Archive

Publication for Volume-2 Issue-5, April 2017

Title
:
Design and Development Pressure Sensing Compression Bandage
Article Type
:
Research Article
Author Name(s)
:
Pudhumozhi Subramanian, Kumaraguru College of Technology; Aarthy Sekar ,Kumaraguru College of Technology
Country
:
India
Research Area
:
Smart Textile

Compression bandages are specially designed to apply pressure, helping to maintain blood flow and reduce discomfort and swelling. Compression bandages are a simple non-invasive treatment for varicose veins, chronic venous insufficiency and lymph edema. The treatment compresses superficial veins to promote the flow of blood through the body veins. The main objective is to design pressure sensing bandage using suitable method and to measure different level of pressure intensity. Compression bandages come in a variety of sizes, length, and colors. They are also available with different strengths of compression. Stockings and compression bandages with successive sensors are available in the market but there provide least comfort and hence make them difficult to be worn. Further, these sensors often have contact with skin which makes them undesirable. In order to overcome this level we have to design the bandages with using compressed air concepts. The main objective is to design pressure sensing fabric using suitable method and to measure different level of pressure. These different readings of pressure will be sent through wireless Bluetooth device which connects the patients’ device to the concerned.

Keywords : Apply Pressure, Compressed, Blood Flow, Sensors, Compressed Air

Recent

[1] H. Partsch, M. Clark, G. Mosti, and E.Steinlechner “Classification of compression bandage: practical aspects” Wiley Online Library. [2] HN. Msyrovitx- Clinivsl Physiology, 1988 “Compression induced pulsatile blood flow changes in human legs [3] S. Thomas and J. Ewma ‘The use of the Laplace equation in the calculation of sub-pressure’ worldwidewounds.com [4] BD. Fellmeth, AC. Robrtyd, JJ. Bookdyrin, JA. Freischlag, 1991 “Post angiographic femoral artery injuries: non-surgical repair with US- guided compression” pubs.rsana.org [5] P. Jergers, JP. Belgrado, A. Leduc, O. Leduc “excessive pressure in multichambered cuffsused for sequential compression therapy, 2002” search. Proquest.com [6] DHC. Wang, N.blenman, S. Maunder, V. Patton “an optical fibre Bragg grating force sensor for monitoring sub- bandage pressure during compression therapy” osapublishing.org. [7] EJ. Arkans – US patent “Sequential compression device, November 8, 2011” [8] G. Mosti, V. Matttaliano, H. Partsch “Inelastic compression increases venous ejection fraction more than elastic bandages in patients with superficial venous reflux, 2008”

Title
:
Anonymous Authentication using ABE for Securing Cloud Storage
Article Type
:
Research Article
Author Name(s)
:
Sadanand H Bhuse, Sinhgad Academy of Engineering; Santosh Shelke ,Sinhgad Academy of Engineering
Country
:
India
Research Area
:
Cloud Computing

In recent days cloud is the best option to store data and provide various services such as Infrastructure as a service cloud, Platform as a service cloud, Software as a service cloud and also communication as a service cloud. Cloud can be used for the various purposes, may be publically open or privacy based secured for sensitive information. The information in cloud can be secured in many ways as per the needs of the users. The authorization and authentication is the main issue in any service from such clouds. The attribute based encryption is the way to secure the authentication process to access and to control the access to the cloud and cloud services. Using same theme the authentication can be done without knowing the identity of the users i.e. to keep user anonymous for the curious system as well as administrator of the system. Considering decentralized access control and need to hide identity of the user, the concept of anonymous authentication is introduced and discussed in this paper. The multitenant SaaS is considered here and few issues related to ABE are focused.

