Title: Mining Online Discussion Data For Understanding Teacher's Reflective Thinking? A Survey
Authors: V.T. Kalaivani and B. Loganathan
Abstract: The purpose of this study is to determine the effect of reflective thinking on the professional teachers and to explore their reflective levels. Within the qualitative research paradigm, action research was used to gain a deeper understanding of the reflective experiences of teachers. The notion of reflection nowadays is considered crucial in the field of teaching and teacher education" and relevant literature reviewed in this study has indicated support for this. We propose and test a model of reflective thinking among teachers using, mining online discussion data. We encouraged collaborative reflection among teachers using the closed social networking site. While there were obstacles and ambiguities, findings indicated that our pre-service teachers found the site highly usable, appreciated the choice and influence afforded them through the medium, and grew as teacher-candidates from peer-toper interactions.
Title: A Review on Plant Disease Detection Based on Image Processing Techniques
Authors: M.Kannan, R.Thangavel and P.Jayachandral
Abstract: Agriculture is one of the most important sectors, and plays a major role in the socio-economic development of a country like India. Crop maintenance and disease control are challenging tasks in agriculture. They require skilled human resource for the purpose, but in today?s scenario getting an experienced person is very difficult. For better productivity, early detection of disease is the best way. Most of the disease cause the deformation in external appearance of plants such as leaves, fruits, flowers and stem. One of the easy ways is to identify the disease in the early stage through image processing techniques. Image processing is an advanced technology, which is used to detect the disease in plant leaves and other parts. It consists of five main phases, namely, image acquisition, pre-processing, segmentation, feature extraction and classification. This paper reviews the different types of image processing techniques for detection and classification of plant leaf disease at an early stage.
Title: Modeling Human Activity Recognition using Kears and Tensorflow: Deep Learning Approach
Authors: R.S. Kamath and R.K. Kamat
Abstract: Authors report Deep Learning (DL) model for Human Activity Recognition (HAR) in Ambient Assisted Living (AAL) using Keras and Tensorflow. DL is a set of algorithms that is inspired by the structure and function of the brain accounts for the use of many hidden neurons and layers as an architectural advantage combined with new training paradigms. The present research exhibits performance evaluation for various deep learning network configurations and compare the classification accuracy. The reported investigation depicts optimum DL architecture achieved by tuning the number layers, number of hidden neurons of neural network model. Result concluded that model of three hidden layers with number of hidden nodes 378, 262 and 168 outperform other combinations significantly. Moreover the performance of the model is evaluated with reference to accuracy and loss.
Title: Connection Management of IoT (Internet of Things) with 16-bit microcontrollers
Authors: Atul Ranjan Srivastava and Kartik Goyal
Abstract: Any server-side architecture would ideally be highly scalable, and be able to support millions of devices all constantly sending, receiving, and acting on data. However, many ?high-scalability architectures? have come with an equally high price ? both in hardware, software, and in complexity. A few IoT devices have some form of UI, but in general IoT devices are focused on offering one or more sensors, one or more actuators, or a combination of both. The requirements of the system are that we can collect data from very large numbers of devices, store it, analyse it, and then act upon it. Existing protocols, such as HTTP, have a very important place for many devices. Even an 8-bit controller can create simple GET and POST requests and HTTP provides an important unified (and uniform) connectivity. The most capable IoT platforms are full 16-bit, 32-bit or 64-bit computing platforms. These systems, such as the Raspberry Pi or the Beagle Bone, may run a full Linux OS or another suitable Operating System, such as Android. In many cases these are either mobile phones or based on mobile-phone technology.
