Articles


Dye Removal by Adsorption Using Waste Biomass: Sugarcane Bagasse

Madhura Chincholi, Priyanka Sagwekar, Charmi Nagaria, Sunil Kulkarni, Sonali Dhokpande

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 05 (2014), 1 July 2014

Dye removal from industrial effluents is an important environmental concern. Various physical and chemical treatment methods can serve this purpose, of which the most economical and effective one is adsorption. A variety of adsorbents are available naturally- rice husk, neem bark, clays etc. that can be used to remove dye from the discharged waste. In this study, adsorption efficiency of low cost adsorbent Sugarcane Bagasse is examined. The effect of different parameters like contact time, adsorbent dosage, initial concentration of dye, pH on the adsorption rate. The data perfectly fits Freundlich isotherm with second order kinetics.

Keywords: Adsorption, Bagasse, Methylene Blue Adsorption, Dye removal.

Improving Handover in GSM Network

Giriraj Sharma, Ashish Kumar Bansal, Ankur Jhalani

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 05 (2014), 1 July 2014

All GSM service provider uses KPI to monitor their QOS performance. Report generated from OMCR terminal & customer feedback are considered in further network improvement activity. Handover is very important QOS .In this paper some practical cases and solutions are adopted to improve the  Handover . Major Handover failure reason, call drop, easons and solutions are discussed. drive test tool Ascom TEMS 10.2.1 is used to perform drive test. if optimization done continuously it will attract more and more customers due to service satisfaction.

Index term :- GSM,RF optimization ,drivetest, TEMS drive test tool, Handover etc.

A Survey on Mobile Augmented Reality Based Interactive Storytelling

Sagaya Aurelia, Dr. M. Durai Raj, Dr. Omer Saleh

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 05 (2014), 1 July 2014

Mobile technology improvements in built-in camera, sensors, computational resources and power of cloud sourced information have made AR possible on mobile devices. This paper surveys the field of mobile augmented reality and how it is used as interactive, collaborative and location based story telling medium. This survey provides a starting point for anyone interested in researching or using Mobile Augmented Reality and interactive storytelling irrespective of the application.

Keywords: Human Computer Interaction,   Immersive environment, Interactive storytelling

HASH Mechanism to Secure the AODV Protocol in MANETs

Sudarsanan. D, Megha. J

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 05 (2014), 1 July 2014

Mobile ad-hoc networks are self forming network without any fixed infrastructure. An ad hoc network does not have fixed infrastructure, it means a network without the standard routing infrastructure like fixed routers and routing backbones. Since the network is self configuring it is prone to security problems [19].  One such aspect is Routing .The most widely used protocol for ad-hoc networks is DSDV and AODV. The routing protocol Ad hoc On Demand Distance Vector   has been built without considering any security mechanisms.  In AODV the updates are generated as per demand not on a periodic basis. The freshness of routing in AODV is recognized by the control packet which contains hop-count and sequence field. As the fields are editable, it creates a possible vulnerability that is recurrently abused by malicious nodes to advertise false enhanced routes. To improve the security there are some new mechanisms like hash chains and digital signature.  To verify the correct functionality of the protocol it is implemented on NS2 simulator and performed extensive simulations and performance evaluations. This experimentation considers parameters such as packet delivery ratio, control overhead and throughput.

Keywords: AODV,Hashchain,Security,Routing,DigitalSignature

Web Based Security using oPass System: A Survey

Akshaya Arun Bhosale, R. B. Singh

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 05 (2014), 1 July 2014

Password authentication is an essential form of user authentication both on the Internet and for internal organizational computing systems. Password protection schemes are used to protect relatively low-sensitivity systems such as access to online archives as well as highly sensitive corporate intranets or personal bank accounts. Text password is the most popular form of user authentication on websites due to its convenience and simplicity. However, users’ passwords are prone to be stolen and compromised under different threats and vulnerabilities. Users often select weak passwords and reuse the same passwords across different websites. Routinely reusing passwords causes a domino effect; when an adversary compromises one password, she will exploit it to gain access to more websites.