Keywords : Cryptography, CP-ABE, KP-ABE, Anonymous Authentication, Multi-Tenancy

Recent

[1] Sushmita Ruj,Milos Stojmenovic,Amiya Nayak. “Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds”, IEEE Transactions on Parallel And Distributed Systems,Vol-25,2014 [2] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute-based encryption”, IEEE Symposium on Security and Privacy. , pp. 321–334, 2007 [3] Muhammad Asim, Milan Petkovic, Tanya Ignatenko,”Attribute Based Encryption and Decryption Outsourcing”, 12Th Australian Information Security Management Conference ,13 Dec 2014 [4] Umech Chandra Yadav, “Cipher text-Poliecy Attribute Based Encryptioin with Hiding Access Structure”, Advance Computing Conference (IACC), 2015 [5] GH Gowthami, G.G. Sreeja, B. Rajtha, “Control Cloud Data Access Privilege Using Attribute Based Encryption”, IRACST, Vol 6 No.2, March April 2016. [6] Divya L, Hema S, Kayalvizhi C, “Fully Annonymous Attribute Based Encryption for Privilege and Anonymity access control in cloud”, IJETCSE,Vol 21 Issue 2, April 2016 [7] S.E. Wang, B.G.Lin, “ A scheme of attribute based encryption access policy used in mobile cloud storage for personal health record” , IEEE, 2014. [8] M.Sowmiya, M. Adimoolam, “Secure Cloud Storage Model with Hidden Policy Attribute based Access Control”, IEEE International Conference on recent trends in Information Technology, 2014 [9] Shradhha Mokle, Nuzhat F Shaikh, “Anonymous Authentication for secure data stored on cloud with decentralized access control”, IEEE WiSPNET conference 2016. [10] Sadanand H Bhuse, Santosh N Shelke “A Noble Approach for Decentralized Access Control to Secure Cloud Storage Using ABA Authentication” Fifth post graduate conference of Computer Engineering-cPGCON , 2016 [11] Xingbing Fu, Zufeng Wu, “Ciphertext Policy Attribute Based Encryption with Immediate Attribute revocation for fine grained Access Control in Class Storage”, IEEE , 2013. [12] Zechao Liu et al. ,“Dynamic Attribute Based Access Control in Cloud Storage Systems” , IEEE Trust Com –Big Data SE ISPA, 2016 [13] Lifeng Li, Xiaowan Chen , Hai Jiang, “P-CP –ABE: Parallelizing Ciphertext –Policy Attribute Based Encryption for Clouds” IEEE SNPD, May 2016. [14] Ms.S. Vijaya Lekshmi, Mrs. M.P. Revathi, “Implementing Secure Data access Control for Multi Authority Cloud Storage System Using Ciphertext Policy Attribute Based Encryption”,IEEE- ICICES2014 Chennai 2014. [15] Karthik, Chandrashekhar B N Lakshmi H, “Fully Anonymous Attribute Based Encryption with Privacy and Access Pricilege”, IEEE- International Conference on Computational System and Information System for Sustainable Solutions,2016. [16] Dr. V.G. Goutham, K. Sunitha, P. Lakshmi, “Manage Cloud Data Access Opportunity and Anonymity with fully anonymous with secure status”, IJARCSSE-Vol. 6 Issue-6 , June 2016. [17] Sumeet Pate, Saurabh Gadhari, Vishal Mane, “Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption”, IJREAM, March 2016. [18] Ileana Buhan, Emile Kelkboom, Koen Simoens, “A Survey of the Security and Privacy Measures for [19] Anonymous Biometric Authentication Systems,”IEEE, Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2010. [20] Mate Horvath, “Private Key Delegation in Attribute-Based Encryption. [21] Susan Hohenberger and Brent Waters “Attribute-Based Encryption with Fast Decryption”, May 8 2013. [22] Yingjie Xue et al, “LABAC: A Location-aware Attribute-based Access Control Scheme for Cloud Storage”, IEEE, 2016. Web References [23] gleamly.com/article/introduction-attribute-based-encryption-abe [24] cryptowiki.net/index.php?title=Attribute-based encryption

Title
:
Smart Cloud Document Clustering and plagiarism checker using TF-IDF Based on Cosine Similarity
Article Type
:
Research Article
Author Name(s)
:
Sudhir Sahani, IMS Engineering College; Rajat Goyal ,IMS Engineering College; Saurabh Sharma ,IMS Engineering College, Shaili Gupta, IMS Engineering College
Country
:
India
Research Area
:
Computer science

This research paper describes the results oriented from experimental study of conventional document clustering techniques implemented in the commercial spaces so far. Particularly, we compared main approaches related to document clustering, agglomerative hierarchical document clustering and K-means. Though this paper, we generates and implement checker’s algorithms which deals with the duplicacy of the document content with the rest of the documents in the cloud. We also generate algorithm required to deals with the classification of the cloud data. The classification in this algorithm is done on the basis of the date of data uploaded and. We will take the ratio of both vectors and generate a score which rates the document in the classification.

