Articles


Design and Analysis of Optical Communication for Underwater Applications

Prof. Ajay V. Raipure, Dr. Ashwinikumar P. Dhande, Dr. S. M. Deshmukh

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 06 (2015), 31 May 2015

This paper presents   design and implementation of underwater optical communication system . The system consists of transmitter, water channel, and receiver. The laser diode used as a transmitter at 530 – 540  nm wavelength in CW mode with 100 mw power. The channel is about glass pool its dimensions (1m, 0.5m, 0.5m) with different samples of water . The receiver consists of photodiode detector and amplification circuit. This system transmits data from PC to another PC through water channel at different samples. The result shows the difference in the received signal at different tested water samples..

Index Term:  optical communication, laser diode, LED ,  amplification. 

Performance Evaluation of Continuous Reinforced Concrete Pavement

Sagar Ranmale, Rakesh Shinde, Rahul Kumar

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 06 (2015), 31 May 2015

Performance is key factor for selection of pavement type.In the present study performance evaluation on four Continuous Reinforced Concrete Pavement (CRCP) projects have been carried outby actual site survey.For performance evaluation different parameters explaining the nature of cracks, punch-out and spalling have been considered. The observations for all cases have been presented in detail in this paper. The comparison between CRCP and pavement quality concrete (PQC) road of same life span and traffic condition is also discussed in this paper.From the entire study, it can be concluded that performance of CRCP is better than conventional PQC pavement

Stepper Motor: A Review on Theory and Fundamentals

Radhakrishna Harshvardhan, Milind Tambat, Vikram Patil

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 06 (2015), 31 May 2015

Stepper motors are different from all other types of electrical drives and it is also called as step motor. Stepper motor basically follows the principle of discrete control pulse fundamental during its working this is the reason it rotates in discrete steps. On the other hand ordinary electrical a.c and d.c drives are analog in nature and rotate continuously depending on magnitude and polarity of the control signal received. The basic advantage of discrete nature of operation of a step motor makes it easy and suitable for directly interfacing with a computer and direct computer control. These motors are having wide applications in industrial control, specifically for CNC machines, where open loop control in discrete steps are acceptable. These motors can also be adapted for continuous rotation. In this paper we have discussed about the construction, principle, theory and operations of stepper motors.

Keywords: Stepper motor, electrical drives, discrete control, magnitude, computer control.

Clinical Observation of Toxicological Pathology of Vegetable oil in White Male Rats

Majeed Saleh. K, Batool S. Hamza, Hassan Mohammed A.A., Al-Sereah Bahaa. A

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 06 (2015), 31 May 2015

Sixty white male rats (Sprague dawelly) were divided into two groups, 20 untreated control male rats feed on normal diet as group one while 40 treated male rats feed solely on vegetable oil for six months both young and adult showed varying degrees of emaciation associated with poor condition some with half  closed  eyes and all showed varying degrees of roughness of  hair, piloerection, greasy of  hair, loss of  weight and some of the animals died during the experiment especially young ones.

Keywords: vegetable oil, clinical, rat.

Simulation of In-Cylinder Partially Premixed Combustion Mode

Sharath S, Dr. G. V. Naveen Prakash

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 06 (2015), 31 May 2015

An SI engine gets the charge as a mixture of air and fuel. The quality of the mixture plays a very important factor that decides the quality of combustion, efficiency of the engine, particulate and acoustic emission. Hence it is important to arrive at the right quality of fuel and method of induction of charge. This study focuses on comparison of premixed and partially premixed combustion modes. Various parameters are studied and compared using the Ansys Fluent software. Contours such as progress variable, total pressure, total temperature and turbulent flame speed are obtained at various crank angles for premixed and partially premixed modes. By this simulation it is concluded that partially premixed mode is a better viewpoint in engine design.

Planning, Scheduling and Delay Analysis of Construction Project

Neeraj Kumar, Raju Ratne, Vansh Chauhan

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 06 (2015), 31 May 2015

Construction planning and scheduling is an important tool in a construction project. In every construction project a lot of activities are involved which need to be planned and scheduled properly to ensure the successful completion of the project. Therefore the study on construction planning and scheduling is important so as to provide a view on how it is to be implemented on construction project. This paper consists of study on the concept of planning and scheduling of various activities associated with building construction project. Also study of project management software (MSP) is done. To find out total project duration and critical path planning and scheduling technique is to be used. From the results of planning and scheduling delays that occur in the project are analyzed. In the next step controlling technique is for optimization of the completion time of the project.

