IJTEEE

Open Access Journal of Scientific, Technology & Engineering Research


International Journal of Technology Enhancements and Emerging Engineering Research (ISSN 2347-4289)
QUICK LINKS
CURRENT PUBLICATIONS



IJTEEE Volume 3 - Issue 6, June 2015 Edition - ISSN 2347-4289

All listed papers are published after full consent of respective author or co-author(s).
For any discussion on research subject or research matter, the reader should directly contact to undersigned authors.

IJTEEE Terms and Conditions


Teklay Mezgebe, Getu Shura

Abstract: Chromatography is one of the analytical methods that able to separate components of the plant leaves sample based on their interaction between stationary phase and mobile phase. Thin layer chromatography has valuable role to separate pigments in leaves based on the rate of reaction with mobile phase. The ratio of RF values are 0.73, 0.93, 0.55, and 0.35 for blue green, golden, yellow and yellow green colour respectively. The ratio RF values occurred between 0 and1, the largest ratio the better resolution, while the smallest ratio the poor resolution .

[View Full Paper]   [Download]   [References]

1-3  



Solomon Legesse

ABSTRACT: Coffee arabicais the key cash crop and top mainstay of the Ethiopian economy and requires sustainable production methods.Coffee wilt disease is one of the reasons for the reduction in coffee productivity as well in the livelihoods of millions involved in cultivation, processing, marketing, and export of coffee. The major causative agent of coffee wilt disease is Fusariumxylarioides. Trichodermaspecies are known for the effective control for this particular pathogen. In the present study;Trichoderma species were isolated from the soil sample taken from Jimma and the antagonistic efficiency of Trichoderma isolates against Fusariumxylarioideswas confirmed, using dual culture method. Trichodermaisolates significantly inhibited the mycelial growth of Fusariumxylarioidesranging from 83.08% - 81.14%, after 6 to 10 days of incubation at 25 o. Trichoderma isolates showed successful antagonism against the test pathogen (Fusariumxylarioides).

[View Full Paper]   [Download]   [References]

4-7  



Raghav Vadehra, Jyoteesh Malhotra, Nitika Chowdhary

ABSTRACT A Body Area Network is a wireless network of wearable computing devices. This paper provides survey on implementation issues of WBAN (Wireless Body Area Network) to be deployed in a medical environment. It describes the challenges in WBAN networks at Physical an MAC layers. It also addresses different protocols used for the transmission of signal. We figured out that the positioning of sensors and receivers, antenna type, complexity of receiver circuit, physical signaling techniques are considered to play a significant role in transmission of the signals. In order to improve efficiency of transmitted signal researchers are working in areas like controlling the power transmission, detecting the distance and handovers between the sensor nodes.

[View Full Paper]   [Download]   [References]

8-13  



Chew Lin Hou, James Mountstephens, Jason Teo

ABSTRACT: Automatic generation of art has aided artists in creating novel 2-dimensional artforms in a field known as evolutionary art. The development of technology on 3D printing has attracted people of different fields to designing 3D shapes for art display, an architecture design, a prototype or even an aiding tool. However, current automatic generation algorithms have focused primarily on 2D art only and have not successfully crossed the realm into 3D. This paper introduces an automatic method for generation of 3D artforms using electroencephalogram (EEG). Interactive evolutionary computing (IEC) is the typical method used to evolve art, however, IEC is often reported to cause significant fatigue among its users due to its repetitive and time-consuming characteristics. With the combination of brain-computer interface (BCI) and IEC, the hope is to speed up the interactive process, hence reducing user fatigue and at the same time be able to produce promising solutions. The proposed approach focuses on understanding human emotions in order to identify user preferences of the 3D shapes automatically and further evolve the selected artform. The use of a nature-inspired shape generation formula, called the Gielis supershape, is used as the encoding for generation of 3D art and is shown to be able to bring forth large varieties of shapes during the automatic evolutionary optimization process.

[View Full Paper]   [Download]   [References]

14-18  



Uttamjit kaur

ABSTRACT :Open-Source Software (OSS) is becoming very popular in today’s software development environment. In OSS, the development and maintenance of the software is decentralized due to which maintainability is core issue in OSS development. The mainten-ance of OSS is a never ending task.Software metrics help to control the uality of OSS. This paper reviews popular object-oriented metrics to analyze LOC, CC RCC and CLC of the JACOB Open Source Software (OSS) of Twenty-two releases over a successive versions.The terms LOC, CC, RCC and CLC was computed for all the Twenty-Two successive versions of OSS. The software metrics wre calculated using Understand4Java tool.