Keywords : Algorithm, Cloud, Classification, Hierarchical, Clustering

Recent

[1] Rajaraman, A.; Ullman, J. D. (2011). "Data Mining". Mining of Massive Datasets (PDF). pp. 1–17. doi:10.1017/CBO9781139058452.002. ISBN 9781139058452. [2] Beel, Joeran; Breitinger, Corinna (2017). "Evaluating the CC-IDF citation-weighting scheme - How effectively can 'Inverse Document Frequency' (IDF) be applied to references?" (PDF). Proceedings of the 12th iConference.” [3] Robertson, S. (2004). "Understanding inverse document frequency: On theoretical arguments for IDF". Journal of Documentation. 60 (5): 503–520. doi:10.1108/00220410410560582Valtchev, Stanimir S.; Baikova, Elena N.; Jorge, Luis R. (December 2012). "Electromagnetic Field as the Wireless Transporter of Energy" (PDF). FactaUniversitatis Ser. Electrical Engineering (Serbia: University of Niš) 25 (3): 171–181. doi:10.2298/FUEE1203171V [4] Manning, C. D.; Raghavan, P.; Schutze, H. (2008). "Scoring, term weighting, and the vector space model". Introduction to Information Retrieval (PDF). p. 100. doi:10.1017/CBO9780511809071.007. ISBN 9780511809071.Leyh, G. E.; Kennan, M. D. (September 28, 2008). Efficient wireless transmission of power using resonators with coupled electric fields (PDF). NAPS 2008 40th North American Power Symposium, Calgary, September 28–30, 2008. Inst. of Electrical and Electronic Engineers. pp. 1–4. doi:10.1109/NAPS.2008.5307364. [5] Singhal, Amit (2001). "Modern Information Retrieval: A Brief Overview". Bulletin of the IEEE Computer Society Technical Committee on Data Engineering 24 (4): 35–43./ [6] Graham L. Giller (2012). "The Statistical Properties of Random Bitstreams and the Sampling Distribution of Cosine Similarity". Giller Investments Research Notes (20121024/1). doi:10.2139/ssrn.2167044. [7] Huang, C., Simon, P., Hsieh, S., & Prevot, L. (2007) Rethinking Chinese Word Segmentation: Tokenization, Character Classification, or Word break Identification [8] Lovins, Julie Beth (1968). "Development of a Stemming Algorithm". Mechanical Translation and Computational Linguistics. 11: 22–31. [9] https://en.wikipedia.org/wiki/Plagiarism_detection [10] Baker, Brenda S. (February 1993), On Finding Duplication in Strings and Software (gs) (Technical Report), AT&T Bell Laboratories, NJ

Title
:
Bridgeless Power Factor Correction Boost Rectifier
Article Type
:
Research Article
Author Name(s)
:
Denzil Fernandes, Department of Electricaland Electronics Engineering Goa College of Engineering, Farmagudi, Goa; Prof. Nilesh Borker ,Department of Electrical and Electronics Engineering Goa College of Engineering, Farmagudi
Country
:
India
Research Area
:
Power Electronic

Most electronic and electrical appliances such as radio, televisions, computers, etc. uses DC supply internally. This is done by converting the source supply (single phase or three phase) into DC supply. The internal DC supply source makes the load compatible with its external power source. The presence of non- linear loads results into low Power Factor operation of the power system. Several techniques are adopted for Power Factor correction and harmonic reduction technique few of them have gained greater acceptance over the others. In this paper some of the bridgeless power factor correction boost converters are proposed which results in improved power factor and reduced harmonics content in input line currents as compared to conventional boost converter topology. In addition the bridgeless Power Factor correction boost converter is proving to have less conduction losses and has higher efficiency.

Keywords : Total Harmonic Distortion (THD), Bridgeless Power Factor Correction (PFC) Boost Rectifier, Continuous Conduction Mode (CCM), Discontinuous Conduction Mode (DCM), Dual Boost PFC Rectifier, Fast-Recovery Diodes, Single Phase Rectifier

