sitemap | contact us
      
 
  Book Series
  Journals
  Book Proposal Form
 
  Using Published Material
  Rights and Permissions
  Examination Copies
   
   
  List of Publishers
  Bargains
   
   
  Services
   
   
  About Narosa
  History
  Mission
  Group Companies
  Our Strength
  Alliances
   
   
   
 
 
JUET Research Journal of Science and Technology
Volume 3 Number 1

ISSN: 2321-6026
Publication Year: January 2016
Pages: 1 - 129


Image Restoration based on Fuzzy rule Median Filter for Gaussian Noise
- Kanika Gupta and S.K. Gupta
Contact: Kanika.gupta@abes.ac.in; guptask_biet@rediffmail.com

Abstract: This paper presents the approach for Image restoration based on the filter which is based on the fuzzy logic and centered on the median of the gray scale images. By applying fuzzy logic rules on the noisy pixel corrupted by gaussian noise, the proposed filter can preserve the sharp edges of the images to the greater extent possible. This includes the two stages:-Firstly, it will detect the noisy and corrupted pixel and secondly, it will correct that particular pixel by taking the median of those pixels. The proposed filter produces the better results when tested on different images as compared to other traditional filters. 

A New Non Symmetric Divergence Measure and Related Bounds
- R.N. Saraswat and Neha Khatod
Contact: sarswatrn@gmail.com; maheshwarineha20@yahoo.com

Abstract: Information divergence measures are well-known in the literature of Information Theory and Statistics. Information divergence measures play an important role in pattern recognition and information retrieval etc. In this paper we shall establish a new information divergence measure using convex function. Upper and lower bounds of Chi-square divergence, Relative J- divergence, Jenson Shannon’s divergence, Triangular discrimination etc. in terms new information divergence measure using a new f-divergence measure and inequalities have studied. Numerical studies have also discussed.

Analysis of APASBCE Scheme Using Missed Data Amplitude and Phase Estimation Schemes in MIMO Communication System
- Ravi Kumar and Rajiv Saxena

Abstract
: Multiple Input Multiple Output (MIMO) antenna systems are being given much attention to provide high capacity with less bandwidth requirement. In this paper, channel estimation techniques have been tried to implement with the adaptive semiblind channel estimation scheme using less requirement of pilot symbols similar to as in the case of the estimating the channel with known channel state information (CSI) conditions which requires high channel bandwidth. The improved results have been found with fewer requirements of transmitted symbols by implementing the missing data amplitude and phase estimation which further can be improved using expectation maximization using most likelihood (ML) detection technique. The results obtained have been compared with the already simulated results. It is shown that in addition to improving the spectral efficiency, the implementation of this channel estimation technique offer better semiblind channel estimation accuracy for the partial CSI conditions.
 
Number of Spans of Pre-Stressed Concrete Bridge Decks: A Parametric Study
- Shachi Jain and P.K. Mehta
Contact
: ishachi@yahoo.com; pkmehta11@gmail.com

Abstract: More and more prestressed continuous bridges are being built these days. The introduction of continuity at support introduces additional forces and moments in the superstructure, some of which are termed as secondary effects. The secondary forces may not necessarily lead to the failure or collapse of the bridges but, if they are ignored they may lead to excessive deformations, cracks and other defects in the bridge superstructure. At present no standard guidelines are available regarding the influence of these forces on the design of such bridges. It is, therefore, necessary to understand the behaviour of the continuous and integral bridges (Rigid Frame Bridges) under the action of these forces. In the present work, the influence of secondary effects on the forces of continuous and integral prestressed bridge decks has been investigated through parametric studies. The secondary forces considered in the present work are those developed due to temperature, differential temperature, creep, differential shrinkage and earth pressure. The parameters varied are Span lengths and Number of spans. Also Support conditions (Continuous and Integral / Rigid Frame) are varied. All the forces (Primary and Secondary) are calculated as per Indian codes. The 3-D grillage models of the bridge deck are developed and analysed using stiffness method of analysis. In general, there is no significant difference in the forces in the bridge deck and forces are almost same in case of both two and three span bridges.
 