[View Full Paper]   [Download]   [References]

19-21  



Mohsin Raza, Sherjung

ABSTRACT: The need for a more efficient transit system has led transit agencies across the country to implement Automatic Vehicle Location systems. This enables them to observe, collect, and analyse location information about a commuter vehicle in real time and transmit this information to the transit management centre and passengers. This information gives the ability to make better and more informed decisions while also providing quicker response to emergencies. The benefits to the passengers mean better on time performance and less waiting time at bus stops. This paper deals with the implementation of cost effective and intelligent solution “Global Positioning System (GPS) Based Public Transit Tracking System” which will provide current location of the BUS and also send messages to the registered passengers/Users when bus reached at specific stoppage. GPS Based Public Transit Tracking System collects real time GPS data from android mobile of the driver and sends it to the server. The server takes decision to inform the registered user via short messaging service about the current location of the Bus/Vehicle. This application is easy to deploy and provide effective management tool for optimal utilization of present resources so that user can use public transport rather than private vehicles.

[View Full Paper]   [Download]   [References]

22-25  



Lovekesh Paul, Jyotsana, Jyoteesh Malhotra

ABSTRACT: In this paper the effect of dispersion on the transmission distance has been demonstrated. Chromatic Dispersion in signal increases as length of optical fiber increases. This limits the performance of a system. Three dispersion compensation techniques are used to compensate the dispersion in 40Gbps OTDM system: pre-, post- and symmetrical over an Alcatel Dispersion Compensated Fiber (DCF) having dispersion 8ps/nm-km. These three techniques pre, post and symmetrical are compared. With pre- dispersion compensation technique, maximum distance travelled by a signal was 572 km. With Post- dispersion compensation technique, maximum distance travelled by a signal was 616 km. But the best results were observed in symmetrical dispersion compensation technique where maximum distance travelled by signal is 704 km with Q-Factor 7.9. All the results are gained at a wavelength of 1552.52 nm.

[View Full Paper]   [Download]   [References]

26-30  



Gautam Hazarika, Masud U. A., Manash Pratim Kashyap

ABSTRACT :The main principle of design of truss by using Ferro-cement is economy and safety. In this investigation a ferrocement roof truss has been designed which are of low in cost, light in weight and easy to maintain. The first step of design involves the calculation of dead load using IS 875 (part-1) and wind load using IS 875 (part-3)-1987. The next step involves the calculation of tension and compression in each individual member of the truss. Sections of the truss are designed using the value of highest tension or compression. After designing all the sections, the truss is constructed. A 6-mm diameter circular coil is used as reinforcing material for construction and angles of desired shape are made to hold the sections in position. Hexagonal wire mesh or chicken mess is cut into required sizes and are placed over the reinforced skeleton of the section. Conventional mortar of cement sand ratio of 1:2 is prepared. The mixture is laid on the truss and the structure is allowed to stand for 28 days. Connection plates, nuts and bolts are used to connect the members and to hold them firmly in position.

[View Full Paper]   [Download]   [References]

31-33  



Meenakshi, Jyotsana, Jyoteesh Malhotra

ABSTRACT: Dense wavelength division multiplexing (DWDM) is a fibre optic technology that can transmit multiple information streams simultaneously over a single fibre. This paper focusing on to implementation of comparative analysis of dispersion compensated configuration for 40 Gbps dense wavelength division multiplexing (DWDM) system with modulation format (NRZ) and compensation schemes (Pre, Post and symmetrical compensation) at same bit rate 40 Gbps with standard and dispersion compensated fibre on the basis of Q-factor, eye –diagram and bit error rate for fixed gain EDFA and length both type of fibre. On the basic comparison of that Symmetrical compensation is superior to pre and post compensation schemes and gives better results even at high bit rate 40Gbps its transmission distance is 480 km with BER 10-28 and Q factor 10.92 with NRZ format.

[View Full Paper]   [Download]   [References]

34-38  



Syed Uvaid Ullah, Dr. R. K. Baghel, Sami Siddiqi

Abstract: This paper manages scaling down and tuning of wearable electro-textile antennas by the utilization of Minkowski fractal geometries and tuning holes. Different electro-textile materials used for wearable electronics (like polyester fabric.) are considered for the substrate (or dielectric medium) configuration of microstrip antennas. In the essential outline these antennas are intended for WLAN applications and hence specifically tuned by tuning holes designed over the patch. The path antenna with tuning holes gives an increase of 3.2 dB with an impedance bandwidth of 150 MHz though, the change in material offers an addition of 3.4 dB and an impedance bandwidth of 162 MHz. By applying holes in Minkowski fractal geometry to the antennas, tuning is accomplished. Also the impact of different iterations are also considered to make them suitable for GSM 1900 applications. In these analysis, the performance and limitations of these designs in accordance with their separate operating environment are also compared. The reenactment studies uncover that tuning holes yields better results contrasted with normal antenna.

