Articles


Sensor Based Bridge Condition Monitoring System Using GSM

Prof. Dr. S. S. Patil, Bhadange Tejaswini, Jadhav Poonam, Jagtap Bhakti

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 04 (2015), 1 April 2015

In this paper, a new bridge health monitoring system is suggested. Basically, in this project we are going to monitor the parameters of the bridge which will help us to maintain the bridge and detect the faults in it. The real time safety evaluation of bridge includes the following components:(1) real time analysis of pressure (2) real time analysis of temprature (3) real time analysis of tilt (4) real time analysisn of weight (5) real time analysis of flood (6) real time analysis of boat detection. The sensors will detect the condition of changing parameter of the bridge. The sensors installed on main cables, hangers, decks.towers etc detects the strain, acceleration, temprature,wind and water level. The advancement in wireless technology has provided a motive to develop the wireless network based bridge health monitoring system. Sensor technologies have made the monitoring process more accurate and fast zigbee wireless network can be used among sensors in the bridge for short distance but we use GSM between the bridge and management center for long distance data communication. GSM technology is suggested to send the data to the remote location in which the maintenance office is located. This project is useful to monitoring the faults and error in the bridge and will help to prevent the loss of human life. It will also save the hazards which will creats a distractions in human life.

Application of Molecular Biology in the Wastewater Treatment

P. Senthur Pandy

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 04 (2015), 1 April 2015

Due to the huge structural complexity of granular sludge and the many trophic interactions among the microbial populations required to transform complex organic matter into biogas (CO2 and CH4), the microbial ecology of micro ecosystem is still not understood. Microbial ecology techniques, such as 16SrRNA, gene cloning and sequencing. Fluorescence insitu hybridization and denatured gradient gel electrophoresis are now a days the most powerful tool available to access the diversity, abundance and distribution of microorganisms in natural and engineered ecosystems, superceding the restrictions and bias of conventional microbiology technique.

The ability of molecular methods to provide high information not attained by traditional methods. They directly interrogate the genetic information contained by the microorganisms composting the microbial community. The effective use of molecular biology to improve biological treatment processes is that molecular methods most important complements to more traditional measures and quantitative analysis. An appropriate scientific basis of new molecular data exits to effectively use these tools toward increased understanding of complex waste treatment environment. From the literature it has been amply reviewed that the best molecular biology tools to serve as an identity for accessing and quantitatively determining the microbial community, existing in conventional wastewater treatment systems.

Seismic Performance for Fixed Base and Base Isolated Reinforced Concrete Structure

Numair A. Shaikh, Dr. Ashok S. Kasnale

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 04 (2015), 1 April 2015

The base isolation systems are gaining large attention as a mean to protect structure form seismic hazard. It is a suitable technology for earthquake resistant design of variety of structure like buildings, bridges, airport terminals, nuclear power plant etc. Seismic isolation consists of essentially the installation of mechanisms which decouple the structure from base by providing seismic isolators. The seismic isolation system is mounted beneath the superstructure and is referred as Base Isolation. The aim of this study deals with structural behavior of building with and without base isolation. Lead rubber bearing is used as an isolation device then compare various parameters like Base shear, Displacement, Storey drift. 5and 15 storey buildings are test models. Nonlinear time history analysis is carried out for both fix base and base isolated structure.

Key Words: Base isolation, Storey drift, Base shear, Nonlinear time history analysis, SAP2000

Fast Fractal Image Compression Using Non Search Methodology.

Prerna Mundada, Bhagyashri Patil, Rohini Mali, Bhagyashri Pawar

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 04 (2015), 1 April 2015

Compression rates of fractal images are improved by applying the loss-less compression technique on the parameters of affine transformations of the fractal compressed image. By keeping PSNRs unchanged, proposed improved fractal image compression techniques give better compression rates. But, the compression time of proposed techniques are significantly increased than its counterparts. In order to solve the problem of long encoding time of fractal image compression, non-search fractal image compression coding is put forward. In this algorithm specific domain block is assigned as a matching block, so search is required and coding is accelerated. Besides, this algorithm adopts the method of range block adaptive decomposition and combination, and can solve problems like part of range blocks incapable of matching and low compression ratio of non-search method Experiments indicate that this algorithm is better than search fractal image compression algorithm and JPEG algorithm. 

