際際滷shows by User: ijtetjournal / http://www.slideshare.net/images/logo.gif 際際滷shows by User: ijtetjournal / Mon, 28 Sep 2015 08:42:10 GMT 際際滷Share feed for 際際滷shows by User: ijtetjournal Beaglebone Black Webcam Server For Security /slideshow/beaglebone-black-webcam-server-for-security/53266244 ijtet0502003-150928084210-lva1-app6891
Web server security using BeagleBone Black is based on ARM Cortex-A8 processor and Linux operating system is designed and implemented. In this project the server side consists of BeagleBone Black with angstrom OS and interfaced with webcam. The client can access the web server by proper authentication. The web server displays the web page forms like home, video, upload, settings and about. The home web page describes the functions of Web Pages. The video Web page displays the saved videos in the server and client can view or download the videos. The upload web page is used by the client to upload the files to server. The settings web page is used to change the username, password and date if needed. The about web page provides the description of the project]]>

Web server security using BeagleBone Black is based on ARM Cortex-A8 processor and Linux operating system is designed and implemented. In this project the server side consists of BeagleBone Black with angstrom OS and interfaced with webcam. The client can access the web server by proper authentication. The web server displays the web page forms like home, video, upload, settings and about. The home web page describes the functions of Web Pages. The video Web page displays the saved videos in the server and client can view or download the videos. The upload web page is used by the client to upload the files to server. The settings web page is used to change the username, password and date if needed. The about web page provides the description of the project]]>
Mon, 28 Sep 2015 08:42:10 GMT /slideshow/beaglebone-black-webcam-server-for-security/53266244 ijtetjournal@slideshare.net(ijtetjournal) Beaglebone Black Webcam Server For Security ijtetjournal Web server security using BeagleBone Black is based on ARM Cortex-A8 processor and Linux operating system is designed and implemented. In this project the server side consists of BeagleBone Black with angstrom OS and interfaced with webcam. The client can access the web server by proper authentication. The web server displays the web page forms like home, video, upload, settings and about. The home web page describes the functions of Web Pages. The video Web page displays the saved videos in the server and client can view or download the videos. The upload web page is used by the client to upload the files to server. The settings web page is used to change the username, password and date if needed. The about web page provides the description of the project <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ijtet0502003-150928084210-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Web server security using BeagleBone Black is based on ARM Cortex-A8 processor and Linux operating system is designed and implemented. In this project the server side consists of BeagleBone Black with angstrom OS and interfaced with webcam. The client can access the web server by proper authentication. The web server displays the web page forms like home, video, upload, settings and about. The home web page describes the functions of Web Pages. The video Web page displays the saved videos in the server and client can view or download the videos. The upload web page is used by the client to upload the files to server. The settings web page is used to change the username, password and date if needed. The about web page provides the description of the project
Beaglebone Black Webcam Server For Security from IJTET Journal
]]>
625 4 https://cdn.slidesharecdn.com/ss_thumbnails/ijtet0502003-150928084210-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Biometrics Authentication Using Raspberry Pi /slideshow/biometrics-authentication-using-raspberry-pi/53266234 ijtet0502001-150928084158-lva1-app6891
Biometric authentication is one of the most popular and accurate technology. Nowadays, it is used in many real time applications. However, recognizing fingerprints in Linux based embedded computers (raspberry pi) is still a very complex problem. This entire work is done on the Linux based embedded computer called raspberry pi , in which database creation and management using postgresql, web page creation using PHP language, fingerprint reader access, authentication and recognition using python were entirely done on raspberry pi This paper discusses on the standardized authentication model which is capable of extracting the fingerprints of individual and store that in database . Then I use the final fingerprint to match with others in fingerprints present in the database (postgresql) to show the capability of this model.]]>

Biometric authentication is one of the most popular and accurate technology. Nowadays, it is used in many real time applications. However, recognizing fingerprints in Linux based embedded computers (raspberry pi) is still a very complex problem. This entire work is done on the Linux based embedded computer called raspberry pi , in which database creation and management using postgresql, web page creation using PHP language, fingerprint reader access, authentication and recognition using python were entirely done on raspberry pi This paper discusses on the standardized authentication model which is capable of extracting the fingerprints of individual and store that in database . Then I use the final fingerprint to match with others in fingerprints present in the database (postgresql) to show the capability of this model.]]>
Mon, 28 Sep 2015 08:41:58 GMT /slideshow/biometrics-authentication-using-raspberry-pi/53266234 ijtetjournal@slideshare.net(ijtetjournal) Biometrics Authentication Using Raspberry Pi ijtetjournal Biometric authentication is one of the most popular and accurate technology. Nowadays, it is used in many real time applications. However, recognizing fingerprints in Linux based embedded computers (raspberry pi) is still a very complex problem. This entire work is done on the Linux based embedded computer called raspberry pi , in which database creation and management using postgresql, web page creation using PHP language, fingerprint reader access, authentication and recognition using python were entirely done on raspberry pi This paper discusses on the standardized authentication model which is capable of extracting the fingerprints of individual and store that in database . Then I use the final fingerprint to match with others in fingerprints present in the database (postgresql) to show the capability of this model. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ijtet0502001-150928084158-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Biometric authentication is one of the most popular and accurate technology. Nowadays, it is used in many real time applications. However, recognizing fingerprints in Linux based embedded computers (raspberry pi) is still a very complex problem. This entire work is done on the Linux based embedded computer called raspberry pi , in which database creation and management using postgresql, web page creation using PHP language, fingerprint reader access, authentication and recognition using python were entirely done on raspberry pi This paper discusses on the standardized authentication model which is capable of extracting the fingerprints of individual and store that in database . Then I use the final fingerprint to match with others in fingerprints present in the database (postgresql) to show the capability of this model.
Biometrics Authentication Using Raspberry Pi from IJTET Journal
]]>
1253 9 https://cdn.slidesharecdn.com/ss_thumbnails/ijtet0502001-150928084158-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks /ijtetjournal/conceal-traffic-pattern-discovery-from-revealing-form-of-ad-hoc-networks ijtet0501004-150928084148-lva1-app6892
Number of techniques has been planned supported packet secret writing to safeguard the communication in MANETs. STARS functioning supported stastical characteristics of captured raw traffic. STARS discover the relationships of offer to destination communication. To forestall STAR attack associate offer hidding technique is introduced.The pattern aims to derive the source/destination probability distribution. that's the probability for each node to entire traffic captured with link details message source/destination and conjointly the end-to-end link probability distribution that's the probability for each strive of nodes to be associate end-to-end communication strive. thence construct point-to-point traffic originate and then derive the end-to-end traffic with a set of traffic filtering rules; thus actual traffic protected against revelation attack. Through this protective mechanism efficiency of traffic enlarged by ninety fifth from attacked traffic. For a lot of sweetening to avoid overall attacks second shortest path is chosen.]]>

Number of techniques has been planned supported packet secret writing to safeguard the communication in MANETs. STARS functioning supported stastical characteristics of captured raw traffic. STARS discover the relationships of offer to destination communication. To forestall STAR attack associate offer hidding technique is introduced.The pattern aims to derive the source/destination probability distribution. that's the probability for each node to entire traffic captured with link details message source/destination and conjointly the end-to-end link probability distribution that's the probability for each strive of nodes to be associate end-to-end communication strive. thence construct point-to-point traffic originate and then derive the end-to-end traffic with a set of traffic filtering rules; thus actual traffic protected against revelation attack. Through this protective mechanism efficiency of traffic enlarged by ninety fifth from attacked traffic. For a lot of sweetening to avoid overall attacks second shortest path is chosen.]]>
Mon, 28 Sep 2015 08:41:48 GMT /ijtetjournal/conceal-traffic-pattern-discovery-from-revealing-form-of-ad-hoc-networks ijtetjournal@slideshare.net(ijtetjournal) Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks ijtetjournal Number of techniques has been planned supported packet secret writing to safeguard the communication in MANETs. STARS functioning supported stastical characteristics of captured raw traffic. STARS discover the relationships of offer to destination communication. To forestall STAR attack associate offer hidding technique is introduced.The pattern aims to derive the source/destination probability distribution. that's the probability for each node to entire traffic captured with link details message source/destination and conjointly the end-to-end link probability distribution that's the probability for each strive of nodes to be associate end-to-end communication strive. thence construct point-to-point traffic originate and then derive the end-to-end traffic with a set of traffic filtering rules; thus actual traffic protected against revelation attack. Through this protective mechanism efficiency of traffic enlarged by ninety fifth from attacked traffic. For a lot of sweetening to avoid overall attacks second shortest path is chosen. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ijtet0501004-150928084148-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Number of techniques has been planned supported packet secret writing to safeguard the communication in MANETs. STARS functioning supported stastical characteristics of captured raw traffic. STARS discover the relationships of offer to destination communication. To forestall STAR attack associate offer hidding technique is introduced.The pattern aims to derive the source/destination probability distribution. that&#39;s the probability for each node to entire traffic captured with link details message source/destination and conjointly the end-to-end link probability distribution that&#39;s the probability for each strive of nodes to be associate end-to-end communication strive. thence construct point-to-point traffic originate and then derive the end-to-end traffic with a set of traffic filtering rules; thus actual traffic protected against revelation attack. Through this protective mechanism efficiency of traffic enlarged by ninety fifth from attacked traffic. For a lot of sweetening to avoid overall attacks second shortest path is chosen.
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks from IJTET Journal
]]>
467 8 https://cdn.slidesharecdn.com/ss_thumbnails/ijtet0501004-150928084148-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor Networks /slideshow/node-failure-prevention-by-using-energy-efficient-routing-in-wireless-sensor-networks/53266215 ijtet0501003-150928084127-lva1-app6891
The most necessary issue that has to be solved in coming up with an information transmission rule for wireless unplanned networks is a way to save unplanned node energy whereas meeting the wants of applications users because the unplanned nodes are battery restricted. Whereas satisfying the energy saving demand, its conjointly necessary to realize the standard of service. Just in case of emergency work, it's necessary to deliver the information on time. Achieving quality of service in is additionally necessary. So as to realize this demand, Power - efficient Energy-Aware routing protocol for wireless unplanned networks is planned that saves the energy by expeditiously choosing the energy economical path within the routing method. When supply finds route to destination, it calculates 留 for every route. The worth 留 is predicated on largest minimum residual energy of the trail and hop count of the trail. If a route has higher 留, then that path is chosen for routing the information. The worth of 留 are higher, if the most important of minimum residual energy of the trail is higher and also the range of hop count is lower. Once the trail is chosen, knowledge is transferred on the trail. So as to extend the energy potency any transmission power of the nodes is additionally adjusted supported the situation of their neighbour. If the neighbours of a node are closely placed thereto node, then transmission vary of the node is diminished. Thus it's enough for the node to own the transmission power to achieve the neighbour at intervals that vary. As a result transmission power of the node is cut back that later on reduces the energy consumption of the node. Our planned work is simulated through Network machine (NS-2). Existing AODV and Man-Min energy routing protocol conjointly simulated through NS-2 for performance comparison. Packet Delivery quantitative relation, Energy Consumption and end-toend delay.]]>