[View Full Paper]   [Download]   [References]

39-41  



Manjunath Minajagi Ambale Swapnil, Masal Kailas, Sandage Sushilkumar, Patil Tejesh

ABSTRACT: The latest trend in the automotive industry is to develop light weight vehicles. Every automotive industry is looking to reduce the weight of the vehicle as it helps in the better handling of the vehicle and increases the efficiency of the vehicle. Today, the heavy vehicles are known for producing a large amount of harmful gases like CO2, SO2 etc. which act as the major source for global warming. So research is going on to find a light weight vehicle which does not pollute the environment. The present study focuses on engine it is modified from a 4-stroke to a 2-stroke engine using a cam system driven by a crankshaft and the intake and exhaust valves have a small lift due to this modification. The electricity requirement for compressing air has to be considered while computing overall efficiency. Nevertheless the compressed air vehicle will contribute to reducing air pollution and tend to zero pollution level. Main advantage of this engine is that no hydrocarbon fuel required means no combustion process is take place.The design and experimental test result presented here can be used for further research and modification of the technique.

[View Full Paper]   [Download]   [References]

42-45  



Lovepreet kaur/ CSE Dept GNDU RC Jal, Jyoteesh Malhotra / CSE Dept GNDU RC Jal.

ABSTRACT: Wireless sensor network is a collection of sensor nodes with limited processor and limited memory unit embedded in it. Sensor networks are used in wide range of applications such as Environment monitoring, health, industrial control units, military applica-tions and many more. This paper defines the security requirements and various attacks on sensor network. This paper also review proposed security mechanisms for WSN.

[View Full Paper]   [Download]   [References]

46-49  



Krantee Jamdaade, Mohsin Choudhary, Riyaz Gangrekar

ABSTRACT: In current era business organizations are striving to get accurate data to make key decision. The popularity of Business Intelligence (BI) is increasing day by day. Business Intelligence (BI) project are developed under strict budget which overshoot most of the time. There is always the need to evolve with the technological advancement. Cloud BI provides a low cost, sensible solution for high cost Business Intelligence projects. Various new cloud models can be integrated with BI which was not possible before. BI when used with cloud will solve problems associated with implementation. The paper provides a review on future of Business Intelligence.

[View Full Paper]   [Download]   [References]

50-53  



S. K. Jha, Ankit Kapahi

ABSTRACT: Organizations are adopting cloud in their business to gain cost-efficiency and to survive amongst the best. Moving to cloud, customer organizations can utilize pay-per-usage pattern of service and innumerable advantages that cloud offers over traditional methodologies. With the diversity of purposes that cloud computing is used for, data storage is the major adopted service. This includes the storage of sensitive data like employee personal information, which increases the demand for privacy and high security in cloud. For ensuring the safety of data and information sensitive to the business, organizations must know what type of cloud to be used. Public cloud, wherein costs are low with minimum or no guarantee of safety of the data or Private cloud, wherein the customer can rely on a third party cloud vendor for safeguarding their data with complete privacy. The tug of war between public cloud and private cloud came to an end with hybrid cloud which is a connected cluster of public clouds and private clouds.Hybrid cloud can viewed as the solution for many organizations needs in terms of security and usage. The paper provides a proposed algorithm for hybrid cloud security and the comparative study between the existing security algorithm and proposed security algorithm of hybrid cloud.

[View Full Paper]   [Download]   [References]

54-56  



KUSSUM BHAGAT, Dr. JYOTEESH MALHOTRA

ABSTRACT :OFDM is very attractive technique now a day due to its various benefits like easy and efficient in dealing with multipath, robust in nature, spectral efficiency and high speed data transmission. Thus because of its applications OFDM plays a vital role for upcoming 4G wireless communication. OFDM works either as the multiplexing or modulation technique. It has also been used in broadband multimedia wireless services. Beside of its application, one major drawback of OFDM system is high Peak to Average Power ratio (PAPR) which causes non-linearity at the receiving end. The paper describes the PAPR problem in OFDM system and various PAPR reduction techniques that are used to reduce the PAPR have been discussed. The PTS technique for 16 QAM/OFDM systems is used to reduce the PAPR and simulation results are then analyzed. Also, SC-FDMA is another technique which can replace the OFDM. Thus the subcarrier mapping schemes of SC-FDMA has been described. The results for IFDMA and LFDMA for 16QAM modulation technique are shown when DFT spreading technique is applied.

