Table of Contents

Hot Topics

Pleskac , Shuli Yu , and Jerome R. Schrader , Stephen H. This system will prove to be helpful in areas where security of data is of utmost importance. Norton,Machine Design,pearson Second edition. Impact of land- use changes on the processes in the Elbow river watershed in southern Alberta. Atomic Absorption Spectroscopy, AAS was used to determine the chemical composition of the clay and the concentration of heavy metals on the paints produced.

Search Curly Nikki

Retrospective You have access. Profile You have access. Commentaries You have access. Bianco and Jon M. Physical Sciences Applied Mathematics You have access. David Kelly , Andrew J. Majda , and Xin T. Kvam , Timothy J. Pleskac , Shuli Yu , and Jerome R. Drews , Nguyen H. Nguyen , Kyle J. Bishop , and Sharon C. Amir Haji-Akbari and Pablo G. Brady , and Steven A. Cortese-Krott , Gunter G. Kuhnle , Alex Dyson , Bernadette O. Fernandez , Marian Grman , Jenna F. DuMond , Mark P.

Bruce King , Joseph E. Saavedra , Larry K. Butler , and Martin Feelisch. Leibfarth , Jeremiah A. Johnson , and Timothy F. Faysal Bibi and Wolfgang Kiessling. Bramer , Daniel C. Fortin , John E. Patel , Trenton C. Pulsipher , Jennie S. Rice , Teklu K. Tesfa , Chris R. Vernon , and Yuyu Zhou. Aranson , Andreas R. Bausch , and Erwin Frey. James Habyarimana and William Jack.

Ori Weisel and Shaul Shalvi. Sibhatu , Vijesh V. Krishna , and Matin Qaim. Biological Sciences Agricultural Sciences You have access. Parton , Myron P. Gutmann , Emily R. Merchant , Melannie D. Hartman , Paul R. Adler , Frederick M. McNeal , and Susan M.

Frederick , Michael T. Harper , Holley L. Weeks , Antonio F. Branco , Peter J. Moate , Matthew H. Williams , Maik Kindermann , and Stephane Duval. Ungar , and Linmao Qian. Sjostrom , Björn M. Vanderklish , and Lujian Liao. Michael Dean Chamberlain , Laura A. Heim , Jez L. Marston , Ross S. Federman , Anne P. Edwards , Alexander G. Karabadzhak , Lisa M. Petti , Donald M. Engelman , and Daniel DiMaio. Jian Zhang , Yen K. Lieu , Abdullah M. Ali , Alex Penson , Kathryn S. Ravindra reddy, "Parameter design for MIG welding of Al- alloy using Taguchi technique", Journal of scientific and industrial research, vol 70,,pp.

Balasubramanian, "Optimization of pulsed current gas tungsten arc welding process parameters to attain maximum tensile strength in AZ31B magnesium alloy", Trans.

International Journal of Engineering research and applications, vol2,, pp. Jayabalan,"Predictio n and optimization of Pulsed current gas tungsten arc welding process parameters to obtain sound weld pool geometry in Titanium alloy using lexicographic method",JMEPEG 18,,pp Datta, "Prediction of weld bead geometry and penetration in shielded metal arc welding using artificial neural network", Journal of material processing technology, ,pp , [10] P.

Murugan, "optimization of weld bead geometry for stainless steel claddings deposited by FCAW" Journal of material processing technology,vol ,,pp. In this paper, images of real- world natural scenes and manmade structures of different depth are taken.

With increase in image depth , roughness increases in case of man-made structures whereas natural scene images become smooth, thus reducing the local roughness of the picture. Such kind of specific arrangement produces a particular spatial pattern of dominant orientations and scales that can be described using Gabor filter as it gives the local estimate of frequency content in an image. Here various techniques are used i.

Here the real scene images are classified in four classes such as near natural, near manmade, far natural and far manmade. Gabor filter only classify into low energy and high energy scenes. In the proposed method i.

Its properties like low cost, high bandwidth and significant progress has been made in understandingthe behavior of TCP and congestion-controlled traffic over CSMA based multihop wireless networks. Despite these advances, however, no prior work identified severe throughput imbalances in the basic scenario of mesh networks, in which a one-hop flow contends with a two-hop flow for gateway access.

In this paper, we demonstrate via real network measurements, testbed experiments, and an analytical model that starvation exists in such a scenario; i.

Our analytical model yields a solution consisting of a simple contention window policy that can be implemented via standard mechanisms defined in IEEE Despite its simplicity, we demonstrate through analysis, experiments, and simulations that the policy has a powerful effect on network-wide behavior, shifting the network's queuing points, mitigating problematic MAC and transport behavior, and ensuring that TCP flows obtain a fair share of the gateway bandwidth, irrespective of their spatial location.

Higher-Speed Physical Layer Extension in the 2. The electrocardiogram ECG is widely used for diagnosis of heart diseases. Good quality of ECG is utilized by physicians for interpretation and identification of physiological and pathological phenomena. However, in real situations, ECG recordings are often corrupted by artifacts.

Noise severely limits the utility of the recorded ECG and thus need to be removed, for better clinical evaluation. Donoho and Johnstone [4, 5, 10] proposed wavelet thresholding denoising method based on discrete wavelet transform DWT with universal threshold is suitable for non-stationary signals such as ECG signal.

