-
Robust Face Recognition for Uncontrolled Environment
Dr.P.Latha ; N.Meffiya; Baby.D.Dayana
Computer science and engineering
Year: 2015, Volume:1, Issue : 9
Pages: 133 - 141
The aim of this project is face recognition from constraint environment. In this constraint environment various occlusion, different pose variation are exist. Robust Face recognition is needed today, for constrained environment because it used in ATM access, personal identification, Reliable face recognition system mainly depend upon method used for feature extraction and classification. The method used for feature extraction is Eigen Faces and also Sparse Representation based Classification is used .In this Sparse Representation based classification, l1 minimization algorithm is used. Sparse Representation based classification, represent the testing sample as the linear combination of all training sample B=AX, then classify the test sample by evaluating which class leads to minimum sparse representation error. This Sparse Representation based Classification gives best performance for constraint environment with 98% acceptance ratio. SRC based classification is robust to occlusion and gives high recognition rate.
Read More...
-
Less Known Ethnobotanical Uses of Maring Tribe of Manipur
Rita Nongmaithem ; Dr. Ajit Kumar Das
applied science
Year: 2015, Volume:1, Issue : 9
Pages: 142 - 144
The Maring are among the oldest tribes of Manipur. Their distinctive peculiarities of blacken teeth as part of their customs was believed to strengthen teeth and prevents tooth decay. Study conducted revealed the use of fruit of Melastoma malabathricum and Garcinia peduculata in the process. Melastoma malabathricum was also used by various tribes in curing different ailments like diarrhoea, dysentery, piles, leucorrhoea, skin infections, toothache etc. The present paper deals with the age-old traditional customs of Maring tribes which is getting rapidly wiped out because of cultural invasion of west. A detailed study with modern technological inputs will be helpful in developing noble drugs from this traditional knowledge.
Read More...
-
Comparison of Controllers For a Flow Process in a Conical Tank
M.Shehenaz Fathima ; A.Nazreen Banu; A.Nisha; S.Ramachandran
Instrumentation and Control Engineering
Year: 2015, Volume:1, Issue : 9
Pages: 145 - 148
The control of liquid is an essential process in process industries. But it is difficult to control a non-linear process. Conical tanks are being used in many industries due to its non-linear shape. So, level control of conical tank presents a challenging task due to its non-linearity and constantly changing cross-section. The aim of this paper is to provide suitable controllers for maintaining the level with flow as input parameter. The different controllers includes Proportional Integral Derivative controller (PID), Model Predictive Controller (MPC) and Internal Model Controller (IMC) which are simulated in Matlab environment.
Read More...
-
Data Accumulation using Sampled Dispersive Routes in Wireless Sensor Networks
D Saikumar ; P Srinivasan; T Karthikeyan; V Gokulnath
Computer Science and Engineering
Year: 2015, Volume:1, Issue : 9
Pages: 149 - 155
In large amount of sensor network, especially in case of data aggregation it should reduce the amount of communication and energy consumption. Recently, the research community has proposed a robust aggregation framework called synopsis diffusion which combines multipath routing schemes with duplicate-insensitive algorithms to accurately compute aggregates (e.g., predicate Count, Sum) in spite of message losses resulting from node and transmission failures. But these aggregation frameworks aggregation frameworks does not solve the problems which are appearing at base station side. These problems may occur due to the irrespective of the network size, the per node communication over-head. In this paper, we make the synopsis diffusion approach secure against attacks in which compromised nodes contribute false sub aggregate values. In particular, we present a novel lightweight verification algorithm by which the base station can determine if the computed aggregate (predicate Count or Sum) includes any false contribution. In this paper, we study the compromised-node and denial-of-service is the two key attacks in wireless sensor networks. We argue that multipath routing approaches are highly vulnerable to such attacks. So, for these attacks we develop the mechanisms that generate randomized multipath routes. Under our designs, the routes taken by the shares of different packets change over time. So, we analytically investigate the security and energy performance of proposed schemes.
Read More...
