper presents a wide-ranging review of
various aspects of HRES. This paper discusses study, best sizing, and model, organize aspect and reliability
issue
Keywords: HRES HOMOR.
[1] Torreglosa J. P, García-Triviño P, Fernández-Ramirez L. M, & Jurado F. Control based on techno- economic optimization of
renewable hybrid energy system for stand-alone applications. Elsevier on. Expert Systems with Applications. 2016; 51:59–75.
[2] Shezan S. A, Julai S, Kibria M A, Ullah K R, Saidu, R, Chong W T, & Akikur R K. Performance Analysis of an off-grid Wind-PVDiesel-
Battery Hybrid Energy System Feasible for Remote Area. Elsevier on. Journal of cleaner production. 2016:121–132.
[3] Fulzele J. B., Subroto Dutt. Optimium Planning of Hybrid Renewable Energy System Using HOMER. International Journal of
Electrical and Computer Engineering (IJECE), 2012; 2(1):68-74.
[4] Mohamed Najeh Lakhoua*, Naouelli Walid**, Chakroun Atef**. System Analysis of a Hybrid Renewable Energy System.
International Journal of Electrical and Computer Engineering (IJECE), 2014; 4(3):343-350.
[5] Ali Zakerian, Daryoosh Nazarpour. New Hybrid Structure Based on Improved Switched Inductor Z-Source and Parallel Inverters
for Renewable Energy Systems. International Journal of Electrical and Computer Engineering (IJECE), 2014; 6(3):636-647.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: This paper presents the coordinated methodology for three-stage PWM AC-DC converter for
acquiring the balanced parts under lopsided gracefully condition. In the instances of unequal three-stage
framework, it causes the presence of uneven current and voltages in this way produce the negative parts on the
network voltage. Something else, the unbalance voltage in a three-stage power framework causes extreme
execution debasement of a matrix associated VSI. Subsequently, the information structures for traditional direct
force control have been altered with a three easier grouping networks rather it coupled by a point by point
three-stage framework strategy. Subsequently, the lopsidedness voltage can be settled by isolating from the
individual components of voltage.......
Keywords:Direct power control Negative sequence Positive sequenceTotal harmonic distortion Unbalance condition
[1]. K.VenkateshvarluandCh.Chengaiah,"ComparativestudyonDCmotorspeedcontrolusingvariouscontrollers,"Global Journal of
Researchers in Engineering Electrical and Electronics Engineering, vol. 13(17), 2013.
[2]. Wang Feng and Luo Yutao, "Modelling of a power converter with multiple operating modes," World Electric Vehicle Journal, pp.
1-17,2018.
[3]. DaweiZhi,LieXu,andBarryW.Williams,"ImproveddirectpowercontrolofgridconnectedDC/ACconverter,"IEEE Transaction Power
Electronic, vol. 24(5), 2009.
[4]. Zhang, Y., Li, Z., Zhang, Y., Xie, W., Piao, Z., and Hu, C., "Performance improvement of direct power control of PWM rectifier
with simple calculation," IEEE Transactions on Power Electronics, vol. 28(7), pp. 3428-3437,2013.
[5]. Jingjing Huang, Fanghong Guo, Changyun Wen, Bo Yang and Jianfang Xiao, "A direct power control strategy on best switching
state approach," IEEE Transaction Power Electronic, vol. 6(4),2018..