In the present paper a new thresholding technique is proposed for de-noising of ECG signal. This new de-noising method is called as improved thresholding de-noising method could be regarded as a compromising between hardand soft-thresholding de-noising methods. The advantage of the improved thresholding de-noising method is that it retains both the geometrical characteristics of the original ECG signal and variations in the amplitudes of various ECG waveforms effectively.

The experimental results indicate that the proposed method is better than traditional wavelet thresholding de-noising methods in the aspects of remaining geometrical characteristics of ECG signal and in improvement of signal-tonoise ratio SNR.

ECG signal, wavelet de-noising, discrete wavelet transform, improved thresholding Reference [1] Pan. Mc Clintock, and A. Stefanovska, "Noise and deterministic in cardiovascular dynamics", Physica A. Johnstone, "Ideal spatial adaptation via wavelet shrinkage", Biometrika, , Vol. Marques de sa, "ECG noise filtering using wavelets with softthresholding methods", Computers in Cardiology, vol.

Mallat, "A theory for multiresolution signal decomposition: Johnstone, "Adapting to unknown smoothness via wavelet shrinkage", J. Zhao, "Three novel models of threshold estimator for wavelets coefficients", 2nd International Conference on Wavelet Analysis and Its Applications, Berlin: The demand for silent machine operation in any of the organization is prime need in today's environmentally conscious world.

The legal aspects of noise control requires a silent and noise free operation of the machine. The vibration and noise resulted due to it is the common phenomena in any dynamic machinery. In this paper an attempt has been made to found a suitable Viscoelastic material which can minimize the vibration and results into less noise and efficient operation. Viscoelastic material, Vibration, FFT analyzer. Tillema, Thesis Noise reduction of rotating machinery by viscoelastic bearing supports, University of Twente, Enschede, Netherlands, pp.

This paper investigates the effect of orthogonal frequency division multiplexing OFDM transmission mode on the performance of the cyclic prefix- CP based frequency synchronization technique.

Five different OFDM transmission modes are developed and frequency synchronization is performed on each of them in turn. The results show that synchronization performance improves with increase in the order of transmission mode IFFT size but with increase in CFO estimation time.

Ippolito, Satellite communications systems engineering West Sussex: John Wiley and Sons Ltd. Ajayi, Orthogonal frequency division multiplexing OFDM for future mobile multimedia communications, International Journal of Engineering, 5 4 , , The necessity in image compression continuously grows during the last decade. A number of image compression techniques have been developed in the past different kind of application. In recent years, discrete time wavelet transform DWT is observed to be very efficient for image compression techniques.

Mallat, "A theory for multi resolution signal decomposition: Pattern Analysis and Machine Intelligence, vol. On Circuits and Systems for Video Tech. Power Quality is one of the primary concerns of the utilities, since lack of quality in power may cause malfunctions, instability, short lifetime and so on. The efficiency and sustainability of a power system is highly dependent on the maintenance of good quality of power supply.

Conventional Methods have been used to analyze the transient effects but found to be high resource consuming under remote applications. In this aspect the Discrete Wavelet Transformation DWT analysis has gained reputation of being a very effective and efficient analysis tool.

VHDL is used to implement DWT architecture for improving the efficiency of estimation and response in the power systems. The evaluations are compared with theoretical results from MATLAB and were observed to be meeting the accuracy of estimation. Vetterli " Wavelets and signal processing. Kovacevic " Wavelets and Subband Coding". Multiplying floating point numbers is a critical requirement for DSP applications involving large dynamic range. The multiplier was verified against Xilinx floating point multiplier core.

It handles the overflow and underflow cases. Rounding is not implemented to give more precision when using the multiplier in a Multiply and Accumulate MAC unit. The construction industry in recent years has incorporated information technology which serves to facilitate the conceptualization and realization of construction projects. BIM has attracted widespread popularity recently; however, there is several challenges concerning its definitions and expectations in early phases of construction projects.

Evidently different organizations and people create their own definitions of BIM, based on the specific way they work with BIM. Thus, it is evident that there are differences in the way BIM is perceived by both different individuals and organizations within the construction industry.

As a result, it might be difficult to come up with a common definition of BIM for the entire construction industry. This can lead to misunderstandings concerning expectations from different stakeholders involved in construction projects where BIM is utilized. It is suggested that the definition of BIM should not be unilateral but rather encompass several key characteristics which have been attributed to it.

Joo, Building information modelling BIM framework for practical implementation, Automation in Construction 20 2 , , To design a high speed multiplier with reduced error compensation technique.

The fixed-width multiplier is attractive to many multimedia and digital signal processing systems which are desirable to maintain a fixed format and allow a little accuracy loss to output data.

This paper presents the Design of error compensated truncation circuit and its implementation in fixed width multiplier. To reduce the truncation error, we first slightly modify the partial product matrix of Booth multiplication and then derive an effective error compensation function that makes the error distribution be more symmetric to and centralized in the error equal to zero, leading the fixed-width modified Booth multiplier to very small mean and mean-square errors.