Database Intrusion Detection by using Improved Rule Minor Algorithm with Extended Weighted Data Dependency
- Ajitesh Kumar and S.K. Gupta
Contact
: patel.ajiteshkumar@gmail.com; guptask_biet@rediffmail.com

Abstract: Now a day’s database in all the fields is used and maintained by most of the organizations as it keeps much of sensitive and important information secured. Due to major online operations which are very frequent that’s why security challenges increase for appropriate and effective measures which are required to safeguard the database from intruders. As the use of database is increasing intrusion detection plays an important role in the field of security and it is performed with the help of intrusion detection techniques such as Statistics, Expert system, Neural Network etc. To extract the useful patterns and information from the large amount of data, the data mining technique is used for increased database size and number of records in each database. To overcome the difficulties of a database administrator for monitoring various operations on the basis of the attributes such as reading, writing or modifying the mechanism of database intrusion detection is used through data mining.

Electronegativity Equalization Method and Charge Partition Schemes
- Navnit K. Misra and Poonam Tandon
Contact
: navnitmisra@gmail.com
Abstract: Electronegativity equalization method (EEM) has been a fast and reliable technique for the calculation of charge distribution in large systems. We have performed parameterization of the EEM for the different quantum chemically calculated charges and quality of EEM charges is investigated. Geometries of small molecules in a training set are calculated at the B3LYP/6-311G + (d, p) level using G03 package and atomic charges are calculated using different charge partitioning schemes e.g. MPA, ESP, AIM & Lowdin. Furthermore, pure and screened coulombic forms of electrostatic potential were employed to describe the charge-charge interatomic interactions. A good correlation is obtained for different types of charges in the training set. Transferability of the EEM parameters has been tested for some large systems and it is found that the EEM parameters based on the AIM charge partitioning scheme and the screened coulombic potential are best transferable.

Sintering Behavior of Tin-base Alloy Under Conventional and Microwave Heating
- Amit Sharma, Bhagat Singh and M. Hameedullah

Abstract
: Sintered products are widely used in automotive industries due to their exceptional properties (i.e, high density, porosity etc). The most recent development in microwave applications is in sintering of metal powders; surprising applications, in view of the fact that bulk metals reflect microwaves. Microwave heating and sintering is fundamentally different from the conventional sintering. In this study, properties of conventionally sintered specimens in nitrogen gas atmosphere are compared with the properties sintered by microwave heating. It has been concluded that low sintering temperature, high compaction pressure and microwave heating for shorter period of time is required for high overall density.
 
CFD: On the Prediction of Fluid Film Bearing Pressure
- Raman Kumar and R.K. Awasthi
Contact
: raman.kumar.0288@gmail.com

Abstract
: The cylindrical (plain) hydrodynamic journal bearing is the most basic hydrodynamic bearing as cylindrical bore plays a vital role in design and stable operation of rotating machinery. For stable operation of machinery, a proper understanding of the behaviour of hydrodynamic journal bearing is needed. The main objective of the current work is to make numerical analysis of a fluid-film journal bearing system for predicting fluid film pressure distribution at various eccentricities by incorporating ADI technique and developing a computer code in Fortran 90 for pressure prediction. The JFO based model of fluid film journal bearing is selected for this purpose as this model leads to more accurate prediction of pressure vis-a-vis to Reynolds boundary condition based model. In order to compute the fluid film pressure for fluid film journal bearing system, the two dimensional Reynolds equation is solved numerically using FDM. The numerical study has been performed using, a computer code developed in Fortran 90 using Salford compiler. The code is tested for various grid sizes, and an optimum grid 72 × 10 is selected which is based on minimum computational time and grid independent load. The present study then computes pressure distribution and fluid film thickness at various eccentricity ratios.
 
Data Envelopment Analysis Approach for Measuring Technical Efficiency of Libraries of Technical Colleges
- Anita Biswas, Smita Verma and D.B. Ojha
Contact
: biswas.anita28@gmail.com; yvsmita@rediffmail.com; ojhabrat@gmail.com

Abstract
: In this paper, Data Envelopment Analysis (DEA) approach has been used for measuring technical efficiency of a sample for selected libraries of technical colleges for the period of two years: 2013 and 2014. We have shown that DEA-CCR model could be an effective and efficient tool for monitoring and controlling the performance of libraries. Data about the inputs and outputs of the libraries are gathered and analyzed to compute the relative efficiency of the libraries. DEA can also assist in identifying areas where resources are misallocated. In this study we demonstrated that the DEA is a powerful non-parametric approach for measuring the efficiency of the libraries studies and it can provide a summary measure of the relative performance of each libraries. We analyze the technical efficiency of 4 randomly selected college libraries from the one city using Data Envelopment Analysis (DEA). DEA efficiency scores are calculated using Library staff and printed edition value as input and number of registered readers and book borrowed as output. Among the 4 college libraries analyzed 2 libraries are rated fully efficient for 2013-2014. A benchmark model is recommended for inefficient units.