Some Analytical Aspects of Categories

Dhanjit Barman

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 04 (2015), 1 April 2015

In this paper we discuss some analytical aspects of categories. Here we see that if  F : C→ D is a covariant functor then image of F will not form a subcategory of D. We provide an example to show it. Also we try to find some results of the category of rings ( Ring), the category of sets (Set), the category of groups (Gp) and category of topological spaces ( Top).  We define some functors between categories and discuss their properties.

Key words: Category, functor, morphism, monomorphism, epimorphism,bimorphism, isomorphism , balanced, normalcategory

Design of Low Power Transversal FIR Filter For VLSI Signal Processing Applications

Soumee Sharmeela Pattnaik, Ritisnigdha Das, Siba Kumar Panda

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 04 (2015), 1 April 2015

An efficient novel technique of synthesis of a low arithmetic complexity, linear phase low pass FIR filter is proposed .The output response is modeled using trigonometric functions of frequency and its slopes. This approach has the advantages of ease of computation of the impulse response and reduction in the Gibb’s phenomenon. The synthesized filter proves to be a good alternative to the existing FIR filters. This paper deals with the design of 16-tap FIR filter and proposed work has been done using Xilinx ISE 9.2i evaluating the performance by the synthesis report and shown the synthesizes RTL schematic along with the simulation results.

Keywords: FIR, Transversal, VHDL, Digital Signal Processing, VLSI Signal Processing.

Application of Contourlet Transform in Brain Tumor Classification

Dr.Prakash H. Patil, K. Manju

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 04 (2015), 1 April 2015

In this paper, contourlet transformation has been used for Brain Tumor classification along with Probabilistic neural network. The other methods like wavelet and support vector machine based classification resulted in a limited precision, since it cannot work accurately for a large data due to training complexity. Computerized Tomography and Magnetic Resonance Images are based on human inspection for tumor classification and detection. These methods are not effective and are also non reproducible if amount of data is large. Also, the directional features of wavelet and other transforms are not taken from all directions except horizontal,vertical and diagonal. Neural Networks based classificatioin shows good results in medical fields which are combined here with contourlet transform. Decision is based on two steps (i) Image reduction and Feature extraction using contourlet transform (ii) Classification using probabilistic Neural Network(PNN). Various Features extracted from different brain images are tabulated which shows 100%  recognition rate and also fast results, when compared to other classifiers.

Index Terms— Brain tumor image classification, Probabilistic, Neural Networks, Contourlet Transform, Dimensionality Reduction, Feature Extraction.

Cyber-Security Measures in Ivy League Colleges and Other Higher Educational Institutions

Kanika Dhameja

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 04 (2015), 1 April 2015

Driven by a growing concern for the potential vulnerability of important data together with an increasing number of disruptions in the cyber- domain, many organizations have tried to study the various possible threats to their infrastructure and most of these organizations have even proposed security measures for the protection of their assets and valuable information. This paper investigates the various cyber security measures that have been enforced by the Ivy League Colleges mainly Harvard University as well as institutions of higher education in Israel and China. The Ivy League Colleges are known to be the most prestigious Colleges for higher education in the United States. The Ivy League is a collegiate athletic conference composed of sports teams from eight private institutions that offer higher education in the Northeastern United States. The name is commonly used to refer to those eight schools as a group. The eight institutions are Brown University, Columbia University, Dartmouth University, Harvard University, Princeton University, the University of Pennsylvania, and Yale University. Further this paper also looks at some of the latest cyber security tools that are being implemented and used at these institutions.
Keywords – Cyber-domain, Ivy League, Higher Education, Harvard University, Israel, China, tools

A Comparative Study between Waterfall and Incremental Software Development Life Cycle Model