Title: Investigation on number of bands in Multi Band Spectral Subtraction for Speech Enhancement and their effect on performance Measures
Authors: P.Sunitha and Dr.K.Satya Prasad
Abstract: This paper presents an investigation on number of bands in Multi Band Spectral Subtraction along with linear frequency spacing method for speech enhancement and their effect on performance measures in presence of additive non-stationary noise at different ranges of input SNR. Since speech is non-stationary signal, noise distribution is non-uniform i.e few frequency components are affected severely than others. A common method to restore the original speech in presence of noise is speech enhancement by suppressing the back ground noise. Multi Band Spectral Subtraction is one among the speech enhancement techniques which performs spectral subtraction by dividing noisy speech spectrum into uniformly spaced non over lapping frequency bands, and spectral over subtraction is performed in each band separately. The performance of this method is evaluated in terms of objective measures such as segmental SNR, global SNR, Frequency weighted segmental SNR, spectral distortion measures like, spectrum distance, Itakura-Saito, Log likelihood Ratio, Weighted Spectral Slope Distance and Perceptual Evaluation of Speech Quality.
Title: Design and Optimization of Square SPI for Ultra-Wide Band Applications
Authors: Beeresha R S, A M Khan and Manjunatha Reddy H V
Abstract: The design, simulation and implementation of microstrip square spiral inductors (SPI) for ultra-wideband applications. An accurate analytical modeling was done by using the current sheet approximation (CSA) method. The simplified lumped equivalent circuit is used to determine the physical dimension of the square SPI model. They are three different square turn SPI structures (1-turn, 2-turn, and 3-turns) are electromagnetically (EM) simulate using physical dimensions. These physical dimensions help to achieve desired inductance values. The implementation SPI structure in monolithic multilayer integrated circuit (MMIC) technique and operating frequency from 100MHz to 2000MHz and calculate inductance and quality factor (Q-factor) at 950MHz for ultra-wide band applications. The SPI is model on RT/Duroid substrate and measured with the network analyzer. The obtained results show that the average inductance of SPI (1-turn to 3-turn) increases by 74% and quality factor decreases the average of 68%.The observed results show that average error of CSA v/s EM simulated = 5.66%, CSA v/s tested = 4% and EM simulated v/s measured = 6.87%. It is found that CSA, EM simulation and measured results are in close agreement with the smaller average error. The analysis show that, increase in turns will influence to increases inductance value. The enhancement of the series resistance is leading to deterioration of the Q-factor.
Title: Research Paper on Voting System by Using Biometric & VVPAT
Authors: Prof. Jitendra R. Rana, Rohit S. Borade, Amit S. Kolte and Sumit S. Kulkarni
Abstract: Now-a-days voting process is exercised by using EVM (Electronic Voting Machine). In this project, we present and use implementation is to implement the development of anti-rigging voting system using fingerprint. The purpose of the project and implementation is to provide a secured and reliable environment to the voters is to electing the candidates by using the intelligent electronic voting machine by providing a unique identity to every user using FINGER PRINT identification & VVPAT (Voter?s Verified Paper Audit Trail) technology. Here in this project and implementation we are going to provide the at most security since it is taking the finger prints as a authentication for EVM. It involves Aurdino & interfaces. Intelligent (with biometric module) EVM has been specially designed to collect, record, store, count and display cent percent accurately. It has ?Display? section that will display the number of votes to respective candidates at the end of the poll. VVPAT enables the voter to physically verify the vote to cast on EVM. It consists of the printer unit to print the voter?s selection & VVPAT status display unit to display error message of VVPAT during poll. The system is designed in such a way that it should avoid booth capturing, bogus voting, multiple voting by same voter, system tampering.
Title: An Advanced Mechanism for Computing Using Revocable Storage Identity-Based Encryption with Secure Data Sharing In Cloud
Authors: A. Sri varsha and H. Venkateshwara Reddy
Abstract: Cloud computing is given to the customized and user-friendly way of gathering information and sharing the data. What is the providing in cloud computing will give the several profitable for society as well as personal profit also? Still, the exists the data resistance for the consumers to immediately provide the shared information to the cloud server still the information is valuable for sending the data to the cloud server. Then it is locating and sharing data needs to cryptographically using optimize access control for cloud data. In this data sharing system using an Identity-based encryption (IBE) is an important cryptography and it makes a real data for sharing with the user and will store the data in the cloud. But when users will access the authorization process. Then, unfortunately, it is expired. That is not a static key to access control. Then only this process automatically removes the users from the system. Thus, the data sharing in the cloud that data revoked user will not access the both previously and subsequently information end of this. We can propose the system called as revocable-storage identity-based encryption (RSIBE), which we can be using the ciphertext of the forward/backward security system then automatically ciphertext and user revocation data will update simultaneously. Moreover, RS-IBE system we can provide the concrete construction and it validates the security in this security model. Mainly the aim of the RS-IBE strategy, which is performance, compared the advantages of the terms of functionality and improvement. And this is a workable and cost-effective as well as practical data sharing system in the cloud. Finally, we can give the implementation results and this proposed system verifies and it is more practicability.