Performance Analysis of Aodv and Dymo Routing Protocols in Wi-Max Networks
- Sheenu Agarwal, Sandeep Vijay and Ashutosh Bhatt
Contact
: sheenuagarwal9@gmail.com; sandeepvijay@gmail.com; ashutoshbhatt123@birlainstitute.co.in
Abstract: Routing protocol is the part of network layer that is responsible for deciding the route of data packets from source node to the destination node. MANET is a network of mobile nodes with the wireless radio interface. The IEEE 802.16 Wi-Max (World Wide Interoperability for Microwave Access) standard is based on global interoperability and is an emerging technology that delivers high speed wireless broadband at much lower cost to the area covering the larger distance than the cellular services and the Wi-Fi network. Mobile Ad-Hoc & Wi-Max network are presently applicable everywhere in real life, so as to solve day to day commercial needs of civilians business, business meetings outside the offices, education by the help of virtual classrooms, in Bluetooth, the transmission of multimedia applications over networks etc. AODV and DYMO are the two protocols specifically designed for MANET network and are also frequently implemented for Wi-Max network. As DYMO is a successor to the AODV protocol hence it is interesting to investigate would the DYMO implementation is better when compared to results obtained using AODV for the Wi-Max network. In this research work observations are presented regarding the performance comparison of AODV and DYMO protocols for VBR traffic source by varying the item size of data packets in Wi-Max networks.

Performance and Emission Characteristics of Diesel Engine with Microemulsion Fuels
- Ramchandra Ram and Atul Kumar Shrivastava
Contact
: ramchandra.ram@gmail.com

Abstract
: Biofuels such as biodiesel and bioethanol have utilized in many countries including India due to an imposed or the shortage of crude oils. A blend of biofuels has the superior lubricity and environmentally friendly characteristics. The properties as like density, viscosity, flashpoint, cetane number and higher heating values of microemulsion fuels were determined. A 3.73 kW stationary, constant speed CI engine was tested on nine selected biodiesel-ethanol-diesel microemulsions i.e. 200°, 195° and 190° proof ethanol microemulsions as B15E2D83, B20E2D78 and B25E2D73 respectively. The performance of the engine was evaluated in terms of fuel consumption, brake specific fuel consumption, brake thermal efficiency and energy input at no load, 25, 50, 75 and 100 per cent loads and engine speed of 1500 rpm. The emission characteristics of fuels were evaluated through the diesel engine. The emissions of CO and CO2 for microemulsion fuels of 200° proof ethanol were found to be lower at maximal operating conditions. The microemulsion fuels of 190° proof ethanol were found to be the best performance than other microemulsions at the maximal operating conditions for engine parameters, but comparable diesel fuel.

An Analysis of HYBRID FUSION Based Image Steganography Technique in Spatial Domain for Secured Data Transmission
- Indu Maurya and S.K Gupta
Contact
: indumaurya42@gmail.com; guptask_biet@rediffmail.com

Abstract
: Steganography is the technique of hiding secret information within any media like text, images, audio/video and protocol based network. Steganography is an important area of research in recent years involving a number of applications. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected. Safe and Protected communication is the most important requirement. Steganography is the process of implanting secret information into a multimedia carrier it may be text, image, video or audio etc., by hiding information in the image such a way that no one apart from the intended recipient knows of the occurrence of the message. Image fusion is the operation of mixing relevant information from two or more pictures into a single image. In this paper, the Steganography and the image fusion processes are combined. By the combination of both processes steganography and (DWT & PCA), the security will be improved. By applying hybrid fusion where the images are fused twice using an effective fusion method that provides enhanced resultant image. The project Hybrid fusion approach in image Steganography finds an effective way for enhancing security in image processing to get higher PSNR and data hiding capacity.

Prev Issue

Next Issue



CLICK HERE


Group
| Companies | Mission | Strength | Values | History | Contact us
© Narosa Publishing House