The most necessary issue that has to be solved in coming up with an information transmission rule for wireless unplanned networks is a way to save unplanned node energy whereas meeting the wants of applications users because the unplanned nodes are battery restricted. Whereas satisfying the energy saving demand, its conjointly necessary to realize the standard of service. Just in case of emergency work, it's necessary to deliver the information on time. Achieving quality of service in is additionally necessary. So as to realize this demand, Power - efficient Energy-Aware routing protocol for wireless unplanned networks is planned that saves the energy by expeditiously choosing the energy economical path within the routing method. When supply finds route to destination, it calculates 留 for every route. The worth 留 is predicated on largest minimum residual energy of the trail and hop count of the trail. If a route has higher 留, then that path is chosen for routing the information. The worth of 留 are higher, if the most important of minimum residual energy of the trail is higher and also the range of hop count is lower. Once the trail is chosen, knowledge is transferred on the trail. So as to extend the energy potency any transmission power of the nodes is additionally adjusted supported the situation of their neighbour. If the neighbours of a node are closely placed thereto node, then transmission vary of the node is diminished. Thus it's enough for the node to own the transmission power to achieve the neighbour at intervals that vary. As a result transmission power of the node is cut back that later on reduces the energy consumption of the node. Our planned work is simulated through Network machine (NS-2). Existing AODV and Man-Min energy routing protocol conjointly simulated through NS-2 for performance comparison. Packet Delivery quantitative relation, Energy Consumption and end-toend delay.]]>
Mon, 28 Sep 2015 08:41:27 GMT /slideshow/node-failure-prevention-by-using-energy-efficient-routing-in-wireless-sensor-networks/53266215 ijtetjournal@slideshare.net(ijtetjournal) Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor Networks ijtetjournal The most necessary issue that has to be solved in coming up with an information transmission rule for wireless unplanned networks is a way to save unplanned node energy whereas meeting the wants of applications users because the unplanned nodes are battery restricted. Whereas satisfying the energy saving demand, its conjointly necessary to realize the standard of service. Just in case of emergency work, it's necessary to deliver the information on time. Achieving quality of service in is additionally necessary. So as to realize this demand, Power - efficient Energy-Aware routing protocol for wireless unplanned networks is planned that saves the energy by expeditiously choosing the energy economical path within the routing method. When supply finds route to destination, it calculates 留 for every route. The worth 留 is predicated on largest minimum residual energy of the trail and hop count of the trail. If a route has higher 留, then that path is chosen for routing the information. The worth of 留 are higher, if the most important of minimum residual energy of the trail is higher and also the range of hop count is lower. Once the trail is chosen, knowledge is transferred on the trail. So as to extend the energy potency any transmission power of the nodes is additionally adjusted supported the situation of their neighbour. If the neighbours of a node are closely placed thereto node, then transmission vary of the node is diminished. Thus it's enough for the node to own the transmission power to achieve the neighbour at intervals that vary. As a result transmission power of the node is cut back that later on reduces the energy consumption of the node. Our planned work is simulated through Network machine (NS-2). Existing AODV and Man-Min energy routing protocol conjointly simulated through NS-2 for performance comparison. Packet Delivery quantitative relation, Energy Consumption and end-toend delay. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ijtet0501003-150928084127-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The most necessary issue that has to be solved in coming up with an information transmission rule for wireless unplanned networks is a way to save unplanned node energy whereas meeting the wants of applications users because the unplanned nodes are battery restricted. Whereas satisfying the energy saving demand, its conjointly necessary to realize the standard of service. Just in case of emergency work, it&#39;s necessary to deliver the information on time. Achieving quality of service in is additionally necessary. So as to realize this demand, Power - efficient Energy-Aware routing protocol for wireless unplanned networks is planned that saves the energy by expeditiously choosing the energy economical path within the routing method. When supply finds route to destination, it calculates 留 for every route. The worth 留 is predicated on largest minimum residual energy of the trail and hop count of the trail. If a route has higher 留, then that path is chosen for routing the information. The worth of 留 are higher, if the most important of minimum residual energy of the trail is higher and also the range of hop count is lower. Once the trail is chosen, knowledge is transferred on the trail. So as to extend the energy potency any transmission power of the nodes is additionally adjusted supported the situation of their neighbour. If the neighbours of a node are closely placed thereto node, then transmission vary of the node is diminished. Thus it&#39;s enough for the node to own the transmission power to achieve the neighbour at intervals that vary. As a result transmission power of the node is cut back that later on reduces the energy consumption of the node. Our planned work is simulated through Network machine (NS-2). Existing AODV and Man-Min energy routing protocol conjointly simulated through NS-2 for performance comparison. Packet Delivery quantitative relation, Energy Consumption and end-toend delay.
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor Networks from IJTET Journal
]]>
476 5 https://cdn.slidesharecdn.com/ss_thumbnails/ijtet0501003-150928084127-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method /slideshow/prevention-of-malicious-nodes-and-attacks-in-manets-using-trust-worthy-method/53264096 ijtet0501002-150928073300-lva1-app6891
In Manet the first demand is co-operative communication among nodes. The malicious nodes might cause security issues like grey hole and cooperative attacks. To resolve these attack issue planning Dynamic supply routing mechanism, that is referred as cooperative bait detection theme (CBDS) that integrate the advantage of each proactive and reactive defence design is used. In region attacks, a node transmits a malicious broadcast informing that it's the shortest path to the destination, with the goal of intercepting messages. During this case, a malicious node (so-called region node) will attract all packets by victimisation solid Route Reply (RREP) packet to incorrectly claim that fake shortest route to the destination then discard these packets while not forwarding them to the destination. In grey hole attacks, the malicious node isn't abs initio recognized in and of itself since it turns malicious solely at a later time, preventing a trust-based security resolution from detective work its presence within the network. It then by selection discards/forwards the info packets once packets undergo it. During this we have a tendency to focus is on detective work grey hole/collaborative region attacks employing a dynamic supply routing (DSR)-based routing technique.]]>