[View Full Paper]   [Download]   [References]

57-61  



Gurjant Singh, 4th SEM, M.E. (EE), Chandigarh University, Gharuan, Mohali Dr. Inderpreet Kaur, Professor EEE Department, Chandigarh University, Gharuan, Mohali

Abstract: As an integral part of the Smart Grid, smart transformers both work independently to constantly regulate voltage and maintain contact with the smart grid in order to allow remote administration if needed and to provide information and feedback about the power supply and the transformers themselves. Through a process known as voltage optimization, a smart transformer provides the exact amount of power that is needed, and responds instantly to fluctuations within the power grid, acting as a voltage regulator to ensure that the optimized voltage is undisturbed. Because they directly reduce energy consumption, smart transformers therefore directly reduce greenhouse gas emissions as well. As a recognized Smart transformer are a ready and significant source of LEED Points for any business or organization in pursuit of LEED certification. This makes them an important part of any energy retrofit or lighting retrofit. While smart transformers immediately reduce power consumption by providing a stable, optimal power supply that supplies electrical equipment with its ideal voltage, they also protect electrical equipment from power fluctuations – thereby helping electrical equipment last longer. In this paper we discuss on a continuous and discrete smart transformer which is accurate and fast respectively. The continuous smart transformer has a continuous turn ratio and it controls the microgrid side voltage without voltage steps, there for it increases the system accuracy and on another side discrete smart transformer has discrete turn ratio, the output is regulated between several discrete values and discrete smart transformer is less accurate.

[View Full Paper]   [Download]   [References]

62-64  



Karamjit Kaur, Rajeev Bedi, R.C.Gangwar

ABSTRACT: Data mining has many aspects like clustering, classification, anomaly detection, association rule mining etc. Among such data mining tools, association rule mining has gained a lot of interest among the researchers. Some applications of association mining include analysis of stock database, mining of the web data, diagnosis in medical domain and analysis of customer behaviour. In past, many algorithms were developed by researchers for mining frequent itemsets but the problem is that it generates candidate itemsets. So, to overcome it tree based approach for mining frequent patterns were developed that performs the mining operation by constructing tree with item on its node that eliminates the disadvantage of most of the algorithms. The paper tries to address the problem of finding frequent itemset by determining the infrequent itemsets in a transaction which would reduce the computation time. The proposed algorithm is compared with the existing weighted mining algorithm for performance evaluation.

[View Full Paper]   [Download]   [References]

65-69  



Krantee Jamdaade, Hetal Champaneri

ABSTRACT: In this paper we review a secure e-payment system for online transaction. The e-payment system is to be secure fore-transaction included participants such as Payment gateway, Bank and Merchant.Electronic payment system is the online processing of exchanging information between included participants. Basically the main goal of e-payment system is to perform transaction from anyway as well as for fast processing rather than manual. The electronic payment process gives a way to do online transaction for doing activities such as placing order, money transfer, etc.

[View Full Paper]   [Download]   [References]

70-72  



Supriya Ghanekar

ABSTRACT: This paper presents analysis and design method for semi rigid steel frame. The frame is having multi bay and multi storey. This frame is analyzed for number of rigidities varying from 0 % to 100 %. The design of members is done for each case. The case for which weight is coming minimum is selected. The semi rigid joint is designed for that case. The rigidity of the joint is achieved by adjusting the moment-rotation relationship.

[View Full Paper]   [Download]   [References]

73-75  



Deepti Kanoujia, Vishal Moyal

ABSTRACT: This paper proposes CMOS 5T SRAM cell intended for the power reduction in it for advanced memory design. The aim is to reduce the static power dissipation. Various employed technologies are briefly described and discussed in the best possible way along with their strengths and weakness. The design metrics of a five transistor SRAM cell are discussed briefly and its performance is evaluated. Lastly, comparison between various methodologies is done to evaluate the best methodology to reduce power as per described technology. Performance and delay parameters will also be calculated using the tools, used in the entire project duration (H-spice). It is shown that the power in the new cell will be reduced up to 20% as compared to the conventional cell. As a trade-off, this may affect the area or speed of the cell, up to some extent. The entire work is done using tools like Microwind, DSCH and finally simulation done using H-Spice and thus power reduction. Delay is calculated using Cosmoscope. The technology used is 45nm technology.