Simulation & Implementation of Complex Multiplier using Vedic Mathematics

Aruna M, Usharani G

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 05 (2014), 1 July 2014

In VLSI technology speed optimization plays a vital role. So designing of high speed devices became necessary to fulfill the end user requirements. Generally the processor designing is mainly depending upon  the MAC units. In that particularly multiplier architecture comes under crucial design. Vedic Mathematics is the ancient methodology of Indian mathematics which has a unique technique of calculations based on 16 Sutras (Formulae). In this paper the importance of Urdhva tiryakbhyam Sutra and Nikhilam Sutra are discussed. The design of complex multiplier designed using this sutra consists of Radix Selection Unit (RSU), Exponent Determinant (ED), Mean Determinant (MD) and Comparator. The multiplier shows the product of the  provided inputs with reduced latency along with optimized power estimation. Transistor level implementation of Vedic Mathematics based 16-bit complex multiplier for high speed low power processor is reported in this paper. The functionality of these circuits was checked and performance parameters like propagation delay and dynamic power consumption were calculated by Xilinx sparten3E using standard 90nm CMOS technology for synthesis and simulation. The propagation delay of the resulting (16, 16) x (16, 16) complex multiplier was found to be 4ns and consume 81mW power. The implementation offered significant improvement in terms of delay and power from earlier reported ones.

Keywords—Vedic Mathematics, Nikilam sutra, partial product, Exponent & Mean determinant, Xilinx.

VLSI FOR MULTIMEDIA APPLICATIONS

Prof.Sagar Pandurang More, Prof. S.M.Agrawal*, Prof. S.S.Patil**, Prof. P.D.Dudhat, Prof. R.L.Mukera

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 05 (2014), 1 July 2014

Today there is a race to design interoperable video systems for basic digital computer functions, involving multimedia applications in areas such as media information, education, medicine and entertainment, to name but a few. Digital TV functions can be optimized for encoding and decoding and be implemented in silicon in a more dedicated way using a kind of automated custom design approach allowing enough flexibility.

This paper provides an overview of the current status in industry of digitized television including techniques used and their limitations, technological concerns and design methodologies needed to achieve the goals for highly integrated systems.

Study of Technology Forecasting Methods

Abhaysinh Vishwasrao Surve

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 05 (2014), 1 July 2014

The primary function of forecasting is to predict the future using data we have in hand. Technological forecasting is the process of predicting the future characteristics and timing of technology. The technology forecasting methods can be classified as exploratory and normative forecasting methods. There are many changes being performed in different technologies such as software technologies, computing technologies, hardware technologies, etc. There is a need to find the trends and predict the future of these technologies. The technology forecasting methods are useful to find the trends and predict the future. In this paper, we focused on various technology forecasting methods which can be used to track the trends of different technologies.

Keywords: Technology forecasting, Exploratory, Normative. 

Influence of Red Mud Catalyst in the Catalytic Fuel Reformer

Muthu Kannan, C.G. Saravanan

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 05 (2014), 1 July 2014

The hazardous waste material such as Waste engine oil (WEO) and red mud is recycled in this study. WEO is thermally cracked with red mud catalyst in the catalytic fuel reformer (CFR). The gas obtained from the CFR is condensed using water cooled condenser for analyzing purpose. The output of the condenser is named as WEORM. The different chemical properties such as density, kinematic viscosity, flash and fire point and calorific value of WEORM are analyzed and compared with those of diesel fuel. The compositional analysis for diesel and WEORM was made using Fourier transform infrared (FT-IR) and gas chromatograph-mass spectra (GC-MS). The results of FT-IR and GC-MS of WEOA revealed that it was similar to fossil diesel fuel. Thus this study concludes that environmentally hazardous waste material such as waste engine oil and red mud is recycled and converted into a useful resource and serves as an alternative source of fuel for CI engine.

Analysis of Modified Medical Research Council scale and Baseline Dyspnea Index to evaluate Obesity related breathlessness.

Shweta Satish Devare Phadke, Ankita Girish Mahajani, Ramakrishnan. K.S

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 05 (2014), 1 July 2014

Obesity is a chronic disease characterized by excessive accumulation of body fat on human body that causes damage to the individuals health and  is regarded as a public health concern[1], Obesity is associated with many health consequences and overall reduction in quality of life. Dyspnea is very frequent chief complaint experienced by obese subjects. The Modified Medical Research council scale (mMRC) and Baseline Dyspnea Index (BDI), both have been used individually to assess dyspnea in respiratory related functional impairment. Our aim is to evaluate the two scales to assess dyspnea in obese individual, analyze it with obesity determining parameters like waist circumference, 6 minute walk distance and Rate of Perceived exertion. And to find out any association of these two scales. Cross sectional assessment study was designed, including apparently healthy obese individuals. Evaluation of dyspnea was carried out using mMRC and BDI in random order. Assessment of waist to hip ratio, 6 minute walk test was carried out. Non parametric correlation test used to determine relationship of mMRC and obesity. Scatterplot matrix was used to determine relationship of BDI and obesity. Association between two scales was analyzed using Spearman’s rho and gamma results. We concluded from our study Modified medical research council scale and Baseline Dyspnea Index can be used clinically to assess dyspnea in obese individuals. Modified medical research council scale and Baseline Dyspnea Index were moderately associated with each other.

