|Sr.||Title of Research Paper/Article||Author||e-Certificate||Download|
|1||Multi-Sequences for Paper Fall Devoid of Face Information in SFBC MIMO OFDM SystemsAbstract – A novel unconventional multi-sequences scheme for the peak-to-average power ratio (PAPR) reduction in multi-input multi-output orthogonal frequency division multiplexing (MIMOOFDM) systems with space frequency block coding (SFBC). The key idea of the proposed scheme is keeping the advantage of the SFBC structure to generate some alternative multisequences via combining the signals at different transmit antennas. Specifically, when the proposed scheme is employed in SFBC MIMO-OFDM systems with quadrature amplitude modulation (QAM), one of the big advantages is that the side information does not need to be sent to the receiver. Theoretical analysis and simulation results validate that the proposed scheme has the ability to provide large PAPR reduction, low bit error rate and low computational complexity without side information in SFBC MIMO-OFDM systems. this paper describes some of the important PAPR reduction techniques for multicarrier transmission including a novel alternative multi sequences (AMS) scheme and a low-complexity PAPR reduction scheme for SFBC OFDM MIMO systems. Compare and contrast of above techniques are discussed.||K.Rajesh, M. D. Areef, K. Sridhar & Prakash. J. Patil|
|2||Fuzzy based Power Quality Improvement at distribution level for Grid Interconnected renewable energy sourcesAbstract – This paper presents a grid interfacing inverter that compensates power quality problems and it can also interface renewable energy sources with the electric grid. The grid interfacing inverter can effectively be utilized to perform following functions: 1) transfer of active power harvested from the renewable resources; 2) load reactive power demand support; 3) current harmonic compensation at PCC; and 4) current unbalance and neutral current compensation in case of 3phase 4-wire system. The ability of fuzzy logic to handle rough and unpredictable real world data made it suitable for a wide variety of applications, especially, when the models or processes are too complex to be analyzed by classical methods. In this paper fuzzy logic controller is used for controlling the DC capacitor voltage. Simulations using MATLAB / SIMULINK are carried out to verify the performance of the proposed controller. The results show that the proposed controller has fast dynamic response, high accuracy of tracking the DC-voltage reference, and strong robustness to load parameters variation.||P. Shravan Kumar & N. Ravi Shankar|
|3||Deterring Attacks and Abuses of Cloud Computing Services through Economic Measures: Bit Deposit Abstract – Reliability in cloud computing applications can be negatively affected by various attacks or service abuses. To come ahead of this threat, we propose an economic measure to deter attacks and various service abuses in cloud computing applications. Our proposed defense is based on requiring a service user to pay a small deposit, using digital currency, before invoking the service. Once they are done using the service, and there has been no detected abuse or attack, the deposit is paid back by the service provider to the service user. If an attack or an abuse is detected, the service user is not paid back and the service provider gets to keep the deposit. We propose the use of micropayments with a decentralized nature and small transaction fees, such as the Bitcoin digital currency. Moreover, thanks to the existence of money exchanges which convert the Bitcoin currency to real world currency, service providers can recoup losses when they exchange the confiscated deposits for real world currency.||T.Sujilatha, C.Manjusha & B.Jyothi|
|4||Routine Scrutiny of an RFID Key Management Scheme for Vehicular NetworksAbstract – In this paper we analyze the performance of an RFID Key Management scheme to be applied in VANETs. As often being considered as a precondition for the realization of the Internet of Things (IoT), RFID can be utilized in the vehicles, so as to make the vehicles identifiable and inventoriable by computers as long as they are fitted out with radio tags. One of the public concerns is likely to focus on a certain large number of security and privacy issues. Various light symmetric key management schemes will be proposed for different RFID scenarios. In order to perform a reliable and trusted authentication, one prerequisite is to ensure the credibility of RFIDs by means of digital certificate validation. We propose a certificate revocation status validation scheme called EKA2, using the concept of clustering from data mining to evaluate the trustiness of digital certificates.||Sujeeth T. & Kiran Kumar Reddy D.|
|5||An Improved Canary-Based System with BIST for SRAM Standby Power Reduction Abstract – This paper presents a new technique to accurately measure the achieve aggressive standby power reduction for static random access memory (SRAM), we have previously proposed a closed-loop scaling system with canary replicas that can track global variations. In this paper, we propose several techniques to enhance the efficiency of this system for more advanced technologies. Adding dummy cells around the canary cell improves the tracking of systematic variations. A new canary circuit avoids the possibility that a canary cell may never fail because it resets into its more stable data pattern. A built-in self-test (BIST) block incorporates selfcalibration of SRAM minimum standby and the initial failure threshold due to intrinsic mismatch. Measurements from a new 45 nm test chip further demonstrate the function of the canary cells in smaller technology and show that adding dummy cells reduces the variation of the canary cell.||B. Ramesh & T. Mahaboob Doula|