Title: Integration of Hypermedia in e-learning environment: The impact, characteristics based categorization and Recommendations
Authors: Akanksha Bisht and NeeluJyothi Ahuja
Abstract: This paper presents a study of learning environments, with respect to understanding the learners, their learning process and their challenges. The ability of Hypermedia as an effective mechanism to enthuse, motivate and build interest of the learner towards learning, is analysed and its integration into modern learning environments, is recommended. The impact of integration is explored and categorizations of learning environments accordingly have been detailed.
Title: EOG Based Human Machine Interface to Control Electric Devices Using Eye Movement
Authors: Mr. Shivaprasad B K, Mr. Vishwanath Muddi and Mr. Shivraj S T
Abstract: Rehabilitation devices are increasingly being used to improve the quality of the life of differentially abled people. Human Machine Interface (HMI) have been studied extensively to control electromechanical rehabilitation aids using biosignals such as EEG, EOG and EMG etc. among the various biosignals, EOG signals have been studied in depth due to the occurrence of a definite signal pattern. Persons suffering from extremely limited peripheral mobility like paraplegia or quadriplegia usually have the ability to coordinate eye movements. The current project focuses on the development of a prototype motor wheelchair controlled by EOG signals. EOG signals were used to generate control signals for the movement of the wheelchair. As a part of this work an EOG signal acquisition system was developed. The acquired EOG signal was then processed to generate various control signals depending upon the amplitude and duration of signal components. These control signals were then used to control the movements of the prototype motorized wheelchair model.
Title: Compact Microstrip Antenna with Multi-frequency Operation
Authors: Priyabrata Biswas, Srija De, Biplab Bag, Sushanta Biswas and Partha Pratim Sarkar
Abstract: In this paper design of a single layer compact microstrip patch antenna with multi-frequency operation has been proposed. A rectangle stripline spiral shaped patch is coaxially fed with a meandered ground plane. The fundamental resonant frequency of the proposed antenna is lower than the fundamental resonant frequency of the reference antenna due to the meandering effect of the ground plane. Experimentally 89% size reduction is achieved for the proposed antenna with respect to the reference antenna. The proposed antenna also operates at multiple resonant frequencies. The measured results show that the operating frequencies are 1.1GHz, 5.5GHz, 6.34-6.75 GHz and 7.14-8GHz. The gain of the antenna at each operating frequencies are also good.
Title: GPS Aided Power Optimization in MANETs
Authors: B. M. Parmar and Dr. Kishor G. Maradia
Abstract: Mobile ad-hoc networks (MANETs) are multi-hop wireless communication networks formed dynamically on ad-hoc basis without fixed infrastructure and centralized administration. Successful communication between source and destination depends on quality of temporarily formed multi-hop link. Quality parameter for multi-hope link includes link life and link length. Aim of work presented in this paper is to improve link quality in terms of link life and link length. We have proposed GPS aided routing technique that finds shortest end to end path and adjusts transmission power of node based on calculated distance to next hop. Saving battery power of node increases link life and ultimately network life time. Selection of shortest end to end path decreases end to end delay in packet transmission. To check suitability and efficiency of proposed routing technique we have modified well known Ad-hoc On-demand Distance Vector (AODV) routing protocol. We have done two modifications in AODV, first transmission power based on transmission distance and second, selection of route that has shortest distance to destination. Using NS3.25 simulation tool we demonstrate that there is approximately 42% saving in average battery power consumption and average end to end delay is improved by 55% compared to conventional AODV during simulation time.