Content Based Image Retrieval Using Local Directional Pattern (LDP) Image Descriptor

Meenakshi, Ruby Panwar, Amit Kumar

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 06 (2015), 31 May 2015

We present an approach for image retrieval using Local Directional Pattern (LDP) and efficient on-line learning. This paper presents an image retrieval using novel local feature descriptor, the Local Directional Pattern (LDP), for describing local image feature. A LDP feature is obtained by computing the edge response values in all eight directions at each pixel position and generating a code from the relative strength magnitude. Each bit of code sequence is determined by considering a local neighborhood hence becomes robust in noisy situation. A rotation invariant LDP code is also introduced which uses the direction of the most prominent edge response. Finally an image descriptor is formed to describe the image (or image region) by accumulating the occurrence of LDP feature over the whole input image (or image region). Experimental results on the UW database show that LDP impressively outperforms the other commonly used dense descriptors (e.g., Gabor-wavelet and LBP).

Keywords: Grey-Level Co-occurrence matrix(GLCM),Local Binary Pattern (LBP),k-NN,Rotation Invariant LDP.

The Enhancement of Sperm Retrieval Rate in Cases of Non-Obstructive Azoospermia Via Collagenase IV Enzyme Treatment in Combination with Mechanical Extraction

Amr Alhwani, Mona Hosni, Ayman Diab, Ashraf Bakkar

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 06 (2015), 31 May 2015

In cases of non-obstructive azoospermia (NOA), enzymatic digestion and mechanical treatment can be applied for the extraction of vital spermatozoa from the testicular tissues obtained by the microscopic testicular sperm extraction (micro TESE) surgery. Unfortunately, the results have repeatedly proven to be unsatisfactory when using either method separately. This study aimed at increasing the sperm retrieval rate of testicular sperm extraction (TESE), by using enzymatic digestion using collagenase IV in combination with sperm extraction from a testis tissue with mechanical method. To estimate this, tissue samples were collected from 146 men with NOA who underwent unsuccessful TESE using the mechanical method for sperm extraction. After the micro TESE, the mechanical procedures by mincing and shredding combined with   enzymatic digestion using DNaseI and collagenase type IV was applied to the samples. Pathology, testis size and hormones were determined for all patients.The combination of micro TESE and enzymatic digestion can now be foreseen as an effective method to recover spermatozoa.

Key words: TESE, Micro TESE, Non-obstructive azoospermia (NOA), enzymatic digestion, collagenase IV

Quadratic Trend Running Cost Replacement Model with Linear Trend Salvage and Predicted Inflation

Srinivas Basamgari, Dr. S. Gajanana, Dr. K. Hemachandra Reddy

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 06 (2015), 31 May 2015

The paper Quadratic Trend Running Cost Replacement Model with Linear Trend Salvage and Predicted Inflation is an attempt made to develop right replacement strategy to determine an age of equipment at which the replacement is most economical. The annual maintenance or running cost of equipment is assumed to follow quadratic trend and salvage as linear trend. Using trend equations along with parameters like money value, predicted inflation economic replacement model has been developed.

MANET Routing Protocols with CBR and TCP Traffic using Improved Reference Point Group Mobility (iRPGM) Model

Smita Babele, Prof Rucji Jain

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 06 (2015), 31 May 2015

A mobile ad hoc network (MANET) is a collection of wireless mobile nodes forming a dynamic network Topology without the aid of any existing network infrastructure or centralized administration. Each  node  participating  in  the  network  acts  as a host  and as a  router , means they have to forward packets and identify route as well. Random waypoint is the most common mobility model in most of the simulation based studies of various MANET routing protocols. The Group Mobility Model has been generated by Impact of Mobility Patterns on Routing in Ad-hoc Network (IMPORTANT). The present communication is an attempt to develop an improved version of Group Mobility Model named iRPGM, which provide the facility to assign number of nodes in a group according to demand. We have analyzed the Packet Delivery Ratio (PDR),  Average End to End delay, Average Throughput,  Normalized Routing Load (NRL) and number of Drop packets in CBR and TCP  traffic model using reactive routing protocol,  AODV and proactive routing protocol, DSDV . Research efforts have focused much in measuring their performance with unequal distribution of nodes in each group. Simulations has been carried out using NS-2 simulator

Keywords- MANET,  IMPORTANT, CBR, TCP, iRPGM, PDR, NRL,  NS-2.

Energy Consumption in Unipath and Multipath MANET Routing Protocols under CBR and VBR Traffic Models

Sonam Sehgal, Prof. Ruchi Jain

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 06 (2015), 31 May 2015

A Mobile Ad hoc Networks (MANET) represents a system of wireless mobile nodes that can freely and dynamically self-organize in to arbitrary and temporary network topologies, allowing people and devices to seamlessly communicate without any pre-existing communication architecture. One of the main issues in MANET routing protocols is development of energy efficient protocols due to limited bandwidth and battery life. There are various such protocols developed and analyzed under Constant Bit Rate (CBR) traffic by many authors. The present communication is an attempt to identify the energy consumption packets in traffic models (CBR and VBR) using unipath routing protocol AODV and multipath routing protocol AOMDV.  Simulation and computation of energy consumed, received and transmitted energy were done with ns-2 simulator (2.34 version) with parameter variation: number of nodes, pause time, average speed.