Recent

[1] Environment Protecting Agency (EPA), Product Specifications: Eligibility Criterias & Partner Commitments [Online help]. Available: http://www.energystar.gov/index.cfm?c=product_specs. [2] D. M. Mitchell, “AC - DC converter having an Improved Power Factor,” U.S. Patent 4 412 277, Oct. 25, 1983. [3] J. C. Salmon, “Circuit Topologies for Single-Phase Voltage-Doubler Boost Rectifiers,” in Proc. IEEE, Applied Power Electronics Conf. Mar. 1992, pp. 549–556. [4] D. Tollik and B. Pietkiewicz, “Comparative Analysis of 1-ɸ active Power Factor correction Topologies,” in Proc. Int. Telecommunication Energy Conf., Oct. 1992, pp. 517–523. [5] P.Enjeti and K. Martinez, “A high performance single phase AC to DC rectifier with input power factor correction,” in Proc. IEEE Applied Power Electronics Conf., Mar. 1993, pp. 190–195. [6] A. F. Souza and L. Barbe, “A new ZCS quasi-resonant unity power factor converter with reduced conduction losses,” in Proc. IEEE Power Electronics Specialists Conf., Jun. 1995, pp. 1171–1177. [7] A. E. Souza and I. Barbe, “A new ZVS-PWM unity power factor converter with reduced conduction losses,” IEEE Trans. Power Electron., vol 10, no. 6, pp 746–752, Nov. 1995. [8] R. Martinez and P. N. Enjeti, “A high performance single phase AC to DC rectifier with input power factor correction,” IEEE Trans. Power Electron., vol. 11, no. 2, pp. 311–317, Mar. 1996. [9] A. F. Souza and I. Barbi, “A new ZVS semiresonant high power factor rectifier with reduced conduction losses,” IEEE Trans. Ind. Electron., vol. 46, no. 1, pp. 82–90, Feb. 1999. [10] J.-W. Lim and B.-H. Kwon, “A power-factor controller for singlephase PWM rectifiers,” IEEE Trans. Ind. Electron., vol. 46, no. 5, pp. 1035–1037, Oct. 1999. [11] U. Moriconi, “A bridgeless PFC configuration based on L4981 PFC controller,” Application Note AN 1606, STMicroelectronics, 1/18–18/18 Nov. 2002. [12] C. M.Wang, “Anovel zero-voltage switchingPWMboost rectifier with high power factor and low conduction losses,” in Proc. Int. Telecommunication Energy Conf., Oct. 2003, pp. 224–229. [13] F. K. A. Lima, C. M. T. Cruz, and F. L. M. Antunes, “A family of turn-on and turn-off non-dissipative passive snubbers for soft-switching single-phase rectifier with reduced conduction losses,” in Proc. IEEE Power Electronics Specialists, Jun. 2004, pp. 3745–3750. [14] C. M. Wang, “A novel ZCS PWM power factor preregulator with reduced conduction losses,” IEEE Trans. Ind. Electron., vol. 52, no. 3, pp. 689–700, Jun. 2005. [15] W.-Y. Choi, J.-M. Kwon, E.-H. Kim, J.-J. Lee, and B.-H. Kwon, “Bridgeless boost rectifier with low conduction losses and reduced diode reverse-recovery problems,” IEEE Trans. Ind. Electron., vol. 54, no. 2, pp. 769–780, Apr. 2007. [16] J. C. Salmon, “Circuit topologies for PWM boost rectifiers operated from 1-phase and 3-phase ac supplies and using either single or split dc rail voltage outputs,” in Proc. IEEE Applied Power Electronics Conf., Mar. 1995, pp. 473–479 [17] A. F. Souza and I. Barbi, “High power factor rectifier with reduced conduction and commutation losses,” in Proc. Int. Telecommunication Energy Conf., Jun. 1999, pp. 8.1.1–8.1.5. [18] T. Ernö and M. Frisch, “Second generation of PFC solutions,” in Proc. Power Electronics Europe, 2004, no. 7, pp. 33–35. [19] J. Liu, W. Chen, J. Zhang, D. Xu, and F. C. Lee, “Evaluation of power losses in different CCM mode single-phase boost PFC converters via simulation tool,” in Rec. IEEE Industry Applications Conf., Sep. 2001, pp. 2455–2459. [20] H. Ye, Z. Yang, J. Dai, C. Yan, X. Xin, and J. Ying, “Common mode noise modeling and analysis of dual boost PFC circuit,” in Proc. Int. Telecommunication Energy Conf., Sep. 2004, pp. 575–582. [21] B. Lu, R. Brown, and M. Soldano, “Bridgeless PFC implementation using one cycle control technique,” in Proc. IEEE Applied Power Electronics Conf., Mar. 2005, pp. 812–817. [22] P. Kong, S.Wang, and F. C. Lee, “Common mode EMI noise suppression in bridgeless boost PFC converter,” in Proc. CPES Power Electronics Conf., Apr. 2006, pp. 65–70. [23] Technical Data, Magnetics [Online]. Available: http://www.mag-inc. com/pdf/2006_Powder%20Core_Catalog_Technical_Data.pdf [24] R. W. Erickson and D. Maksimovic´, Fundamentals of Power Electronics. Norwell, MA: Kluwer, 2001. [25] P. L. Dowell, “Effects of eddy currents in transformer windings,” Proc. Inst. Elect. Eng., vol. 113, no. 8, pp. 1387–1394, Aug. 1966. [26] S T. Erno and M. Frisch, ―Second generation of PFC solutions,‖ Power Electronics Europe, Issue, pp. 33-35, 2004. single phase bridge diode rectifier". IEEE Conf. ESC 4 June 2004, Aachen, Germany. [27] [27]C.M. Wang, "A novel zero-voltage switching PWM boost rectifier with high power factor and low conduction losses," International Telecommunication Energy Conf. (INTELEC) Proc., pp. 224-229, Oct.2003. [28] U. Moriconi, "A bridgeless PFC configuration based on L4981 PFC controller," Application Note AN 1606, ST Microelectronics, 1/18- [29] L. Rossetto, G. Spiazzi, and P. Tenti, ―Boost PFC with 100-Hz switching frequency providing output voltage stabilization and compliance with EMC standards,‖ IEEE Trans. Ind. Applications .vol.3 6, pp.188–193,Jan./Feb.2000. [30] R. Martinez and P. N. Enjeti, ―A high performance single phase AC to DC rectifier with input power factor correction,‖ IEEE Trans. Power Electron., vol. 11, no. 2, pp.311– 317, Mar.1996. [31] H. Ye, Z. Yang, J. Dai, C. Yan, X. Xin, and J. Ying, ―Common mode noise modeling and analysis of dual PFC circuit,‖ International Telecommunication Energy Conf. (INTELEC) Proc., pp. 575-582, Sep.2004.