Deepti Singh, Ankit Thakur, Abhishek Chaudhary

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 04 (2015), 1 April 2015

Software development life cycle or SDLC for short is a methodology for designing, building, and maintaining information and industrial systems. There are various SDLC models widely used for developing software. SDLC models give a theoretical guide line about development of the software. Software Development Life Cycle (SDLC) methodologies are mechanisms to assure that software meet established requirements. These methodologies impose various degrees of discipline to the software development process with the goal of making the process more efficient and predictable. SDLC models are very important for developing the software in a systematic manner such that it will be delivered within the time deadline and should also have proper quality. Each SDLC has its advantages and disadvantages according to which we decide which model should be implemented under which conditions. In the present scenario all software systems are imperfect because they cannot be built with mathematical or physical certainty. According SDLC each and every model has the advantage and drawbacks. The concept of system lifecycle models came into existence that emphasized on the need to follow some structured approach towards building new or improved system. For this we need to compare SDLC models. In this paper we will compare two different famous life cycle models like-waterfall model & incremental model.

Keywords: Increment model, waterfall model, Software engineering, Software process model and Software

A Pairwise Homogeneity Active Learning

Sneha Mary Thomas, Nimmymol Manuel

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 04 (2015), 1 April 2015

Machine Learning has becoming an emerging topic within data mining. The active learning is also an upcoming topic. Active learning is the process of labeling unlabeled data instances by using queries and the labeling process will be done by expert labelers such as an oracle. The process of labeling will be very expensive and time consuming. The proposed method called a pairwise homogeneity active learning method which is an unsupervised label refinement method by using a pairwise homogeneity between the pair of data instances which improves the quality of the label. In this method we use a non expert labeler to provide the class label for data instances. The experimental results shows that the proposed method improves the labeling quality of the data instances which are being labeled.

Keywords: active learning, data mining, labeling, pairwise homogeneity, data instances.

Image Denoising Using Different Filters

Mr. Avinash Shrivastava, Pratibha Bisen, Monali Dubey, Maya Choudhari

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 04 (2015), 1 April 2015

Image processing is basically the use of computer algorithms to perform image processing on digital images. Image denoising adds the manipulation of the image to produce a high quality image. The main criteria of Image denoising are to restore the detail of original image as much as possible. Image processing provides much range of algorithms to be applied to the input data and can remove problems such as the increase of noise and signal distortion during processing of images. Different types of noise models including additive and multiplication types are used. In this work four types of noise (Amplifier noise, Salt & Pepper noise, Speckle noise and Poisson noise) is used and image de-noising performed for different noise by Inverse filter, Wiener filter and Lucy-Richardson method. Selection of the denoising algorithm is based on the using noise and filter in image processing. Hence, it is very important to know about the noise present in the image and select the appropriate denoising algorithm. The filtering approach has defined the best results when the image is corrupted with salt and pepper noise. In this paper, we introduce some important type of noise and a comparative analysis of noise removal techniques is applied. The experimental results are discussed and analyzed to determine the overall advantages and disadvantages of each category.

Keywords: Image noise modal, filters, Gaussian noise, salt and pepper noise, speckle noise, Poisson noise.

Website Structure Improvement using User Navigation Monitoring and Web Mining

Pratik Kawale, Urvi Pimparkar, Pooja Singh, Amol Potgantwar

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 04 (2015), 1 April 2015

To style effective information processing system user navigation may well be an enormous challenge. A main reason is that website|internet site|site|computer|computing machine|computing device|data processor|electronic computer|information processing system} developers have to be compelled to style a web site otherwise than the other users. completely different strategies have to be compelled to be generated to relink the WebPages, so the user navigation ar typically merely done. The new organized ways ar unpredictable, disorienting worth can’t be analyzed. This paper introduces information processing system whereas not substantial changes. User navigation may be reduced victimization mathematical programming and together alteration to Structure. The Result shows that it improved its user navigation and together it's effectively solved. to boot we've got an inclination to outlined 2 all completely different methods: assess performance of information processing system and real information set. The result together shows that user navigation has been improved greatly. The observation is disoriented user ar quite that of improved structure users.

Index Terms— net Personalization, net Transformation,DOM Tree, greatest Forward Reference, mini Sessions, Out- Degree Threshold, web site style, User Navigation, Web Mining, Mathematical Programming.