In Manet the first demand is co-operative communication among nodes. The malicious nodes might cause security issues like grey hole and cooperative attacks. To resolve these attack issue planning Dynamic supply routing mechanism, that is referred as cooperative bait detection theme (CBDS) that integrate the advantage of each proactive and reactive defence design is used. In region attacks, a node transmits a malicious broadcast informing that it's the shortest path to the destination, with the goal of intercepting messages. During this case, a malicious node (so-called region node) will attract all packets by victimisation solid Route Reply (RREP) packet to incorrectly claim that fake shortest route to the destination then discard these packets while not forwarding them to the destination. In grey hole attacks, the malicious node isn't abs initio recognized in and of itself since it turns malicious solely at a later time, preventing a trust-based security resolution from detective work its presence within the network. It then by selection discards/forwards the info packets once packets undergo it. During this we have a tendency to focus is on detective work grey hole/collaborative region attacks employing a dynamic supply routing (DSR)-based routing technique.]]>
Mon, 28 Sep 2015 07:33:00 GMT /slideshow/prevention-of-malicious-nodes-and-attacks-in-manets-using-trust-worthy-method/53264096 ijtetjournal@slideshare.net(ijtetjournal) Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method ijtetjournal In Manet the first demand is co-operative communication among nodes. The malicious nodes might cause security issues like grey hole and cooperative attacks. To resolve these attack issue planning Dynamic supply routing mechanism, that is referred as cooperative bait detection theme (CBDS) that integrate the advantage of each proactive and reactive defence design is used. In region attacks, a node transmits a malicious broadcast informing that it's the shortest path to the destination, with the goal of intercepting messages. During this case, a malicious node (so-called region node) will attract all packets by victimisation solid Route Reply (RREP) packet to incorrectly claim that fake shortest route to the destination then discard these packets while not forwarding them to the destination. In grey hole attacks, the malicious node isn't abs initio recognized in and of itself since it turns malicious solely at a later time, preventing a trust-based security resolution from detective work its presence within the network. It then by selection discards/forwards the info packets once packets undergo it. During this we have a tendency to focus is on detective work grey hole/collaborative region attacks employing a dynamic supply routing (DSR)-based routing technique. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ijtet0501002-150928073300-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In Manet the first demand is co-operative communication among nodes. The malicious nodes might cause security issues like grey hole and cooperative attacks. To resolve these attack issue planning Dynamic supply routing mechanism, that is referred as cooperative bait detection theme (CBDS) that integrate the advantage of each proactive and reactive defence design is used. In region attacks, a node transmits a malicious broadcast informing that it&#39;s the shortest path to the destination, with the goal of intercepting messages. During this case, a malicious node (so-called region node) will attract all packets by victimisation solid Route Reply (RREP) packet to incorrectly claim that fake shortest route to the destination then discard these packets while not forwarding them to the destination. In grey hole attacks, the malicious node isn&#39;t abs initio recognized in and of itself since it turns malicious solely at a later time, preventing a trust-based security resolution from detective work its presence within the network. It then by selection discards/forwards the info packets once packets undergo it. During this we have a tendency to focus is on detective work grey hole/collaborative region attacks employing a dynamic supply routing (DSR)-based routing technique.
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method from IJTET Journal
]]>
326 8 https://cdn.slidesharecdn.com/ss_thumbnails/ijtet0501002-150928073300-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Effective Pipeline Monitoring Technology in Wireless Sensor Networks /slideshow/effective-pipeline-monitoring-technology-in-wireless-sensor-networks/53264081 ijtet0501001-150928073242-lva1-app6891
Wireless detector nodes are a promising technology to play three-dimensional applications. Even it will sight correct lead to could on top of ground and underground. In solid underground watching system makes some challenges are there to propagating the signals. The detector node is moving entire the underground pipeline and sending information to relay node that's placed within the on top of ground. If any relay node is unsuccessful during this condition suggests that it'll not sending the info. In this watching system can specially designed as a heterogeneous networks. Every high power relay nodes most covers minimum 2 low power relay node. If any relay node is unsuccessful within the network, the constellation can modification mechanically supported the heterogeneous network. The high power relay node is change the unsuccessful node and sending the condition of pipeline. The benefits are thought-about to be extremely distributed, improved packet delivery]]>

Wireless detector nodes are a promising technology to play three-dimensional applications. Even it will sight correct lead to could on top of ground and underground. In solid underground watching system makes some challenges are there to propagating the signals. The detector node is moving entire the underground pipeline and sending information to relay node that's placed within the on top of ground. If any relay node is unsuccessful during this condition suggests that it'll not sending the info. In this watching system can specially designed as a heterogeneous networks. Every high power relay nodes most covers minimum 2 low power relay node. If any relay node is unsuccessful within the network, the constellation can modification mechanically supported the heterogeneous network. The high power relay node is change the unsuccessful node and sending the condition of pipeline. The benefits are thought-about to be extremely distributed, improved packet delivery]]>
Mon, 28 Sep 2015 07:32:42 GMT /slideshow/effective-pipeline-monitoring-technology-in-wireless-sensor-networks/53264081 ijtetjournal@slideshare.net(ijtetjournal) Effective Pipeline Monitoring Technology in Wireless Sensor Networks ijtetjournal Wireless detector nodes are a promising technology to play three-dimensional applications. Even it will sight correct lead to could on top of ground and underground. In solid underground watching system makes some challenges are there to propagating the signals. The detector node is moving entire the underground pipeline and sending information to relay node that's placed within the on top of ground. If any relay node is unsuccessful during this condition suggests that it'll not sending the info. In this watching system can specially designed as a heterogeneous networks. Every high power relay nodes most covers minimum 2 low power relay node. If any relay node is unsuccessful within the network, the constellation can modification mechanically supported the heterogeneous network. The high power relay node is change the unsuccessful node and sending the condition of pipeline. The benefits are thought-about to be extremely distributed, improved packet delivery <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ijtet0501001-150928073242-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Wireless detector nodes are a promising technology to play three-dimensional applications. Even it will sight correct lead to could on top of ground and underground. In solid underground watching system makes some challenges are there to propagating the signals. The detector node is moving entire the underground pipeline and sending information to relay node that&#39;s placed within the on top of ground. If any relay node is unsuccessful during this condition suggests that it&#39;ll not sending the info. In this watching system can specially designed as a heterogeneous networks. Every high power relay nodes most covers minimum 2 low power relay node. If any relay node is unsuccessful within the network, the constellation can modification mechanically supported the heterogeneous network. The high power relay node is change the unsuccessful node and sending the condition of pipeline. The benefits are thought-about to be extremely distributed, improved packet delivery
Effective Pipeline Monitoring Technology in Wireless Sensor Networks from IJTET Journal
]]>
337 8 https://cdn.slidesharecdn.com/ss_thumbnails/ijtet0501001-150928073242-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Raspberry Pi Based Client-Server Synchronization Using GPRS /slideshow/raspberry-pi-based-clientserver-synchronization-using-gprs/53264070 ijtet05-02-002-150928073221-lva1-app6891
A low cost Internet-based attendance record embedded system for students which uses wireless technology to transfer data between the client and server is designed. The proposed system consist of a Raspberry Pi which acts as a client which stores the details of the students in the database by using user login system using web. When the user logs into the database the data is sent through GPRS to the server machine which maintains the records of the employees and the attendance is updated in the server database. The GPRS module provides a bidirectional real-time data transfer between the client and server. This system can be implemented to any real time application so as to retrieve information from a data source of the client system and send a file to the remote server through GPRS. The main aim is to avoid the limitations in Ethernet connection and design a low cost and efficient attendance record system where the data is transferred in a secure way from the client database and updated in the server database using GPRS technology]]>

A low cost Internet-based attendance record embedded system for students which uses wireless technology to transfer data between the client and server is designed. The proposed system consist of a Raspberry Pi which acts as a client which stores the details of the students in the database by using user login system using web. When the user logs into the database the data is sent through GPRS to the server machine which maintains the records of the employees and the attendance is updated in the server database. The GPRS module provides a bidirectional real-time data transfer between the client and server. This system can be implemented to any real time application so as to retrieve information from a data source of the client system and send a file to the remote server through GPRS. The main aim is to avoid the limitations in Ethernet connection and design a low cost and efficient attendance record system where the data is transferred in a secure way from the client database and updated in the server database using GPRS technology]]>
Mon, 28 Sep 2015 07:32:21 GMT /slideshow/raspberry-pi-based-clientserver-synchronization-using-gprs/53264070 ijtetjournal@slideshare.net(ijtetjournal) Raspberry Pi Based Client-Server Synchronization Using GPRS ijtetjournal A low cost Internet-based attendance record embedded system for students which uses wireless technology to transfer data between the client and server is designed. The proposed system consist of a Raspberry Pi which acts as a client which stores the details of the students in the database by using user login system using web. When the user logs into the database the data is sent through GPRS to the server machine which maintains the records of the employees and the attendance is updated in the server database. The GPRS module provides a bidirectional real-time data transfer between the client and server. This system can be implemented to any real time application so as to retrieve information from a data source of the client system and send a file to the remote server through GPRS. The main aim is to avoid the limitations in Ethernet connection and design a low cost and efficient attendance record system where the data is transferred in a secure way from the client database and updated in the server database using GPRS technology <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ijtet05-02-002-150928073221-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A low cost Internet-based attendance record embedded system for students which uses wireless technology to transfer data between the client and server is designed. The proposed system consist of a Raspberry Pi which acts as a client which stores the details of the students in the database by using user login system using web. When the user logs into the database the data is sent through GPRS to the server machine which maintains the records of the employees and the attendance is updated in the server database. The GPRS module provides a bidirectional real-time data transfer between the client and server. This system can be implemented to any real time application so as to retrieve information from a data source of the client system and send a file to the remote server through GPRS. The main aim is to avoid the limitations in Ethernet connection and design a low cost and efficient attendance record system where the data is transferred in a secure way from the client database and updated in the server database using GPRS technology
Raspberry Pi Based Client-Server Synchronization Using GPRS from IJTET Journal
]]>
724 4 https://cdn.slidesharecdn.com/ss_thumbnails/ijtet05-02-002-150928073221-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
ECG Steganography and Hash Function Based Privacy Protection of Patients Medical Information /slideshow/ecg-steganography-and-hash-function-based-privacy-protection-of-patients-medical-information/53264056 ictte446-150928073202-lva1-app6891
Data hiding can hide sensitive information into signals for covert communication. Most data hiding techniques will distort the signal in order to insert additional messages. The distortion is often small; the irreversibility is not admissible to some sensitive techniques. Most of the applications, lossless data hiding is desired to extract the embedded data and the original host signal. The project proposes the enhancement of protection system for secret data communication through encrypted data concealment in ECG signals of the patient. The proposed encryption technique used to encrypt the confidential data into unreadable form and not only enhances the safety of secret carrier information by making the information inaccessible to any intruder having a random method. For that we use twelve square ciphering techniques. The technique is used make the communication between the sender and the receiver to be authenticated is hash function. To evaluate the effectiveness of ECG wave at the proposed technique, distortion measurement techniques of two are used, the percentage residue difference (PWD) and wavelets weighted PRD. Proposed technique provides high security protection for patient data with low distortion is proven in this proposed system.]]>