Title
:
Camera Based Spectacles for Visually Impaired (Camspects)
Article Type
:
Research Article
Author Name(s)
:
Wineeta P. Babu, Saintgits College of Engineering; Nitu Elza John ,Saintgits College of Engineering; Sujin Sam Mathews ,Saintgits College of Engineering; Tony M.S ,Saintgits College of Engineering; Thomas Joseph ,Saintgits College of Engineering
Country
:
India
Research Area
:
COMPUTER VISION

Camspecta is a portable bar code reader for visually impaired people. This device consist of a pair of spectacles, a camera and head phones attached with it. When an object is held in front of the spectacles, it will detect the bar code from the device and will extract the details of the object including the price and name of the product. Thus it will help the visually impaired ones to identify and buy an object during shopping.

Keywords : Barcode, Portable, User-Friendly, Spectacles

Recent

[1] Abinaya, R. Infant, E. Esakkiammal, and Mrs Pushpalatha. "Compact Camera Based Assistive Text Product Label Reading and Image Identification for Hand-Held Objects for Visually Challenged People." [2] Creusot, Clement, and Asim Munawar. "Real-time barcode detection in the wild." In Applications of Computer Vision (WACV), 2015 IEEE Winter Conference on, pp. 239-245. IEEE, 2015. [3] PALLAVI, N., and MAYA SPATIL. "An Innovative Product Identification for Blind Persons." (2015). [4] Kulyukin, Vladimir, Aliasgar Kutiyanawala, and Tanwir Zaman. "Eyes-free barcode detection on smartphones with Niblack's binarization and support vector machines." In Proceedings of the International Conference on Image Processing, Computer Vision, and Pattern Recognition (IPCV), p. 1. The Steering Committee of the World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), 2012. [5] Tekin, Ender, and James M. Coughlan. "An algorithm enabling blind users to find and read barcodes." In Applications of Computer Vision (WACV), 2009 Workshop on, pp. 1-8. IEEE, 2009. [6] Data mining Concepts and Techniques, Jiawei Han and Micheline Kamber. [7] Jafri, Rabia, Syed Abid Ali, and Hamid R. Arabnia. "Computer vision-based object recognition for the visually impaired using visual tags." In Proceedings of the International Conference on Image Processing, Computer Vision, and Pattern Recognition (IPCV), p. 1. The Steering Committee of the World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), 2013. [8] https://gist.github.com/gyurisc/aa692ad27c2699ec37.Detecting Barcodes in Images with Python. [9] Jafri, Rabia, Syed Abid Ali, Hamid R. Arabnia, and Shameem Fatima. "Computer vision-based object recognition for the visually impaired in an indoors environment: a survey." The Visual Computer 30, no. 11 (2014): 1197-1222.

Title
:
Security Analysis in Different Areas using Crime Data
Article Type
:
Research Article
Author Name(s)
:
Shivam Choudhary, IMS Engineering College, Ghaziabad; Siddharth Yadav ,IMS Engineering College, Ghaziabad; Umang Kushwaha ,IMS Engineering College, Ghaziabad
Country
:
India
Research Area
:
Crime Analysis

This paper talks about hotspots and use of k means clustering for crime pattern detection. It first identifies significant attributes in the database. Unlike other papers, it then gives weights to attributes in the data set. The most important attribute (e.g. type of crime) is given the highest priority (weight) as compared to other attributes. We are using this feature of the research paper in our project. The data with missing values are made as test cases. It suggests dividing the database according to respective states, using classification, to make the data easier to analyze. In our project, we are subdividing the data into different types of crime allowing the user to get information of those crimes easily (e.g. percentage of the particular crime in a particular year, the hotspot of that particular crime)