Importance of Pharmacovigilance

Dr.R.V.S.N.S Ramachandudu

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 04 (2015), 1 April 2015

According to WHO, pharmacovigilance is defined as “science and activities relating to detection, assessment, understanding and prevention of adverse effects or any other drug related problem.[1]

WHO defines "Adverse Effect" as “any undesirable or unintended consequence of drug administration†[2].

The term Side Effect is often used synonymously but it precisely means unintended additional action of a drug which may even be therapeutically useful.

There is no drug without some or other adverse effect .It may develop either immediately or after prolonged use or even after stoppage of drug. Adverse effects are sometimes very rare. Even then, they play an important role in determining the therapeutic use of the drug.

It has been estimated that ADRs are responsible for death for nearly 50 out of every 1000 patients admitted to hospitals & cause nearly 5-7% of all hospital admissions.[3].The job of recording & studying these adverse effects is done by pharmacovigilance committee. Unfortunately, In India not all the clinicians & healthcare professionals are aware of this term and its importance.

This article enlightens the importance of pharmacovigilance among various health care professionals and some methods to increase its awareness.

Keywords—pharmacovigilance (PhV), adverse drug reactions(ADRs), side effects

Sensorless Sliding Mode Control of Induction Machine Based On SVPWM

R Senthil Kumar, Prasanth P Kumar, Arun Kumar CR

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 04 (2015), 1 April 2015

Abstract— In  recent years, sensorless modes of operation are becoming most convenient and standard solutions in the areas of electric drives. This paper explains about sensorless speed control of induction motor with a predictive current controller. The closed loop estimation system with at most robustness against any parameter variations is used for the control approach.  In this paper further a noval scheme implementing Space Vector pulse width modulation is also proposed increasing overall stability.  Here a Space Vector Pulse width modulated VSI is used to feed the IM. The simulation results illustrate the performance of IM on various conditions. The results are then compared with the conventional types verifying this scheme has better performance than the others. 

Automatic Toll Collection System

Abel Shajan, Abin Jose, Kalung Tari

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 04 (2015), 1 April 2015

Delay at tollbooths is nowadays quite common in almost all the major highways. This leads to increases in congestion, inconvenience and fuel consumption. Automatic Toll Collection System brings a new idea to eliminate the delay at tollbooths. Here a micro controller based automatic system using infrared sensors is being utilized. IR sensors have been used as these are economical, have perfect line of sight, hence less interference. Automatic toll collection system aims to collect toll from the vehicles without making the vehicle stop at the tollbooth. Each user is provided with a module that is to be mounted on the windshield of the vehicle which consists of transmitter, receiver, microcontroller and a LCD unit. The toll booth is equipped with another module for collecting toll from each user. The computer at the toll booth holds the database consisting of details regarding each user along with a unique code. The Automatic Toll Collection System include benefits to both toll authorities and facility users, in terms of time and cost saving, improved security, increased capacity and greater convenience.

Impact of Green Marketing on Customer Buying with Special Reference to FMCG Sector

Amit Syal, Dr. Lokesh Jindal

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 04 (2015), 1 April 2015

Fast moving consumer goods is the fourth largest sector which fuels the Indian economy to a great extent.  There has been tremendous growth in the past few decades. The overall growth of FMCG industry increased to 9.4% growth in India in which rural area plays a significant role in achieving a faster growth in India.  Changes in consumption pattern of rural and urban people in India is due to many reasons like changing life styles, increasing consumer awareness, growing internet penetration and innovative promotional campaigns.

Secure Mining of Generalized Association Rules from Horizontally Distributed Databases

Mintu Thomas, Neena Joseph

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 04 (2015), 1 April 2015

We consider the problem of secure mining of generalized association rules from horizontally distributed databases. Given a large horizontally distributed database of transactions, where each transaction consists of a set of items and taxonomy on the items, we find associations between items at any level of the taxonomy. Generalized association rule mining technique has discussed in many papers. But, in this paper we discuss about secure mining of generalized association rules from horizontally distributed databases or homogeneous databases. For that purpose, we use the same privacy preserving distributed mining concepts discussed in paper [1] with the generalized association rule mining technique called ‘cumulate’ algorithm discussed in paper [2]. The main privacy preserving parts of the protocol in paper [1] are two secure multi-party algorithms called UNIFI and SETINC. Our proposed protocol is based on Fast Distributed Mining (FDM) algorithm. FDM algorithm is an unsecured distributed version of Apriori algorithm. It offers enhanced privacy, simplicity and efficiency.