[View Full Paper]   [Download]   [References]

76-80  



Lekshmi Balakrishnan, Soja Salim

ABSTRACT: With the arrival of cloud computing, data owners can outsource their complex data from local systems to the commercial public cloud .Storing data on cloud enables them to access their data from anywhere by using any system. The main advantage of cloud computing is data service outsourcing.It allows data owners to store their documents in the public data centers by economically saving their capital investment towards data management. But for protecting data privacy, sensitive information must be encrypted before storing them to cloud.Encrypting the documents before storing them to cloud outmoded traditional data utilization which focuses on plaintext keyword search. Today’s main challenge is to enable searching over encrypted cloud data. Since cloud contains large number of data users and documents, it is necessary to allow multi-keywords in the search request and return documents in the order of their relevance to these keywords. The main aim is to make effective data access in the public cloud storage by improving various searching techniques, thereby, increasing the data utilization. In this survey, an attempt is made to study various searching techniques over encrypted cloud data.

[View Full Paper]   [Download]   [References]

81-83  



Dr Namita Gupta

ABSTRACT: Code coverage is a measure used to describe the degree to which the source code of a program is tested by a particular test suite. A program with high code coverage has been more thoroughly tested and has a lower chance of containing software bugs than a program with low code coverage. Many different metrics can be used to calculate code coverage like statement coverage, decision coverage, condition coverage, path coverage etc. Path coverage ensures that every independent path in the program should be executed at least once by the give test suite. The proposed technique check the adequacy of given test suite and design new test cases (if required) by mutating the existing test cases, for path coverage testing based on genetic algorithm using XNOR fitness function.

[View Full Paper]   [Download]   [References]

84-92  



Vidhya Rao, Dr. Durga Surekha

ABSTRACT: With the augmentation of the internet, ICT has seen exponential growth in the coming years and will continue to do so. Over the years, the numbers of universities and colleges offering online courses have been dramatically increasing. ICT comprises all forms of electronically supported learning and teaching. The interactive tools for communication in ICT give the sighted learners as well as visually impaired learners’ flexibility in terms of easy accessibility to learning, learning at their own pace, anytime anywhere learning environment. In view of the issues, the paper focuses about the study of the methods and practices of teaching the visually challenged people and how ICT (Information and Communication Technology) can be used to provide higher education for the visually challenged learners. It reveals information about the available software tools and resources that let learners with sight and without sight to team up to see, hear – and now also feel – what is on the computer screen. It also emphasizes on scenarios which demonstrate the effective use of ICT for the visually impaired learners. The use of technology can help them in activities like newspaper reading, creative writing, making resumes, presentations, participating in select college events thereby highlighting each one’s abilities. Also, the study points out how the visually impaired learners could be groomed to take mock interviews and making them corporate ready. It reveals information about the available software tools and resources that let learners with sight and without sight to team up to see, hear – and now also feel – what is on the computer screen. The visually challenged learners do have aspirations. There is a huge talent pool of PWDs which is untapped yet. However, even in this digital era, there has been little done for learners with low vision or no vision.The visually impaired learners too require the same learning opportunities as the sighted learners because they too live and have to work and earn within the same environment. So there is a need to boost and encourage learning for the visually impaired learners so that these learners can lead an independent life. A minute supportive change to this neglected section of a society could make a lot of difference and improve their standard of living. The day when companies fully support this community, there will be increased productivity. The use of ICT aims at making a better future for the visually challenged learners. The study presently states the pedagogy of the visually impaired learners of any age.

[View Full Paper]   [Download]   [References]

93-97  



Dr Nirmal Kumar Betchoo

ABSTRACT: The objective of this article titled “A broadened philosophy for savings in Mauritius” firstly explains how Mauritius, an island nation in the Indian Ocean, positions itself as an emerging market with a population having the capability of spending more than saving. Although this reflects a positive sign concerning spending, it also echoes a major concern for the domestic economy that relies extensively on imports. The imbalance of trade puts the Mauritian economy to test since personal savings have not improved over the past. There have been earlier initiatives to stimulate savings in order to improve the liquidity asset of the Central Bank of Mauritius - hence the country-but these have not improved when the economy suffered from local and international negative economic cycles. This research paper, which is essentially a case study report, claims that the policy of bringing again savings as a central issue for better cash flow and reserves will be important to Mauritius. A fragile economy that is overly dependent on imports which outweigh considerably its exports might find it salutary to initiate public’s awareness on savings and these need to be precautionary.

[View Full Paper]   [Download]   [References]

98-101  





Impact Factor : 1.556
Provided by IIFS

International Journal of Technology Enhancements and Emerging Engineering Research

Manuscript submission

IJTEEE Open Access Journal

QR CODE
IJTEEE-QR Code