Call for paper April 2016.

Girl Image

 

 

 

           Text

Volume 4 Issue 6

 

 

S.No
Article Title & Author Name
Page
1.
New Electro-Optic Properties of Polysiloxane Liquid Crystals
Khalid Al.Ammar || Sura Al.Asadi

Abstract: This review focuses on recent developments in the chemistry of side chain liquid crystal polymers. It concentrates on current trends in synthetic methods and novel,well defined structures, supramolecular arrangements, properties, and applications. A series of siloxane based side chain liquid crystal polymers have been prepared with asystematic variation in spacer length.Nematic liquid crystal polymers possess large optical nonlinearities owing to their large refractive index anisotropy coupled with the collective molecular reorientation. All the polymer exhibited a smectic phase, for which the Nematic-isotropic transition temperature increased as the spacer length increased. Electro-optic measurements are used to evaluate the threshold voltages for this series of polymers. It is found that with increasing spacer length (n) of polymer the threshold voltage is lowered and that the variation of the threshold voltage arises from changes to the intrinsic curvature elasticity rather than to differences in orientational order. A simple model is used to indicate the origion of the effects observed which appear to arise from the constraints offered by the coupling of the mesogenic units to the polymer backbone.
Keywords: The spacer length polysiloxane, liquid crystal polymers, electro – optic properties.
Refer this Research Paper(copy & paste below code)
Khalid Al.Ammar, Sura Al.Asadi - New Electro-Optic Properties of Polysiloxane Liquid Crystals - published at: "International Journal of Engineering Inventions, Volume 4, Issue 6, November 2014 Edition".
01-08
2.
Hadoop Job Runner UI Tool
Deepu Sojan || Mr. Sujith kumar P. S.

Abstract: To do research on Hadoop in virtual environment, an experimental environment is needed. This paper firstly introduces some technologies used such as Distributed environment and Map Reduce. Based on that, a method to deploy Distributed environment is given. Then we discuss how to deploy Hadoop in virtual machines which can be obtained from network by some means, then an algorithm to solve the problem that all the virtual machines which are created by distributed environment. After that we run some Hadoop programs under the cluster. Important part of this project is focussed on the Hadoop Job Runner UI Tool. This application can perform all most every job that's normally works in command mode. Basic concepts behind this application are makes Hadoop job running easy. You can browse the input data from local. Application Copies the input file to HDFS. Copies the selected class to be executed to remote server. Run the job. Copy the result from HDFS to local. Display the Result and job statistics once completed.
Refer this Research Paper(copy & paste below code)
Deepu Sojan, Mr. Sujith kumar P. S. - Hadoop Job Runner UI Tool - published at: "International Journal of Engineering Inventions, Volume 4, Issue 6, November 2014 Edition".
09-18
3.
Algebraic Approach to Prove Non-Coplanarity of K9
Sanjib Kr. Kuila

Abstract: It was proved by several mathematicians in the midst of last century, almost simultaneously, that the complete graph on nine vertices is not biplanar. A new proof of this theorem has been described in this article. Here, the concept of a mapping from a bipartite subgraph on six vertices of minimal lower coplanar graph to disjoint pairs of triangle in the corresponding coplanar triangulation is utilized.
Keywords: Coplanar Graph, Triangulation, Minimal Lower Coplanar, Kn, Km,n
Refer this Research Paper(copy & paste below code)
Sanjib Kr. Kuila - Algebraic Approach to Prove Non-Coplanarity of K9 - published at: "International Journal of Engineering Inventions, Volume 4, Issue 6, November 2014 Edition".
19-23
4.
Applying Semantic Web Technologies to Services of e-learning System
Anas Ali Ballah Ali || Alwalid Bashier Gism Elseed Ahmed || Awad Alkarim Moh. Yousif

Abstract: Supercapacitors or EDLCs (i.e. electric double-layer capacitors) or ultra-capacitors are becoming increasingly popular as alternatives for the conventional and traditional battery sources. This brief overview focuses on the different types of supercapacitors, the relevant quantitative modeling areas and the future of supercapacitor research and development. Supercapacitors may emerge as the solution for many application-specific power systems. Especially, there has been great interest in developing supercapacitors for electric vehicle hybrid power systems, pulse power applications, as well as back-up and emergency power supplies. Because of their flexibility, however, supercapacitors can be adapted to serve in roles for which electrochemical batteries are not as well suited. Also, supercapacitors have some intrinsic characteristics that make them ideally suited to specialized roles and applications that complement the strengths of batteries. In particular, supercapacitors have great potential for applications that require a combination of high power, short charging time, high cycling stability and long shelf life. So, let's just begin the innovative journey of these near future of life-long batteries that can charge up almost anything and everything within a few seconds!
Refer this Research Paper(copy & paste below code)
Anas Ali Ballah Ali, Alwalid Bashier Gism Elseed Ahmed, Awad Alkarim Moh. Yousif - Applying Semantic Web Technologies to Services of e-learning System - published at: "International Journal of Engineering Inventions, Volume 4, Issue 6, November 2014 Edition".
24-38
5.
On the Analysis of the Finite Element Solutions of Boundary Value Problems Using Gale kin Method
Emenogu N. George || Oko Nlia || Okereke R. Ngozi