Keywords: Privacy Preserving Data Mining, Horizontally Distributed Databases, Generalized Association ruldes, Frequent Itemsets..

Filtering Techniques

Dr. M. Suman Ph.D, Ch. Mounika, M.Shyam

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 04 (2015), 1 April 2015

Our aim is to reduce the noise in the images and also for the speech enhancement using the filtering techniques. In this paper, we used the filtering techniques like Kalman filter, Wiener filter, and H-infinity filter and also we used the spectral subtraction method. These methods and filtering techniques are more useful to get the accurate results of any system what the user wants. The techniques are helpful in many applications like wiener filter in image processing, denoise audio signals, especially speech, as a pre-processor before speech recognition and Kalman filter in speech enhancement, 3D modelling, weather forecasting and h-infinity filter is used in control theory and also for the speech enhancement.

Keywords: Kalman Filter, Wiener Filter, H-infinity Filter.

Pre – Destining the Quality of Plastic Parts Produced By Injection Molding Method Using Computer Simulation Techniques

Madhu Kumar K, Kumarswamy R, Nataraj M, Vasu M

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 04 (2015), 1 April 2015

In this paper attempt has been made to eliminate the errors during each step while designing and analysis of the component to minimize the defects during manufacturing of the component. Air filter bottom box component was selected for the study and PPTF (polypropylene talc filled) was considered as a material for this component. Initially component was modeled and modified using wildfire pro-e 3.0 software. Estimation of structural quality of the part was carried out on the basis of injection moulding computer simulation technique.  Various computer simulations were carried out for different structural solutions with the support of literatures and also on the basis of instances happens in the industries. For the simulation mold flow insight 5.1 software was used.  Using  of  computer  methods  to  design  and  optimization  of  structural conclusions of parts, avoids rejections, rework and minimizes time, hence minimizes  the production cost. Results were compared with predictions presented in professional literature.  Results obtained during studies will be used during the process of injection mould. This study will help us to understand the use of simulating computer program applications in designing and initiation to production of polymer parts and also helps you to avoid potential manufacturing defects and get innovative products to market faster.

A Fuzzy Mathematical Model to Find the Problems Faced by Gypsies in Tamilnadu

Ramkumar C, Ravanan R, Lourdusamy A, Narayanamoorthy S

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 04 (2015), 1 April 2015

In this research paper, the authors investigate about the problem faced by Gypsis in Tamil Nadu using Fuzzy Cognitive maps. In 1986, Bart Kosko introduced the FCM and its properties.  Fuzzy Cognitive maps are more applicable when the data is an unsupervised one.

Design of Floating Point Multiplier Using Residue Number System with Moduli Set {2n-1, 2n, 2n+1}

Praveen Amrutkar, Prasanna Palsodkar

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 04 (2015), 1 April 2015

This paper presents implementation of floating point multiplier using residue number system (RNS). A floating point multiplier has inputs in terms of mantissa and exponent. For multiplication of two inputs, mantissas are multiplied and exponents are needed to be added together. Residue is the remainder obtained after division of two integers. Operations in residue number system are performed on remainders, which are smaller integers. RNS system possesses properties of carry free computation and parallelism which leads to improvement in speed. RNS multiplier unit consist of forward converter, modulo multiplier, modulo adder and reverse converter. A moduli set of the form {2n - 1, 2n, 2n+ 1} is used to find residues of input integers. Input to the system is half precision floating point numbers i.e. sign (1bit), mantissa (10bit), exponent (5bit) and output is a single precision number, sign (1bit), mantissa (23bit), exponent (8bit). The design is coded in Verilog HDL using Xilinx 13.1 ISE software.




