Call for paper January 2016.

Girl Image         

 

 

 

  Text

Volume 3 Issue 12

 

 

S.No
Article Title & Author Name
Page
1.
A Study of Significant Software Metrics
Neha Saini, Sapna Kharwar, Anushree Agrawal

Abstract: A software system continues to grow in size and complexity, it becomes increasing difficult to understand and manage. Software metrics are units of software measurement. As improvement in coding tools allow software developer to produce larger amount of software to meet ever expanding requirements. A method to measure software product, process and project must be used. In this article, we first introduce the software metrics including the definition of metrics and the history of this field. We aim at a comprehensive survey of the metrics available for measuring attributes related to software entities. Some classical metrics such as Lines of codes LOC, Halstead complexity metric (HCM), Function Point analysis and others are discussed and analyzed. Then we bring up the complexity metrics methods, such as McCabe complexity metrics and object oriented metrics(C&K method), with real world examples. The comparison and relationship of these metrics are also presented.
Keyword And Phrases: Software metrics, software measurement scales, Function points, software attributes, categories of metrics, metrics for measuring internal attributes, software complexity.
Refer this Research Paper(copy & paste below code)
Neha Saini, Sapna Kharwar, Anushree Agrawal - A Study of Significant Software Metrics - published at: "International Journal of Engineering Inventions, Volume 3, Issue 12, July 2014 Edition".
01-07
2.
Foundation on Layered Soil under Torsional Harmonic Vibration using Cone model
S. N. Swar, P. K. Pradhan

Abstract: This paper presents the analytical solution based cone model for machine foundation vibration analysis on layered soil. Impedance functions for a rigid massless circular foundation resting on layered soil underlain by rigid base subjected to torsional harmonic excitation are found using cone model. One-dimensional wave propagation in cones, based on the strength of material approach is used in computing dynamic stiffness and damping coefficients. Using the above coefficients the frequency –amplitude response of massive foundations are computed varying widely the influencing parameters such as, depth of the layer, material damping ratio and Poisson's ratio. The results are presented in the form of dimensionless graphs which may be useful for practicing engineers.
Keywords: Cone model, Dynamic impedance, Circular foundation, one-dimensional wave propagation, Foundation vibration.
Refer this Research Paper(copy & paste below code)
S. N. Swar, P. K. Pradhan- Foundation on Layered Soil under Torsional Harmonic Vibration using Cone model - published at: "International Journal of Engineering Inventions, Volume 3, Issue 12, July 2014 Edition".
08-17
3.
Finite Element Analysis of Concrete Filled Steel Tube (CFT's) Subjected to Flexure
Vijay laxmi B. V., Manoj Kumar Chitawadagi

Abstract: This paper presents a study on flexural behaviour of concrete filled steel tube based on the former work carried out by Manojkumar. An ANSYS model is developed that can predict the behaviour of concrete filled steel tube to determine moment carrying capacity at ultimate point for beam Concrete filled steel tube beams are studied and verified by the finite element program ANSYS against experimental data. The Main parameters affecting the behaviour and strength of concrete filled beams are geometrical parameters, material nonlinearities, loading, boundary conditions and degree of concrete confinement. To account for all these properties ANSYS model is developed. The main parameters varied in analysis study are D/t ratio, characteristic strength of infilled concrete. The proposed model predicts ultimate moment capacity for CFT beams. In the numerical analysis, circular and rectangular CFT cross sections are considered using different grades of concrete. The predicted values are compared with experimental results. Numerical analysis has shown that for rectangular CFT's a good confining effect can be provided. Moment capacity results obtained from the ANSYS model are compared with the values predicted by Lin Han (2004) and different codes such as AISC-LRFD (1999) and EC4 (1994).
Keywords: Concrete filled steel tubes, beams, circular tubes, rectangular tubes, composite section, ultimate moment capacity, finite element analysis (FEA) and two-point load.
Refer this Research Paper(copy & paste below code)
Vijay laxmi B. V., Manoj Kumar Chitawadagi- Finite Element Analysis of Concrete Filled Steel Tube (CFT's) Subjected to Flexure - published at: "International Journal of Engineering Inventions, Volume 3, Issue 12, July 2014 Edition".
18-28
4.
Single-Phase Heat Transfer and Pressure Drop In the Micro-Fin Tube with Coiled Wire Insert
R. S. Lavate, A. M. Patil, N. V. Deshpande