However, a huge truncation error will be introduced to this kind of fixed-width modified Booth multipliers. To overcome this problem, several error compensated truncation circuit approaches have been proposed to effectively reduce the truncation error of fixed-width modified Booth multipliers. Very Large Scale Integr. The operation of VSI is supported by a dc storage capacitor with proper dc voltage across it.

Any change in the load affects the dc-link voltage directly. The sudden removal of load would result in an increase in the dc-link voltage above the reference value, where as sudden increase in load would reduce the dc-link voltage below its reference value.

Conventionally, a Proportional-Integral PI controller is used to maintain the dc-link voltage to the reference value. It uses deviation of the capacitor voltage from its reference value as its input.

However the transient response of the conventional PI dc-link controller is slow. To maintain the dc-link voltage at the reference value, the dc-link capacitor needs a certain amount of real power, which is proportional to the difference between the actual and reference voltages. To overcome the disadvantage of the conventional PI dc-link voltage controller, a fast-acting dc-link voltage controller is proposed.

To maintain the dc-link voltage of fast acting controller reference value is proportional to the difference between the squares of the actual and reference voltages. Mathematical equations are given to compute the gains of the conventional controller based on fast-acting dc-link voltage controllers to achieve similar fast transient response. The value of the dc-link capacitor can be selected based on its ability to regulate the voltage under transient conditions.. The efficiency of the proposed controller over the conventional dc-link voltage controller has been developed in MATLAB environment, simulated and obtained related waveforms.

This methodology provides a numerical approach to observability analysis. The approach enables observability analysis and restoration pseudo-measurement selection in a simple way with iteration, via triangular factorization of the jacobian matrix of the weight least square state estimator.

An algorithm for precious measurement of topological observability in large bus — system state estimation has been proposed. The algorithm is based on observation that the search for a spanning tree of full rank. We use observability algorithm and state estimation algorithm.

We use the Mat lab to obtain the various graphs of bus systems. By using simulation method of bus system we analyze the observability. Power system state estimation, Observability analysis, Pseudo — measurement. Reference 1 Fred C. Schwepp and Wildes "Power static state estimation Part- 1: Davis "Power System Observability: Mukhedkar, "Power systems observability: Kusic "Computer aided power systems analysis" Prentice hall of india, 6 V.

Quintana, A Simoes-costa and A. As health care centres have becomes popular, daily monitoring of health-status related parameters is becoming important. An easy, comfortable and patient friendly solution for acquisition, processing and remotely transmitting the information from patient to the centre is therefore an important issue. Phonocardiogram PCG is a physiological signal reflecting the cardiovascular status.

This paper deals with a Signal Processing Module for the computer-aided analysis of the condition of heart. The module has three main blocks: Data acquired includes the heart sounds. The system integrates embedded internet technology and wireless technology. As the data is being send by internet, it realizes real-time recording and monitoring of physiological parameter of patients at low cost and both at home and in hospital.

The analysis can be carried out using computer initially and further by doctor. The tele-monitoring system may provide a low-cost, reliable and convenient solution for data acquisition and real time analysis of the PCG. The heart sounds are acquired using an acoustic stethoscope and then processed using software developed using the simulation tool Python 2. Abrams, Current concepts of the genesis of heart sounds.

First and second sounds, Jama, vol. Khan, Third heart sound: The heart arteries and veins, 7th ed. Hard turning is a machining process defined of hardness higher than 45 HRC under appropriate cutting tools and cutting speed. The objective of this paper is to investigate the optimum process parameters for a particular work piece-tool material combination. In this study, three levels of each parameters viz. AISI H 11 was taken as work piece material.

The experiment is designed using Taguchi Method. The final results of experimental investigation are presented in this paper. The conclusions arrived at are critically discussed at the end.. Turning versus grinding—a comparison of surface integrity aspects and attainable accuracies.

Ann CIRP ;42 1: Cutting of hardened steel. Ann CIRP ;49 2: Tool wear and surface integrity in hard turning. Prod Eng ;3 1: Hard turning—Influence on the workpiece properties.

Identification of cutting errors in precision hard turning process. J Mater Process Tech ;— Rech J, Moisan A. Surface Integrity in finish hard turning of case hardened steels.

Int J Mach Tool Manuf ; Technology key to mold making success. Manuf Eng ; 4: High-speed milling of dies and molds in their hardened state. Ann CIRP ;46 1: Ann CIRP ;52 2: Capability profile of hard cutting and grinding processes. Ann CIRP ;54 2: Morphology is a part of linguistic that deals with study of words, i. A morphological analyzer is a program for analyzing morphology for an input word, it detects morphemes of any text.

In current technique, only provides dictionary which defines the meaning of the word, but does not give the grammatical explanation regarding that word. In propose system, we evaluate the morphological analyzer for Marathi, an inflectional language and even a parsed tree i. We plug the morphological analyzer with statistical pos tagger and chunker to see its impact on their performance so as to confirm its usability as a foundation for NLP applications.

A case of implementing the open source platformApertium". Pearson Education, Singapur, second edition, Akshar Bharati and V. Electrocardiogram ECG is a noninvasive technique used as a primary diagnostic tool for detecting cardiovascular diseases.

One of the important cardiovascular diseases is cardiac arrhythmia. Computer-assisted cardiac arrhythmia detection and classification can play a significant role in the management of cardiac disorders.