Pocket PC

Tanuja Shaikh, Savita Kamble, Ankita Chavan, Savita Pal, Alone Vinod N, Netrawati Sawale

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 04 (2015), 1 April 2015

Pocket Pc it is easy-to-use, reliable and secure remote control software which will allow you to work on the remote home or office computer from your mobile phone. You will see the screen of the remote computer on your mobile phone and also you can operate mouse and keyboard of the remote computer. Additional features of Remote Desktop for Mobiles allow you to execute any console commands on the remote computer and receive result to mobile phone. In addition has a set of commands for getting a system information and perform management of system.

Keywords: Pocketpc,PocketPc, Remote deskto mobile ,Android mobile,Wi-fi ,remote desktop.

Smart Accident Detection & Assistance System

Pranav Dhole, Nishad Gite, Saba Shaikh, Vijay Sonawane

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 04 (2015), 1 April 2015

The numbers of deaths due to road accidents are increasing day by day. Even the vehicles are becoming more sophisticated with features like GPS navigation and airbags for safety. In spite of this the victims of the accidents which occur at remote locations do not get prompt medical service. There are several cases where the accident victims lose their lives due to lack of medical assistance. These victims may get serious injuries due to which the might not be able to move or communicate to the rest of the world. In such situations the advancements in technology and the sophistication of the vehicles do not seem to be useful. Smart Accident Detection and Assistance Systems overcomes this limitations as it will automatically detect an accident and notify the nearest emergency response services i.e. Hospitals and Towing services which will enable the accident victim to receive instant medical help and assistance. In today’s day roads are the most used medium for traveling. A large number of road accidents take place every year around the globe. Most of the accidents on highways may prove fatal; sometimes the victims go unattended and even lose their lives. So, this system proposes a solution to this problem which detects accident of the vehicle and alerts the ambulance service, insurance company, towing services so as to provide instant medical help.

A Critical Study of IT Transformation Practices to Achieve Business IT Alignment

Baljit Singh Sidhu, Dr. Kirti Gupta

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 04 (2015), 1 April 2015

Abstract: Transformation is the creation and change of a whole new form, function or structure.  IT transformation means a significant change of organization’s IT systems with an aim to achieve a state of alignment of IT strategy with business strategy. IT transformation of an organization from its legacy environment to the next generation of technology is one of the most complex and expensive changes an organization can undergo.

The objective of IT transformation is to build more efficient enterprise architecture and transform the IT organization into an effective business partner. It  is a process that results in a dynamic state of business IT alignment. There are many reasons why organizations should align IT with Business, like cost reduction, productivity enhancement, implementation of new business strategies or to gain competitive edge etc. A number of case studies have also shown how significant cost and performance efficiencies were achieved by organizations through business IT alignment (BITA).

Numerous studies, research papers and articles available in the public domain suggest that business IT alignment has remained a perennial problem for the industry with no standard solution. This study takes a critical look at various prevailing IT transformation practices and the key factors that lead to optimum business IT alignment. A survey was carried out to incorporate viewpoints of professionals from the Indian industry. 

Keywords: IT transformation, IT strategy, business IT alignment (BITA), perennial problem, IT practitioners and consultants

Ascendible Quantizing of Streaming Data Warehouse

Subba Reddy, Vikram Shinde

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 04 (2015), 1 April 2015

In this paper we study update scheduling problem in streaming data warehouse, streaming data Warehouse combines the benefits of traditional data warehouses and data stream systems. In this problem jobs Corresponds to the processes which a load the new data in to the table, and main is aim is to minimize data staleness. Also it handle the challenges faced by streaming warehouse such as view hierarchies, preempt updates, data consistency and heterogeneity of update jobs caused by different arrival times and size of data. The scheduling metric is considered as staleness of data, we study the paper which explains how to schedule view updates in streams and transactions in soft real time database system, where two definitions of staleness are used one is MA (Maximum Age) and another is UU (unapplied Update). Four algorithms are examined for scheduling transactions And installing updates in soft real time database systems. Deadlines are very close To each other, SJF algorithm is used to schedule task within a group. Hence total execution time is minimized.

Keywords: about Ascendible quantizing, Data Stream management system, streaming data warehouse, QoD(Quality of Data),Strategy.

