Image Restoration based on Fuzzy rule Median Filter for Gaussian Noise -
Kanika Gupta and S.K. Gupta
Contact: Kanika.gupta@abes.ac.in; guptask_biet@rediffmail.com Abstract: This paper presents
the approach for Image restoration based on the filter which is based on the fuzzy logic and centered on the median of the gray scale images. By
applying fuzzy logic rules on the noisy pixel corrupted by gaussian noise, the proposed filter can preserve the sharp edges of the images to the
greater extent possible. This includes the two stages:-Firstly, it will detect the noisy and corrupted pixel and secondly, it will correct that
particular pixel by taking the median of those pixels. The proposed filter produces the better results when tested on different images as compared
to other traditional filters.
A New Non Symmetric Divergence Measure and Related Bounds - R.N. Saraswat and Neha Khatod
Contact: sarswatrn@gmail.com; maheshwarineha20@yahoo.com
Abstract: Information divergence measures are well-known in the literature of Information Theory and
Statistics. Information divergence measures play an important role in pattern recognition and information retrieval etc. In this paper we shall
establish a new information divergence measure using convex function. Upper and lower bounds of Chi-square divergence, Relative J- divergence,
Jenson Shannon’s divergence, Triangular discrimination etc. in terms new information divergence measure using a new f-divergence measure and
inequalities have studied. Numerical studies have also discussed.
Analysis of APASBCE Scheme Using Missed Data Amplitude and Phase Estimation Schemes in MIMO Communication System
- Ravi Kumar and Rajiv Saxena
Abstract: Multiple Input Multiple Output (MIMO) antenna systems are being given much attention to
provide high capacity with less bandwidth requirement. In this paper, channel estimation techniques have been tried to implement with the adaptive
semiblind channel estimation scheme using less requirement of pilot symbols similar to as in the case of the estimating the channel with known
channel state information (CSI) conditions which requires high channel bandwidth. The improved results have been found with fewer requirements of
transmitted symbols by implementing the missing data amplitude and phase estimation which further can be improved using expectation maximization
using most likelihood (ML) detection technique. The results obtained have been compared with the already simulated results. It is shown that in
addition to improving the spectral efficiency, the implementation of this channel estimation technique offer better semiblind channel estimation
accuracy for the partial CSI conditions.
Number of Spans of Pre-Stressed Concrete Bridge Decks: A Parametric Study
- Shachi Jain and P.K. Mehta
Contact: ishachi@yahoo.com; pkmehta11@gmail.com
Abstract: More and more prestressed continuous bridges are being built these days. The introduction of
continuity at support introduces additional forces and moments in the superstructure, some of which are termed as secondary effects. The secondary
forces may not necessarily lead to the failure or collapse of the bridges but, if they are ignored they may lead to excessive deformations, cracks
and other defects in the bridge superstructure. At present no standard guidelines are available regarding the influence of these forces on the
design of such bridges. It is, therefore, necessary to understand the behaviour of the continuous and integral bridges (Rigid Frame Bridges) under
the action of these forces. In the present work, the influence of secondary effects on the forces of continuous and integral prestressed bridge
decks has been investigated through parametric studies. The secondary forces considered in the present work are those developed due to temperature,
differential temperature, creep, differential shrinkage and earth pressure. The parameters varied are Span lengths and Number of spans. Also Support
conditions (Continuous and Integral / Rigid Frame) are varied. All the forces (Primary and Secondary) are calculated as per Indian codes. The 3-D
grillage models of the bridge deck are developed and analysed using stiffness method of analysis. In general, there is no significant difference in
the forces in the bridge deck and forces are almost same in case of both two and three span bridges.
Database Intrusion Detection by using Improved Rule Minor Algorithm with Extended Weighted Data Dependency
- Ajitesh Kumar and S.K. Gupta
Contact: patel.ajiteshkumar@gmail.com; guptask_biet@rediffmail.com
Abstract: Now a day’s database in all the fields is used and maintained by most of the organizations as
it keeps much of sensitive and important information secured. Due to major online operations which are very frequent that’s why security challenges
increase for appropriate and effective measures which are required to safeguard the database from intruders. As the use of database is increasing
intrusion detection plays an important role in the field of security and it is performed with the help of intrusion detection techniques such as
Statistics, Expert system, Neural Network etc. To extract the useful patterns and information from the large amount of data, the data mining
technique is used for increased database size and number of records in each database. To overcome the difficulties of a database administrator for
monitoring various operations on the basis of the attributes such as reading, writing or modifying the mechanism of database intrusion detection is
used through data mining.