Keywords: Dyspnea, Obesity, Modified Medical Research council scale, Baseline Dyspnea Index .

Change Detection in VHR Images Based on Sparse Representation of Morphological Attribute Profile

N.C. Anu Sree, Shehna Jaleel, V. Bhavya

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 05 (2014), 1 July 2014

Change information of the earth’s surface is becoming more and more important in monitoring the local, regional and global resources and environment. For this reason , Change Detection has an increasing importance in the field of remote sensing. The image acquired by periodical passes of remote sensing satellites over the same areas permit a regular analysis of the changes that occurred on the ground. In this paper a new approach to change detection in very high resolution remote sensing images based on sparse representation of morphological attribute profile is presented. Attribute profiles allows the extraction of geometrical features related to the structure within the scene at different scales. The temporal changes are detected by comparing the geometrical features extracted from the image on each date. Morphological operators have been used in order to decrease the complexity of the image and extract spatial information. The operators are based on mathematical morphology, which is a theory for the analysis of spatial structures based on set theory.

Keywords— Change Detection, sparse representation, morphological attribute profile, remote sensing , very high rersolution imahges.

Why Companies Use the Policy of Buyback of Shares in India

Dr. Neelam Dhanda, Karamjit Kaur

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 05 (2014), 1 July 2014

Buy Back of shares in India is permitted in 1999.This is the new Concept in India. Because few companies are used the buyback of shares in India .Because there are the perception only rich companies are using the buyback of shares in India .But there are many benefit of the buyback of shares in India .This research paper discuss about all the aspect of buyback of shares which are benefit able for the companies as well as shareholders. The main objective this research paper to check the effect of buy back of shares post and pre performance.

Key Words: Buy Back of Shares, Companies, Ratio

A PFC Zeta Converter for Speed Control of PMBLDC Motor Drive

K.S. Geerthiga* D.Kavitha**

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 05 (2014), 1 July 2014

Abstract— This paper presents a Zeta DC-DC converter as a power factor correction (PFC) converter which is operated in voltage control mode for speed control of a permanent magnet brushless DC motor (PMBLDCM). The proposed converter performs the PFC action and DC link voltage control in single stage and needs only one controller. The proposed PMBLDCM drive (PMBLDCMD) is designed and modeled, and its performance is evaluated in PSIM environment. Simulated results are presented to demonstrate an improved power quality at ac mains of the PMBLDCM system in a wide range of speed and input ac voltage. Test results of a developed controller are also presented to validate the design and model of the drive.

 

Effective Cryptosystem Scheme Using Biometric Template

Shweta Hariharno, Mrs. Shikha Pandey

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 05 (2014), 1 July 2014

Abstract—Nowadays security is an important issue. Encryption and Decryption is a technique to ensure the security. Having secure and reliable means for communicating with videos and images is becoming a very necessity and its issues must be carefully considered. Hence, network security and data encryption have become important. Nowadays the images and videos are the most usable forms of encryption. There are two types of applications for information transmission over the Internet. The first ones are the online applications and next ones are the web pages, which consider the speed and security respectively as the main issue. In this thesis, encryption algorithms that can fulfil the requirements of these two applications were studied, and were adjusted to meet the requirements of image encryption by using the bio-metric template i.e. palm print. Bio-metric authentication systems are widely used in order to provide authentication without possessing any physical materials. Bio-metric authentication systems are mainly concentrating on security, privacy, and accuracy. In this thesis, propose a provably two way secured biometric authentication system, which concerns of user’s privacy, protection, trust issues, network security, and accuracy. The two way secured means, biometric details are going to be encrypted twice i.e. double encryption. In this system two different encryption algorithms have been used. One is private key cryptography another one is public key cryptography. Authentication by using two way encryption will give additional security when comparing with existing system

 

Index Terms— Biometric, Image encryption and decryption, Image processing, Palm print.

 


Implementation of MIMO OFDM Transcreceiver for Increasing Data Rates

Madhuri Harish Jadhav, Prof .Inamdar M U

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 05 (2014), 1 July 2014

Now a days the need for wireless data transmission is being widely used for communication purpose. Orthogonal frequency division multiplexing (OFDM) which is multi carrier communication technique can be used for wireless mobile communication as it has the property to overcome channel fading. While multiple inputs multiple outputs (MIMO) is the technique of implementing multiple antennas at the transmitter as well as receiver side to increase the data rates.In this paper, by taking the advantage of OFDM & MIMO a system has been implemented to get the data rates up to several hundred mbps.The first stage will be verification of each block using matlab. After the algorithm is verified, the hardware implementation will be obtained by constructing block diagram in Simulink. Then a VHDL code will be imported into Simulink via Xilinx system generator block set which will create bit true and cycle accurate hardware model. The resultant hardware model will be programmed into FPGA prototyping board.