Screening of phytochemical and in vitro antioxidant efficacy of Vitex negundo L. leaf extract

M. Janakiraman, K. Jeyaprakash

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 04 (2015), 1 April 2015

Objective: The present study was carried out to evaluate the qualitative and quantitative phytochemical and In vitro antioxidant activities of methanolic leaf extract of vitex negundo.

Materials and Methods: Vitex negundo leaves were extracted with three solvents like methanol,ethanol and water. Three extracts of vitex negundo were tested for different phytoconsituents and the In vitro antioxidant activity of the methanolic extract was studied by using 1,1-diphenyl-2-picryl hydrazyl (DPPH) radical scavenging activity, ferric reducing power activity, hyderogen peroxide scavenging activity, super oxide scavenging activity and nitricoxide scavenging activity. The total Phenolic contents and total flavanoid contents were also estimated.

Results: The yield of phytochemicals is in the order of methanol extract > ethanol extract > water were obtained. Finally, methanolic extract was selected for investigation on the analysis of total phenol content, total flavanoid content and in vitro antioxidant activity. Total phenolic content was estimated as 163.43 mg/g of extract and total flavonoid content was estimated 86.25 mg/g of extract. Free radical scavenging activity was determined by DPPH assay (86.2.%  inhibition at 1000 μg/ml concentration),ferric reducing power scavenging activity was determined (95.2% inhibition at 1000 μg/ml concentration), hydrogen  peroxide scavenging activity was determined (49.2.% inhibition at 1000 μg/ml concentration),super oxide radical scavenging activity was determined (77.2 .%  inhibition at 1000 μg/ml concentration)  and  nitric oxide radical scavenging activity was determined (98.4.%  inhibition at 1000 μg/ml concentration)  at highest concentration of methanol extract of vitex negundo  in this study.

Conclusion: The present study concluded that the in vitro antioxidant activity of Vitex negundo L.  was mainly due to the presence of the phenolic compounds like tannins and flavonoid compounds like quercetin. 

Key words: Phytochemical,Vitex negundo L,  In vitro antioxidant, Total phenols, Total flavonoids.

AADQ’s: Advances in Aggregation & Distribution of Query services

Pavan Kumar J, Shanmukha Swamy C.V, Priyardarshini M.M

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 04 (2015), 1 April 2015

Cloud computing has significant efficiency and cost advantages, here is an appealing solution for the cost efficient clouds especially for the pay as you go model.  We propose a scheme called Advanced Aggregation & Distribution of query services (AADQ’s). In this paper, we address Privacy and Efficiency are the two fundamental issues. Without heavy querying this scheme allows users to retrieve files of their interest without leaking any information which is subject to privacy. It also aggregates user’s queries in a short time delay, based on multi keyword and multi ranking techniques, which retrieves higher percentage of matched files. The AADQ contains a caching mechanism which overcomes the drawback of sending redundant queries to the cloud, which intern saves the cost. As it provides an efficient solution to reduce querying overhead incurred on the cloud. This feature is useful when cloud retrieves large numbers of matched files, but the user needs only a few of them. Extensive evaluations have been conducted to show the advantages of this approach.

Keywords: Multikeyword, Multiranking, Query Services, Caching Mechanism.

Animated Movie Making Using A Game Engine

Mr. Rishi Mehta, Mr. Yash Bhatt, Mr. Yashvardhan Joshi, Mr. Sanjay Vidhani

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 04 (2015), 1 April 2015

A game engine is a software framework designed for the creation and development of video games. Video game developers use them to create games for video game consoles, mobile devices and personal computers. Thanks to the growing power of video games engines, which are responsible for creating the whole in-game experience - from rendering the physics system and sound architecture to artificial intelligence and networking - the idea that film makers could take advantage of them to improve, speed up or even completely abolish the post-production process is slowly becoming a reality. In this paper we explain how to develop an animated movie using a game engine.