Abstract: The heat transfer duty or thermal performance of heat exchangers can be improved by heat transfer enhancement techniques. Coiled wire insert has been used as one of the passive heat transfer enhancement techniques and are the most widely used tubes in several heat transfer applications, for example, heat recovery processes, air conditioning and refrigeration systems, chemical reactors, food and dairy processes, Thermal Power plants, radiators for space vehicles, automobiles etc. These techniques broadly are of three types viz. passive, active and compound techniques. The present paper is a review of the passive augmentation techniques used in the recent past.
Keywords: coiled wire insert, Heat transfer augmentation technique, Micro fin tube, Passive methods.
Refer this Research Paper(copy & paste below code)
R. S. Lavate, A. M. Patil, N. V. Deshpande- Single-Phase Heat Transfer and Pressure Drop In the Micro-Fin Tube with Coiled Wire Insert - published at: "International Journal of Engineering Inventions, Volume 3, Issue 12, July 2014 Edition".
29-33
5.
Positive perception of Weather Index Based Insurance scheme in Karnataka –A case study of Cotton crop
Mahadevaswamy.M, Dr. G.Kotreshwar

Abstract: Lot of factors, ranging from climate variability, frequent natural disasters, uncertainties in yields and prices, weak rural infrastructure, imperfect markets and lack of financial services including limited span and design of risk mitigation instruments such as credit and insurance have affected Indian agriculture which in turn has affected the farmer's livelihood and incomes in India. In order to avoid the agriculture risks government and private insurance company are introducing varieties of insurance scheme. These schemes will reduce the financial loss occurred through weather vagaries in agriculture sectors. In the present day's insurance can be divided into two categories namely Crop insurance and weather index based insurance. The present article mainly focuses on impact assessment of weather index based insurance in Karnataka. The primary data was collected through random questionnaire and the secondary data regarding weather index based insurance of five districts namely Chitradurga, Dharwad, Shimog, Davangere and Tumkur were collected from Agriculture Insurance Company of India Limited. Comparative study was made between these data to know the impact of WIBI on cotton farmers. It was observed that cotton farmers in Chitradurga, Dharwad, Shimog, and Davangere, districts show more positive perception than Tumkur district.
Refer this Research Paper(copy & paste below code)
Mahadevaswamy.M, Dr. G.Kotreshwar- Positive perception of Weather Index Based Insurance scheme in Karnataka –A case study of Cotton crop - published at: "International Journal of Engineering Inventions, Volume 3, Issue 12, July 2014 Edition".
34-40
6.
Distributed Web System Performance Improving Forecasting Accuracy
Shraddha B. Rahane, Dr. Sanjay T. Singh

Abstract: Recently with the increasing development of distributed computer systems (DCSs) in networked industrial and manufacturing applications on the World Wide Web (WWW) platform, including service-oriented architecture and Web of Things QoS-aware systems, it has become important to predict the Web performance. In this paper, we present Web performance prediction in time by making a forecast of a Web resource downloading using the Efficient Turning Bands (TB) geostatistical simulation method. Real-life data for the research were obtained from our own website named "Distributed forecasting system". Generation of log file form website and performing monitoring of a group of Web clients from connected LAN. For better web prediction we used spatio temporal prediction method with time utility for downloading particular file from website and calculate forecasting result using Turning bands method but improving more forecasting accuracy use the efficient turning band method basically efficient turning band use Naive bays algorithm and calculate efficient result and that result is compared with Turning band and efficient turning band method. The efficient turning band method result show good forecasting quality of Web performance prediction and forecasting.
Keywords: Distributed Computer System, Turning Band,, Qos-Aware Systems, Geostatistics, Spatio-Temporal Prediction.
Refer this Research Paper(copy & paste below code)
Shraddha B. Rahane, Dr. Sanjay T. Singh- Distributed Web System Performance Improving Forecasting Accuracy - published at: "International Journal of Engineering Inventions, Volume 3, Issue 12, July 2014 Edition".
41-48
7.
Improved Map reduce Framework using High Utility Transactional Databases
Arati W. Borkar , Dr. Sanjay T. Singh