This paper presents an algorithm developed using Python 2. The rapid growth of video data leads to an urgent demand for efficient and true contentbased browsing and retrieving systems. In response to such needs, various video content analysis schemes using one or a combination of image, audio, and text information in videos have been proposed to parse, index, or abstract massive amount of data text in video is a very compact and accurate clue for video indexing and summarization.

Most video text detection and extraction methods hold assumptions on text color, background contrast, and font style. Moreover, few methods can handle multilingual text well since different languages may have quite different appearances. In this paper, an efficient overlay text detection and extraction method is implemented which deals with complex backgrounds.

Based on our observation that there exist transient colors between inserted text and its adjacent background. It is robust with respect to font size, style text, color, orientation and noise and can be used in a large variety of application fields such as mobile robot navigation vehicle license detection and recognition, object identification , document retrieving, etc. Worring, "Time interval maximum entropy based event indexing in soccer video," in Proc.

Multimedia and Expo, Jul. Freisleben, "Text detection in images based on unsupervised classification of highfrequency wavelet coefficients," in Proc. Zhang, "Efficient video text recognition using multiple frame integration," in Proc. Circuit and Systems for Video Technology, vol. Samarabandu, "Multiscale edge-based text extraction from complex images," in Proc. Wang, "Automatic text detection in complex color image," in Proc. Machine Learning and Cybernetics, Nov.

Tan, "Effective video text detection using line features," in Proc. Control, Automation, Robotics and Vision, Dec. Maenpaa, "Multiresolution gray-scale and rotation invariant texture classification with local binary patterns," IEEE Trans. Kasturi, "Robust extraction of text in video," in Proc. The dynamic analysis is carried out by the finite element method simulation thereby predicting failure modes of the vehicle frame under vibration analysis.

This work investigates the vibration characteristics of the frame including the natural frequencies and mode shapes. Finite element method, dynamic analysis, failure modes, mode shapes.

In image processing, various biometric applications, name identification from facial images plays an important role, Weber's Local Descriptor WLD will be used for face recognition for name identification. WLD is a texture descriptor that performs better than other similar descriptors but it is holistic due to its very construction. We divide an image into a number of blocks, calculate WLD descriptor for each block and concatenate them. This spatial WLD descriptor has better discriminatory power.

It is used to represent the image in terms of differential excitations and gradient orientation histogram for texture analysis. WLD is based on Weber's law and it is robust to illumination change, noise and other distortions.

So it effectively analyzes the face features to accurate matching and name identification. The feature extraction approach will be used for both test and database images to recognize for name identification. The face will be recognized by finding Euclidean distance between them. The proposed spatial WLD descriptor with simplest classifier gives much better accuracy with lesser algorithmic complexity than face recognition approaches. Normalization, Orientation, Differential excitation, Euclidean Distance.

Cheng, "Robust movie character identification and the sensitivity analysis," in Proc. Association of face and name in video," in Proc. Forsyth, "Names and faces in the news," in Proc.

Hauptmann, "Multiple instance learning for labeling faces in broadcasting news video," in Proc. Zisserman, "Identifying individuals in video by combining "generative" and discriminative head models," in Proc. Cipolla, "Automatic cast listing in feature length films with anisotropic manifold space," in Proc.

Taskar, "Learning from ambiguously labeled images," in Proc. Stiefelhagen, "Video-based face recognition on real-world data," in Proc. The heterogeneity in peer to peer P2P networks can be its advantage as well as disadvantage. The heterogeneity may be about amount of storage, computing power, connectivity etc.

But P2P systems make it possible to harness resources such as the storage, bandwidth and computing power of large populations of networked computers in a cost effective manner. There are many approaches to balance these systems in a costeffective way. Both approaches are having its own advantages and shortcomings. Systems and Humans, Vol.

Parallel and Distributed Systems, Vol. In this paper, a common fixed point theorem for six self mappings has been established using the concept of semicompatibility and weak compatibility in Fuzzy metric space, which generalizes the result of Singh B.

Fuzzy metric space, common fixed point, t-norm, compatible map, semi-compatible, weak compatible map. Veeramani, On some results in Fuzzy metric spaces, Fuzzy sets and systems, 64 , Grebiec, Fixed points in Fuzzy metric space, Fuzzy sets and systems, 27 , Michalek, Fuzzy metric and statistical metric spaces, Kybernetika 11 , Sharma, Common Fixed point theorems in Fuzzy metric spaces, Fuzzy sets and systems, , Masoodi, Semicompatibility, weak compatibility and fixed point theorem in Fuzzy metric space, International Mathematical Forum, 5, , no.

Jain, Semi-compatibility, compatibility and fixed point theorems in Fuzzy metric space, Journal of Chungecheong Math. Zadeh, Fuzzy sets, Inform and Control, 8 , Steganographyis the art or technique of hiding messages in such a way that no one except the sender and the intended recipient suspects the existence of the message, a form of security through obscurity.

We use this concept wherein text is hidden behind the image and the intended recipient is able to view it. The purpose of the system is covert communication to hide a message from a third party. In this paper, a technique called digital signature is also included which is added to all the documents sent by the sender to increase the reliability and authenticity of the document.