Keywords: game engine, video games, artificial intelligence, networking, animated movie

A University Model Thesis on Globalization for Globalism

Dr. Rojukurthi Sudhakar Rao

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 04 (2015), 1 April 2015

Research for fulfilling the needs and expectations of Society at large , as a matter of fact , becomes  Policy  of Quality and Equality in thinking and activities of contemporary Researchers.  One such area of Research with influence on a global scale is the Globalization for Globalism. The effects of recent monetary, security and economic developments all over the World in the name of Globalization have become significantly an important current area of research –interest. This Paper is a thrust in the direction of comprehending the World as a Product of Globalization gifted by the ideology of Globalism. The Author  has visited  Universities for  doing Research  on Globalization and collected  models  of  the University  formats for  presentation of  his Research Works on Globalization summarily . The result is this Paper and a byproduct within this Paper presented as the Zero-base Review of the Globalization Zeitgeist.      

Key Words :  Globalism , Globalization ,  Ideology , Porter ,  Arjun , John Dewey Professor , Research .  

Link Stability in Mobile Ad Hoc Network

Ms. Amita Pandey

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 04 (2015), 1 April 2015

Providing an efficient, robust and low overhead path from source node to destination node in MANETs is a critical issue due to frequent change in the network topology and mobility of the node (which cause frequent change in radio link). Hence it is necessary to check the node stability with respect to node mobility during path establishment .path. Many routing algorithms, proposed for ad-hoc network, are based on source routing scheme. When a route is broken in source routing, route recovery and maintenance procedure are executed, these procedure consume many resources. To minimize route breaking, it important to find a route that endures longer time. Shortest path route has short lifetime especially in high dense ad-hoc network. Some routing protocol such as SSA and ABR are considering the link stability and try finding more stable route.   The stability is computed by using the parameters such as received power, distance between neighboring nodes and link quality that is assessed using bit error in a packet. The proposed scheme is simulated over a large number of MANETs nodes with wide range of mobility and the performance is evaluated. The performance of the proposed scheme is compared with two well-known mesh based multicast routing protocol, i.e. on demand multicast routing protocols(ODMRP) and enhance on demand multicast routing protocol(EODMRP) It is observed that the proposed scheme produce better packet delivery ratio, reduces packet delay and reduced overheads.  This paper also proposes a method to find the stability factor of a node by considering self and neighbor node stability. The stability factor of a node may be used to establish a path from source to destination. The stable nodes in the path will provide higher packet delivery ratio and lower latency. We have tried to show link stability and node stability under the influence of varying node speeds and number of nodes.

Key words: MANETs, Stability factor, Link stability, node stability, SSA and ABR

Effect of Monopole field on the Gravitational Collapse of Husain Space-Time

Sanjiv Shridharrao Zade

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 04 (2015), 1 April 2015

We study the effect of the monopole ï¬eld on the occurrence of the naked singularities arising in Husain space-time. For an appropriate choice of the arbitrary functions, the outgoing radial null geodesics, emanating from the central singularity has one or more positive roots. The occurrence of naked singularity violates the cosmic censorship hypothesis.

 

Design and Simulation of AGC and AVR for a Multi Area Interconnected System

Abhilash M G, Frenish C Francis, Parvathy P

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 04 (2015), 1 April 2015

This work deals with the automatic generation control (AGC) of interconnected thermal systems with combination of the automatic voltage control (AVR) and load Management. In this particular work thermal unit is considered with three area concept. The primary purpose of the AGC is to balance the total system generation against system load and losses so that the desired frequency and power interchange with neighboring systems are maintained. Any mismatch between generation and demand causes the system frequency to deviate from scheduled value. Thus high frequency deviation may lead to system collapse. Further the role of automatic voltage regulator is to hold terminal voltage magnitude of synchronous generator at a specified level. The interaction between frequency deviation and voltage deviation is analyzed in this paper. System performance has been evaluated at various loading disturbances. On the other hand, in those days more emphasis on generation side rather than load side. In this paper load management scheme is also considered. Load management is normally used to reduce the total load demand of power systems during periods of peak demands in order to maintain the security of the system. Research has been carried out in order to identify additional functions and benefits that load management can bring to end users and utilities.

Keywords: Automatic Generation Control, automatic Voltage Generator, Area Control Error, fuzzy Logic Control.