Keywords : Security Analysis

Recent

[1] Crime Pattern Detection Using Data Mining: Hsinchun Chen, Wingyan hung, Yi Qin, Michael Chau, Jennifer , Rong Zheng, Homa Atabakhsh, “Crime Data Mining: A General Framework and Some Examples”, IEEE Computer Society April 2004. [2] An Optimal KD Model for Crime Pattern Detection Based on Semantic Link Analysis-A Data Mining Tool: Agrawal R., Gupta A., Sarawagi. [3] An Optimal KD Model for Crime Pattern Detection Based on Semantic Link Analysis-A Data Mining Tool : Fayyad, U. Data Mining and [4] Evolving Data Mining Algorithms on the Prevailing Crime Trend – An Intelligent Crime Prediction Model A. Malathi and Dr. S. Santhosh Baboo : Brown, D.E. (1998) The regional crime analysis program: A frame work for mining data to catch criminals," in Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics.

Title
:
Ant Colony Optimization for Job Scheduling in Grid with Alea Simulator
Article Type
:
Other
Author Name(s)
:
Chinmay Joshi, A D Patel Institute of Technology; Prerak Thakkar ,A D Patel Institute of Technology; Gopi Bhatt ,A D Patel Institute of Technology; Aniruddh Kurtkoti ,A D Patel Institute of Technology; Siddharth Shah ,A D Patel Institute of Technology
Country
:
India
Research Area
:
Grid Computing

Achieving high performance Grid scheduling in heterogeneous computing environment is critical. The Grid scheduling problem is an NP-complete problem. Because of its key importance on performance, the grid-scheduling problem in general has been extensively studied and various heuristics have been proposed. These heuristics are classified into a variety of categories such as job-Scheduling algorithms, Local-search algorithms, Duplication-based algorithms and Random based algorithms. Except for a few, these heuristics are mainly for system with fully connected homogeneous processors. The Ant Colony Algorithm has performed best compared to MET, MCT, OLB, MIN-MIN, MIN-MAX scheduling algorithms [8]. Problem with this algorithm is that it does not consider any resource failure and also does not consider CPU load at runtime. With the comparison of local search algorithms like First Come First Served (FCFS), (EDF) Earliest Deadline First, PBS (Priority Based Scheduling), EDF performs best in new extended gridsim toolkit called Alea[6]. We use an existing Ant Colony Optimization algorithm to perform job scheduling, in Alea Simulator and compare it with FCFS, EDF and PBS Scheduling algorithms.

Keywords : Grid computing, job scheduling, Alea simulator

Recent

[1] F. MAGOULES, J. PAN, K-A TAN AND A. KUMAR, Introduction to Grid Computing, CRC Press, 2009. [2] GLOBUS ALLIANCE. Globus. Web Published, 2007. Available online at: http://www.globus.org/ (accessed August 3rd, 2010). [3] Kousalya.K and Balasubramanie.P, Anna University, Kongu Engineering College, Tamilnadu, India, IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.4, April 2008 [4] Penka Martincová, Michal Zábovský University of Zilina gement Science and Informatics, penka.martincova@fri.uniza.sk, in year 4/2007 [5] Stefka Fidanova and Mariya Durchova IPP – BAS, Acad. G. Bonchev, bl.25A, 1113 Sofia, Bulgaria stefka@parallel.bas.bg, mabs@parallel.bas.bg [6] Dalibor Klusáˇcek Faculty of Informatics, Masaryk University Botanická 68a Brno, Czech Republic xklusac@fi.muni.cz [7] Hana Rudová Faculty of Informatics, Masaryk University Botanická 68a Brno, Czech Republic hanka@fi.muni.cz [8] R. Shakerian, S. H. Kamali, M. Hedayati, M. Alipour/ TJMCS Vol .2 No.3 (2011) 469-474 [9] Using Swarm Intelligence for Distributed Job Scheduling on the Grid A Thesis Submitted to the College of Graduate Studies and Research in Partial Ful_llment of the Requirements for the degree of Master of Science in the Department of Computer Science University of Saskatchewan Saskatoon By Azin Moallem c Azin Moallem, 03/2009. [10] The Anatomy of the Grid Enabling Scalable Virtual Organizations * Ian Foster •¶ Carl Kesselman § Steven Tuecke • {foster, tuecke}@mcs.anl.gov, carl@isi.edu

Title
:
Amalgamate Economic & Emission Dispatch Applying Radial Basis Function Backboned Neural Network
Article Type
:
Research Article
Author Name(s)
:
Sharad Chandra Rajpoot, G.E.C. Jagdalpur , Bastar, Chhattisgarh, India; Prashant Singh Rajpoot ,L.C.I.T., Bilaspur, Chhattisgarh, India; Sanjay Kumar Singhai ,G.E.C. Bilaspur, Chhattisgarh, India; Anil Kumar Shukla ,G.E.C. Bilaspur, Chhattisgarh, India
Country
:
India
Research Area
:
Neural Network