Thus, the proposed system would help to hide the existence of confidential data and would increase the difficulty of detecting the hidden embedded data. We are also including facial recognition which automatically identifies the person by comparing selected facial features from the image and a facial database.

Hence when an image is sent with data encrypted in it, the recipient's facial features will be compared with the one in the central database. In this way the receiver is authenticated using facial recognition tool. Thus this paper gives a brief idea about image steganography that makes use of Least Significant Bit LSB algorithm for hiding the data into an image which is implemented through the Microsoft. This system will prove to be helpful in areas where security of data is of utmost importance.

It will also be very easy to share and send data to a recipient via a single image file. Reference [1] "Introduction to computer security" -Bishop, M. Subramanya and Byung K. Design of new security using symmetric and asymmetric cryptography algorithms- World Journal of Science and Technology Face recognition withEigen faces. Acute hypotensive episode AHE is a serious clinical event, which can lead to irreversible organ damage and sometimes death. When detected in time, an appropriate intervention can significantly lower the risks for the patient.

The algorithm consists of probability distributions of MAP and information divergence methods for calculating the statistical distance between two probability distributions. The Bhattacharyya Distance is found out to be most accurate method for calculating such statistical distance. The comparison is also carried out for feasibility of Bhattacharyya distance with another divergence method like KL ivergence.

Computers in Cardiology ; On information and sufficiency. Ann Math Statics ; The elements of statistical learning. Springer, [6] Bellman R. Theory and Methods, A6, , pp. The nature of statistical learning Theory. Sringer-Verlag, [8] Bellman R. Princeton University Press, The ultraviolet UV region of electromagnetic radiation from sun occupies a section of wavelengths ranging from to 10 nm.

It is highly ionizing and activates many chemical processes on different types of materials and living beings. The amount of UV radiation at different places on the earth depends on the position of the sun during the day and the season of the year.

A decline in the amount of total ozone content TOC at a particular time also leads to an increase in UV radiation at that time. The Norwegian Academy of Science and Letters, Ghude, Exposureplant response of ambient ozone over the tropical Indian region, Atmos.

Diffey , Human Exposure to Ultraviolet Radiation: Risks and Regulations, ed. Bosnajakovic, Elsevier, Amsterdam, 83—87, Tropospheric Emission MonitoringInternet Service. Our goal is to detect when the distributor's sensitive data have been leaked by agents, and if possible to identify the agent that leaked the data.

In this project, we are giving the methodology for adding fake object into data. Fake object will be added through stegnography concept. Stegnnography is an ancient technique of data hiding or the stegnography is the art and science of hiding the existence of information, we contrast it with the related disciplines of cryptography And traffic security.

Many techniques are used to hide data in various formats in steganography. The most widely used mechanism on account of its simplicity is the use of the Least Significant Bit. Least Significant Bit or its variants are normally used to hide data in a digital image. This paper discusses technique to hide data in a colorful image using least significant bit. How to Send a Secret Message. Steganography - The Art of Hiding Data. Information technology Journal 3 3 - [9] Sellars, D. An Analytical Approach Abstract: The pulse density modulation technique has been used in resonant power converters because its ability to maintains soft-switching for any level of output power.

The sub harmonics of the switching frequency are in general undesired and are seen as a drawback. In this work are developed analytical equations to express the harmonics and sub harmonics components of a PDM signal. It is still analyzed the PDM parameters variation and their effects in the frequency spectra.

Cardesin, "Analysis, design, and experimentation of a high-voltage power supply for ozone generation based on current-fed parallel-resonant push-pull inverter", IEEE Transactions on Industry Applications, vol. Lipo, Pulse width modulation for power converters: Principles and practice, Wiley Inter-Science, The paper deals with error detection method for difference set cyclic codes with majority logic decoding. These are suitable for memory applications due to their capability to correct large number of errors.

The proposed Majority Logic decoder itself detects failures which minimize area overhead and power consumption. The memory access time is also reduced when there is no error in the data read. The results obtained in various tools are presented in this paper. Costello, Error Control Coding, 2nd ed. Morita, "Error correction circuit using difference-set cyclic code," in Proc. Resistance spot welding RSW is one of the most used methods of joining sheet metals.

The RSW process is based on Joule Lenz effect, of the electric current passing trough the similar or dissimilar joining metal sheets positioned between the two contact electrodes. At welding process , some important changes occurs in metallurgical and mechanical properties of the welded areas and heat affected zones HAZ.

The purpose of this work is to highlight the influences of joint materials and welding parameters on the tensile strength and on the failure mode of the joints. By using constant pressure force of the electrodes and different values of current and welding time, three types of materials were welded. The welding samples have been subjected to tensileshear tests and the surfaces of failures were analyzed by scanning electron microscopy SEM Some recommendations referring the electing of the optimum welding parameters were formulated..

Materials and Design, 28 2 , — Investigation of several PVD coatings for blind hole tapping in austenitic stainless steel Surface Coating Technology 18—19 , — Metallic glasses from " alchemy" to pure science. Present and future of design, processing and applications of glassy metals Materials and Design, 35, pp. In the paper we derive minimum non coherent distance dnc of block coded TAPSK and compare it with different modulation techniques, i.