Data hiding can hide sensitive information into signals for covert communication. Most data hiding techniques will distort the signal in order to insert additional messages. The distortion is often small; the irreversibility is not admissible to some sensitive techniques. Most of the applications, lossless data hiding is desired to extract the embedded data and the original host signal. The project proposes the enhancement of protection system for secret data communication through encrypted data concealment in ECG signals of the patient. The proposed encryption technique used to encrypt the confidential data into unreadable form and not only enhances the safety of secret carrier information by making the information inaccessible to any intruder having a random method. For that we use twelve square ciphering techniques. The technique is used make the communication between the sender and the receiver to be authenticated is hash function. To evaluate the effectiveness of ECG wave at the proposed technique, distortion measurement techniques of two are used, the percentage residue difference (PWD) and wavelets weighted PRD. Proposed technique provides high security protection for patient data with low distortion is proven in this proposed system.]]>
Mon, 28 Sep 2015 07:32:02 GMT /slideshow/ecg-steganography-and-hash-function-based-privacy-protection-of-patients-medical-information/53264056 ijtetjournal@slideshare.net(ijtetjournal) ECG Steganography and Hash Function Based Privacy Protection of Patients Medical Information ijtetjournal Data hiding can hide sensitive information into signals for covert communication. Most data hiding techniques will distort the signal in order to insert additional messages. The distortion is often small; the irreversibility is not admissible to some sensitive techniques. Most of the applications, lossless data hiding is desired to extract the embedded data and the original host signal. The project proposes the enhancement of protection system for secret data communication through encrypted data concealment in ECG signals of the patient. The proposed encryption technique used to encrypt the confidential data into unreadable form and not only enhances the safety of secret carrier information by making the information inaccessible to any intruder having a random method. For that we use twelve square ciphering techniques. The technique is used make the communication between the sender and the receiver to be authenticated is hash function. To evaluate the effectiveness of ECG wave at the proposed technique, distortion measurement techniques of two are used, the percentage residue difference (PWD) and wavelets weighted PRD. Proposed technique provides high security protection for patient data with low distortion is proven in this proposed system. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ictte446-150928073202-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Data hiding can hide sensitive information into signals for covert communication. Most data hiding techniques will distort the signal in order to insert additional messages. The distortion is often small; the irreversibility is not admissible to some sensitive techniques. Most of the applications, lossless data hiding is desired to extract the embedded data and the original host signal. The project proposes the enhancement of protection system for secret data communication through encrypted data concealment in ECG signals of the patient. The proposed encryption technique used to encrypt the confidential data into unreadable form and not only enhances the safety of secret carrier information by making the information inaccessible to any intruder having a random method. For that we use twelve square ciphering techniques. The technique is used make the communication between the sender and the receiver to be authenticated is hash function. To evaluate the effectiveness of ECG wave at the proposed technique, distortion measurement techniques of two are used, the percentage residue difference (PWD) and wavelets weighted PRD. Proposed technique provides high security protection for patient data with low distortion is proven in this proposed system.
ECG Steganography and Hash Function Based Privacy Protection of Patients Medical Information from IJTET Journal
]]>
367 4 https://cdn.slidesharecdn.com/ss_thumbnails/ictte446-150928073202-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes /slideshow/an-efficient-decoding-algorithm-for-concatenated-turbocrc-codes/53264032 ictte440-150928073121-lva1-app6891
In this paper, a hybrid turbo decoding algorithm is used, in which the outer code, Cyclic Redundancy Check code is not used for detection of errors as usual but for error correction and improvement. This algorithm effectively combines the iterative decoding algorithm with Rate-Compatible Insertion Convolution Turbo Decoding, where the CRC code and the turbo code are regarded as an integrated whole in the Decoding process. Altogether we propose an effective error detecting method based on normalized Euclidean distance to compensate for the loss of error detection capability which should have been provided by CRC code. Simulation results show that with the proposed approach, 0.5-2dB performance gain can be achieved for the code blocks with short information length]]>

In this paper, a hybrid turbo decoding algorithm is used, in which the outer code, Cyclic Redundancy Check code is not used for detection of errors as usual but for error correction and improvement. This algorithm effectively combines the iterative decoding algorithm with Rate-Compatible Insertion Convolution Turbo Decoding, where the CRC code and the turbo code are regarded as an integrated whole in the Decoding process. Altogether we propose an effective error detecting method based on normalized Euclidean distance to compensate for the loss of error detection capability which should have been provided by CRC code. Simulation results show that with the proposed approach, 0.5-2dB performance gain can be achieved for the code blocks with short information length]]>
Mon, 28 Sep 2015 07:31:20 GMT /slideshow/an-efficient-decoding-algorithm-for-concatenated-turbocrc-codes/53264032 ijtetjournal@slideshare.net(ijtetjournal) An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes ijtetjournal In this paper, a hybrid turbo decoding algorithm is used, in which the outer code, Cyclic Redundancy Check code is not used for detection of errors as usual but for error correction and improvement. This algorithm effectively combines the iterative decoding algorithm with Rate-Compatible Insertion Convolution Turbo Decoding, where the CRC code and the turbo code are regarded as an integrated whole in the Decoding process. Altogether we propose an effective error detecting method based on normalized Euclidean distance to compensate for the loss of error detection capability which should have been provided by CRC code. Simulation results show that with the proposed approach, 0.5-2dB performance gain can be achieved for the code blocks with short information length <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ictte440-150928073121-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this paper, a hybrid turbo decoding algorithm is used, in which the outer code, Cyclic Redundancy Check code is not used for detection of errors as usual but for error correction and improvement. This algorithm effectively combines the iterative decoding algorithm with Rate-Compatible Insertion Convolution Turbo Decoding, where the CRC code and the turbo code are regarded as an integrated whole in the Decoding process. Altogether we propose an effective error detecting method based on normalized Euclidean distance to compensate for the loss of error detection capability which should have been provided by CRC code. Simulation results show that with the proposed approach, 0.5-2dB performance gain can be achieved for the code blocks with short information length
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes from IJTET Journal
]]>
222 4 https://cdn.slidesharecdn.com/ss_thumbnails/ictte440-150928073121-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Improved Trans-Z-source Inverter for Automobile Application /slideshow/improved-transzsource-inverter-for-automobile-application/53264002 ictte343-150928073020-lva1-app6892
In this paper a new technology is proposed with a replacement of conventional voltage source/current source inverter with Improved Trans-Z-source inverter in automobile applications. The improved Trans-Z-source inverter has a high boost inversion capability and continues input current. Also this new inverter can suppress the resonant current at the startup; this resonant current in the startup may lead the device to permanent damage. In improved Trans-Z-source inverter a couple inductor is needed, instead of this coupled inductor a transformer is used. By using a transformer with sufficient turns ratio the size can be reduced. The turns ratio of the transformer decides the input voltage of the inverter. In this paper operating principle, comparison with conventional inverters, working with automobiles simulation results, THD analysis, Hardware implementation using ATMEGA 328 P are included.]]>