Index terms— MIMO, OFDM

Universal Data Management through Web Base Configurable System

Vrishali Patil, Biradar M.S

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 05 (2014), 1 July 2014

Abstract— This paper presents universal data management through web base configurable system. Universal data stands for most of analog signal which are useful for mankind and industrial system. 24bit ADC provides high resolution data.  We have tried data acquisition for multiple applications. Data frequency and channels can be customized through web base configurable system. Data can be logged with set frequency with real time stamp and this data is available on web. Remote access of the data, makes the system very useful and low cost solution. data can be collected from remote locations. HTML/.NET script is used to develops web pages and their GUI application. Embedded hardware contains Ethernet [10/100 base-T, RJ45 connector] base microprocessor RCM3700 having 512KB memory for storing the web pages. By using a low cost network communication module (RCM 3700) as a web server, one can achieve better network security, lower power consumption, compact size, and easier to use at remote places. Results show the remote monitoring and control system [RMACS] with data log. Low cost web server for collecting high resolution data with multiple channels provides best solution for many applications.

Keywords – Data Acquisition, Ethernet, HTML/.NET script GUI, RMACS.

Designing and Frequency Analysis on Bus Structure for Lynx and Stag

Arun S. Menasinkai, Karthik A.S, Chetan C. Kokatnur, Dr.S.N. Kurbet

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 05 (2014), 1 July 2014

The structural strength is a fundamental concern. Unnecessary weight of the bus structure leads to reduction in overall performance of bus. The designing the whole frame with analysis by using solidwork software and reducing the capital spent on out sourcing as well as materials. The perfect chassis is a large diameter thin walled tube. In order to understand this we should have a solid grasp of statics and deflection. The Automotive chassis has two main goals, to hold the weight of the components and to rigidly fix the suspension components together when moving. The frame of the bus consists of five parts are roof, floor, sides, front, rear. Each frames are designed separately and is assembled together using weldment. The frame is a space frame structure made separately out of two types of cross sections that is rectangular tube and round tube. After the completion of the frame, stress deformation and frequency modes are analysed and results are obtained. As per the target of 5 hertz of minimum natural frequency, the model was designed and values more than the target is achieved in all the five modes which are detailed results in this report.

Keywords: Body Structure, 3D-Modelling, Frequency, Stress, Displacement, Solidworks, Lightweight.

Multideployment and Multisnapshotting on IAAS Cloud Environments

Amulya Dasari, Chandra Sekhar Reddy N, Srinivas Reddy B

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 05 (2014), 1 July 2014

Infrastructure as a Service (IaaS) cloud computing has revolutionized the way we think of acquiring resources by introducing a simple change: allowing users to lease computational resources from the cloud provider’s datacenter for a short time by deploying virtual machines (VMs) on these resources. This new model raises  new challenges is the need to deploy a large number (hundreds or even thousands) of VM instances simultaneously. Once the VM instances are deployed, another challenge is to simultaneously take a snapshot of many images and transfer them to persistent storage to support management tasks, such as suspend-resume and migration. With datacenters growing rapidly and configurations becoming heterogeneous, it is important to enable efficient concurrent deployment and snapshotting that are at the same time hypervisor independent and ensure a maximum compatibility with different configurations. This paper addresses these challenges by proposing a virtual file system specifically optimized for virtual machine image storage. It is based on a lazy transfer scheme coupled with object versioning that handles snapshotting transparently in a hypervisor- independent fashion, ensuring high portability for different configurations.

Personalized Recommendations in e-Learning System using Web Mining

Namdev Ashok Anwat, Mrs. Varsha Patil

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 05 (2014), 1 July 2014

Personalization is a subclass of information filtering system that seek to predict the 'ratings' or 'preferences' that a user would give to an items, they had not yet considered, using a model built from the characteristics of an item (content-based approaches or collaborative filtering approaches). Web mining is an emerging field of data mining used to provide personalization on the web. It consist three major categories i.e. Web Content Mining, Web Usage Mining, and Web Structure Mining. In this paper, a simplified Personalized Recommendation System using web usage mining and content mining is proposed to provide personalized search results to learners. The web usage mining and content mining technologies are used for system implementation aim to identify personalized recommendations. Basically, It consist four major steps to construct personalized recommendations are Data Collection, Data Processing, Data Analysis, and Output Generation. The proposed architecture in this paper is implemented using .Net technology to achieve system goals.