Keywords- MANET, CBR Traffic, VBR traffic, AODV, AOMDV, NS-2.34.

Improving Evolutionary Algorithm Design for Complex Real Time Problems

Volga Benjamin F., Jose Hormese

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 06 (2015), 31 May 2015

Several types of evolutionary algorithms (EAs) have been applied to solve the project scheduling problem (PSP).  The  performance of these EAs highly depends on design choices for the EA. Based on the dedications of particular tasks the employee can work on multiple jobs simultaneously. This consist of normalizing employees’ dedication for different tasks to ensure they are not working overtime; a fitness function that requires fewer pre-defined parameters and provides a clear gradient towards feasible solutions; and an improved representation and mutation operator. Both the theoretical and empirical findings show that the  design is very effective. A repair mechanism is  that which  facilitates the search for feasible schedules without overwork. Their repair mechanism considers the maximum total dedication of any employee at any point of time during the generated schedule. the problem of overwork can be alleviated and hence  can remove a crucial obstacle in the search process of EAs by using the following an approach : normalisation. Combining the use of normalization to a population gave the best results in the experiments, and normalization was a principle insight for the practical effectiveness of the existing system. Existing system concludes that normalisation is not always effective. The proposed work is based on comparison of an earlier technique used in this area called ‘repair mechanism’. Proposing the collaboration of both techniques to arrive at the best optimal solutions for the PSP and at the end testing the feasibility of the proposed idea. 

Study of Adverse Drug Reactions Associated with Antiretroviral Agent At Government General Hospital & GMC, Anantapur

Dr. K. Santha Bai, Dr.P.Sreenivasulu Naik, Dr. N.M.Riyaz, Dr.D.Kushbu

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 06 (2015), 31 May 2015

Objectives: To study the adverse drug reactions (ADRs) associated with antiretroviral agents (ARVs) in HIV positive patients.

Methods: The present study was a prospective observational study conducted at Government General Hospital, Anantapur from JUNE 2014 – JUNE 2015 (for one year period).  Qualified Pharmacologist monitored all the in – patients receiving ARVs during the study period for suspected adverse reactions.   WHO causality assessment scale, Modified Hartwig & Seigel scale and Modified Schumock & Thornton scales were applied to assess the causality, severity and preventability  of the reported ADRs respectively.  All cases and assessments were further reviewed by senior Pharmacologist & Head of the Department of STI.

Results: During the study period,  94 ADRs were observed in 71 patients.  As per WHO scale, 80 ADRs were probable and 14 were possible.  Based on the severity assessment, 10 ADRs were mild, 80 ADRs were moderate and 4 ADRs were severe in nature.  Among the reported  ADRs, 70  were definitely preventable and 24 were probably preventable.  Antiretroviral drugs responsible for ADRs were Zidovudine (46), Stavudine (21), Nevirapine (10), Effavirenz (10), Lamivudine (5), Tenofovir (1), and Retonvir (1),.  Among the reported ADRs, major ADRs were Anemia (25), Skin rashes (10), Hepatitis (10), Vomiting (10), Lactic acidosis (9), IRIS (5).

Conclusion: Regular monitoring of the HIV patients on ART is essential to identify and resolve ADR related morbidities.

Fast and Approximate processing unit for 2D Discrete Cosine System

Sunita Shandilya, Karan Singh

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 06 (2015), 31 May 2015

The recent time witnesses a tremendous need for high performance digital signal Processing (DSP) systems for high end emerging applications like HD-TV, medical imaging, satellite communication, 3G mobile technologies etc. For all these applications, the sources of data are video signals. For transmission of video signals significant amount of bandwidth required. Since the captured video data contain huge amount of redundant data, there is an opportunity for video data compression keeping the picture quality intact. DCT is a well known technique used in video or image compression. DCT algorithms are computation intensive and involve large number of multiplication and addition operations. Therefore, with the increase in number of length of the DCT,the number of multiplication and addition operations also increase leading to larger chip area and performance degradation. The primary aspect of the 2-D DCT computation is to compute the DCT coefficients, where a large number of mathematical computations are required. This work is implemented on Matlab and hardware level by using of Verilog hardware language. Many researchers provided different architectures targeting area or speed or throughput with non scalable approach for computation..