Abstract: Mining high utility itemsets from transactional information refers to the invention of itemsets with high utility like profits. Though varieties of relevant algorithms are planned in recent years, they incur the matter of manufacturing an oversized range of candidate itemsets for prime utility itemsets. Such an oversized range of candidate itemsets degrades the mining performance in terms of execution time and house demand. The case might deteriorate once the information contains ample long transactions or long high utility itemsets. During this paper, we have a tendency to propose two algorithms, particularly utility pattern growth (UP-Growth) and UP-Growth+, for mining high utility itemsets with a collection of effective methods for pruning candidate itemsets. the data of high utility itemsets is maintained in an exceedingly tree-based system named utility pattern tree (UP-Tree) such candidate itemsets will be generated with efficiency with solely 2 scans of information. The performance of UP-Growth and UP-Growth+ is compared with the progressive algorithms on many varieties of each real and artificial information sets. Experimental results show that the planned algorithms, particularly UP Growth+, not solely scale back the quantity of candidates effectively however conjointly exceed different algorithms considerably in terms of runtime, particularly once databases contain ample long transactions. In this project we are presenting new approach which is extending these algorithms to overcome the limitations using the MapReduce framework on Hadoop.
Keywords: Dataset Mining, Hadoop, Itemsets, MapReduce Framework, Transactional Dataset, UP-Growth, UP-Growth+.
Refer this Research Paper(copy & paste below code)
Arati W. Borkar, Dr. Sanjay T. Singh- Improved Map reduce Framework using High Utility Transactional Databases - published at: "International Journal of Engineering Inventions, Volume 3, Issue 12, July 2014 Edition".
49-55
8.
Multiflow Model for Routing and Policing Traffic in Infocommunication Network
Dr. Mohammed Khodayer Hassan

Abstract: Thus the article offers the model represented by algebraic equations and inequalities for routing and policing traffic in infocommunication network. The novelty of the model is as follows: multiflow nature of modern ICN is taken into account (1), i.е. a set of flows circling between different pairs of network routers are considered simultaneously; coherent formalization of processes of traffic routing and policing within the model that has lower dimensionality in comparison to known earlier is provided; the choice of optimality criterion, use of which allows to implement multipath routing with consequent inclusion of paths as well as to organize limitation of flow intensity on all the used routs simultaneously depending on their characteristics and flow priority. According to the results of the analysis conducted we offer recommendations for choosing relation in numerical values of routing metrics and service denial regarding the provision of the given values for the main QoS characteristics, e.g. average packet delay. The model can be used as a basis for perspective protocol decisions aimed at coherence of solutions for the tasks of traffic routing and policing. Further development of the given model is possible under full account of stochastic characteristics of packet flows circling in the network.
Keywords: Model; Routing, Traffic, Flow, Priority, Quality of Service, Network.
Refer this Research Paper(copy & paste below code)
Dr. Mohammed Khodayer Hassan- Multiflow Model for Routing and Policing Traffic in Infocommunication Network - published at: "International Journal of Engineering Inventions, Volume 3, Issue 12, July 2014 Edition".
56-59
9.
Data attribute security and privacy in Collaborative distributed database Publishing
Ms. Pragati J. Mokadam, Dr. S.T.Singh