If the block length N is very small. However, if the block length N is not short, NBCQAM has the best error performance because the code words with small non-coherent distances are rare. Sensor nodes are usually deployed in an open environment therefore they are subjected to various kinds of attacks like Worm Hole attack, Black Hole attack, False Data Injection attacks. Since the attackers can cause disruption and failure to the network, it's very important to detect these compromised nodes and revoke them before any major disruption occurs.

Therefore, it's very important to safe guard the network from further disruption. Secure positioning in wireless networks. Reputation-based framework for high integrity sensor networks. Attacktolerant time-synchronization in wireless sensor networks. Fast port scan detection using sequential hypothesis testing. Robust statistical methods for securing wireless localization in sensor networks. Distributed detection of node replication attacks in sensor networks.

A trust evaluation framework in distributed networks: Distributed software-basedattestation for node compromise detection in sensor networks. The video image spitted into number of frames, each frame maintains the text. Then the Image is converted into Gray Scale to avoid the text color variation. A single value is corresponding to gray value and detecting the edge. Detecting the edge process is the boundary between two regions with relatively distinct graylevel properties.

One is the horizontal direction of the image. Another is the vertical direction of the image. The features to describe text regions are area, saturation, orientation, aspect ratio and position. Then convert into binary image. The comer detected we can using the new techniques for neural network. To apply the Harris corner algorithm to implementing the Feature description by selecting the text area. The Orientation is defined as the angle ranging from to degree to 90 degree between the x-axis and the major axis of the ellipse that has the same second-moments as the region.

The input image is given equalization based extracting the text. After finding out the text, it is checked with the database. If tracked image is matched with the existing database.

From that we can identify the text of the particular image. Next input image is spited into frames to extract text for sequences, and compare to previous text. Finally convert into voice. Edge detection, text, video retrieval Reference [1] Arman, F. Content based browsing of video sequences, in ACM Multimedia 94 pp. Petkovic, Key to Effective Video Retrieval: Algorithms and Technologies, Feb , pp Chiu, Feature Management of large video Database, Proc.

SPIE vol , , pp The main objective of this review paper is optimizing various Gas Metal Arc welding parameters including welding voltage, and nozzle to plate distance NPD by developing a mathematical model for weld deposit area of a mild steel specimen. And this mathematical model is developed with the help of the design of Matrix.

MAG-CO2 is a process in which the source of heat is an arc format between consumable metal electrode and the work piece with an externally supplied gaseous shield of gas either inert such as CO2.

This experimental study aims at Factorial design approach has been applied for finding the relationship between the various process parameters and weld deposit area. Hofmannb, "Arc characteristics and behaviour of metal transfer in pulsed current GMA welding of stainless steel", journal of materials processing technology 2 0 0 9 ,Vol , pp.

Yarlagadda, "Meeting challenges in welding of aluminum alloys through pulse gas metal arc welding", Journal of Materials Processing Technology , Vol , p. Kangb,, "Advancements in pulse gas metal arc welding", Journal of Materials Processing Technology , Vol — p.

Olabi, "Optimization of different welding processes using statistical and numerical approaches — A reference guide", Advances in Engineering Software, , vol 39 p. Concrete is by far the most widely used construction material today. It is estimated that present consumption of concrete in the world is of the order of 10 billion tonnes every year.

So nowadays there is a great interest in the development and implementation of various alternatives to Portland cement as a binder in concrete and also alternatives to fine and coarse aggregates in concrete to reduce the energy used in production of Portland cement clinker and the associated greenhouse gas emission and also for reducing resources consumption by proper recycling.

This research work is carried out in order to explore the effect of various replacement percentages of cement by combined High alumina cement with silica fume and also the fine aggregate is fully replaced with manufacturing sand.

Conclusion is made based on the comparison between the performance of blended cement concrete and conventional concrete. The AISI H13, a chromium based hot work tool Steel has a wide variety of applications in aluminum casting and extrusion dies, forging dies, hot nut tools, hot header dies, extrusion mandrels, plastic molds, cores, die holder blocks, hot press dies and specially hot work punches etc.

In this study, the optimization of two response parameters Surface roughness and Material Removal Rate by three machining parameters cutting speed, feed rate and depth of cut is investigated in high speed turning of H13 in dry conditions. The simultaneous optimization is done by Grey Relational Analysis approach. The optimum condition for combined effects was found V5-F1-D1 and the optimal value of the surface roughness Ra comes out to be 0.

The optimum results are also verified with the help of confirmation experiments. Reference [1] Akhyar, G. Failure analysis of collar of Biomass Briquetting Machine: Briquette machine is used to produced briquette. Briquette is one of the biomass product which is widely used in a boiler for a burning purpose. Briquette is a solid biomass product. Due to solidification of biomass it achieve a better quality of combustion and also it facilitate storage and transportation of biomass.

The various method is used to solidify the biomass. These are discuss in various paper. This paper give the brief description of solidification of biomass or briquette by briquetting machine and also discuss about the various part of briquetting machine especially COLLAR. Biomass; Briquette; Briquette machine; collar ; solidification. Menon, "Essential requirements for Gbiin2 headlmedia interface", Proc. Yahisa, " Transparent pin wear test an thin-film disk", Trans.