 

Trust based Opportunistic Routing Admission Control in Wireless Ad Hoc Networks

Pallavi Shinde, Mr. N. D. Kale

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 06 (2015), 31 May 2015

For providing QoS in wireless ad hoc networks is difficult task because the network is decentralised network. The multi-hop nature of the network affects QoS in wireless networks. In routing scheme, if one node at the optimal path is down due to lack of available energy the path will be broken, and the source must have to re-route again. Introduced Opportunistics routing to solve this problem which improves performance. It is quite difficult to provide better QoS in Opportunistic Routing due to the uncertainty of forwarding paths in wireless as hoc networks. Most of the existing existing Opportunistic Routing ie OR protocols rarely consider providing service for different types of flows. It uses Admission Control of nodes for the different flows. The ORAC scheme manage a new alternative flow admission control scheme considering the factors bandwidth, backlog traffic and residual energy of nodes to select forwarding candidates. The existing work in OR considered either of QoS and security. So, in the proposed system, security issue in to account while adopting the ORAC scheme and to resolve issues of security we have used the trust value of the nodes

Keywords: Wireless ad hoc networks routing, traffic, bandwidth, energy.

Big-Data Gathering Using Mobile Collector in Densely Deployed Wireless Sensor Network

Amruta S. Pattanshetti, Mr. N. D. Kale

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 06 (2015), 31 May 2015

With trem

With tremendous growth of Information and Communication Technology (ICT) Wireless sensor network has major contribution in big data gathering. Even if data generated by individual sensor is not significant, the overall data generated by all sensors in the network is contributed for generation of significant portion of big data. Hence, the energy efficient big data gathering is a very challenging task in the densely deployed wireless sensor network. Also cluster formation before data collection from sensors in the network is additional challenge. Recent research addressed these challenges with mobile sink, which in turn raise the challenge of determining the sink nodes trajectory. In this paper we have proposed new solution, M-mobile collector based data gathering with network clustering based on improved Expectation maximization technique. Mobile collectors traverse a fixed path to collect data from cluster centroids and sensors in the clusters. Finally all the collected data is transferred amongst M-collectors to reach to the static sink node. Also we derive optimal number of clusters to minimize the energy consumption.

Keywords: Big data, Wireless Sensor Networks (WSNs), clustering, optimization, data gathering, and energy efficiency.

Roads & Railways’ Knowledge to Philosophy, A Next Generation Graph Theory

Dr. Rojukurthi Sudhakar Rao

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 06 (2015), 31 May 2015

From Roads & Railway’s Knowledge to Philosophy -- A Next Generation Graph Theory, it is a maiden attempt in the philosophical thought exclusively without using at least once the word of Network throughout the philosophical treatment and discourse in this short Paper, to derive the rudimentary Graph with Loop  and Edge as the two philosophical organs. This is not the case with the commonly available College & University  syllabus-materials to study the Graph Theory  usually appreciated  by and known to scholars and students of Graph Theory as has been introduced into this World of Education  by the then famous Swedish Mathematics  teaching assistant, His Excellency Leonhard Euler  for the very first time marking the beginning of Graph Theory  &  Applied  simultaneously in the then 18th Century’s  World of Philosophy, Mathematics and  Biology  of which he himself  was a keen Student & Professor hailing from the University of Basel ,  Switzerland. 

This Research Paper, no one can dispute, justifies and fills the space  that Euler was  natural philosopher of the 18th century  but expired having left a secret gap in philosophizing  non-geometrical liberal  Graph Theory.

Analysis of Plate Girder Bridge for Class-AA Loadings (Tracked Vehicles)

Mr. Shivraj D. Kopare, Prof. K. S. Upase

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 06 (2015), 31 May 2015

A bridge is a means by which a road, railway or other service is carried over an obstacle such as a river, valley and other road or railway line, either with no intermediate support or with only a limited number of supports at convenient locations.

Strength, safety and economy are the three key features that cannot be neglected before the finalization of types of bridges. While deciding the types of bridge, spans and other parameters are to be studied carefully to meet out the need of suitability to site conditions. The scope of this thesis is to confine to the design aspect related to variable parameters. Depth of web, thickness of web, width of flange and span of bridges are the variable parameters considered during the design of plate Girder Bridge.

The use of steel often helps the designer to select proportions that are aesthetically pleasing. Structural steels have high strength, ductility and strength to weight ratio. Thus it has become the obvious choice for long span bridges as steel is more efficient and economic. Among the various types of bridges plate girder bridges, truss bridges and box girder bridges are more commonly used. As the cost of steel is rising we have to reduce the amount of steel used without affecting the strength of section. In this thesis a plate girder bridge is designed as per the Limit state method using the IS 800:2007, IRC: 24-2000 and analysed by SAP-2000. Basically the Indian standards are derived from the British Standards. The basic concept is the same. Only the values of various parameters vary according to the design and fabrication/ erection practices existing in India. Design calculations are carried out for simply supported single span. Seismic and wind effect is not taken in to account at design stage. To clarify the design procedure and the current state of practice, a comprehensive literature search and survey were conducted. Recommendations pertaining to best practices for planning, design, and construction activities, as well as applications and limitations are also provided.