In this paper a new technology is proposed with a replacement of conventional voltage source/current source inverter with Improved Trans-Z-source inverter in automobile applications. The improved Trans-Z-source inverter has a high boost inversion capability and continues input current. Also this new inverter can suppress the resonant current at the startup; this resonant current in the startup may lead the device to permanent damage. In improved Trans-Z-source inverter a couple inductor is needed, instead of this coupled inductor a transformer is used. By using a transformer with sufficient turns ratio the size can be reduced. The turns ratio of the transformer decides the input voltage of the inverter. In this paper operating principle, comparison with conventional inverters, working with automobiles simulation results, THD analysis, Hardware implementation using ATMEGA 328 P are included.]]>
Mon, 28 Sep 2015 07:30:20 GMT /slideshow/improved-transzsource-inverter-for-automobile-application/53264002 ijtetjournal@slideshare.net(ijtetjournal) Improved Trans-Z-source Inverter for Automobile Application ijtetjournal In this paper a new technology is proposed with a replacement of conventional voltage source/current source inverter with Improved Trans-Z-source inverter in automobile applications. The improved Trans-Z-source inverter has a high boost inversion capability and continues input current. Also this new inverter can suppress the resonant current at the startup; this resonant current in the startup may lead the device to permanent damage. In improved Trans-Z-source inverter a couple inductor is needed, instead of this coupled inductor a transformer is used. By using a transformer with sufficient turns ratio the size can be reduced. The turns ratio of the transformer decides the input voltage of the inverter. In this paper operating principle, comparison with conventional inverters, working with automobiles simulation results, THD analysis, Hardware implementation using ATMEGA 328 P are included. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ictte343-150928073020-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this paper a new technology is proposed with a replacement of conventional voltage source/current source inverter with Improved Trans-Z-source inverter in automobile applications. The improved Trans-Z-source inverter has a high boost inversion capability and continues input current. Also this new inverter can suppress the resonant current at the startup; this resonant current in the startup may lead the device to permanent damage. In improved Trans-Z-source inverter a couple inductor is needed, instead of this coupled inductor a transformer is used. By using a transformer with sufficient turns ratio the size can be reduced. The turns ratio of the transformer decides the input voltage of the inverter. In this paper operating principle, comparison with conventional inverters, working with automobiles simulation results, THD analysis, Hardware implementation using ATMEGA 328 P are included.
Improved Trans-Z-source Inverter for Automobile Application from IJTET Journal
]]>
474 4 https://cdn.slidesharecdn.com/ss_thumbnails/ictte343-150928073020-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Converter /ijtetjournal/wind-energy-conversion-system-using-pmsg-with-tsource-three-phase-matrix-converter ictte331-150928072947-lva1-app6892
This paper presents an analysis of a PMSG wind power system using T-Sourcethree phase matrix converter. PMSG using T-Source three phase matrix converterhas advantages that it can provide any desired AC output voltage regardless of DC input with regulation in shoot-through time. In this control system T-Source capacitor voltage can be kept stable with variations in the shoot-through time, maximum power from the wind turbine to be delivered. Inaddition, of a new future, the converter employs a safe-commutation strategy toconduct along a continuous current flow, which results in theelimination of voltage spikes on switches without the need for a snubber circuit. With the use of matrix converter the surely need forrectifier circuit and passive components to store energy arereduced. The MATLAB/Simulinkmodel of the overall system is carried out and theoretical wind energy conversion output load voltage calculations are madeand feasibility of the new topology has been verified and that theconverter can produce an output voltage and output current. This proposed method has greater efficiency and lower cost.]]>

This paper presents an analysis of a PMSG wind power system using T-Sourcethree phase matrix converter. PMSG using T-Source three phase matrix converterhas advantages that it can provide any desired AC output voltage regardless of DC input with regulation in shoot-through time. In this control system T-Source capacitor voltage can be kept stable with variations in the shoot-through time, maximum power from the wind turbine to be delivered. Inaddition, of a new future, the converter employs a safe-commutation strategy toconduct along a continuous current flow, which results in theelimination of voltage spikes on switches without the need for a snubber circuit. With the use of matrix converter the surely need forrectifier circuit and passive components to store energy arereduced. The MATLAB/Simulinkmodel of the overall system is carried out and theoretical wind energy conversion output load voltage calculations are madeand feasibility of the new topology has been verified and that theconverter can produce an output voltage and output current. This proposed method has greater efficiency and lower cost.]]>
Mon, 28 Sep 2015 07:29:47 GMT /ijtetjournal/wind-energy-conversion-system-using-pmsg-with-tsource-three-phase-matrix-converter ijtetjournal@slideshare.net(ijtetjournal) Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Converter ijtetjournal This paper presents an analysis of a PMSG wind power system using T-Sourcethree phase matrix converter. PMSG using T-Source three phase matrix converterhas advantages that it can provide any desired AC output voltage regardless of DC input with regulation in shoot-through time. In this control system T-Source capacitor voltage can be kept stable with variations in the shoot-through time, maximum power from the wind turbine to be delivered. Inaddition, of a new future, the converter employs a safe-commutation strategy toconduct along a continuous current flow, which results in theelimination of voltage spikes on switches without the need for a snubber circuit. With the use of matrix converter the surely need forrectifier circuit and passive components to store energy arereduced. The MATLAB/Simulinkmodel of the overall system is carried out and theoretical wind energy conversion output load voltage calculations are madeand feasibility of the new topology has been verified and that theconverter can produce an output voltage and output current. This proposed method has greater efficiency and lower cost. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ictte331-150928072947-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This paper presents an analysis of a PMSG wind power system using T-Sourcethree phase matrix converter. PMSG using T-Source three phase matrix converterhas advantages that it can provide any desired AC output voltage regardless of DC input with regulation in shoot-through time. In this control system T-Source capacitor voltage can be kept stable with variations in the shoot-through time, maximum power from the wind turbine to be delivered. Inaddition, of a new future, the converter employs a safe-commutation strategy toconduct along a continuous current flow, which results in theelimination of voltage spikes on switches without the need for a snubber circuit. With the use of matrix converter the surely need forrectifier circuit and passive components to store energy arereduced. The MATLAB/Simulinkmodel of the overall system is carried out and theoretical wind energy conversion output load voltage calculations are madeand feasibility of the new topology has been verified and that theconverter can produce an output voltage and output current. This proposed method has greater efficiency and lower cost.
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Converter from IJTET Journal
]]>
736 6 https://cdn.slidesharecdn.com/ss_thumbnails/ictte331-150928072947-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Comprehensive Path Quality Measurement in Wireless Sensor Networks /slideshow/comprehensive-path-quality-measurement-in-wireless-sensor-networks/53263883 ictte330-150928072631-lva1-app6891
A wireless sensor network mostly relies on multi-hop transmissions to deliver a data packet. It is of essential importance to measure the quality of multi-hop paths and such information shall be utilized in designing efficient routing strategies. Existing metrics like ETF, ETX mainly focus on quantifying the link performance in between the nodes while overlooking the forwarding capabilities inside the sensor nodes. By combining the QoF measurements within a node and over a link, we are able to comprehensively measure the intact path quality in designing efficient multihop routing protocols. We propose QoF, Quality of Forwarding, a new metric which explores the performance in the gray zone inside a node left unattended in previous studies. We implement QoF and build a modified Collection Tree Protocol.]]>

A wireless sensor network mostly relies on multi-hop transmissions to deliver a data packet. It is of essential importance to measure the quality of multi-hop paths and such information shall be utilized in designing efficient routing strategies. Existing metrics like ETF, ETX mainly focus on quantifying the link performance in between the nodes while overlooking the forwarding capabilities inside the sensor nodes. By combining the QoF measurements within a node and over a link, we are able to comprehensively measure the intact path quality in designing efficient multihop routing protocols. We propose QoF, Quality of Forwarding, a new metric which explores the performance in the gray zone inside a node left unattended in previous studies. We implement QoF and build a modified Collection Tree Protocol.]]>
Mon, 28 Sep 2015 07:26:31 GMT /slideshow/comprehensive-path-quality-measurement-in-wireless-sensor-networks/53263883 ijtetjournal@slideshare.net(ijtetjournal) Comprehensive Path Quality Measurement in Wireless Sensor Networks ijtetjournal A wireless sensor network mostly relies on multi-hop transmissions to deliver a data packet. It is of essential importance to measure the quality of multi-hop paths and such information shall be utilized in designing efficient routing strategies. Existing metrics like ETF, ETX mainly focus on quantifying the link performance in between the nodes while overlooking the forwarding capabilities inside the sensor nodes. By combining the QoF measurements within a node and over a link, we are able to comprehensively measure the intact path quality in designing efficient multihop routing protocols. We propose QoF, Quality of Forwarding, a new metric which explores the performance in the gray zone inside a node left unattended in previous studies. We implement QoF and build a modified Collection Tree Protocol. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ictte330-150928072631-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A wireless sensor network mostly relies on multi-hop transmissions to deliver a data packet. It is of essential importance to measure the quality of multi-hop paths and such information shall be utilized in designing efficient routing strategies. Existing metrics like ETF, ETX mainly focus on quantifying the link performance in between the nodes while overlooking the forwarding capabilities inside the sensor nodes. By combining the QoF measurements within a node and over a link, we are able to comprehensively measure the intact path quality in designing efficient multihop routing protocols. We propose QoF, Quality of Forwarding, a new metric which explores the performance in the gray zone inside a node left unattended in previous studies. We implement QoF and build a modified Collection Tree Protocol.
Comprehensive Path Quality Measurement in Wireless Sensor Networks from IJTET Journal
]]>
185 4 https://cdn.slidesharecdn.com/ss_thumbnails/ictte330-150928072631-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Optimizing Data Confidentiality using Integrated Multi Query Services /slideshow/optimizing-data-confidentiality-using-integrated-multi-query-services/53263867 ictte326-150928072557-lva1-app6892
Query services have experienced terribly massive growth within past few years for that reason large usage of services need to balance outsourcing data management to Cloud service providers that provide query services to the client for data owners, therefore data owner needs data confidentiality as well as query privacy to be guaranteed attributable to disloyal behavior of cloud service provider consequently enhancing data confidentiality must not be compromise the query processed performance. It is not significant to provide slow query services as the result of security along with privacy assurance. We propose the random space perturbation data perturbation method to provide secure with kNN(k-nearest-neighbor) range query services for protecting data in the cloud and Frequency Structured R-Tree (FSR-Tree) efficient range query. Our schemes enhance data confidentiality without compromising the FSR-TREE query processing performance that also increases the user experience.]]>