Title: QoS aware Multimedia Cloud Computing ? A Survey
Authors: K.Syed Ibrahim and Dr. A.R.MohamedShanavas
Abstract: Cloud computing systems facilitate pay-per usage model for computing services provided to the users throughout the globe over the internet. Nowadays the demand for cloud services thru the Mobile devices has increased as organizations and individuals have now started using various handheld mobile devices such as laptop PCs, smart phones, tablets and other such devices. Therefore Cloud Service Providers need to offer services based on the expected quality requirements over the mobile devices. One of the challenges created by cloud application is quality of service (QoS) management, which is the problem of allocating resources to the applications to guarantee the service based on performance, availability and reliability. In this paper, we have presented a survey on QoS in Mobile Cloud Computing with respect to techniques used, advantages and disadvantages.
Title: Performance of hybrid channel coding in OFDM based FSO communication system during turbulence
Authors: Ritu Gupta, Tara Singh Kamal and Preeti Singh
Abstract: In this paper the performance of serially concatenated codes, trellis coded modulation (TCM) with 8-phase shift keying (TCM-8PSK) modulation as inner code and low-density-parity-check (LDPC) (64800, 32400) as outer code, over a free space optical (FSO) communication system, is investigated. The performance is evaluated in terms of bit error rate (BER) for the proposed concatenated codes under various turbulence conditions (weak to strong) for distance of 1 km. The orthogonal frequency division multiplexing (OFDM) is used with FSO link as inspired by the huge demand of bandwidth and optical atmospheric channel is modeled using gamma-gamma fading distribution. Simulation results shows proposed concatenated codes outperform the individually applied LDPC with DVB.S2 standard and TCM codes with same code rate and trellis complexity for OFDM based FSO communication system.
Title: Function Point Computation of Software Cost Estimation Based on Metrics Model
Authors: Saoud Sarwar, Dr. Kalpana Sharma and Dr. Rajendra Kumar Sharma
Abstract: A lot of methods, techniques and models have been developed after the research a large number of completed projects of software from different associations and applications to look at how projects sizes mapped addicted to project effort. In my research paper which is based on my thesis work, focused on how we can reduced the cost within time and having limited no of resources. To compute the exact software cost estimates are decisive for both developer and as well as customers. The major challenges to estimate the project cost to keep away from any lose in the project and besides submit the project on time. The costing of projects or design of the algorithmic to estimating the cost of a software project based on functional point is the greatest practice and approach. So the purpose of this paper is to calculate the empirical evaluation of layers based software cost opinion based on domain and centre on type of the domain of the software projects. The two layers architecture of software cost ruling is not achievable to compute the cost and effort of any software project, so my paper is totally focused on the three layers based software cost estimation. In this paper we have apply three use cases, first for education system, second for Microsoft exchange server hide and unhide mail account from Global Address List (GAL) and third for multinational company. All three use cases we have estimates step wise function point to reach exact cost of any software with the help of parameter weight table values and complexity tables values.
Title: Analytical Approach Assisted Simulation Study of Drift and Diffusion based Bipolar Junction Transistor
Authors: M. R. Jena, S. Mohapatra, A.K. Panda and G.N. Dash
Abstract: In this paper a detailed theoretical analysis of the physics behind a drift and a diffusion transistors are presented which are followed by the presentation of common figure of merit definitions of these transistors. The models are validated analytically by using simple theories of semiconductor physics and practically by using ATLAS module of SILVACO software tool. This investigation gives a thorough description of the various properties like DC, AC, RF, Breakdown and noise analysis of both the transistors have analyzed and compared.
Title: A Framework for the Development of ANN- metamodel using Genetic Algorithm
Authors: Benu Singh and Sunita Bansal
Abstract: Artificial Intelligence is one of the dynamic branches of computer science, which can be quantitatively measured by analyzing the failure data of human brains. Earlier, Genetic algorithms used to be an afterthought, but now-a-days it is widely accepted to be an essential part of artificial neural network. Most of the genetic algorithms failures happen due to choose the poor factors for evaluation. GA is taken as a key factor to artificial intelligence. In this context, we have proposed a framework for genetic algorithms (GA) and some artificial neural networks (ANN) to optimise honing mechanisms in industrial manufacturing environment. This framework measures and minimizes the fault of GNN model and leading to a enhance end product.