Based on the design results, conclusions are arrived at to know the behaviour of plate girder bridges when designed using Indian code.

Keywords: Steel bridges, design comparison, Welded Plate Girder, Indian Road Congress

Assuring Data Integrity in Cloud Using Regenerating Codes

Bhavyashree K P, GuruPrakash C D

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 06 (2015), 31 May 2015

The cloud computing is the emerging technology growing rapidly with its services. Cloud storage is one of the many services it is rendering. This cloud storage not only allows the clients to store their huge volume of precious data, also provides a facility to move the data out to the other cloud storage or data centers .In these cases, the data may be corrupted or may be compromised by data centers. Hence the clients must be alert to assure the integrity and correctness of their data.

This paper aims to provide assurance of integrity, hence DIP is put forth. The issues fault tolerance and recovery procedures are addressed as additional features.  Regenerating codes are introduced to give the above said features by distributing the chunks of data among different servers randomly and only the lost part of data is regenerated in to new server. Thus repair traffic is minimized and fault tolerance is provided. The tests are conducted under different parameters for the efficiency.

Keywords: Cloud storage, Data integrity, fault tolerance, regenerating codes, repair traffic

Global Development of Mushroom Biotechnolgy

Buhari Lawan Muhammad, Badaru Suleiman

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 06 (2015), 31 May 2015

There are At least 12000 species of fungi that can be considered as mushrooms with at least 2000 species showing various degrees of edibility. To date, only about 35 mushrooms species have been cultivated commercially, and about 20 are currently on an industrial scale. The majority of these cultivated species are both edible and posses certain medicinal properties [6].

Mushrooms are in prime focus in the food industry for their multi-functional benefits. They are gaining popularity owing to their high nutritional values and are gradually approaching a “super food†status. Mushrooms are a rich source of proteins and have very low or zero fat and cholesterol, and hence are widely accepted in most of the regions of the world. Increase in the consumption of processed food across the world is one of the major driving factors of the mushroom market. Being a promising and profitable business, mushroom cultivation is widely adopted by growers. Factors such as R&D and innovations to enhance the acceptability and continuous improving technologies to increase mushroom shelf-life are also projected to drive the mushroom market in the next five years.

Technological developments in the mushroom industry in general have witnessed increasing production capacities, innovations in cultivation technologies, improvements to final mushroom goods, and utilization of mushrooms' natural qualities for environmental benefits, mainly due to contributions from developing countries such as China, India, and Vietnam. However, there is always the need to maintain current trends and to continue to seek out new opportunities. The challenge is to recognize opportunities such as increasing consumption capabilities with the increase in world population and to take advantage of this by promoting the consumption of mushrooms. Those countries, in which mushroom cultivation is not yet well established, will find difficulty to cope with the new competitive circumstances generated by globalisation. Some insights into biotechnological development of mushroom production in the world are reviewed in this paper.

Comparison of Different Filters for the Improvement of Power Quality

Kavya Mittal, Ankita Kosti

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 06 (2015), 31 May 2015

This paper basically deals with the purpose to increase the reliability of power system and improve the Power Quality (PQ) by using Hybrid Filter which hence also improves the Total Harmonic Distortion (THD) as per IEEE-519 Standard limits. The proposed filter estimates and mitigates the harmonics in power transmission systems because of non-linear loads. So, by using Hybrid Power Filter, THD will be checked and is compared with the THD obtained without using filter. In this paper I will also compare the results of different filters. The Simulation is performed and the results are realized in Simulink / MATLAB environment.

Keywords: hybrid filter, IEEE- 519 harmonic standard, power quality, total harmonic distortion.

Ethnomedicinal Values of Some Weed Plant Species of Bhavnagar, Gujarat, India

Bharat B. Maitreya

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 06 (2015), 31 May 2015

Weed plants are considered as unwanted and undesired plants in the fields in plant community. It is also considered as enemies to the farmers and gardeners. they are known as useless or unwanted plants .Many agriculturists, Ayurvedic practicner and field botanists are considered that weeds are used in Indian traditional and tribal medicine .Many of these weeds have high ethno medicinal importance, they are being destroyed because of lack of scientific knowledge and guidance. There are  many weeds are having medicinal and good therapeutic values . The main aim of this study is to expose the important ethnomedicinal values of 61 prominent weeds belongs to 31 different families that grow as wild in the Bhavnagar. Weeds could provide its medicinal importance.