The efficient and optimum economic operations of electric power generation systems have always occupied an important position in the electric power industry. This involves allocation of the total load between the available generating units in such a way that the total cost of operation is kept at a minimum. In recent years this problem area has taken on a suitable direction as the public has become increasingly concerned with environmental matters, so that economic dispatch now includes the dispatch of systems to minimize pollutants, as well as to achieve minimum cost. In addition, there is a need to expand the limited economic optimization problem to incorporate constraints on system operation to ensure the security of the system, thereby preventing the collapse of the system due to unforeseen conditions. The purpose of the traditional Economic Dispatch (ED) problem is to find the most economical schedule of the generating units while satisfying load demand and operational constraints. This involves allocation of active power between the units, as the operating cost is insensitive to the reactive loading of a generator, the manner in which the reactive load of the station is shared among various on line generator dos not affect its economy.

Keywords : Economic Dispatch (ED), Electric Power Generation Systems, Redial Neural Network, Economic Emission Dispatch (EED), RBF, BPA

Recent

[1] E. H. Chowdhury, Saifur Rahrnan “A Review of Recent Advances in Economic Dispatch”, IEEE Trans. on Power Syst., Vol. 5, No. 4, pp 1248- 1259, November 1990. [2] Allen J. Wood, Bruce F. Wollenberg, “Power Generation, Operation, And Control”, John Wiley & Sona, Inc., New York, 2004 [3] J. Kennedy and R. Eberhart, “Particle swarm optimization,” in Proc. IEEE Int. Conf. Neural Networks (ICNN’95), vol. IV, Perth, Australia, pp1942-1948, 1995.Syst., Vol. 20, No.1, pp 34- 42, February 2005. [4] M. R. AlRashidi, Student Member, IEEE, and M. E. El-Hawary, Fellow, IEEE “A Survey of Particle Swarm Optimization Applications in Electric Power Systems”IEEE Trans. On Evolutionary Computation 2006 [5] Wu Q.H. and Ma J. T.(1995) ‘Power system optimal reactive power dispatch using Evolutionary programming ‘IEEE Trans on Power Systems [6] Zwe-Lee Gaing, “Particle Swarm Optimization to Solving the Economic Dispatch Considering the Generator Constraints”, IEEE Tans. on Power Syst., Vol 18, No. 3, pp 1187- 1195, Aug. 2003. [7] El-Keib, A.A.; Ma, H.; Hart, J.L,Economic dispatch in view of the Clean Air Act of 1990, IEEE Trans Pwr Syst, Vol. 9 (2), May 1994, pp.-972 -978 [8] J.H.Talaq,F.El-Hawary,andM.E.El-Hawary,“A Summary of Environmental/Economic Dispatch algorithms,” IEEE Trans. Power Syst., vol. 9, pp. 1508–1516, Aug. 1994. [9] A. Immanuel Selva Kumar, K. Dhanushkodi, J. Jaya Kumar, C. Kumar Charlie Paul, “Particle Swarm Optimization Solution to Emission and Economic Dispatch Problem”, IEEE TENCON 2003. [10] Sharad Chandra Rajpoot, Prashant Singh Rajpoot and Durga Sharma,” Power system Stability Improvement using Fact Devices”,International Journal of Science Engineering and Technology research ISSN 2319-8885 Vol.03, Issue. 11,June-2014,Pages:2374-2379. [11] Sharad Chandra Rajpoot, Prashant singh Rajpoot and Durga Sharma,“Summarization of Loss Minimization Using FACTS in Deregulated Power System”, International Journal of Science Engineering and Technology research ISSN 2319-8885 Vol.03, Issue.05,April & May-2014,Pages:0774-0778. [12] Sharad Chandra Rajpoot, Prashant Singh Rajpoot and Durga Sharma, “Voltage Sag Mitigation in Distribution Line using DSTATCOM” International Journal of ScienceEngineering and Technology research ISSN 2319-8885 Vol.03, Issue.11, April June-2014, Pages: 2351-2354. [13] Prashant Singh Rajpoot, Sharad Chandra Rajpoot and Durga Sharma, “Review and utility of FACTS controller for traction system”, International Journal of Science Engineering and Technology research ISSN 2319-8885 Vol.03, Issue.08, May-2014, Pages: 1343-1348. [14] Sharad Chandra Rajpoot, Prashant Singh Rajpoot and Durga Sharma, “A typical PLC Application in Automation”, International Journal of Engineering research and TechnologyISSN 2278-0181 Vol.03, Issue.6, June-2014. [15] Iba K. (1994) ‘Reactive power optimization by genetic algorithms’, IEEE Trans on power systems, May, Vol.9, No.2, pp.685-692. [16] Sharad Chandra Rajpoot, Prashant Singh Rajpoot and Durga Sharma,“21st century modern technology of reliable billing system by using smart card based energy meter”,International Journal of Science Engineering and Technology research,ISSN 2319-8885 Vol.03,Issue.05,April & May-2014,Pages:0840-0844. [17] Prashant singh Rajpoot , Sharad Chandra Rajpoot and Durga Sharma,“wireless power transfer due to strongly coupled magnetic resonance”, international Journal of Science Engineering and Technology research ISSN 2319-8885 Vol.03,.05,April & May-2014,Pages:0764-0768.