Keywords: Recommendations, Web Usage Mining, Association Rule Mining, Clustering, Lingo.

Challenges Facing Agricultural Sector in Accessing Credit from Financial Institutions The Case Study of Horticulture Subsector in Tanzania

Kenani Mwakanemela

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 05 (2014), 1 July 2014

ABSTRACT

Tanzania is currently experiencing a significant growth in population with potential food shortages predicted in the next few years. Global warming is causing a serious threat on food production because lands used for agriculture can no longer produce food. As a result of this, food prices are raising sharply causing an adverse effect in the economy where the standard of living is now very high.  As a way to address this problem, the Government of Tanzania has prepared a “Kilimo Kwanza†initiative which aims at revolutionizing agriculture to increase food security in the country. Access to agriculture finance is one of the pillars of this initiative.

In this regard, the study examined challenges facing agriculture sector in accessing credit from financial institutions using horticulture subsector as a case. It examined factors that make agriculture financing risky and evaluated the gap that exists between farmers and financial institutions. Furthermore it evaluated strategies used by financial institutions to give credit to farmers and examined the impact of financing agriculture in Tanzania. This was a qualitative study which used a sample of 48 respondents from the two active horticultural production regions in Tanzania, Arusha and Kilimanjaro.

The study revealed that agriculture financing is an important catalyst in stimulating agricultural development to ensure food security in Tanzania. Unpredictable weather, lack of collateral, absence of agriculture insurance, little farmer’s education, infrastructure and fluctuating market prices are among factors which makes agriculture financing risky. It found that there is a big gap between small scale farmers and financial institutions mainly due to geographical distance between the two parties, availability of alternative sources of finance such as SACCOS, VICOBA and competition from mobile money services such as M-PESA. In assessing the impact of agriculture financing, the study revealed that there has been significant achievements in horticulture through support from the government and donors. The study therefore recommends that, the Government of Tanzania should invest more resources to ensure access to credit is not a challenge to farmers while financial institutions should develop products and services customized for agriculture giving priority to small scale farmers

Performance Analysis of Combined Algorithm for Preemptive Handoff of Real Time and Non-Real Time Services

Reena, Pritika

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 05 (2014), 1 July 2014

Handoff is very important concept in mobile computing. When a mobile user travels from one area of coverage or cell to another cell within a call’s duration the call should be transferred to the new cell’s base station. Otherwise, the call will be dropped because the link with the current base station becomes too weak as the mobile recedes. Indeed, this ability for transference is a design matter in mobile cellular system design and is call handoff. Handoff is very rigorous process. Performance of handoff is very important issue. There are many types of handoff in the mobile computing.

In this paper performance of preemptive handoff is analysed by the combined algorithm for real time services and non-real time services by using MATLAB.We  choose  the  fluid  flow  model  [19]  as  the  mobility  model  of  mobile  users. However, our proposed method can be easily used to other mobility models as well.

Tall Office Building Form to Attend Sustainability

Ar. Priya V. Gupta(Raut), Ar. Anjali V. Narad

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 05 (2014), 1 July 2014

From the early history, we can visualize that there is continuous development in urban areas. Development not only city settlements but rather in individual buildings along with innovative technologies from pyramids of Egypt to Eiffel tower to till date. Slowly and gradually, people were migrating from villages to town areas with the demand of more employment which directly escalate the need of land for to perform work and to live. Global warming, energy and water shortage, urban sprawl, air pollution, overflowing landfills, disease, and global conflict will be the legacy of the twenty-first century. Rapid development is overtaking and transforming villages, towns, cities and metropolises in the world. Social& economic transformation is producing new aspiration in the society. Development of world is mainly driven by economy. The city continued dynamism it given its business required ideal surrounding in which to operate. The time has come to pause a little, to think about long term development objectives rather than speeding blindly into a state of exhaustion unless we move quickly towards the notion and implementation of sustainability it will be tough to survive and need the ways to come out of it. This paper will discuss –How sustainability will be achieved through tall office building and analysis of convenient forms for tall building.

Index Terms: sustainable development, organizing sustainability, tall building, building form, 

Image Transmission Using LDPC Log Domain Iterative Decoding Method

Hazeena Hussain, Rehna. A.S, Radha. S

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 05 (2014), 1 July 2014

Abstract: Most source coding standards (voice, audio, image and video) use Variable-Length Codes (VLCs) for compression. However, the VLC decoder is very sensitive to transmission errors in the compressed bit-stream. Previous contributions, using a trellis description of the VLC codeword’s to perform soft decoding, have been proposed. But the complexity of the trellis technique becomes intractable. In this paper, we propose a soft-input VLC decoding method which is not trellis based. Performance in the case of transmission over an Additive White Gaussian Noise (AWGN) channel is evaluated. Simulation results show that the proposed decoding algorithm exhibit very low complexity and also bit error rate (BER) at output of channel decoder decreases with increase in SNR. We consider the serial concatenation of a VLC with the channel code and perform iterative decoding. Results show that, when concatenated with Low Density Parity Check (LDPC) codes, iterative decoding provides remarkable error correction performance. Experimental results indicate that the proposed method requires less iteration and improves overall system performance.

