Home
Issues List
1 May 04, 2017
DESIGN COORDINATED CONTROLLER PSS AND TCSC FOR POWER DAMPING OSCILLATIONS USING BACTERIAL FORAGING ALGORITHM

This paper present an approach for designing power system stabilizer (PSS) and thyristor controlled series capacitor (TCSC) as a damping controller in the single-machine infinite bus for damping low frequency oscillations in a power system using Bacterial Foraging Algorithm (BFA). The problem of robustly PSS and TCSC based damping controller is formulated as an optimization problem according to the eigenvalue-based objective function comprising the damping factor, and the damping ratio of the undamped electromechanical modes to be solved using Bacterial Foraging Optimization (BFA). To ensure the robustness of the proposed stabilizers, the design process takes into account wide range three types of loading light and normal and heavy of operating conditions. The effectiveness of the new controller is demonstrated through eigenvalue analysis studies show that the proposed controller has a good ability in damping power system oscillations....

Authors: Bahram Khorram , Hamid Lesani , Mahmoud-Reza Haghifam.

2 May 04, 2017
IMMUNO-INFORMATIC APPROACH OF IN-SILICO T CELL EPITOPE PREDICTION

Epitope is the defined group of amino acids which is derived from a antigen and induce response by the activating of lymphatic cell receptor either T and B- cell or both and epitope mapping is the mechanism through which we can identify where the antibody bind with antigen. For the epitope mapping we have used many type of method and divided in two group one was based on biological process and second one was based on computational method few of them are discussed in this article such as ANN, HMM, NMR, X-ray, Quadratic programming and other biological methods are fragmentation, competition etc. There were many databases available which gave us full information about the peptide sequence these are MHCBN, MHCPEP, IEDB etc. were discussed and conclude that epitope mapping is so beneficial for human there are lots of advantages in various field such as vaccine design, finding autoimmune diseases and cure of many disease such as HIV, Pneumonia, Type1-diabetes etc. by using T-cell epitope mapping....

Authors: Bhavana Soni, Chandrabhan Seniya, Richa Misra , Vaibhav Vyas.

3 May 04, 2017
AUTO E-MAILS CLASSIFICATION USING BAYESIAN FILTER

Now-a-days, email becomes a powerful tool for communication as it saves a lot of time and cost. Like every powerful medium, however, it is prone to misuse. One such case of misuse is the blind posting of unsolicited e-mail messages, also known as spam, to very large numbers of recipients. Spam can be defined as unsolicited (unwanted, junk) email for a recipient or any email that the user does not want to have in his inbox. These junk mail not only wastes user time, but can also quickly fill-up file server storage space, especially at large sites with thousands of users who may all be getting duplicate copies of the same junk mail. As a result of this growing problem, automated methods for filtering such junk from legitimate E-mail are becoming necessary. This paper described spam filter implemented is used to block spam. It uses Bayesian filtering to block the spam. Classification using Bayesian filter is done according to the method defined by Paul Graham. The general idea is that some words occur more frequently in known spam, and other words occur more frequently in legitimate messages. Using wellknown mathematics, it is possible to generate a “spamindicative probability” for each word....

Authors: G. Bhagyashri, H. Pratap.

4 May 04, 2017
USING A GIS-BASED MODEL AS A DECISION SUPPORT FRAMEWORK FOR IDENTIFYING SUITABLE RAIN WATER HARVESTING SITES

This research uses a GIS-based model as a decision support framework to optimize and identify locations to implement Rain Water Harvesting (RWH) management strategies effectively and efficiently. Rainfall, soil texture, DEM, slopes and land use/land cover were used as model development indicators. These indicators were rasterized and reclassified unto a five class digital number range for raster interpolation. Project findings indicates that, GIS-based model for identifying the suitable RWH potential sites could be customized, interpolated and predicted based on percentage influence preference scales of each RWH indicator. In addition, a sensitivity analysis on percentage influence was conducted to provide an insight into the influence of each RWH indicator in weights assigned to each indicator. Suitability classes developed indicated that, with a 25% influence of each RWH indicator as a control, rainfall was the most important indicator for identifying a RWH potential site. Its significant increase was proportional to increased percentage influence followed by soil indicator. Due to the location of research site, slope map generated from DEM contributed less in RWH suitability maps and was inversely proportional to increased percentage influence. However, the south western boundaries indicated higher RWH potentials whilst the northern, poor to not suitable potentials. In view of these, research outputs presented a guide to policy formulation and information for policy makers in terms of resource allocation at basin scale for sustainable wide scale adoption of RWH potentials in the White Volta Basin. As such, water resource management strategies to make water available for irrigation measured could be adopted in water stressed seasons of the northern part of the country, thereby increased agricultural productivity....