Yamamoto, " Carbon avercoated pin wear tests an thin-film magnetic disks ", Proc. Theorems on list-coloring Abstract: Graph coloring is a well-known and wellstudied area of graph theory with many applications. In this paper, we will consider two generalizations of graph coloring. In particular, list-coloring and sum-list-coloring. Four Color Theorem, Thomassen's 5- list-coloring. Reference [1] Dimitris Achlioptas and Cristopher Moore.

Almost all graphs with average degree 4 are 3-colorable. You can't paint yourself into a corner. Kostochka, and Douglas B. Precoloring extensions of Brooks' theorem. Restricted colorings of graphs. In Surveys in combinatorics, Keele , volume of London Math.

Degrees and choice numbers. Random Structures Algorithms, 16 4: Every planar map is four colorable. This paper proposes a novel scheme of scalable coding for encrypted gray images. In the encryption phase of the proposed scheme, the pixel values are completely concealed so that an attacker cannot obtain any statistical information of an original image. Then, the encrypted data are decomposed into several parts, and each part is compressed as a bit stream.

At the receiver side with the cryptographic key, the principal content with higher resolution can be reconstructed when more bit streams are received. IEEE transactions on image processing, vol. Barni, "Protection and retrieval of encrypted multimedia content: Neri, "A commutative digital image watermarking and encryption method in the tree structured Haar transform domain," Signal Process.

Activation of chloride gated GABAA receptors regulates the excitatory transmission in the epileptic brain. Positive allosteric modulation of these receptors via distinct recognition sites is the therapeutic mechanism of antiepileptic agents which prevents the hyperexcitability associated with epilepsy. These distinct sites are based on subunit composition which determines binding of various drugs like benzodiazepines, barbiturates, steroids and anesthetics.

The binding of antiepileptic agents to this recognition site increases the affinity of GABAA receptor for modulating the inhibitory effects of GABAinduced chloride ion flux.

The present study initiates the binding analysis of chosen benzodiazepines with the modeled GABA receptor subunit gamma The results revealed the binding modes and the interacting residues of the protein with the benzodiazepines. Glutamate, GABA and epilepsy. Progress in Neurobiology, Vol 47, , Significance of GABA in brain function.

Subtypes of gamma-aminobutyric acidA receptors: The Performance of microprocessor can be improved by increasing the capacity of on-chip caches. On-chip caches consume noticeable fraction of total power consumption of microprocessors. The performance gained can be achieved by reducing energy consumption due to leakage current in cache memories.

The technique for power reduction in cache is divided in mainly two parts Circuit level and architectural level technique. In this paper a circuit level techniques like gated-Vdd, gatedGround, Drowsy caches, Asymmetric SRAM cell for reducing leakage current in cache memory are discussed. Solid-State Circuits, Vol 30,pp. Solid-state Circuits,vol 35, pp.

Of solid-state circuits, vol. Vijaykumar, " Dynamically resizable instruction cache: An energy efficient and high-performance deepsubmicron instruction cache.

Yang, B Falsafi, k. A circuit technique to reduce leakage in deepsubmicron cache memories," porc. Of Solid-State Circuits, Vlo. Flautner, Nam sung kim, S.

Mudge, "Drowsy instruction cacheLeakage power reduction using dynamic voltage scaling and cache sub-bank prediction. Soft storey or open ground storey is an unavoidable feature in the multistorey building. It is open for the purpose of parking or reception lobbies. It is also called as stilts storey. A large number of buildings with soft storey have been built in India in recent year.

But it showed poor performance during past earthquake. Therefore it is need of time to take immediate measures to prevent the indiscriminate use of soft first storeys in buildings, which are designed without regard to the increased displacement and force demands in the first storey columns.

Also study has been carried out to compare modified soft storey provisions with complete infill wall frame and bare frame models.

Soft storey, masonry infill, RC frame, earthquake, displacement, drift. Printed Circuit Boards PCBs collected from local sources were used for recovering copper by electrolytic process, using a laboratory reactor setup of working volume 15 liters and nitric acid for dissolution. Copper plate was used as the cathode and graphite rod as the anode for the deposition process. Five durations were adopted both for the dissolution and deposition processes. Based on the above investigations it found that 5 hours for gm copper has dissolved and the maximum copper deposited was The maximum power consumption is found to be 0.

The maximum copper Cu recovered in minutes of the deposition process can be considered as the optimum for the 5 L of dissolved solution. There is scope to refine the process and scale it up, if proper funding and facilities are made available. J, Zhang L, Metallurgical recovery of metals from electronic waste: A review, Journal of Hazardous Materials, Electronic waste in Ghana, Greenpeace International, Aimsterdam.

Inventories are being considered to be an important aspect for any organization. EOQ model is defined as a controller of quantity and total cost per unit. Here, we used instantaneous case of replenishment and finite case of replenishment for different functional relationship to get optimum value of stock quantity and total cost per unit time. It is easy to use EOQ models to get an optimal order quantity level. In addition, we make different conditions and propose economic interpretation.

Reference 1 Aggarwal, S. Shear walls are specially designed structural walls which are incorporated in buildings to resist lateral forces that are produced in the plane of wall due to wind, earthquake and flexural members. This paper presents the study and comparison of the difference between the wind behavior of buildings with and without shear wall using Staad pro.