Keywords: JPEG compression, Discrete Cosine Transform (DCT), Huffman encoding, LDPC codes.

Cooperative MIMO Communication in Constrained Wireless Ad Hoc Networks

Hemanti Bani, Bhosale J.D

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 05 (2014), 1 July 2014

In this paper, we investigate the issue of cooperative node selection in MIMO communications for wireless ad hoc networks, where a source node is surrounded by multiple neighbors and all of them are equipped with a single antenna. Given constraints such as energy, delay and data rate, a source node dynamically chooses its cooperating nodes from its neighbors to form a virtual MIMO system with the destination node (which is assumed to have multiple antennas), as well as adaptively allocates the power level and adjusts the constellation size for each of the selected cooperative nodes. In order to optimize system performance, we jointly consider the optimization of all these parameters with given system constraints. We assume that the source node either has CSI, or has no CSI. Heuristic algorithms, such as maximal channel gain (MCG) and least channel correlation (LCC) algorithms are proposed in order to exploit available system information and to solve the constrained optimization problem.  

Keywords: Cooperative/virtual MIMO, ad hoc, correlation, QR decomposition, channel state information (CSI).

No Development without Better Life for Rural Women - A Case of Tanzania

SABBATH M. UROMI

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 05 (2014), 1 July 2014

Tanzania has a broad scope for agricultural diversification and a great potential to enhance production through agricultural intensification. The country has 945,090 km of land and 40 million ha (i.e. 42%) is cultivatable; but only 16% (6.3 million ha.) are currently being cultivated.

Despite a rich endowment of natural resources, good climate and abundant land, Tanzania’s agriculture performance is unsatisfactory due to exclusive of women in agriculture policies making. Therefore poverty eradication will not become reality in Africa unless all women, particularly rural women, enjoyed better living conditions and when Africa governments and regional economic communities combat the liberalization policies in Agriculture and develop Agricultural policies that can help their people reach food security. In Tanzania’s rural services and infrastructure are extremely poor and underdeveloped. African women play a key role in food production and supply, the real value of their contribution is not valued enough for the part it plays in the gross domestic product, (Dr. Sophia Mlote, 2014).

Moreover, in Tanzania women’s skill and knowledge of the age – old technologies they use in food production, processing and preservation are not recognized as they should be and are not showcased accordingly. For instance in Zimbabwe nearly 20% percent of women own the land they use, Kenya 3% percent while in Tanzania only one percent of women enjoyed the right to land. Hence this poverty is by and large in the rural areas. Most poor and marginalized groups are women, the agriculture sector as main workforce that makes a huge contribution to food production in African countries. This is why there is a talk of feminization of Poverty in Africa. This article presents the implications for agricultural Policies in Africa and consequences for Africa’s Rural Women as well as mitigations toward those consequences.

Keywords: Mainstreaming, inequalities in Agriculture

A Low Complexity Detection Scheme of Space Frequency Codes for MIMO OFDM Systems with Minimum Euclidean Distance Metric Calculation

Haseen Banu S.H, Tariqmon

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 05 (2014), 1 July 2014

Abstract

In this paper a design criteria of full diversity space frequency codes (SFC) is proposed for MIMO-OFDM systems with a low complexity detection scheme. It can achieve full diversity. This system utilizes space distributive properties of SFCs to make correct decisions. In the proposed scheme detection of SFCs is done using a novel minimum Euclidean distance metric calculation method followed by decision making. It can achieve the performance of partial interference cancellation methods. Partial interference cancellation (PIC) group decoding is an attractive decoding alternative for MIMO wireless communications. It can well deal with the tradeoff among rate, diversity and decoding complexity of SFC codes. Simulation results of the newly proposed codes demonstrate the theory.

Index Terms:  MIMO-OFDM, SFC, ML decoding, PIC group decoding.