Abstract: The finite difference method can be considered as a direct discretization of differential equations but in finite element methods, we generate difference equations by using approximate methods with piecewise polynomial solution. In this paper, we use the Galerkin method to obtain the approximate solution of a boundary value problem. The convergence analysis of these solution are also considered.
Refer this Research Paper(copy & paste below code)
Emenogu N. George, Oko Nlia, Okereke R. Ngozi - On the Analysis of the Finite Element Solutions of Boundary Value Problems Using Gale kin Method - published at: "International Journal of Engineering Inventions, Volume 4, Issue 6, November 2014 Edition".
39-43
6.
Gain scheduling automatic landing system by modeling Ground Effect
Caterina Grillo || Fernando Montano

Abstract: Taking ground effect into account a longitudinal automatic landing system is designed. Such a system will be tested and implemented on board by using the Preceptor N3 Ultrapup aircraft which is used as technological demonstrator of new control navigation and guidance algorithms in the context of the "Research Project of National Interest" (PRIN 2008) by the Universities of Bologna, Palermo, Ferrara and the Second University of Naples. A general mathematical model of the studied aircraft has been built to obtain non–linear analytical equations for aerodynamic coefficients both Out of Ground Effect and In Ground Effect. To cope with the strong variations of aerodynamic coefficients In Ground Effect a modified gain scheduling approach has been employed for the synthesis of the controller by using six State Space Models. Stability and control matrices have been evaluated by linearization of the obtained aerodynamic coefficients. To achieve a simple structure of the control system, an original landing geometry has been chosen, therefore it has been imposed to control the same state variables during both the glide path and the flare.
Keywords: Automatic landing, gain scheduling, ground effect, UAS.
Refer this Research Paper(copy & paste below code)
Caterina Grillo, Fernando Montano - Gain scheduling automatic landing system by modeling Ground Effect - published at: "International Journal of Engineering Inventions, Volume 4, Issue 6, November 2014 Edition".
44-51
7.
Sustainable Transportation Strategies for Nagpur City
Pallavi D. Dhawad || Prof. S. D. Ghodmare

Abstract: The present study has been undertaken to evaluate the delay caused to the traffic of Nagpur city and thus to implement the different strategies to reduce delay to the traffic. The existing signal timings causing delay to the traffic which can be reduce to some extent by changing the pattern of signal timings. Later the work continues with the factor of vehicle emission which can be decrease automatically if the delay reduces. Thus the signal timing data and volume data during peak hour were collected from different Junctions of , Nagpur. After work on simulation, it was found that the delay to the traffic and is reduced by some percent. Thus change in signal timing proves to be one of the strategy that can be implement in Nagpur city.
Keywords: Sustainability, Strategies, signal timing, delay, Fuel emission.
Refer this Research Paper(copy & paste below code)
Pallavi D. Dhawad, Prof. S. D. Ghodmare - Sustainable Transportation Strategies for Nagpur City - published at: "International Journal of Engineering Inventions, Volume 4, Issue 6, November 2014 Edition".
52-55
8.
Frequent Temporal Patterns Mining With Relative Intervals
Prof. GVNKV SUBBA RAO, Prof.Md. SAMEERUDDHIN KHAN, M. VENKAT REDDY

Abstract: In this paper we have focused on the matter of discovering frequent temporal patterns in the database which contains temporal sequences, wherever a temporal sequence could be a set of things with associated dates as well as durations. Since the quantitative temporal info seems to be elementary in several contexts, it's taken under consideration within the mining processes and came back as a part of the extracted data. For this task we've got tailored the classical A Priori framework to propose an effective algorithmic rule supported by a hyper-cube illustration of temporal sequences. The extraction of quantitative temporal info is performed by employing a density estimation of the distribution of event intervals from the temporal sequences. Analyzing information sets shows that the projected algorithmic rule will robustly extract frequent temporal patterns with quantitative temporal extents. Keywords: Temporal Patterns, A priori framework, hyper-cube representation
Refer this Research Paper(copy & paste below code)
Prof. GVNKV SUBBA RAO, Prof.Md. SAMEERUDDHIN KHAN, M. VENKAT REDDY - Frequent Temporal Patterns Mining With Relative Intervals - published at: "International Journal of Engineering Inventions, Volume 4, Issue 6, November 2014 Edition".
56-59
9.
Semantic Analysis and Representation of Medical Images using Hybrid Watershed algorithm
Dr.Pandarinath Potluri, P.Prashant Kumar, Muneer Ahmed