Title: Text to Image Synthesis Using Generative Adversarial Networks
Authors: Saksham Bhardwaj and Samksha Bhardwaj
Abstract: Text to Image Synthesis is a technique that can convert text descriptions into the images. This task is based on the quality and accessibility of the learning data given to the network. This task is further dependent on the type of input provided by the user to fetch the output from the model. The model used in this paper is known as Generative Adversarial Networks (GANs), and is a very developing and under research topic at the R&D departments of the global leaders in the research works such as Facebook, Stanford University, and Microsoft etc. The usefulness of this task is very advanced and can help in creating images and objects that we can imagine right now. The major study field that deals with this topic is Computer Vision and Machine Learning and has number of applications in the respective areas.
Title: On selection of optimum parameter operational amplifier for transimpedance amplifier
Authors: Pravin Bhadane, Suchita Bhangale and Aparna Lal
Abstract: Selection of operational amplifier (op-amp) for transimpedance amplifier has been studied in the present work. Transimpedance amplifier is the preamplifier or the first stage of any instrumentation system which is generally constructed using op-amp. The three parameters of op-amp i.e. input bias current, input impedance and input offset voltage are studied for the selection of op-amp. The present study is helpful to the beginners in the field of instrumentation.
Title: MOSFET SPICE Parameter Extraction by Modified Differential Evolution Algorithm
Authors: Chinmay Ranjan Patra, M Suresh and A K Panda
Abstract: A modified differential evolution algorithm is applied to extract the threshold and mobility related parameters of MOSFET BSIM3V3 model. The results of experimental studies of 0.18?m fabricated by TUBITAK Laboratories are used for parameter extraction. I-V characteristics are obtained by using differential evolution and modified differential evolution algorithm. The obtained results are compared with the measurement data. The simulation results show that the modified differential evolution algorithm implemented for parameter extraction is much more effective and accurate as compared to the genetic algorithm and thus suggested to use modified differential evolution algorithm for CMOS parameter extraction.
Title: An Analysis of Particle Swarm Optimization Algorithm to Obtain Minimum Execution Time in Target Finding Using Artificial Neural Network Algorithm
Authors: Anagha Pokharkar and Mukesh Kumar
Abstract: In Particle Swarm Optimization (PSO), the measurement of similarity in the given problem can be determined by knowing how close two patterns are with one another. Different particle swarm optimization algorithms are exist and designed to search in continuous domains. The A* algorithm direct an optimal path to a target path, if its heuristic function is acceptable. It means thatit never overestimates actual cost. So to get the minimum execution time in target finding, we have proposed an hybrid algorithm PSOAS. After analysis of the proposed algorithm, the execution time of finding target in given domain is found comparatively less.
Title: Design and Implementation of Low Power Bist Based Radix 4 Booth Multiplier Using FPGA
Authors: Ms. Jangam SharanammaRoopa and Mr. J.Sunil Kumar
Abstract: The ever increasing applications of integrated circuits in the day-to-day useful electronic gadgets are the driving force for the development of low power designs of configurable hardware designs. High speed and low power are the main parameters that are targeted by modern circuit designers. Among the fastest increasing applications the audio and video signal processing applications are growing at a very high rate. Mobile applications have increased the technological improvements for digital signal processing applications. Multipliers are the very important logic operational unit of any processing unit in digital signal processing applications. The speed and performance of multiplier is among the efficiency improvement parameters of any digital hardware design. Another important feature of hardware designs is self-testing ability. In this proposed work radix 4 booth multiplier is designed and tested by using low power Built in self Test technique. The built-in-self test (BIST) feature helps in quick diagnosis of the hardware functional authenticity. The proposed design consumes less power, less device utilisation and delay factor compared to the radix 2 testing using BIST. RTL synthesis has been done by using Xilinx 14.7 and simulation is done by using Xilinx Isim. The proposed design is realized using Xilinx Tool using Verilog. A low power Test Pattern Generator (TPG) is involved in the design for self-test design realization.