Query services have experienced terribly massive growth within past few years for that reason large usage of services need to balance outsourcing data management to Cloud service providers that provide query services to the client for data owners, therefore data owner needs data confidentiality as well as query privacy to be guaranteed attributable to disloyal behavior of cloud service provider consequently enhancing data confidentiality must not be compromise the query processed performance. It is not significant to provide slow query services as the result of security along with privacy assurance. We propose the random space perturbation data perturbation method to provide secure with kNN(k-nearest-neighbor) range query services for protecting data in the cloud and Frequency Structured R-Tree (FSR-Tree) efficient range query. Our schemes enhance data confidentiality without compromising the FSR-TREE query processing performance that also increases the user experience.]]>
Mon, 28 Sep 2015 07:25:57 GMT /slideshow/optimizing-data-confidentiality-using-integrated-multi-query-services/53263867 ijtetjournal@slideshare.net(ijtetjournal) Optimizing Data Confidentiality using Integrated Multi Query Services ijtetjournal Query services have experienced terribly massive growth within past few years for that reason large usage of services need to balance outsourcing data management to Cloud service providers that provide query services to the client for data owners, therefore data owner needs data confidentiality as well as query privacy to be guaranteed attributable to disloyal behavior of cloud service provider consequently enhancing data confidentiality must not be compromise the query processed performance. It is not significant to provide slow query services as the result of security along with privacy assurance. We propose the random space perturbation data perturbation method to provide secure with kNN(k-nearest-neighbor) range query services for protecting data in the cloud and Frequency Structured R-Tree (FSR-Tree) efficient range query. Our schemes enhance data confidentiality without compromising the FSR-TREE query processing performance that also increases the user experience. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ictte326-150928072557-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Query services have experienced terribly massive growth within past few years for that reason large usage of services need to balance outsourcing data management to Cloud service providers that provide query services to the client for data owners, therefore data owner needs data confidentiality as well as query privacy to be guaranteed attributable to disloyal behavior of cloud service provider consequently enhancing data confidentiality must not be compromise the query processed performance. It is not significant to provide slow query services as the result of security along with privacy assurance. We propose the random space perturbation data perturbation method to provide secure with kNN(k-nearest-neighbor) range query services for protecting data in the cloud and Frequency Structured R-Tree (FSR-Tree) efficient range query. Our schemes enhance data confidentiality without compromising the FSR-TREE query processing performance that also increases the user experience.
Optimizing Data Confidentiality using Integrated Multi Query Services from IJTET Journal
]]>
197 4 https://cdn.slidesharecdn.com/ss_thumbnails/ictte326-150928072557-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Foliage Measurement Using Image Processing Techniques /slideshow/foliage-measurement-using-image-processing-techniques/53263862 ictte323-150928072541-lva1-app6892
Automatic detection of fruit and leaf diseases is essential to automatically detect the symptoms of diseases as early as they appear on the growing stage. This system helps to detect the diseases on fruit during farming , right from plan and easily monitoring the diseases of grapes leaf and apple fruit. By using this system we can avoid the economical loss due to various diseases in agriculture production. K-means clustering technique is used for segmentation. The features are extracted from the segmented image and artificial neural network is used for training the image database and classified their performance to the respective disease categories. The experimental results express that what type of disease can be affected in the fruit and leaf .]]>

Automatic detection of fruit and leaf diseases is essential to automatically detect the symptoms of diseases as early as they appear on the growing stage. This system helps to detect the diseases on fruit during farming , right from plan and easily monitoring the diseases of grapes leaf and apple fruit. By using this system we can avoid the economical loss due to various diseases in agriculture production. K-means clustering technique is used for segmentation. The features are extracted from the segmented image and artificial neural network is used for training the image database and classified their performance to the respective disease categories. The experimental results express that what type of disease can be affected in the fruit and leaf .]]>
Mon, 28 Sep 2015 07:25:41 GMT /slideshow/foliage-measurement-using-image-processing-techniques/53263862 ijtetjournal@slideshare.net(ijtetjournal) Foliage Measurement Using Image Processing Techniques ijtetjournal Automatic detection of fruit and leaf diseases is essential to automatically detect the symptoms of diseases as early as they appear on the growing stage. This system helps to detect the diseases on fruit during farming , right from plan and easily monitoring the diseases of grapes leaf and apple fruit. By using this system we can avoid the economical loss due to various diseases in agriculture production. K-means clustering technique is used for segmentation. The features are extracted from the segmented image and artificial neural network is used for training the image database and classified their performance to the respective disease categories. The experimental results express that what type of disease can be affected in the fruit and leaf . <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ictte323-150928072541-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Automatic detection of fruit and leaf diseases is essential to automatically detect the symptoms of diseases as early as they appear on the growing stage. This system helps to detect the diseases on fruit during farming , right from plan and easily monitoring the diseases of grapes leaf and apple fruit. By using this system we can avoid the economical loss due to various diseases in agriculture production. K-means clustering technique is used for segmentation. The features are extracted from the segmented image and artificial neural network is used for training the image database and classified their performance to the respective disease categories. The experimental results express that what type of disease can be affected in the fruit and leaf .
Foliage Measurement Using Image Processing Techniques from IJTET Journal
]]>
345 5 https://cdn.slidesharecdn.com/ss_thumbnails/ictte323-150928072541-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System /slideshow/harmonic-mitigation-method-for-the-dcac-converter-in-a-single-phase-system/53263824 ictte322-150928072454-lva1-app6891
This project suggest a sine-wave modulation technique is to achieve a low total harmonic distortion of Buck-Boost converter connected to a changing polarity inverter in a system. The suggested technique improves the harmonic content of the output. In addition, a proportional-resonant Integral controller is used along with harmonic compensation techniques for eliminating the DC component in the system. Also, the performance of the Proposed controller is analyzed when it connecting to the converter. The design of Buck-Boost converter is fed by modulated sine wave Pulse width modulation technique are proposed to mitigate the low order harmonics and to control the output current. So, that the output complies within the standard limit without use of low pass filter.]]>

This project suggest a sine-wave modulation technique is to achieve a low total harmonic distortion of Buck-Boost converter connected to a changing polarity inverter in a system. The suggested technique improves the harmonic content of the output. In addition, a proportional-resonant Integral controller is used along with harmonic compensation techniques for eliminating the DC component in the system. Also, the performance of the Proposed controller is analyzed when it connecting to the converter. The design of Buck-Boost converter is fed by modulated sine wave Pulse width modulation technique are proposed to mitigate the low order harmonics and to control the output current. So, that the output complies within the standard limit without use of low pass filter.]]>
Mon, 28 Sep 2015 07:24:54 GMT /slideshow/harmonic-mitigation-method-for-the-dcac-converter-in-a-single-phase-system/53263824 ijtetjournal@slideshare.net(ijtetjournal) Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System ijtetjournal This project suggest a sine-wave modulation technique is to achieve a low total harmonic distortion of Buck-Boost converter connected to a changing polarity inverter in a system. The suggested technique improves the harmonic content of the output. In addition, a proportional-resonant Integral controller is used along with harmonic compensation techniques for eliminating the DC component in the system. Also, the performance of the Proposed controller is analyzed when it connecting to the converter. The design of Buck-Boost converter is fed by modulated sine wave Pulse width modulation technique are proposed to mitigate the low order harmonics and to control the output current. So, that the output complies within the standard limit without use of low pass filter. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ictte322-150928072454-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This project suggest a sine-wave modulation technique is to achieve a low total harmonic distortion of Buck-Boost converter connected to a changing polarity inverter in a system. The suggested technique improves the harmonic content of the output. In addition, a proportional-resonant Integral controller is used along with harmonic compensation techniques for eliminating the DC component in the system. Also, the performance of the Proposed controller is analyzed when it connecting to the converter. The design of Buck-Boost converter is fed by modulated sine wave Pulse width modulation technique are proposed to mitigate the low order harmonics and to control the output current. So, that the output complies within the standard limit without use of low pass filter.
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System from IJTET Journal
]]>
387 5 https://cdn.slidesharecdn.com/ss_thumbnails/ictte322-150928072454-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Comparative Study on NDCT with Different Shell Supporting Structures /slideshow/comparative-study-on-ndct-with-different-shell-supporting-structures/53263133 ictte309-150928070151-lva1-app6892
Natural draft cooling towers are very essential in modern days in thermal and nuclear power stations. These are the hyperbolic shells of revolution in form and are supported on inclined columns. Several types of shell supporting structures such as A,V,X,Y are being used for construction of NDCTs. Wind loading on NDCT governs critical cases and requires attention. In this paper a comparative study on reinforcement details has been done on NDCTs with X and Y shell supporting structures. For this purpose 166m cooling tower with X and Y supporting structures being analyzed and design for wind (BS & IS code methods), seismic loads using SAP2000.]]>