Abstract: In this paper, a learning approach coupling region based and content based image processing is presented for Semantic image analysis in medical domain. Explicitly defined domain knowledge under the proposed approach includes objects of the domain of interest and their spatial relations based on the training set. The proposed algorithm contains 3 levels namely Annotation, Region analysis and Graphical representation. Finally the images are represented as graphs. Annotation is to find the organs present in the image and Region analysis is to find the dissimilarities. The abnormal conditions are clearly noted and revealed in graphs. The efficiency of graph is increased by the providing more information about the discrepancies. This gives the exact information what user requires and helps in easier understanding of Medical images.
Refer this Research Paper(copy & paste below code)
Dr.Pandarinath Potluri, P.Prashant Kumar, Muneer Ahmed - Semantic Analysis and Representation of Medical Images using Hybrid Watershed algorithm - published at: "International Journal of Engineering Inventions, Volume 4, Issue 6, November 2014 Edition".
60-64
10
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Dr Tirumala Rao.K, Mr. L.NARESH, J.Raja Ram

Abstract: With the character of low maintenance, cloud computing provides an economical and efficient solution for sharing group resource among cloud users. Unfortunately, sharing data in a multi-owner manner while preserving data and identity privacy from an un trusted cloud is still a challenging issue, due to the frequent change of the membership. In this paper, we propose a secure multi owner data sharing scheme, named Mona, for dynamic groups in the cloud. By leveraging group signature and dynamic broadcast encryption techniques, any cloud user can anonymously share data with others. Meanwhile, the storage overhead and encryption computation cost of our scheme are independent with the number of revoked users. In addition, we analyze the security of our scheme with rigorous proofs, and demonstrate the efficiency of our scheme in experiments.
Refer this Research Paper(copy & paste below code)
Dr Tirumala Rao.K, Mr. L.NARESH, J.Raja Ram - Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud - published at: "International Journal of Engineering Inventions, Volume 4, Issue 6, November 2014 Edition".
65-70
11.
Security Issues in Mobile Banking Using Cloud Based Services
Dr. P.Nageswara rao, K.Srikanth

Abstract: with the rapid growth of mobile users and they are converting to use mobile phones for banking applications instead of using personnel computers. Mean while mobile computing is changing the landscaper of mobile banking application as the future of the mobile. However mobile cloud computing still facing the security issues, this paper address the security issues of mobile banking cloud which relates to the banking application with the help of secure browser search engine. Security has become a major issue for mobile devices when users browsing malicious sites. It is necessary to migrate banking application to cloud based service to overcome the limitations of internet banking. The system uses mobile cloud-based virtual computing and provides each user a Virtual Machine as a security proxy where all Web transactions are redirected through it. Within the VM, the SSE uses crawling technology with checking services to validate addresses and certificates. A Phishing Filter is used to check URLs with an optimized execution time.
Refer this Research Paper(copy & paste below code)
Dr. P.Nageswara rao, K.Srikanth - Security Issues in Mobile Banking Using Cloud Based Services - published at: "International Journal of Engineering Inventions, Volume 4, Issue 6, November 2014 Edition".
71-75
12.
Flexible and Scalable Access Control Set Based Encryption in Cloud Computing (FSC)
Prof. GVNKV SUBBA RAO, AVSM ADISHESHU, S.LAVANYA REDDY

Abstract: Cloud computing is computing in which large groups of remote servers are networked to allow centralized data storage and online access to computer services or resources. Clouds can be classified as public, private or hybrid. Several schemes employing on cloud for data access. An Atribute-based encryption had been proposed for access control of outsourced data in cloud computing; however, most of them suffer from inflexibility in implementing complex access control policies. In order to realize scalable, flexible, and fine-grained access control of outsourced data in cloud computing. In this WE proposed a Flexible and scalable Access control set based encryption(FSC) by extending cipher text policy attribute-set-based encryption (ASBE) with a hierarchical structure of users. The proposed scheme not only achieves scalability due to its hierarchical structure, but also inherits flexibility and fine-grained access control in supporting compound attributes of ASBE. WE formally prove the security of FSC based on security of the cipher text-policy attribute-based encryption (CP-ABE) scheme .
Refer this Research Paper(copy & paste below code)
Prof. GVNKV SUBBA RAO, AVSM ADISHESHU, S.LAVANYA REDDY - Flexible and Scalable Access Control Set Based Encryption in Cloud Computing (FSC) - published at: "International Journal of Engineering Inventions, Volume 4, Issue 6, November 2014 Edition".
76-81

 

 

Journal Section
Author Section
Reader Section
Follow Us