Abstract: In this era, there are need to secure data in distributed database system. For collaborative data publishing some anonymization techniques are available such as generalization and bucketization. We consider the attack can call as "insider attack" by colluding data providers who may use their own records to infer others records. To protect our database from these types of attacks we used slicing technique for anonymization, as above techniques are not suitable for high dimensional data. It cause loss of data and also they need clear separation of quasi identifier and sensitive database. We consider this threat and make several contributions. First, we introduce a notion of data privacy and used slicing technique which shows that anonymized data satisfies privacy and security of data which classifies data vertically and horizontally. Second, we present verification algorithms which prove the security against number of providers of data and insure high utility and data privacy of anonymized data with efficiency. For experimental result we use the hospital patient datasets and suggest that our slicing approach achieves better or comparable utility and efficiency than baseline algorithms while satisfying data security. Our experiment successfully demonstrates the difference between computation time of encryption algorithm which is used to secure data and our system.
Keywords: Distributed database, privacy, protection, security, SMC, TTP.
Refer this Research Paper(copy & paste below code)
Ms. Pragati J. Mokadam, Dr. S.T.Singh- Data attribute security and privacy in Collaborative distributed database Publishing - published at: "International Journal of Engineering Inventions, Volume 3, Issue 12, July 2014 Edition".
60-65
10.
Information Withdrawal Applications in Healthcare
Dr.Nanda kumar, Mr.Mahesh kumar reddy, Mr.U.Mahender

Abstract: In this paper, we have centered to look at an assortment of procedures, methodologies and distinctive instruments and its effect on the human services division. The objective of information mining application is to turn that information are truths, numbers, or content which can be handled by a PC into learning or data. The fundamental motivation behind information mining application in medicinal services frameworks is to build up a robotized instrument for distinguishing and dispersing significant human services data. This paper intends to make a definite study report of various sorts of information mining applications in the social insurance segment and to lessen the intricacy of the investigation of the medicinal services information exchanges. Likewise introduces a relative investigation of various information mining applications, strategies and diverse approachs connected for removing learning from database produced in the human services industry. At long last, the current information mining systems with information mining calculations and its application apparatuses which are more important for social insurance administrations are talked about in point of interest.
Keywords: Data Mining, Knowledge Discovery Database, In-Vitro Fertilization (IVF), Artificial Neural Network, WEKA, NCC2P.
Refer this Research Paper(copy & paste below code)
Dr.Nanda kumar, Mr.Mahesh kumar reddy, Mr.U.Mahender- Information Withdrawal Applications in Healthcare - published at: "International Journal of Engineering Inventions, Volume 3, Issue 12, July 2014 Edition".
66-71
11.
A Research Oriented Study On Waste Heat Recovery System In An Ic Engine
Prof.K.Harinarayana, A.Mahesh Babu , Y.Bhargavi

Abstract: In a conventional IC engine a considerable heat is carried away by exhaust gases. To recover the waste heat, various methods are being adopted. One of them is turbo charging. In this project an attempt has been made to explore the various possibilities of waste heat / energy recovery methods in conventional commercial two wheeler and four wheelers. In this context, a new concept of hybrid engine has also been discussed. The heat energy contained in the exhaust gases are recovered in three different methodologies. Firstly, by introducing an auxiliary combustion chamber and injecting an additional suitable fuel and then allowing it to expand in a turbine which forms the part of turbo charger unit. Thus the waste heat energy is utilized to burn an additional amount of fuel. The second stage contains a thermoelectric generator which produces electrical energy by utilizing the high heat of exhaust gases. The third stage energy recovery is done by coupling a compressor and an alternator. Both being coupled to the turbine shaft, produces electrical energy and compressed air which can be accumulated and used effectively for running any auto auxiliaries. Thus the principle of electro turbo generation has been adopted for waste heat recovery In order to use the aforesaid combination of waste energy recovery systems a matrix has also been suggested.
Refer this Research Paper(copy & paste below code)
Prof.K.Harinarayana, A.Mahesh Babu , Y.Bhargavi - A Research Oriented Study On Waste Heat Recovery System In An Ic Engine - published at: "International Journal of Engineering Inventions, Volume 3, Issue 12, July 2014 Edition".
72-76
12.
Practical Analysis Of Turbulent Flow In A Pipe Using Computational Fluid Dynamics
V.RajaKiranKumar, Dr.H.N.Suresh Kumar, Ch.Kiran Kumar