Authors: Abrefa K. Nketiaa; Eric K. Forkuob, Eric Asamoaha; James K. Senayaa.

5 May 04, 2017
A FRAMEWORK FOR SECURE MESSAGE COMMUNICATION USING 3-TIER SECURITY SYSTEM

The network security is becoming more important as the amount of data being exchanged on the Internet is increasing. Security requirements are necessary both at the final user level. There are a number of ways for securing data. Steganography play an important role for secure communication in network security. When we combine the property of steganography with cryptography, we can achieve more secure complex system. This paper work proposed a frame work for secure message communication, it uses multilevel security techniques for securing secret data as well as provision for user authentication and control eavesdropping. This paper also gives comparative study with current techniques....

Authors: Manoj Kumar Sharma, Vishal Shrivastav.

6 May 04, 2017
COMPARATIVE STUDY OF EM AND K-MEANS CLUSTERING TECHNIQUES IN WEKA INTERFACE

Clustering is the fundamental task in data mining. It is a technique by which we can categorize between the similar and the dissimilar objects and group the ones together that are more likely to each other. As per the ICDM‘06, k-Means holds a rank 2 and EM holds a rank 5 in the Top 10 Algorithms. This paper provides the detailed comparative study of the k-Means and the Expectation Maximization Technique using the Weka 3.6.9 Interface. Weka is a popular suite of machine learning software written in Java, developed at the University of Waikato, New Zealand. Weka is free software available under the GNU General Public License. The data used is the fixed broadband Internet Users for 214 Countries from year 1998-2011. Fixed broadband Internet subscribers are the number of broadband subscribers with a digital subscriber line, cable modem, or other high-speed technology....

Authors: Namita Bhan, Deepti Mehrotra.

7 May 04, 2017
COMPARATIVE STUDY OF EM AND K-MEANS CLUSTERING TECHNIQUES IN WEKA INTERFACE

Clustering is the fundamental task in data mining. It is a technique by which we can categorize between the similar and the dissimilar objects and group the ones together that are more likely to each other. As per the ICDM‘06, k-Means holds a rank 2 and EM holds a rank 5 in the Top 10 Algorithms. This paper provides the detailed comparative study of the k-Means and the Expectation Maximization Technique using the Weka 3.6.9 Interface. Weka is a popular suite of machine learning software written in Java, developed at the University of Waikato, New Zealand. Weka is free software available under the GNU General Public License. The data used is the fixed broadband Internet Users for 214 Countries from year 1998-2011. Fixed broadband Internet subscribers are the number of broadband subscribers with a digital subscriber line, cable modem, or other high-speed technology....

Authors: Namita Bhan, Deepti Mehrotra.

8 May 04, 2017
GENOME ANNOTATION OF THE COMPLETE GENOME OF STREPTOCOCCUS MUTANS LJ23 SEROTYPE K BY INSILICO APPROACH

The aim of high-quality annotation is to identify the key features of the genome in particular, the genes and their products. The tools and resources used for annotation are developing rapidly and the scientific community is becoming increasingly reliant on this information for all aspects of biological research. S. mutans is considered to be the main cause of dental caries and also cause bacteremia and infective endocarditis. In this study, we had analyzed the complete genome of S. mutans LJ23 serotype k through identification and prediction of the functional regions & regulatory elements in promoters by two automated methods of annotation using GLIMMER (HMM and IMM algorithm) and the second is MEME to develop a complete set of domains and motifs that are manually analyzed by in-silico approach. Furthermore, genes basically non-coding regions and lactose operon genes were demonstrated in the genome of Streptococcus mutans LJ23. The distribution of new motifs prevelant in putative promoter were also defined in the complete genome of serotype k S.mutans LJ23....

Authors: Shruti Kaushik, Rahul Anand.

