IJSPR: Volume 09 Number 01
Latest News    IJSPR Volume 16, October 2015 Edition Published Successfully.         Call for Papers: November 2015    IJSPR Inviting Original Research Papers for Volume 17, November 2015 Edition.

IJSPR - Volume 09, Number 01

Published On : March 2015
SNo. Paper Title & Authors Page
1
Abstract: This paper presents the design of Home Automation System which is less expensive and secure. This system is designed to provide assistance and support to elderly and disabled at home. Also, the smart home concept in this system improves the standard of living. To provide remote access from the smart phone the main control system implements Bluetooth technology. The design is similar to electrical switches but provides safer control on the switches activating phenomenon. The GUI shows the real time status of the switches. The system is designed to control electrical devices and appliances in the house with relatively low cost and user-friendly interface.
Keywords:Smart phone, Home automation, Smart home, home appliances, Bluetooth, Android.
1-3
2
Abstract: You may be familiar with permanent magnet but other type of magnet called as Electromagnet can be turned on or off? Wherever it necessary. When turned on, electromagnet act just like permanent magnets, but when it turns them off, their magnetic properties disappear. Electromagnets are an important part of many electronic devices like motor, loudspeakers and hard drives. You can create a simple electromagnet by simple coil of wire and a battery. In this project reveals the usage of electromagnet in the part of pulp flowing pipelines in pulping section. We will explore whether the efficiency of electromagnet metal waste extraction in paper making process by extract the amount of staple pins extracted from pulp. In this we will make an electromagnet by winding a coil over the casing and make it energized to collect the metal waste on pulp.
Keywords:electromagnet, coil winding, casing.
4-6
3
Abstract: It is a human tendency to forget some particular things like keys, wallets, laptops etc frequently. We propose design of device called TagDroid which can be attached, sticked or droped to any of your belongings which you tend to forget like laptops, wallet, keys etc. and then when it is lost we can use our TagDroid App in Android phone to locate our belongings. This is a unique device as it is just a size of a matchbox. We are implementing it using Zigbee technology which will be having a range of about more than Bluetooth device. Thus this TagDroid will be of more advantage to Android users who tend to forget their belongings. This device also uses a buzzer alert system, which can be used when an object is nearby but not visible to us. This is a future technology in which many new modifications can be done.
Keywords:Zigbee, Object Finder, TagDroid.
7-9
4
Abstract: In recent years, power demand has increased substantially while the expansion of power generation and transmission has been severely limited due to limited resources and environmental restrictions. As a result, some transmission lines are heavily loaded and the system stability becomes a power transfer-limiting factor. Flexible AC transmission systems (FACTS) controllers have been mainly used for solving various power system steady state control inconvenience. in theses work an optimized fuzzy logic based static synchronous series compensator is designed in place of a PI controlling technique and simulations are carried on a long transmission line by varying the load step by step and results are compared with and without FLC. The projected fuzzy logic controllers improve power system transient stability and damping. FLC works according to system behavior as Controller input parameters are carefully considered to provide effective damping for power system. The capability of each controller is obtained based on simulation results of the flc procedure. Results carried out by simulation indicate that this controller can improve stability margin of the system in the case of transient stability and provide considerable damping of power oscillation.
Keywords:Transient Stability, Fuzzy Logic Controller, SSSC, Oscillation damping.
10-15
5
Abstract: The adoption beam formation of smart antenna techniques is increase the interference moderation future of wireless systems. It is estimated to have a significant impact on the efficient use of the spectrum, the minimization of the cost of build new wireless networks the optimization of service quality and realization of diaphanous operation across multi technology wireless networks. This paper presents the brief functioning account of LMS algorithm on smart antenna (SA) system in context of adaptive beam forming. The capabilities of smart / adaptive antenna are easily employable to Cognitive Radio and OFDMA system. Further Implementation that resolves around the LMS adaptive algorithm chosen for its reckoning restraint and high constancy into the MATLAB simulation of an adaptive array of a smart antenna base station system, is look into its performance in the presence of multipath components and multiple users.
Keywords:Smart/adaptive antenna beams forming LMS MUSIC OFDMA.