Abstract: This paper presents computational investigation of turbulent flow inside a pipe. In this paper, a computational fluid dynamics (CFD) model of fully developed turbulent flow in a pipe is implemented with the help of ANSYS FLUENT 12.0 software and the variation of axial velocity and skin friction coefficient along the length of pipe is analysed. The fluids used for this purpose are air and water. The results obtained computationally are found in well agreement with the results obtained analytically
Keywords: ANSYS FLUENT 12.0, Fully developed flow, Grid, Boundary layer, GAMBIT
Refer this Research Paper(copy & paste below code)
V.RajaKiranKumar, Dr.H.N.Suresh Kumar, Ch.Kiran Kumar- Practical Analysis Of Turbulent Flow In A Pipe Using Computational Fluid Dynamics - published at: "International Journal of Engineering Inventions, Volume 3, Issue 12, July 2014 Edition".
77-81
13.
Flexure Bearing Optimisation for Linear Compressor
Dr.K.R.Vijaya Kumar, G.V.Punna Rao , D.Harinatha Reddy

Abstract: Flexure bearing is a new concept and used for precision applications such as Programmable focusing mechanism (PFM), linear compressor etc. These bearings are compact and inexpensive. A flexure bearing is designed for specific applications. These design can usually be done with the advanced design tool like FEA. With the advent of computers FEA has become the most suitable tool for the engineering analysis where the conventional approach is not suitable, geometric complexity are involved etc. This paper deals with the study of flexure bearings in linear compressor and makes FEA analysis on it to calculate equivalent stress and tries to optimize it. Using software's like CATIA and PROE ,modeling of flexure bearing is done. Also make FEM analysis on it by using Ansys software. Gaunekar have made design calculation for flexure bearing to make appropriate model. This bearing contains three spiral slots having 120° apart and 12 peripheral holes are used to clamp the disc rigidly onto a support structure. One central hole made for movement of shaft..
Keywords: Flexure bearing, CATIA model for flexure bearing, Spiral angle, Equivalent stress, FEA analysis.
Refer this Research Paper(copy & paste below code)
Dr.K.R.Vijaya Kumar, G.V.Punna Rao , D.Harinatha Reddy- Flexure Bearing Optimisation for Linear Compressor - published at: "International Journal of Engineering Inventions, Volume 3, Issue 12, July 2014 Edition".
82-90
14.
Malware vulnerabilities in Mobile OS: Risk and Exploitation
V. Krishna, K. Srinivas, J S V R S Sastry

Abstract:In this research paper, we are presenting the malware practices in Mobile OS. Discussing the related work to find the risk and attack threats available for Mobile Operating System. A framework has been discussed which help in Malware Detection through rule based, Knowledge based system. Keywords: Malware, Security, Risk, Operating System.
Refer this Research Paper(copy & paste below code)
V. Krishna, K. Srinivas, J S V R S Sastry- Malware vulnerabilities in Mobile OS: Risk and Exploitation - published at: "International Journal of Engineering Inventions, Volume 3, Issue 12, July 2014 Edition".
91-94
15.
Embedded Technology for vehicle cabin safety Monitoring and Alerting System
Dr sandeipan p narote, P Bramheswar rao, L Ramesh

Abstract:Motor vehicles are the prime source of transportation where vehicles with A/C play a major part. This paper designs an embedded system for a vehicle cabin, which senses the gases like carbon-monoxide and oxygen and displayed at each and every second. If the level of the CO increases than the normal level (30ppm) or the level of the oxygen decreases than the normal level (19%) then an alarm is generated automatically and also ventilation is provided immediately. A warning message is sent to the authorized user via GSM. The advantage of this system is proper detection and faster response time leading to faster diffusion of the situation, compared with the manual methods.
Refer this Research Paper(copy & paste below code)
Dr sandeipan p narote, P Bramheswar rao, L Ramesh- Embedded Technology for vehicle cabin safety Monitoring and Alerting System - published at: "International Journal of Engineering Inventions, Volume 3, Issue 12, July 2014 Edition".
95-97
16.
Image Watermarking Based on 5/3 Wavelet Decomposition and Turbo-Code
T maheshwar, M Paparao, V shiva