Combined Algorithm For Minimize the Blocking Probability of Real Time and Non-Real Time Services in Handoff

Reena Dahiya

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 05 (2014), 1 July 2014

This algorithm is used to minimize the blocking probability and increase the services. Handoff is very important concern in communication. It is related with the mobile phone. When a mobile user travels from one area of coverage or cell to another cell within a call’s duration the call should be transferred to the new cell’s base station. Otherwise, the call will be dropped because the link with the current base station becomes too weak as the mobile recedes. Indeed, this ability for transference is call handoff. Handoff is very rigorous process. Performance of handoff is very important issue.

In this paper performance of preemptive handoff is analysed by the combined algorithm for real time services and non-real time services by using MATLAB. Blocking probability is minimized in proposed algorithm.

We  choose  the  fluid  flow  model  [19]  as  the  mobility  model  of  mobile  users. However, our proposed method can be easily used to other mobility models as well. The model  assumes  a uniform density of users  throughout  the  area  and  also  assumes  that  a user is equally likely to move in any direction with respect to the cell boundary.Blocking probabilities for both originating and handoff calls has been analyzed for real time and non real time services. The blocking probabilities have been minimized to optimum level. Starvation of non real time calls has also been minimized with the proposed design of hybrid handoff.The algorithm has been analyzed using the markov chain and SOR iteration method. Other suitable methods may find more minimum level of blocking of call. These equations have some of the drawbacks like complex nature of Poisson’s distribution.

We are using MAT-LAB software for simulation of markov chain equations and passion distribution equations to calculate the blocking probability of handoff real time and Non real time calls and originating calls blocking probabilities.

MAT LAB -7.12 is a high-level language and interactive environment that enables you to perform computationally intensive tasks faster than with traditional programming languages such as C, C++, and FORTRAN.

Keywords: Preemptive handoff, MATLAB 7.11, SOR method, Itreative method, exponential distribution generator

Suitability of Groundwater Quality for Irrigation

Latha S, G.P. Shivashankara, Thanushree M.S

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 05 (2014), 1 July 2014

Reconnaissance on the suitability of groundwater quality for irrigation in Tubinakere industrial area, Mandya district, Karnataka was done by determining ion exchange, potential salinity, Cl-/HCO3- ratio, magnesium hazard, percentage sodium, Kelley’s ratio and Residual Sodium Bi-Carbonate (RSBC). 94% of the samples are positive in case of both cation exchange indices leading to reverse ion exchange, potential salinity is slightly high making groundwater samples unfit for irrigation purpose. 75% of samples are slightly to moderately affected on the basis of Cl-/HCO3- ratio. Two of samples falls in unsuitable category with Magnesium Hazard >50%. Based on the classification of percentage sodium, maximum of samples falls under excellent, good waters and 87% of samples were suitable for irrigation as per Kelley’s ratio. RSBC values were <5meq/L safe for irrigation purposes. The study stated that water quality hazards of potential salinity and ratio of Cl-/HCO3- values indicates that groundwater samples are not suitable for irrigation.

Keywords: Industrial effluent, irrigation, sodium, impact.

Analyzing and Blocking Misbehaving User in Anonymizing Network

Mrs. Anuse A.A, Mrs. Rachana A. Satao

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 05 (2014), 1 July 2014

As we studied in our literature, the recent method was presented for blocking of misbehaving user in the Tor networks  called as Nymble. However the first limitation which we identified for Nymble is that if the Nymble manager fails, then whole security system is fails second limitation is blocking IP address is not feasible because if we reconnect it we get new IP address by dynamic property IP addressing.Drawback of existing  system can be overcome by our proposed system i.e “Detection and Prevention of misbehaving users in anonymzing networkâ€. MAC address is used for blocking misbehaving users in anonymizing network. which cover MAC  address as user identity, as IP address can be dynamically generated,it is not useful to solve above problem As ,we use MAC address, there is no chance for Sybil attack, as MAC address is physical address it cannot be change at any cost.As existing system is totally centralized to nymble manager, to overcome above all drawback, we use reliable system where second manager  may handle task of first nymble manager failure.current system has scalability property as well as it  can handle multiple server requestsat a time  .We use strongly cryptography algorithm it’s hard to break security of our system.

Key Words:- Anonymizing, blacklisting, Sybil attack, MAC addresss

UNFAIR TERMINATION OF EMPLOYMENT AT WORKPLACES

Alexander S. Madinda

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 05 (2014), 1 July 2014

In the 18th to the 19th century, the world stated to experience major changes in the means of productions, changes in agriculture, mining, transportation, manufacturing and technology. These changes made a major turning point in human history, as they had effects on the social, economic and cultural perspective of that time. It is industrial revolution that resulted into a need for countries to create effective national system of labor administration to improve employees’ rights, working condition, and productivity for sustainable development. In ensuring employees rights are not infringed this paper therefore seeks to identify the grounds for unfair termination of employment at work places. It starts with the introduction then reviewing theories and practical experience of different cases that happened in Tanzania under unfair dismissal grounds. The application of Tanzania Employment & Labor Relations Act (2004) in regard to unfair dismissal was also cited by this paper so as to enhance the relevancy of the findings and recommendations made. The paper goes on discussing the notice and remedies for termination of employment and identifying problems that lead to unfair procedures of termination of employee’s employment at workplaces and recommend measures on how to combat the problem. The paper ends up by a conclusion.