9 May 04, 2017
PERFORMANCE ANALYSIS ON PEAK-TO-AVERAGE POWER RATIO (PAPR) REDUCTION TECHNIQUES IN ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING (OFDM) SYSTEM

A fundamental wireless transmission system, Orthogonal Frequency Division Multiplexing (OFDM) is widely used recently in wireless communication. However, practical implementation of OFDM introduced a major drawback known as peak-to-average power ratio (PAPR). This paper focused on the most three preferable techniques for reducing high PAPR. In general, Partial Transmit Sequence (PTS), Selective Mapping (SLM) and Clipping and Filtering can improve the PAPR statistic of an OFDM system using 16 QAM and 64 QAM modulation format regardless the number of subcarriers. Simulation results demonstrate that the techniques can efficiently reduce the PAPR performance based on the number of subcarriers and modulation format that being used in the system....

Authors: Abdul Latiff, N.Adilah, Ishak, N.I.Aliyaa, Yusoff, M.Hafiz.

10 May 04, 2017
CLASSIFICATION AND QUALITY CONTROL OF LUBRICATING OILS BY INFRARED SPECTROSCOPY AND CHEMOMETRIC

FT-IR coupled to chemometrics techniques was used to investigate the quality control of engine lubricating oils SAE 30 of gear and machines in industries. The results showed that Partial Least Squares Discriminate Analysis (PLS2-DA) gave good classification results with 100% correct class prediction. The proposed procedure is fast, non-destructive, simple and easy to operate. This developed method is highly recommended for quick monitoring of the oil’s quality, and it is another application of FTIR-chemometrics method for quality control of lubricating oils....

Authors: Aziz Hirri, Mahfoud Bassbasi, Abdelkhalek Oussama.

11 May 04, 2017
TEXT INDEPENDENT TECHNIQUE OF VOICE RECOGNITION ALGORITHMS USING MEL FREQUENCY CEPSTRAL COEFFICIENT (MFCC)

This paper we study of design a system to recognition voice commands. Speaker recognition is the task of establishing identity of an individual based on his/her voice. It has a significant potential as a convenient biometric method for telephony applications and does not require sophisticated or dedicated hardware. Many organizations like banks, institutions, industries etc are currently using this technology for providing greater security to their vast databases. Most of voice recognition systems contain two main modules as follow ?feature extraction? and ?feature matching?. In this paper, MFCC algorithm is used to simulate feature extraction module. Using this algorithm, the cepstral coefficients are calculated on mel frequency scale. VQ (vector quantization) method will be used for reduction of amount of data to decrease computation time. In the feature matching stage Euclidean distance is applied as similarity criterion. Because of high accuracy of used algorithms, the accuracy of this voice command system is high. Using these algorithms, by at least 5 times repetition for each command, in a single training session, and then twice in each testing session zero error rate in recognition of commands is achieved. Digital processing of speech signal and voice recognition algorithm is very important for fast and accurate automatic voice or speaker recognition technology....

Authors: Shweta Tiwari , Manish Saxena, .

12 May 04, 2017
LATTICE REDUCTION AIDED PROBABILISTIC TREE PRUNING (PTP) FOR A SPHERE DECODER IN MIMO SYSTEMS

In digital communication employing Multiple Input Multiple Output (MIMO), Maximum Likelihood (ML) detection is optimum method to decode received signal vector, if channel matrix is known. ML cannot be realized as complexity increases exponentially with the increase in number of antennas and constellation size. Sphere Decoder (SD) is used to achieve the near ML performance with polynomial complexity. As many applications are modeled as integer least square problems, finding solution this problem is equivalent to finding closest lattice point in the sphere. Some of the preprocessing methods such as lattice basis reduction may be applied before sphere decoding to convert integer least square problem into simple . Among them, Lenstra, Lenstra and Lova ´sz (LLL) is a strategic approach to lattice reduction. LLL algorithm reduces the complexity by searching through less number of paths. The paper proposes to combine PTP-SD with lattice basis reduction for complexity reduction. A Look Up Table (LUT) is prepared using Radius Choice algorithm for calculation of initial search radius for SD. LUT is used to start the search process and SD updates the search radius using the PTP algorithm. Simulations are carried out for 4 and 16- QAM over 4×4 and 8×8 MIMO configurations. The results revealed that the initial search radius of SD reduced by about 35%, the average number of Floating Point Operations (FLOPS) reduced by 50% as number of nodes visited also decreased, without degrading the performance....

Authors: Suneeta V. Budihal, Rajeshwari M. Banakar.

Announcements

  • Vol 2, Issue 5 Sept 2012 will be published on 22 Sept 2012 Evening. Kindly wait for little more time. Posted by Admin.