Stature from Human Sternum in Females

Manoharan C, Rajesh R, Dhanalakshmi V

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 06 (2015), 31 May 2015

An essential aspect of medico-legal proceedings is stature estimation. Securing the regression formula for calculation of stature of adult females by assessing the length of manubrium and meso-sternum is the objective of this study. Through dissection and maceration of soft tissues, 50female sterna were obtained from known corpses aged between 14years and 60years. For manubrium the resultant regression formula is Y=130.6 + 5.2x length of manubrium with standard error of ±5.3 and coefficient correlation is 0.3. For meso-sternum the resultant regression formula is Y=126.76+3.6x length of meso-sternum with standard error of ±4.0 and coefficient correlation is 0.49.Due to the greater coefficient correlation, the length of meso-sternum appears to be a perfect instrument for assessment of stature. This study thus verifies that, to determine the stature of a person meso-sternum is a consistent instrument.

Key words: manubrium, meso-sternum, female, stature.

A Simple Load Rebalancing algorithm to rebalance the loads in clouds

Lakshmi urs S M, Dr. C.D Guruprakash

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 06 (2015), 31 May 2015

Distributed file systems are key building blocks for cloud computing applications based on the MapReduce programming paradigm. In such file systems, the nodes are simultaneously serve this computing and storage functions; a file is partitioned into a number of chunks allocated in distinct nodes so that this MapReduce tasks can be performed in parallel over the nodes. However, in a cloud computing environment, failure is the norm, and nodes may be upgraded, replaced, and added in the system. Files can also be dynamically created, deleted, and appended. This results in load imbalance in a distributed file system; that is, the file chunks are not distributed as uniformly as possible among the nodes. Emerging distributed file systems in production systems strongly depend on a central node for chunk reallocation. In this paper, a fully distributed load rebalancing algorithm is presented to solve with the load imbalance problem. This algorithm is compared against a centralized approach in a production system and a competing distributed solution presented in the literature. The simulation results indicate that our proposal is comparable with the existing centralized approach and considerably outperforms the prior distributed algorithm in terms of load imbalance factor, movement cost, and algorithmic overhead.

Keywords: Load balance, distributed file systems, clouds,filechunks,load

Content Based Image Retrieval System Using Relevance Feedback

Aboli U. Deshmukh, Nilesh P. Bhosale

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 06 (2015), 31 May 2015

Content based image retrieval (CBIR) is the basis of image retrieval systems. Image retrieval based on image content has become an interesting topic in the field of image processing. To be more profitable, relevance feedback techniques were introduced into CBIR such that more precise results can be obtained by taking user’s feedbacks. However, existing relevance feedback based CBIR methods usually request a number of iterative feedbacks to produce refined search results, especially in a large-scale image database. To achieve the high efficiency and effectiveness of CBIR we are using two type of methods for feature extraction like SVM (support vector machine) and NPRF (navigation-pattern based relevance feedback). By using SVM classifier as a category predictor of query and database images, they are exploited at first to filter out irrelevant images by its different low-level, concept and key point-based features. In terms of effectiveness, the search algorithm makes use of the discovered navigation patterns and three kinds of query refinement strategies, Query Point Movement (QPM), Query Reweighting (QR), and Query Expansion (QEX) to convert the search space toward the user’s intention effectively. By using these methods, high quality of image retrieval on RF can be achieved in a small number of feedbacks.

Keywords: Content based image retrieval, relevance feedback, query expansion, navigation pattern mining

Clustering Techniques for Wireless Sensor Networks

Sudhir Kumar Gupta, Ashish Ranjan, Gagandeep Sharma

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 06 (2015), 31 May 2015

Wireless sensor network has been emerged as the one of the most promising area of research. The use is not limited to space research, transport, battle fields, surveillance, military, health but many more. The large number of  deployed nodes need to be efficiently organized to fulfil the need of data aggregation , load balancing and prolonging network life time  Sensor nodes are small power devices so to maintain its long life proper measure is required. Clustering serves this requirement by reducing energy consumption and increasing network scalability. In this article, we highlight the objective of clustering, discuss the different clustering approaches and its classification and finally provide a comparative study of different proposals.

Keywords: Base Station (BS), Cell Header (CH), inter-cluster communication, intra- cluster communication.

Prevalence and Detection of Amp C β- Lactamase Resistance in Gram Negative Uropathogens