Title: Optimized Implementation of Fir Filter Based on Reconfigurable MAC Unit
Authors: Ms. Shaik Jareena and Ms. B. Madhavi
Abstract: In Digital signal processing, Filter is used almost in all devices. Filters are used to extract the useful part from the input signal and the required part of the signal is reached to the receiver. For linear characteristics devices, FIR filter is used which is nothing but a combination of multiplier and adder. In this paper FIR filter has been designed by using a reconfigurable radix 4 Booth multiplier and Ripple Carry adder. Combination of radix 4 Booth multiplier and Ripple Carry adder makes FIR filter faster. RTL synthesis has been done by using Xilinx 14.7 and simulation is done by using Xilinx Isim. In this work we compare the Finite impulse response filter based on MAC unit consisting of Radix 4 booth multiplier with FIR filter which contains Vedic multiplier. By the proposed work of FIR filter with MAC unit we can get effective results in terms of Area, Delay, frequency, throughput aspects.
Title: Wireless Sensor Node based Patient Monitoring System (Survey)
Authors: Vinu Thomas
Abstract: Real time patient monitoring system has now become a necessity in this fast moving life of human being. Wireless sensor node based patient monitoring system is a type of real time patient monitoring system in which multiple patients are interconnected using a wireless communication medium so that at a time many patients can be monitored remotely. This system is developed using Internet of Things (IoT) technology. Many wireless communication technologies are available but among them Light Fidelity (LiFi) will be more reliable when patient care is considered. As in LiFi visible light is used for data transmission which is not at all hazardous for patients but Zigbee technology uses radio waves for data transmission which is harmful. The data rate of LiFi is considerably high when compared to Zigbee which have high impact on providing a quality health care management. LiFi is not much susceptible to interference compared to Zigbee therefore breakages in the data transmission won?t happen much which again is an important factor in health care management. There are many other advantages of LiFi over other technologies. The system is developed using Internet of Things (IoT) technology. Sensors are used to collect patient's physiological data. These data are then transmitted to the terminal user through gateway. Doctors or patient?s relative can view data through a user interface. In this survey paper, various real time patients monitoring system using different communication technologies has been compared and it?s found that LiFi outperforms other technologies.
Title: An Enhanced Top-K Approximate Queries for Continuous Document Streams
Authors: Rudra Harika and K Ramachandra Rao
Abstract: The effective handling of document streams assumes an important role in numerous data filtering systems. Developing applications, for example, news refresh sifting and informal organization warnings, request giving end-clients the most important substance to their inclinations. In this work, client preferences are shown by an of keywords. A focal server screens the record stream and persistently reports to every client the top-k archives that are most applicable to her passwords. Our goal is to help huge quantities of clients and high stream rates, while reviving the top-k results promptly. Our answer forsakes the customary recurrence requested ordering approach. Rather, it takes after an identifier-requesting worldview that suits better the idea of the issue. At the point when supplemented with a novel, locally versatile procedure, our technique offers (i) demonstrated optimality w.r.t. the quantity of considered questions per stream occasion, and (ii) a request of greatness shorter response time (i.e., time to refresh the query results) than the current state of the art.
Title: Fuzzy Distance of two Successive Distance of alphabet and word distance
Authors: Pharindra Kumar Sharma and Dr. Neeraj Sahu
Abstract: In this work, we evaluate the performance of voice identification through the hybrid distance method using alphabet distance and word distance. The Voice identification is an important task, which shows the active interaction of natural human-machine, for over last important two decades. The objective of this work, it is consists in working out an identification rate of voice identification. The proposed methodology presented allows evaluating the identification process which considers distance method, which is used distance of alphabet and distance of word. Words as ?Hello?, ?Left?, ?Right?, ?Up?, ?Down?, ?On?, ?Off?, ?Turn-on? and ?Turn-off? are used as parameters. The inputting voice is taken by microphone under the control condition in many cases but in few cases recorded voices are affected by noise. If input voice is noisy then there apply AUDACITY tools for removing. The PRAAT simulation tool calculated the all values for analysis.