Electronegativity Equalization Method and Charge Partition Schemes
- Navnit K. Misra and Poonam Tandon
Contact: navnitmisra@gmail.com
Abstract: Electronegativity equalization method (EEM) has been a fast and reliable technique for the
calculation of charge distribution in large systems. We have performed parameterization of the EEM for the different quantum chemically calculated
charges and quality of EEM charges is investigated. Geometries of small molecules in a training set are calculated at the B3LYP/6-311G + (d, p)
level using G03 package and atomic charges are calculated using different charge partitioning schemes e.g. MPA, ESP, AIM & Lowdin. Furthermore, pure
and screened coulombic forms of electrostatic potential were employed to describe the charge-charge interatomic interactions. A good correlation is
obtained for different types of charges in the training set. Transferability of the EEM parameters has been tested for some large systems and it is
found that the EEM parameters based on the AIM charge partitioning scheme and the screened coulombic potential are best transferable.
Sintering Behavior of Tin-base Alloy Under Conventional and Microwave Heating
- Amit Sharma, Bhagat Singh and M. Hameedullah
Abstract: Sintered products are widely used in automotive industries due to their exceptional properties
(i.e, high density, porosity etc). The most recent development in microwave applications is in sintering of metal powders; surprising applications,
in view of the fact that bulk metals reflect microwaves. Microwave heating and sintering is fundamentally different from the conventional sintering.
In this study, properties of conventionally sintered specimens in nitrogen gas atmosphere are compared with the properties sintered by microwave
heating. It has been concluded that low sintering temperature, high compaction pressure and microwave heating for shorter period of time is required
for high overall density.
CFD: On the Prediction of Fluid Film Bearing Pressure
- Raman Kumar and R.K. Awasthi
Contact: raman.kumar.0288@gmail.com
Abstract: The cylindrical (plain) hydrodynamic journal bearing is the most basic hydrodynamic bearing as
cylindrical bore plays a vital role in design and stable operation of rotating machinery. For stable operation of machinery, a proper understanding
of the behaviour of hydrodynamic journal bearing is needed. The main objective of the current work is to make numerical analysis of a fluid-film
journal bearing system for predicting fluid film pressure distribution at various eccentricities by incorporating ADI technique and developing a
computer code in Fortran 90 for pressure prediction. The JFO based model of fluid film journal bearing is selected for this purpose as this model
leads to more accurate prediction of pressure vis-a-vis to Reynolds boundary condition based model. In order to compute the fluid film pressure for
fluid film journal bearing system, the two dimensional Reynolds equation is solved numerically using FDM. The numerical study has been performed
using, a computer code developed in Fortran 90 using Salford compiler. The code is tested for various grid sizes, and an optimum grid 72 × 10 is
selected which is based on minimum computational time and grid independent load. The present study then computes pressure distribution and fluid
film thickness at various eccentricity ratios.
Data Envelopment Analysis Approach for Measuring Technical Efficiency of Libraries of Technical Colleges
- Anita Biswas, Smita Verma and D.B. Ojha
Contact: biswas.anita28@gmail.com; yvsmita@rediffmail.com; ojhabrat@gmail.com
Abstract: In this paper, Data Envelopment Analysis (DEA) approach has been used for measuring technical
efficiency of a sample for selected libraries of technical colleges for the period of two years: 2013 and 2014. We have shown that DEA-CCR model
could be an effective and efficient tool for monitoring and controlling the performance of libraries. Data about the inputs and outputs of the
libraries are gathered and analyzed to compute the relative efficiency of the libraries. DEA can also assist in identifying areas where resources
are misallocated. In this study we demonstrated that the DEA is a powerful non-parametric approach for measuring the efficiency of the libraries
studies and it can provide a summary measure of the relative performance of each libraries. We analyze the technical efficiency of 4 randomly
selected college libraries from the one city using Data Envelopment Analysis (DEA). DEA efficiency scores are calculated using Library staff and
printed edition value as input and number of registered readers and book borrowed as output. Among the 4 college libraries analyzed 2 libraries are
rated fully efficient for 2013-2014. A benchmark model is recommended for inefficient units.