Dr.B. Subitha, Dr. T. Padmavathi

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 06 (2015), 31 May 2015

The most common mechanism of resistance in Gram negative bacteria is by the production of ß lactamases which inactivate ß lactam antibiotics. Among which Amp C β lactamases are more important because they confer resistance to Cephalosporins, β lactam β lactamase inhibitor combinations and Aztreonam. Although reported with increasing frequency, the true rate of occurrence of AmpC β-lactamases  remains unknown. The present study was designed to determine the occurrence of AmpC enzyme-harboring Gram-negative uropathogens in a tertiary care hospital.  A total of 430 consecutive, non repeat urinary Gram negative isolates were included in the present study. All the 430 isolates were screened for AmpC β-lactamase production by Novel predictor disk placement method. Isolates positive in the screening were further confirmed by inhibitor based Cefoxitin –Cloxacillin disk diffusion test. Sixty eight (16%) isolates were positive for AmpC β-lactamases. Based on the species 36 (14%) Esch.coli ,27 (28%) Klebsiella pneumoniae, 2 (6%) Pseudomonas aeruginosa  1 (5%) Citrobacter freundii, 1 (8%)Acinetobater sp and 1 (33%)Enterobacter aerogens harbored AmpC enzymes. All the isolates were sensitive to imepenam. This study has shown the occurrence of Amp C β lactamase producing Gram negative urinary isolates in our hospital.  Failure to identify Amp C β lactamase producers may lead to inappropriate antimicrobial treatment . Inhibitor based  Cefoxitin -Cloxacillin  disk diffusion test is easier to perform routinely to detect Amp C β lactamase production.

Key words: Gram negative uropathogens, drug resistance,  Amp C β-lactamases

Nano-hardness and Elasticity for Hydroxyapatite Before and After of Immersing it into Simulated Body Fluid

Dora Elena Ledesma-Carrión

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 06 (2015), 31 May 2015

Stoichiometric and anisotropic nanometer hydroxyapatite was made with co-precipitated method. The powder was compacted under uniaxial and isostatic press and lately sintered. Finally, the tablets were immersing in simulated body fluid during 1 day. The material loss hardness (68.20%), elasticity (64.93%) and plastic work (9.20%) only increasing elasticity work (30.06%).

A Robust Low Power Security System for Multi-Node Communication

Lazeena V P, Prasanth M

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 06 (2015), 31 May 2015

Wireless sensor network (WSN) is a collection of sensors organized into a cooperative network. The sensors are monitor the physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location. Security and energy consumption are considered to be long-lasting technical challenges in WSNs. In order to avoid this security and energy consumption problem, channel aware encryption and decision fusion is to provide a secure transmission from sensors to the Ally Fusion Center (AFC) without using any traditional cryptographic techniques. Consider a passive eavesdropping where an Enemy Fusion Center (EFC) located in a vicinity of an AFC tries to eavesdrop on wireless communication between sensors and AFC. Two groups of sensors are activated and send their data in different ways by a random exploiting channel gain over parallel access channel to the AFC.AFC properly detect the target while the EFC is totally ignorant it. The performance evaluation show that detection performance at the AFC exponentially decays with growing the number of sensors. Clustering technique provides an effective way to overcome these problems. Clustering technique can partition the nodes into clusters and select the cluster head (CH) among the nodes and Non Cluster Head (NCH) nodes. The CH receive the data from other nodes then sent to a sink to accomplish a specific goal.CH remain closer to their follower sensor nodes compared to the sink. It take less energy to transmit data to the cluster head instead of the sink, which allows the sensor nodes to conserve more energy and live longer in WSN, also provide a secure communication from nodes to the main station. 

Keywords— Wireless sensor networks (WSN), decision fusion, perfect secrecy, sensor nodes, clustering.

Prospective of Medical Cost for Genitourinary Cancer for Sex and Age Group in Range 2012-2050: Case of Mexico

Dora Elena Ledesma-Carrión, Lidia Hernández- Hernández, María Teresa Leonor Muciño-Porras

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 06 (2015), 31 May 2015

Medical costs are calculated for genitourinary cancer for all age groups of Mexican people and sex into range of 2012-2050. Probabilities of entrance or disease detection, permanence or in treatment and departure or death are calculated for each age group and sex. The maximum probabilities for each case are 0.038% (65+), 0.376%-0.388% (25-29, 85+) and 0.6438% (85+), for male. Analogously, for female are 0.0201% (60-64), 0.514% (35-39), and 0.1074% (85+), respectively. The treatment medical costs are not similarly between men and women. The maximum number of people in treatment is in (20-29) for male and (35-39) for female. The number of patients decreasing in the range. The unit costs are bigger for patients of 50 years old and more than all age group for male (+7.02%) whereas it is not for female.

A Study of Variations of the Recti Muscles of the Eyeball in Cadavers

Dr. Gopal G. Bagal, Dr. Ramdas Surwase

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 06 (2015), 31 May 2015

The human beings are a highly visual species. Most of our information about the world comes to us through our eyes and most of our cultural and intellectual heritage is stored and transmitted as words and images to which our vision gives access and meaning. Knowing more about our eyes and vision is, therefore, one path to better understanding of ourselves. And, as it happens, the human eye is a fairly representative vertebrate eye; knowing more about it tell us much about the eyes of other animals and about how they view the world and us.