Natural draft cooling towers are very essential in modern days in thermal and nuclear power stations. These are the hyperbolic shells of revolution in form and are supported on inclined columns. Several types of shell supporting structures such as A,V,X,Y are being used for construction of NDCTs. Wind loading on NDCT governs critical cases and requires attention. In this paper a comparative study on reinforcement details has been done on NDCTs with X and Y shell supporting structures. For this purpose 166m cooling tower with X and Y supporting structures being analyzed and design for wind (BS & IS code methods), seismic loads using SAP2000.]]>
Mon, 28 Sep 2015 07:01:50 GMT /slideshow/comparative-study-on-ndct-with-different-shell-supporting-structures/53263133 ijtetjournal@slideshare.net(ijtetjournal) Comparative Study on NDCT with Different Shell Supporting Structures ijtetjournal Natural draft cooling towers are very essential in modern days in thermal and nuclear power stations. These are the hyperbolic shells of revolution in form and are supported on inclined columns. Several types of shell supporting structures such as A,V,X,Y are being used for construction of NDCTs. Wind loading on NDCT governs critical cases and requires attention. In this paper a comparative study on reinforcement details has been done on NDCTs with X and Y shell supporting structures. For this purpose 166m cooling tower with X and Y supporting structures being analyzed and design for wind (BS & IS code methods), seismic loads using SAP2000. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ictte309-150928070151-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Natural draft cooling towers are very essential in modern days in thermal and nuclear power stations. These are the hyperbolic shells of revolution in form and are supported on inclined columns. Several types of shell supporting structures such as A,V,X,Y are being used for construction of NDCTs. Wind loading on NDCT governs critical cases and requires attention. In this paper a comparative study on reinforcement details has been done on NDCTs with X and Y shell supporting structures. For this purpose 166m cooling tower with X and Y supporting structures being analyzed and design for wind (BS &amp; IS code methods), seismic loads using SAP2000.
Comparative Study on NDCT with Different Shell Supporting Structures from IJTET Journal
]]>
514 7 https://cdn.slidesharecdn.com/ss_thumbnails/ictte309-150928070151-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems using Self Compacting Concrete /slideshow/experimental-investigation-of-lateral-pressure-on-vertical-formwork-systems-using-self-compacting-concrete/53263126 ictte308-150928070133-lva1-app6891
The modeling of pressure distribution of fresh concrete poured in vertical formwork are rather dynamic than complex. Many researchers had worked on the pressure distribution modeling of concrete and formulated empirical relationship factors like formwork height, rate of pour, consistency classes of concrete. However, in the current scenario, most of high rise construction uses self compacting concrete(SCC) which is a special concrete which utilizes not only mineral and chemical admixtures but also varied aggregate proportions and hence modeling pressure distribution of SCC over other concrete in vertical formwork systems is necessitated. This research seeks to bridge the gap between the theoretical formulation of pressure distribution with the actual modeled (scaled) vertical formwork systems. The pressure distribution of SCC in the laboratory will be determined using pressure sensors, modeled and analyzed.]]>

The modeling of pressure distribution of fresh concrete poured in vertical formwork are rather dynamic than complex. Many researchers had worked on the pressure distribution modeling of concrete and formulated empirical relationship factors like formwork height, rate of pour, consistency classes of concrete. However, in the current scenario, most of high rise construction uses self compacting concrete(SCC) which is a special concrete which utilizes not only mineral and chemical admixtures but also varied aggregate proportions and hence modeling pressure distribution of SCC over other concrete in vertical formwork systems is necessitated. This research seeks to bridge the gap between the theoretical formulation of pressure distribution with the actual modeled (scaled) vertical formwork systems. The pressure distribution of SCC in the laboratory will be determined using pressure sensors, modeled and analyzed.]]>
Mon, 28 Sep 2015 07:01:33 GMT /slideshow/experimental-investigation-of-lateral-pressure-on-vertical-formwork-systems-using-self-compacting-concrete/53263126 ijtetjournal@slideshare.net(ijtetjournal) Experimental Investigation of Lateral Pressure on Vertical Formwork Systems using Self Compacting Concrete ijtetjournal The modeling of pressure distribution of fresh concrete poured in vertical formwork are rather dynamic than complex. Many researchers had worked on the pressure distribution modeling of concrete and formulated empirical relationship factors like formwork height, rate of pour, consistency classes of concrete. However, in the current scenario, most of high rise construction uses self compacting concrete(SCC) which is a special concrete which utilizes not only mineral and chemical admixtures but also varied aggregate proportions and hence modeling pressure distribution of SCC over other concrete in vertical formwork systems is necessitated. This research seeks to bridge the gap between the theoretical formulation of pressure distribution with the actual modeled (scaled) vertical formwork systems. The pressure distribution of SCC in the laboratory will be determined using pressure sensors, modeled and analyzed. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ictte308-150928070133-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The modeling of pressure distribution of fresh concrete poured in vertical formwork are rather dynamic than complex. Many researchers had worked on the pressure distribution modeling of concrete and formulated empirical relationship factors like formwork height, rate of pour, consistency classes of concrete. However, in the current scenario, most of high rise construction uses self compacting concrete(SCC) which is a special concrete which utilizes not only mineral and chemical admixtures but also varied aggregate proportions and hence modeling pressure distribution of SCC over other concrete in vertical formwork systems is necessitated. This research seeks to bridge the gap between the theoretical formulation of pressure distribution with the actual modeled (scaled) vertical formwork systems. The pressure distribution of SCC in the laboratory will be determined using pressure sensors, modeled and analyzed.
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems using Self Compacting Concrete from IJTET Journal
]]>
461 4 https://cdn.slidesharecdn.com/ss_thumbnails/ictte308-150928070133-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
A Five Level Integrated AC DC Converter /slideshow/a-five-level-integrated-ac-dc-converter/53263117 ictte320-150928070107-lva1-app6891
This paper presents the implementation of a new five level integrated AC DC converter with high input power factor and reduced input current harmonics complied with IEC1000-3-2 harmonic standards for electrical equipments. The proposed topology is a combination of boost input power factor pre regulator and five level DC DC converter. The single stage PFC (SSPFC) approach used in this topology is an alternative solution to low power and cost effective applications.]]>

This paper presents the implementation of a new five level integrated AC DC converter with high input power factor and reduced input current harmonics complied with IEC1000-3-2 harmonic standards for electrical equipments. The proposed topology is a combination of boost input power factor pre regulator and five level DC DC converter. The single stage PFC (SSPFC) approach used in this topology is an alternative solution to low power and cost effective applications.]]>
Mon, 28 Sep 2015 07:01:07 GMT /slideshow/a-five-level-integrated-ac-dc-converter/53263117 ijtetjournal@slideshare.net(ijtetjournal) A Five Level Integrated AC DC Converter ijtetjournal This paper presents the implementation of a new five level integrated AC DC converter with high input power factor and reduced input current harmonics complied with IEC1000-3-2 harmonic standards for electrical equipments. The proposed topology is a combination of boost input power factor pre regulator and five level DC DC converter. The single stage PFC (SSPFC) approach used in this topology is an alternative solution to low power and cost effective applications. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ictte320-150928070107-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This paper presents the implementation of a new five level integrated AC DC converter with high input power factor and reduced input current harmonics complied with IEC1000-3-2 harmonic standards for electrical equipments. The proposed topology is a combination of boost input power factor pre regulator and five level DC DC converter. The single stage PFC (SSPFC) approach used in this topology is an alternative solution to low power and cost effective applications.
A Five Level Integrated AC DC Converter from IJTET Journal
]]>
478 4 https://cdn.slidesharecdn.com/ss_thumbnails/ictte320-150928070107-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein and Finger Vein Fusion /ijtetjournal/a-comprehensive-approach-for-multi-biometric-recognition-using-sclera-vein-and-finger-vein-fusion ictte298-150928065802-lva1-app6892
Sclera and finger print vein fusion is a new biometric approach for uniquely identifying humans. First, Sclera vein is identified and refined using image enhancement techniques. Then Y shape feature extraction algorithm is used to obtain Y shape pattern which are then fused with finger vein pattern. Second, Finger vein pattern is obtained using CCD camera by passing infrared light through the finger. The obtained image is then enhanced. A line shape feature extraction algorithm is used to get line patterns from enhanced finger vein image. Finally Sclera vein image pattern and Finger vein image pattern were combined to get the final fused image. The image thus obtained can be used to uniquely identify a person. The proposed multimodal system will produce accurate results as it combines two main traits of an individual. Therefore, it can be used in human identification and authentication systems.]]>