-
Proficient System for Feature Subset Selection in High Dimensional Data
V.Thirumani Thangam ; P.Senthil Kumari
Computer science and engineering
Year: 2015, Volume:1, Issue : 9
Pages: 156 - 163
Feature selection is widely used in preparing high-dimensional data for effective data mining. Getting fast popularity in the social media dataset presents new challenges for feature selection. Web search media data consists of traditional high- dimensional, attribute-value data such as posts, tweets, comments, and images and linked data. The FAST algorithm applies to on data set and produces smaller subsets of features and also improves the accuracy. The FAST not only produces smaller subsets of features but also improves the performances of the process. Experimental results show that our FAST algorithm implementation can run faster and obtain better-extracted features than other methods.
Read More...
-
Survey Based on Secure Authorized De duplication Hybrid Cloud Approach
N.Backialakshmi ; M.Manikandan
Computer Science And Engineering
Year: 2015, Volume:1, Issue : 9
Pages: 164 - 166
Data de-duplication is one of important data compression techniques for eliminating duplicate copies of repeating data, used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the confidentiality of sensitive data while supporting de-duplication, the convergent encryption technique has been proposed to encrypt the data before outsourcing. To protect data security, it makes the first attempt to formally address the problem of authorized data de-duplication.
Read More...
-
Thermoelectric Solar Refrigerator
Sandip Kumar Singh ; Arvind Kumar
Mechanical Engineering
Year: 2015, Volume:1, Issue : 9
Pages: 167 - 170
Solar energy is one of the most well-known green sources of energy. Solar absorption refrigeration systems increasingly attract research interests. The performance of the refrigerator was simulated using Mat lab under varying operating conditions. The system consisted of the refrigeration chamber, thermoelectric modules, heat source and heat sink. When two conductors are placed in electric contact, electrons flow out of the one in which the electrons are less bound, into the one where the electrons are more bound. The performance of thermoelectric solar refrigerator was simulated using Mat lab under varying operating conditions. The system consisted of the thermoelectric solar refrigeration chamber, thermoelectric modules, heat source and heat sink. Results show that the coefficient of performance (C.O.P) which is a criterion of performance of such device is a function of the temperature between the source and sink.
Read More...
-
Pecking Order Hash -- A New Hashing Algorithm
Siva Srinivasa Rao Mothukuri
Computer Science (Security)
Year: 2015, Volume:1, Issue : 9
Pages: 171 - 175
Since the data is present in digital form, security is a major assert and aspect that need to be considered in present activities. However, several incidents show us how security has compromised leading to theft/loss of data like credit card numbers and passwords. Having profound knowledge about passwords alone doesn't make strong security. Saving the pass-phrase on the server matters a lot. If this fails, leads to failure of entire system. This paper introduces a new hashing algorithm which uses levels of hierarchy and turns strong when it is used along with other hashing algorithms.
Read More...
-
Wind Power Plant Monitoring using labview Through Myrio
K. Sujitha ; R. Gopalakrishnan; J. Nancy Amala Geetha; R. Kalaiyarasi
power plant
Year: 2015, Volume:1, Issue : 9
Pages: 176 - 179
In this paper we considered wind as a source of energy because it is a natural, renewable and available abundantly, does not have harmful effects on living beings. We measure the voltage produced by the wind mill, speed of the wind and temperature through my-RIO as an interface. There variables are acquired and monitored using Lab VIEW. We decided to determine the efficiency with these parameters. Here my-RIO serves as an interface between the windmill and pc.
Read More...
-
Fusion Algorithms for Images based on Principal Component Analysis and Discrete Wavelet transform
Krupa Patel
Electronics & Communication Engineering
Year: 2015, Volume:1, Issue : 9
Pages: 180 - 182
Extensive research has been done in the field of image fusion. Image fusion is formation of appropriate information from two or more images into a single fused image. As a consequence the final resultant image will carry more information as compared to the input images. Thus purpose of image fusion algorithm is to take redundant and complementary information from the source images and to generate an output image with better visual quality. This paper presents a review on some of the image fusion techniques like Principal component analysis (PCA) based fusion, Discrete wavelet transforms (DWT) and Curvelet transforms.
Read More...