Title
:
An Enactment of College Talent Placement System
Article Type
:
Reveiw Article
Author Name(s)
:
Sumit Suresh Bhave, Wainganga College of Engineering and Management, Nagpur; Pushpendra Kalbende ,Wainganga College of Engineering and Management; Dipak Suryawanshi ,Wainganga College of Engineering and Management; Rakesh Murkute ,Wainganga College of Engineering and Management; Prof. Gangotri Nathaney ,Wainganga College of Engineering and Management
Country
:
India
Research Area
:
Web Technology

College Talent Placement System aims at providing the facility to automate and simplify the process of registration and list generation of eligible students for placement. Students logging should be able to upload their information in the form of a Resume and Placement Officer can access, view information of the users and prepare schedule of all activities regarding placements. A jobseeker can register himself. After registration, he will be directed to his homepage. Here he can update his profile, change password and see the examination details and all.

Keywords : TPO, TnP, Security, internet, information system, Forum, Cloud system, Automate, Placement, Authenticate.

Recent

[1] Priyanka Hajare, Priyanka Khandave, Shital Adhav, Swati Pimpale, Prof. Anagha Kulkarniresearch paper on Implementation of Online Placement System in January 2016 [2] T.Jeevalatha, N. Ananthi, D. Saravana Kumar, research paper on “Performance Analysis of undergraduate student’s placement selection using decision tree algorithms”. International Journal of Computer Applications, Vol.108-No 15, December 2014. [3] Mr.Nilesh Rathod Dr.Seema Shah Prof. Kavita Shirsat research paper on An Interactive Online Training and Placement System Volume 3, Issue 12, December 2013 [4] Jiming Lan,shengnan xu , research paper on The Design of Algorithm about the System of College Talents Recruitment 2012 3rd International Conference [5] Zongjian He, Jiannong Cao and Xuefeng Liu, research paper on High Quality Participant Recruitment in Vehicle-based Crowdsourcing using Predictable Mobility. [6] Baokun Pang,Lv Qing,Bingyan Lin Yonghong Liu,research paper on The Application of Fuzzy Theory in the Evaluation and Recruitment of University Interpretation Teachers, 2016 12th International Conference on Natural Computation. [7] Hitesh Kasture, Sumit Saraiyya, Abhishek Malviya, Preeti Bhagat,“Training & Placement Web Portal”, International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 2 Issue: 3,March-2014. [8] S.R.Bharamagoudar, Geeta R.B., S.G.Totad , “Web Based Student information Management System” , International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 6, June 2013. [9] Li Yang, Jian Zhang, Xinyu Geng, Haode Liao, Yu Sun,” Research and Application of Mobile agent and Struts 2 Integration Framework Based on MVC”. International Conference on Computational and Information Sciences, December 2010. [10] Kristof Geebelen, Eryk Kulikowski, Eddy Truyen, Wouter Joosen,” A MVC Framework for Policy-Based Adaptation of Workflow Processes: A Case Study on Confidentiality”, IEEE International Conference on Web Services, 2010. [11] Mr. R. J. laird, Dr. C. R. turner mima,” Interactive Web based Placement Management – Principles and Practice using OPUS” CGU-WACE, 2008. [12] Existing Placement System of MKSSS’s Cummins College of Engineering, Pune. [13] G. Chatzimilioudis, A. Konstantinidis, and et al., “Crowdsourcing with smartphones,” IEEE Internet Computing, vol. 16, no. 5, pp. 36–44, 2012. [14] P. Dutta, P. M. Aoki, and et al., “Common Sense: participatory urbansensing using a network of handheld air quality monitors,” in SenSys 2009, pp. 349–350. [15] E. Koukoumidis, L.-S. Peh, and M. R. Martonosi, “SignalGuru: lever-aging mobile phones for collaborative traffic signal schedule advisory,” in MobiSys 2011.