Abstract:This paper is an attempt to describe a new scheme of image watermarking based on 5/3 wavelet decomposition and turbo-code. This new watermarking algorithm based on embedding mark (signature) in the multi-resolution field. For the purpose of increasing the image watermarking robustness against attacks of an image transmission, we encode with a turbo code an image-embedded mark. This new scheme of image watermarking is able to embed 2000 bits in medical images. Results of experiments carried out on a database of 30 - 256×256 pixel - sized medical images show that watermarks are robust to Noises, Filter attacks and JPEG Compression. Results demonstrate that fidelity can be improved by incorporating turbo code- coding mark that is shaped into the embedding process. Other advantages of our embedding process are to preserve intellectual features and to secure the mark in the image. The image degradation is measured by Relative Peak Signal to Noise Ratio (RPSNR). Experimental results show that this unit of measurement is the best distortion metric which is correlated with Human Visual System (HVS); and therefore more suitable for digital watermarking.
Refer this Research Paper(copy & paste below code)
T maheshwar, M Paparao, V shiva - Image Watermarking Based on 5/3 Wavelet Decomposition and Turbo-Code - published at: "International Journal of Engineering Inventions, Volume 3, Issue 12, July 2014 Edition".
98-104
17.
32-bit ALU with Sleep Mode for Leakage Power Reduction
Shanti, A Rama, Ch. Sheker

Abstract:The work in this project is an attempt to design a 32-bit ALU circuit with sleep mode to reduce leakage power consumption in the circuit. The project uses a local sleep transistors network to achieve sleep mode. During sleep mode, power savings of about 99% in Dynamic power and in Leakage power have been observed. A modified circuit with constant inputs to combinational logic has been experimented and further reduction in leakage and short circuit currents can be observed
Refer this Research Paper(copy & paste below code)
Shanti, A Rama, Ch. Sheker - 32-bit ALU with Sleep Mode for Leakage Power Reduction - published at: "International Journal of Engineering Inventions, Volume 3, Issue 12, July 2014 Edition".
105-110
18.
Implementation of SHA-1 Algorithm on FPGA
Mukaramudin, D Narendara chari, L raja

Abstract:SHA (Secure Hash Algorithm) is famous message compress standard used in computer cryptography, it can compress a long message to become a short message abstract. The algorithm can be used in many Secure Algorithm, especially for DSS. In this paper, the improved version SHA-1 is implemented and analysed. It is then improved and implemented in Verilog and FPGA. Xilinx is used to compile and generate the function modules, RTL level description circuit and simulated waveform. RTL level description is the circuit connection in FPGA chip. It shows the connection of the modules. Simulated waveform shows us the timing and the function of the SHA-1 module. SHA-1 module that designed in this paper used less memory units and logic elements. It can be used in DSA or any protocols or secure algorithm.
Refer this Research Paper(copy & paste below code)
Mukaramudin, D Narendara chari, L raja - Implementation of SHA-1 Algorithm on FPGA - published at: "International Journal of Engineering Inventions, Volume 3, Issue 12, July 2014 Edition".
111-115
19.
Effect of EBG Presence on Elliptical Patch Antenna
T maheshwar, ch shekar, p aruna

Abstract:The Paper demonstrates the design and performance of Elliptical Patch antenna in presence of EBG structure at one of its sides and its performance is compared with conventional type under similar design conditions. Here the designed Elliptical Patch antenna has a major radius 4 and ratio 30. And EBG designed as single layer of one array of patches for EBG and having 0.5cm pillar height patch size of 2cm side length square shape patches with 0.2cm gap. Conventional antenna operated at a frequency of 2.6608GHz and in presence of EBG it works at 2.6683GHz Frequency and the comparative analysis is illustrated in this paper.
Refer this Research Paper(copy & paste below code)
T maheshwar, ch shekar, p aruna - Effect of EBG Presence on Elliptical Patch Antenna - published at: "International Journal of Engineering Inventions, Volume 3, Issue 12, July 2014 Edition".
116-118

 

 

Journal Section
Author Section
Reader Section
Follow Us