Any defect in the extraocular muscle results in a misalignment of the visual axes of the two eyes, the condition is called strabismus. In this condition patients suffers from double vision (diplopia) and also cosmetically it doesn’t look good. Surgical treatment of this condition required the anatomical knowledge of extraocular muscles. Various studies are done on extraocular muscle but no literature showed such study in Indian population. This aroused an interest in doing a study on this subject. The aims and objectives of our study were,

  1. To measure the width of the recti muscles at the site of insertion
  2. To measure the distance between the limbus and scleral attachments of the four recti muscles i.e. superior rectus, inferior rectus, medial recttus and lateral rectus.
  3. To compare the measurements of right eye with with those of left eye
  4. To study any variations in the recti muscles
  5. To study variations in the nerve supply of these muscles.
Keywords: Extraocular muscle, Eye movement, Levator palpebrae suprioris, Muscle pulleys; Muscle sleeves, Orbital fascia.

Quality Management and Statistical Performance in Industry

R. Purushotham Rao

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 06 (2015), 31 May 2015

This study attempt to test the effect of Total Quality Management(TQM) competitive advantage and Industrial performance.  The design of this research has quantitative Approach.  Improving the quality with which an organization can deliver its products and services is critical for competing in an expanding global market. TQM begins with the primary assumption that employees in organizations must cooperate with each other in order to achieve quality for the needs of the customer.  Quality teams provide companies with the structured environment necessary for successfully implementing and continuously applying the TQM process. Quality training is conducted and the continuous improvement process executed through a well-planned team structure. 

Prior studies  suggest that TQM strategy that focuses on increasing customer levels of satisfaction does have a significant and positive impact on performance. for example, suggest that attaining customer satisfaction is thought to increase the profits of the organization by decreasing costs through fewer returns and increasing revenues through customer loyalty.  The results show that TQM practices have positive and significant effect both on organizational performance and competitive advantage.  Competitive advantage has a positive and significant effect on organizational performance.  Organizational performance is more influenced by competitive advantage than TQM practices. 

 

Keywords: TQM practices, quality training,  competitive advantage, organizational performance, operation management.

SQL-Injection Vulnerability Analysis Using Machine Learning Technique

Gunjan Shukla, Professor C.S. Satsangi

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 06 (2015), 31 May 2015

Internet may be the supreme supply of data, data is situated in distinct data format and can be accessible everywhere you go, consumer will get connection together with web by way of request covering available as GUI screen, signifies Net is accessible through the use of browser in which consumer might feed his/her data pertaining to authentication in case required through request. Seeing that on view natural environment involving web connection and design development, distinct authentication mechanism, security password safety and an incredible number of protection treatments have been made to defend the approval via unauthorized entry but still crooks are aimed towards distinct ways to break the actual protection, it may be through hit and walk methods, through infecting computer system, through surging computer system, But within the actual suggest cardstock a fresh strategy have been offered to get SQL-Injection being exposed, in case offered in user’s suggestions, the item assessments dilemma personal, finger prints and mapping blend to help think any intruding activities throughout the process,

This suggest strategy is simple to use, since it simply desires fingerprinting and mapping paradigm involving dilemma and all too easy to change, in case new personal is found, instead of positioning any overhead within the existing doing work process.

Keywords— SQL-Injection; SVM; Attack;

Study on Performance of Infill Wall Masonry RCC Frame Using Alternative Types of Bricks

Dhaval H. Joravia, Dr. Kaushal B. Parikh

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 06 (2015), 31 May 2015

Here the particular meaning of alternative type of bricks means the non-conventional type of bricks with new idea of using waste polymer materials. This bricks can be become translucent, insulating, light, strong and mechanically recyclable building material. The polymers materials are used for make alternative types of bricks are PET, HDPV, LDPE, PP, PVC, PC, PS, and ABS. these are widely available as waste material worldwide. The analysis of this bricks and brick modules analyzed by SAP2000 and ANSYS workbench software.

Keywords: Interlocking bricks, Polymer bricks, SAP2000, ANSYS.

An Efficient Dynamic TESLA based Authentication Scheme for Secure Network Coding

Aparna Jumde, Shyamsundar Gupta

International Journal of Emerging Trends in Science and Technology, Vol. 2 No. 06 (2015), 31 May 2015

Network coding based applications are notoriously susceptible to malicious pollution attacks. Packets authentication schemes have been well-recognized as the most effective approach to address this security threat. However, existing packets authentication scheme i. e. the Times keys scheme consumes extra bandwidth for transmission of times keys. Also the Time keys can be captured and replay attack can be launched by the attacker. This motivates to design a new solution to avoid the problems in Time keys scheme. The solution is based on the concept that the source and the destination must agree on the keys along with the network coding process. This scheme of agreeing on the keys is known as adaptive TESLA scheme. Using this proposed scheme the effect of pollution attack and collusion attack is measured in terms of real packets corrupted and dropped. The proposed adaptive TESLA scheme for network coding is also compared with times keys in terms of bandwidth usages.

Keywords: network coding, pollution attack, collusion attack, adaptive TESLA.