Dean Kumar and B. Swami, Wind effects on tall building frames-influence of dynamic parameters, Indian Journal of Science and Technology, Vol. The most common approach for development, testing programs include some corrective actions during testing and some delayed fixes incorporated at the end of test.

This paper presents an Extended model that addresses this practical situation given in the application part of sec 3. In this application the testing mode is considered as active mode and the delayed fixes mode as at the delivery. The result concludes that MTBF is lesser in the action mode and then increases with the delivery mode. Maternal and fetal arginine vasopressin in the chronically catheterized sheep.

Pituitary and plasma concentrations of adrenocorticotrophin, growth hormone, vasopressin and oxytocin in fetal and maternal sheep during the latter half of gestation and response to hemorrhage. The effect of maternal hypoxia on fetal pituitary hormone release in sheep.

Fetal Physiology and Medicine. The release of oxytocin and vasopressin by the human fetus during labor. Renal response of the fetal lamb to complete occlusion of the umbilical.

In most of the manufacturing units scheduling is a difficult task due to the complexity of the system. Hence powerful tools that can handle both modeling and optimization are required. Most of the research in this area focuses in either developing optimization algorithms, or in modeling complex production systems. However, few tools are aimed to the integration of both of them.

In this paper, a Petri Net based integrated approach, for simultaneously modeling and scheduling manufacturing systems, is proposed. The procedure is illustrated with an example problem Key words: Reference [1] Jiacun Wang. P van der Aalst.

Odrey "Job Shop Scheduling in Manufacturing: An approach using Petri Nets and Heuristic Search". World Academy of Science, Engineering and Technology 44 Chretienne , And C. Girault , Modelling scheduling problems with Timed Petri Nets, in: With the introduction of multi-touch, a new form of human computer interaction is introduced. Due to recent innovations multitouch technology has become affordable. Unlike interaction on a desktop computer multi-touch allows multiple users to interact with the same device at the same time.

To demonstrate the vast possibilities of multi-touch technologies an 'interactive RFID-based Multi-touch Device' can be constructed which can be utilised in a hotel. The objective of the project is to enhance the customer's dining experience and to provide an enjoyable and user friendly interface thereby reducing human effort and time.

The multi-touch table constructed is a camera based multi-touch device which is designed using front-side illumination technique.

Card associated with a RFID tag will be used, priced to a specific amount which is issued to the customer at the reception desk. Each order table at the restaurant will have a multi-touch device along with the RFID reader. Customer can now interact with the multi-touch device by showing his RFID card and place an order by selecting from the menu displayed on the order table.

This project proposes the methodology of designing an interactive system along with applications to verify the effectiveness of the same. Low-cost multi-touch sensing through frustrated total internal reflection. A Technical Overview and its application to the enterprise by Ron Weinstein. ACM Siggraph Emerging technologies. Man, starting from the age of civilization, wanted to simplify the processes which he felt difficult while working out in a routine way.

Now we are living in the world of technology. We have different fields of study. Engineering is one among such professions which provides students the caliber to deal with the problems in a different way.

Almost all the problems of various subjects which we deal in our mechanical engineering have solutions. Finite Element Methods is a subject where we deal with the elements but not the entire body at once.

But still it involves a lot of calculations like Matrix multiplications, solving higher order equations etc. We have chosen a topic in Finite Element Methods i. Modal Analysis of elements and are working out to get results in a simpler way.

The code for solving the problem chosen was written in Mat lab and was tested for different inputs. Even though it is accurate and has a large number of built in functions, it is lagging applications in most of the mechanical fields. The code and the procedure we are presenting here in our paper don't exist. The program written asks the user for inputs and gives output after making necessary calculations.

Belegundu, Pearson Education, Inc. In this paper the design of a stand-alone photovoltaic system has been explained in two methods; method-I, considering the solar radiation data of the location and the load, and method-II, considering only the load.

The various constraints considered in the preliminary phase and the later stages have been thoroughly discussed along with a case study pertaining to a college.

The paper describes various parameters required for the design of a photovoltaic system taking the load conditions and economic constraints in the end. Cost analysis of conventional and stand alone photovoltaic system for both the methods is carried out. Duffie , William A. This paper presents the conversion for simple English Assertive sentences to Marathi sentences. This is basically a machine translation. In this proposed system we are going through various processes such as morphological analysis, part of speech, local word grouping, for converting the meaning of simple assertive English sentence into corresponding Marathi sentence.

Here English to Marathi bilingual dictionary has been formed for the purpose of language translation. And English sentence are translated into the Marathi sentences using the rules that are produced earlier in the language translation system.

Standards and practice, November To analyzing for some well-known generations of Weibull-related lifetime models for quick information. A brief discussion on the properties of this general class is also given.

The prolonged effect of Vigabatrin on the platelet enzyme activity would fit in with the fact that restoration of enzyme activity is dependent on regeneration of new enzyme. If the enzyme activity of platelets can be shown to reflect brain GABA-T activity, assay of the easily obtainable platelet enzyme may provide a convenient approach to assessing the pharmacological response in epileptic patients during treatment with GABA-T inhibitor drugs such as Vigabatrin.