16-19
6
Abstract: In this paper, several domino circuits are compared with proposed technique such as current comparison based domino circuit. The proposed domino circuit has lower leakage power and higher speed for wide fan-in gates and which is based on the keeper circuit and comparison of mirrored current of the pull-up network with its worst case leakage current. The current comparison based domino circuit decreases the parasitic capacitance on the dynamic node, generating a smaller keeper for wide fan-in gates to implement fast and robust circuits. Thus the power consumption and delay are reduced. The leakage power is also reduced. Simulation results of wide fan-in gates are designed using an 180nm technology. The static power, dynamic power, leakage power and delay are compared with the various domino circuits for 8-bit and 16-bit OR gates.
Keywords:Domino logic, Leakage-tolerant, Keeper, Wide fan-in, Current mirror.
20-25
7
Abstract: Biometrics is the science and technology of measuring and analyzing biological data of human body. It extracts a feature set from the acquired data, and comparing with template set in the database. In this paper we have introduced a new concept for face & fingerprint recognition by means of APEX algorithm and feed forward back propagation method by using their approach it improves the accuracy gives better performance and more reliable in terms of security and integrity of the biometric data. This approach is developed by coming ridge based & Eigen face approach. The main of their research work is to reduce the false accept rate (FAR), false reject rate (FRR) and false enroll rate (FER). After executing their approach we have compared the result of unimodal biometric system & multimodal biometric system. From the result we observed that unimodal system has many disadvantages in terms performance and accuracy. Whereas multimodal biometric system performs for better them unimodal biometric system.
Keywords:Biometric Identification, Biometric Testing, Biometric Adaptive principal component analysis, APEX algorithm, Biometrics, Feature extraction, Multilayer perception.
26-33
8
Abstract: Privacy of data is a difficult task to implement in the real world with full security. The data publishing of privacy-preserving describes the problem of disclosing sensitive data when mining for useful information. Even though many models exist in the real world for preserving the private data differential privacy provides the strongest privacy guarantees. The paper addresses the issues related to private data publishing, where there is a difference in the attributes for the same set of individuals are held by two parties. The algorithm defines the private release of vertically partitioned data between two parties in the context of semi-honest adversary model. The paper also presents a two-party protocol used for the exponential mechanism. The exponential mechanism is defined based on the secure multi-party computation algorithm that releases differentially private data in a secure way. Experimental results on real-life data suggest that the proposed algorithm can effectively preserve information in a secured manner and can be implemented for a data mining task.
Keywords:Differential Privacy, Secure Multi-party Computation, Two-Phase Validation.
34-39
9
Abstract: An overview of power flow analysis exercising Thyristor Controlled Series Compensator with Newton-Raphson algorithm is shown in this paper. The incorporation of TCSC for power flow analysis in Newton-Raphson algorithm is depicted in this paper. The application of series compensation provides a smoothly variable series capacitor reactance in transmission line which is useful for improving the real power flow. In this method Newton-Raphson algorithm is used for the calculation of voltages and real power for power flow analysis of the system. Power flow study is carried out on IEEE 5 buses test systems. The result for power flow analysis for real power flow control without TCSC and with TCSC using Newton-Raphson algorithm in IEEE 5 bus test system is tabulated.
Keywords:Thyristor Controlled Series Compensator, Power flow analysis, Newton Raphson algorithm, FACTS devices.
40-43
10
Abstract: Personalized web search is a promising way to improve search quality by customizing search results for people with individual information goals. The main aim is to provide results to users according to his interest.Unnecessary exposure will be avoided and relevant results will be provided to the user. For the the first time when the user fires the query , the results provided by the search engine and the proposed system is same if the interest specified by the user at the time of registration is not related to the query. But when a similar query is fired again, more relevant results will be displayed to user using vector space algorithm and ODP, that means the links that user visits earlier will be at the top of the webpage and rest will be listed below .Thus Personalized web search has been effectively carried out. It is good to use Vector Space Model and open directory project (ODP) to obtain personalized results. This paper describes the design and implementation of this system by using user’s information and search behaviour.
Keywords:Privacy providing, personalized search, Vector Space Model, ODP, user profile.
44-47