Sclera and finger print vein fusion is a new biometric approach for uniquely identifying humans. First, Sclera vein is identified and refined using image enhancement techniques. Then Y shape feature extraction algorithm is used to obtain Y shape pattern which are then fused with finger vein pattern. Second, Finger vein pattern is obtained using CCD camera by passing infrared light through the finger. The obtained image is then enhanced. A line shape feature extraction algorithm is used to get line patterns from enhanced finger vein image. Finally Sclera vein image pattern and Finger vein image pattern were combined to get the final fused image. The image thus obtained can be used to uniquely identify a person. The proposed multimodal system will produce accurate results as it combines two main traits of an individual. Therefore, it can be used in human identification and authentication systems.]]>
Mon, 28 Sep 2015 06:58:02 GMT /ijtetjournal/a-comprehensive-approach-for-multi-biometric-recognition-using-sclera-vein-and-finger-vein-fusion ijtetjournal@slideshare.net(ijtetjournal) A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein and Finger Vein Fusion ijtetjournal Sclera and finger print vein fusion is a new biometric approach for uniquely identifying humans. First, Sclera vein is identified and refined using image enhancement techniques. Then Y shape feature extraction algorithm is used to obtain Y shape pattern which are then fused with finger vein pattern. Second, Finger vein pattern is obtained using CCD camera by passing infrared light through the finger. The obtained image is then enhanced. A line shape feature extraction algorithm is used to get line patterns from enhanced finger vein image. Finally Sclera vein image pattern and Finger vein image pattern were combined to get the final fused image. The image thus obtained can be used to uniquely identify a person. The proposed multimodal system will produce accurate results as it combines two main traits of an individual. Therefore, it can be used in human identification and authentication systems. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ictte298-150928065802-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Sclera and finger print vein fusion is a new biometric approach for uniquely identifying humans. First, Sclera vein is identified and refined using image enhancement techniques. Then Y shape feature extraction algorithm is used to obtain Y shape pattern which are then fused with finger vein pattern. Second, Finger vein pattern is obtained using CCD camera by passing infrared light through the finger. The obtained image is then enhanced. A line shape feature extraction algorithm is used to get line patterns from enhanced finger vein image. Finally Sclera vein image pattern and Finger vein image pattern were combined to get the final fused image. The image thus obtained can be used to uniquely identify a person. The proposed multimodal system will produce accurate results as it combines two main traits of an individual. Therefore, it can be used in human identification and authentication systems.
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein and Finger Vein Fusion from IJTET Journal
]]>
222 8 https://cdn.slidesharecdn.com/ss_thumbnails/ictte298-150928065802-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation /slideshow/study-of-eccentrically-braced-outrigger-frame-under-seismic-exitation/53263034 ictte291-150928065723-lva1-app6891
Outrigger braced structures has efficient structural form consist of a central core, comprising braced frames with horizontal cantilever outrigger trusses or girders connecting the core to the outer column. When the structure is loaded horizontally, vertical plane rotation of the core is restrained by the outriggers through tension in windward column and compression in leeward column. The effective structural depth of the building is greatly increased, thus augmenting the lateral stiffness of the building and reducing the lateral deflections and moments in core. In effect, the outriggers join the columns to the core to make the structure behave as a partly composite cantilever. By providing eccentrically braced system in outrigger frame by varying the size of links and analyzing it. Push over analysis is carried out by varying the link size using computer programs, Sap 2007 to understand their seismic performance. The ductile behavior of eccentrically braced frame is highly desirable for structures subjected to strong ground motion. Maximum stiffness, strength, ductility and energy dissipation capacity are provided by eccentrically braced frame. Studies were conducted on the use of outrigger frame for the high steel building subjected to earthquake load. Braces are designed not to buckle, regardless of the severity of lateral loading on the frame. Thus eccentrically braced frame ensures safety against collapse.]]>

Outrigger braced structures has efficient structural form consist of a central core, comprising braced frames with horizontal cantilever outrigger trusses or girders connecting the core to the outer column. When the structure is loaded horizontally, vertical plane rotation of the core is restrained by the outriggers through tension in windward column and compression in leeward column. The effective structural depth of the building is greatly increased, thus augmenting the lateral stiffness of the building and reducing the lateral deflections and moments in core. In effect, the outriggers join the columns to the core to make the structure behave as a partly composite cantilever. By providing eccentrically braced system in outrigger frame by varying the size of links and analyzing it. Push over analysis is carried out by varying the link size using computer programs, Sap 2007 to understand their seismic performance. The ductile behavior of eccentrically braced frame is highly desirable for structures subjected to strong ground motion. Maximum stiffness, strength, ductility and energy dissipation capacity are provided by eccentrically braced frame. Studies were conducted on the use of outrigger frame for the high steel building subjected to earthquake load. Braces are designed not to buckle, regardless of the severity of lateral loading on the frame. Thus eccentrically braced frame ensures safety against collapse.]]>
Mon, 28 Sep 2015 06:57:23 GMT /slideshow/study-of-eccentrically-braced-outrigger-frame-under-seismic-exitation/53263034 ijtetjournal@slideshare.net(ijtetjournal) Study of Eccentrically Braced Outrigger Frame under Seismic Exitation ijtetjournal Outrigger braced structures has efficient structural form consist of a central core, comprising braced frames with horizontal cantilever outrigger trusses or girders connecting the core to the outer column. When the structure is loaded horizontally, vertical plane rotation of the core is restrained by the outriggers through tension in windward column and compression in leeward column. The effective structural depth of the building is greatly increased, thus augmenting the lateral stiffness of the building and reducing the lateral deflections and moments in core. In effect, the outriggers join the columns to the core to make the structure behave as a partly composite cantilever. By providing eccentrically braced system in outrigger frame by varying the size of links and analyzing it. Push over analysis is carried out by varying the link size using computer programs, Sap 2007 to understand their seismic performance. The ductile behavior of eccentrically braced frame is highly desirable for structures subjected to strong ground motion. Maximum stiffness, strength, ductility and energy dissipation capacity are provided by eccentrically braced frame. Studies were conducted on the use of outrigger frame for the high steel building subjected to earthquake load. Braces are designed not to buckle, regardless of the severity of lateral loading on the frame. Thus eccentrically braced frame ensures safety against collapse. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ictte291-150928065723-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Outrigger braced structures has efficient structural form consist of a central core, comprising braced frames with horizontal cantilever outrigger trusses or girders connecting the core to the outer column. When the structure is loaded horizontally, vertical plane rotation of the core is restrained by the outriggers through tension in windward column and compression in leeward column. The effective structural depth of the building is greatly increased, thus augmenting the lateral stiffness of the building and reducing the lateral deflections and moments in core. In effect, the outriggers join the columns to the core to make the structure behave as a partly composite cantilever. By providing eccentrically braced system in outrigger frame by varying the size of links and analyzing it. Push over analysis is carried out by varying the link size using computer programs, Sap 2007 to understand their seismic performance. The ductile behavior of eccentrically braced frame is highly desirable for structures subjected to strong ground motion. Maximum stiffness, strength, ductility and energy dissipation capacity are provided by eccentrically braced frame. Studies were conducted on the use of outrigger frame for the high steel building subjected to earthquake load. Braces are designed not to buckle, regardless of the severity of lateral loading on the frame. Thus eccentrically braced frame ensures safety against collapse.
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation from IJTET Journal
]]>
682 6 https://cdn.slidesharecdn.com/ss_thumbnails/ictte291-150928065723-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-ijtetjournal-48x48.jpg?cb=1523642235 INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY (IJTET) Demands unique, Unregistered research documents in enginering & Technological innovation.All the research papers are evaluated by our Evaluation panel and the paper are selected by the panel associates using strict evaluation process. All arrangements moving evaluation level will be released online once author completes the registration process.Papers must be prepared in english, may as well have sound language use and suitable terms. we expect from authors that they have to check their paper submitted for publication should not be falsification and figure out they are posting just outstanding content for thought in INTE www.ijtet.com https://cdn.slidesharecdn.com/ss_thumbnails/ijtet0502003-150928084210-lva1-app6891-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/beaglebone-black-webcam-server-for-security/53266244 Beaglebone Black Webca... https://cdn.slidesharecdn.com/ss_thumbnails/ijtet0502001-150928084158-lva1-app6891-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/biometrics-authentication-using-raspberry-pi/53266234 Biometrics Authenticat... https://cdn.slidesharecdn.com/ss_thumbnails/ijtet0501004-150928084148-lva1-app6892-thumbnail.jpg?width=320&height=320&fit=bounds ijtetjournal/conceal-traffic-pattern-discovery-from-revealing-form-of-ad-hoc-networks Conceal Traffic Patter...