Performance Analysis of Aodv and Dymo Routing Protocols in Wi-Max Networks
- Sheenu Agarwal, Sandeep Vijay and Ashutosh Bhatt
Contact: sheenuagarwal9@gmail.com; sandeepvijay@gmail.com; ashutoshbhatt123@birlainstitute.co.in
Abstract: Routing protocol is the part of network layer that is responsible for deciding the route of data
packets from source node to the destination node. MANET is a network of mobile nodes with the wireless radio interface. The IEEE 802.16 Wi-Max
(World Wide Interoperability for Microwave Access) standard is based on global interoperability and is an emerging technology that delivers high
speed wireless broadband at much lower cost to the area covering the larger distance than the cellular services and the Wi-Fi network. Mobile Ad-Hoc
& Wi-Max network are presently applicable everywhere in real life, so as to solve day to day commercial needs of civilians business, business
meetings outside the offices, education by the help of virtual classrooms, in Bluetooth, the transmission of multimedia applications over networks
etc. AODV and DYMO are the two protocols specifically designed for MANET network and are also frequently implemented for Wi-Max network. As DYMO is
a successor to the AODV protocol hence it is interesting to investigate would the DYMO implementation is better when compared to results obtained
using AODV for the Wi-Max network. In this research work observations are presented regarding the performance comparison of AODV and DYMO protocols
for VBR traffic source by varying the item size of data packets in Wi-Max networks.
Performance and Emission Characteristics of Diesel Engine with Microemulsion Fuels
- Ramchandra Ram and Atul Kumar Shrivastava
Contact: ramchandra.ram@gmail.com
Abstract: Biofuels such as biodiesel and bioethanol have utilized in many countries including India due to an
imposed or the shortage of crude oils. A blend of biofuels has the superior lubricity and environmentally friendly characteristics. The properties
as like density, viscosity, flashpoint, cetane number and higher heating values of microemulsion fuels were determined. A 3.73 kW stationary,
constant speed CI engine was tested on nine selected biodiesel-ethanol-diesel microemulsions i.e. 200°, 195° and 190° proof ethanol microemulsions
as B15E2D83, B20E2D78 and B25E2D73 respectively. The performance of the engine was evaluated in terms of fuel consumption, brake specific fuel
consumption, brake thermal efficiency and energy input at no load, 25, 50, 75 and 100 per cent loads and engine speed of 1500 rpm. The emission
characteristics of fuels were evaluated through the diesel engine. The emissions of CO and CO2 for microemulsion fuels of 200° proof ethanol were
found to be lower at maximal operating conditions. The microemulsion fuels of 190° proof ethanol were found to be the best performance than other
microemulsions at the maximal operating conditions for engine parameters, but comparable diesel fuel.
An Analysis of HYBRID FUSION Based Image Steganography Technique in Spatial Domain for Secured Data Transmission
- Indu Maurya and S.K Gupta
Contact: indumaurya42@gmail.com; guptask_biet@rediffmail.com
Abstract: Steganography is the technique of hiding secret information within any media like text, images,
audio/video and protocol based network. Steganography is an important area of research in recent years involving a number of applications. The
modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected.
Safe and Protected communication is the most important requirement. Steganography is the process of implanting secret information into a multimedia
carrier it may be text, image, video or audio etc., by hiding information in the image such a way that no one apart from the intended recipient
knows of the occurrence of the message. Image fusion is the operation of mixing relevant information from two or more pictures into a single image.
In this paper, the Steganography and the image fusion processes are combined. By the combination of both processes steganography and (DWT & PCA),
the security will be improved. By applying hybrid fusion where the images are fused twice using an effective fusion method that provides enhanced
resultant image. The project Hybrid fusion approach in image Steganography finds an effective way for enhancing security in image processing to get
higher PSNR and data hiding capacity.
|