A Case Study on Fiber Bragg Gratings for Biomedical Applications

Bindu P. Bhat, Dr.Padmaja K.V.

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 05 (2014), 1 July 2014

This paper discusses the various techniques available for the fabrication of fiber Bragg gratings (FBG) and the most efficient method to fabricate FBGs for biomedical applications. The sensors were fabricated using the phase mask technique and the response was tested. The fabricated bare FBG sensors showed a Bragg wavelength reflectivity around 1547.8nm and the etched FBG sensors showed a Bragg wavelength reflectivity around 1546.5nm when connected to Micron Optics Interrogator. The paper also discusses the further scope of the FBG applications in biomedical and biosensing fields.

Keywords: Fiber Bragg gratings, fabrication, Phase mask technique, Bragg wavelength, biosensing

THE UNCERTAINTY OF ORGANIZATIONAL ENVIRONMENT IN DEVELOPING COUNTRIES

Alexander S. Madinda

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 05 (2014), 1 July 2014

An organization’s environment normally can be well studied from two perfectives, which are the extent of change and the level of complexity. The extent of change considers the stability and instability of the environment and complexity of environment depends on the number of inconsistent pattern which are liable to vary and resulting in either complex or a simple environment. This paper therefore seeks to provide an overview of organizational environment, and discuss the uncertainty of organizational environment in developing countries. It started with the introduction of both terms organization and environment. It explains the developing countries perspective and the uncertainty of its environment, and identifies the factors that contribute to a grown climate of uncertainty in developing countries It goes on analyses the impact of uncertainty of environment towards organizational performance caused by political system, economic, socio cultural, legal, technology and demographic factors and tries to elaborate the best practice of SWOT analysis in managing organizational environment. After that it ended up by a conclusion.

Keywords: Uncertainty, Organization, Environment, Developing Countries, Environmental forces, SWOT analysis.

Identification of Sickle Cells from Microscopic Blood Smear Image Using Image Processing

Athira Sreekumar, Ashok Bhattacharya

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 05 (2014), 1 July 2014

Blood is a connective tissue in fluid form. Blood cell counting gives vital information about a patient’s health. It is used to evaluate and diagnose diseases such as anaemia, polycythemia, leukemia, thrombocytosis thrombocytopenia, identification of sickle cells etc. It indirectly measures the oxygen carrying capacity of blood.  There are many blood cell counting methods. The oldest is the manual counting which is still considered as the “gold standard†method for counting blood cells. But this method is subjective and the result depends on the technician.  Other method for blood cell counting is by using an automatic hematology analyser. This method gives an accurate blood cell count but the cost of the machine is very high also it cannot identify sickle cells. This paper presents a simple method to count the red blood cells and identify sickle cells using Circular Hough Transform an Image processing technique

Automation of Unreserved Ticketing For Indian Railway

Ganesh Prasad Nayak, Dr.K.R. Prakash

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 05 (2014), 1 July 2014

The passenger flow in the Indian Railway system is multiplying day by day. The existing general ticketing system is causing a considerable increase in the travel time due to “LONG QUEUE†at the ticketing counters, which absorbs a significant portion time. On an average, a passenger spends minimum 10 minutes in the queue at the General ticketing windows. In this proposed system we aim to provide an additional option by use of Smart Phone services.

InsTrain:Instantaneus Train Ticketing is to ease the way of ticketing for the general compartments and is an android application where our railway ticket can be bought with just a smart phone and you can carry your unreserved general railway tickets in your smart phone as a soft form

Keywords : InsTrain, TTE

Design and Performance Evaluation of Hybrid WDM/TDM Passive Optical Networks Using Star Topology

Surbhi Jain, Brintha Therese A.

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 05 (2014), 1 July 2014

In this paper, we have analyzed the performance of the hybrid wavelength division multiplexing/time division multiplexing passive optical network (WDM/TDM PON) system using the star topology architecture. We are comparing the proposed hybrid passive optical network for the different data rates and distance by simultaneously varying the number of transmitters at OLT.

Keywords: EPON, hybrid PON, WDM/TDM PON, OLT,ONU, power splitter, power combiner, data rate, bit error rate, eye height, quality factor