|6||An Improvement Approach for EDGE image enhancement using fuzzy set theory and cellular learning automata (CLA)Abstract – The most common degradations in images is their poor distinction quality. Edge enhancement is an image process filter that enhances the edge contrast of an image in an effort to enhance its acutance (apparent sharpness). The projected paper uses the conception of hybrid edge detection technique supported fuzzy based and cellular learning automata to detect the gray level changes of neighbours of each pixel, and to notice the edge by using the ever changing regular of oneorder or two-order directional calculation, however typically there’s uncertainty of the edge, and man cannot distinguish whether or not it’s the edge or not. So as to show the fuzzy sets to be clear and solve the matter above this paper mentions fuzzy set theory and cellular learning automata to comprehend improve image edge detection. In the end, we compare it with popular edge detection methods such as Canny and Prewitt.||Sahil Kadia, Anand Kumar & Ajay Singh Dhabariya|
|7||Privacy and Integrity Preserving Range Queries in Sensor Networks Abstract-The architecture of two- tiered sensor networks where the storage nodes serve as an intermediate tier between sensors and a sink for storing data and processing queries has been widely adopted because of the benefits of power and storage saving for sensors as well as the efficiency of query processing. The importance of storage nodes also makes them attractive to attackers. The SafeQ a protocol that prevents attackers from gaining information from both sensor collected data and sink issue queries. SafeQ also allows a sink to detect compromise storage nodes. To preserve privacy SafeQ use a novel technique to encode both data and queries such that a storage node can correctly process encoded queries over encoded data without knowing their values. The preserve integrity have two schemes one using Merle hash trees and another using a new data structure called neighborhood chains to generate integrity verification information.||T. Kullayappa & M. Lakshmi Prasanna Kumar|
|8||Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks Abstract -This Article Presents The Design Of Continuous Video Streaming Compression Of A Networked System For Joint Compression, Error Detection And For Error Correction. Video Compression Applications Are Becoming More Popular Over Wireless Multimedia Sensor Networks. To Save Energy In Bit Transmissions And Receptions Over A Video Sensor Network, The Video File Contents Need To Be Encoded Packet By Packet Before Its Transmission Over Network. The Quality At The Receiver Side Can Be Maximized By Designing The Cross Layer System. The Transmission Rate And Encoding Rate Can Be Controlled By The Cross Layer System. The Fairness Of The Received Video Quality Can Be Developed By The Rate Controller. Instead, An Adaptive Parity Scheme That Drops Samples In Error Is Proposed And Shown To Improve Video Quality. Finally A Low Complexity, Adaptive Video Encoder, Is Proposed That Performs Low Complexity Motion Estimation On Sensors And Implemented To Further Optimize Energy Consumption., Thus Greatly Reducing The Amount Of Data To Be Transmitted And Video File Can Be Decompressed.||B. Nagamohan & T. K. Balaji|
|9||Constant Supervision of Location Based Spatial Queries in Wireless Broadcast MediumUsing Peer-To-Peer SharingAbstract – Location based spatial queries (LBSQ’s) are the queries that are totally dependent on the location of the probers. Wireless data broadcast is an assuring approach for information airing that influences the computational capacities of the Personal Digital Assistants (PDAs) that tend to elevate the scalability of the system. In this paper we present a contemporary query processing like spatial query procedure that while retaining high scalability and a high definiteness manages to lessen the latency regularly. Our mode is based on peer-to-peer sharing which empower us to deal with queries without delay at a PDA prober by using query outcomes cached in its adjoining mobile peers.||Sirisha Madhuri T. & Dr. A. Rama Mohan Reddy|
|10||Study of Wavelength Dependence of Column Aerosol Optical Depth over Rajkot, GujaratAbstract:Columnar Aerosol Optical Depths (AOD) estimated from two hand held sun photometers [MICROTOPS-II (version 2.43 & 5.5)] over Rajkot were analyzed from March 2005 to March 2006. The AOD shows seasonal variation with high values in summer and low value in winter. The high AOD values in summer (low during winter) is higher for longer wavelengths, which shows that the coarse particles contribute more to the observed variation as compared to sub micron particles. The AOD values decrease in winter and the decrease is more at higher wavelengths indicating that there is a general reduction in the number of bigger particles. Also during the winter months the wind direction changed to southerly and south easterly that brings air that is more rural to the measurement site. The angstrom parameters a and b have also been used to characterize the aerosol optical depths.||Nilesh H. Manani|
|11||Climate Change and MitigationAbstract: Nowadays climate change is very critical problem to face. Our recent activities made the climate change very vulnerable. The possible reasons for the climate change are the characteristics internal procedures, external constraining, and anthropogenic changes in current atmosphere, increasing use of the land, etc. For any developing countries (i.e. India), the climate change is very critical problem as it affects the overall economy. IPCC (Intergovernmental Panel on Climate Change) has given a list of developing countries which are highly dependent on agriculture, which directly or indirectly affects the climate. Due to the climate change many nations may face problem of lack of fresh water, desertification, biodiversity loss, etc. Various greenhouse gases (i.e. CO2) are the main reason for climate change, so it is necessity to make their concentrations stable in atmosphere. The problem of energy shortage also goes hand in hand with the climate change. To overcome this problem we should use renewable energy resources more and more as well as reduce the usage of high-carbon energy resources. To make noteworthy improvement in facing of climate change problem, we should integrate mitigation and adaptation measurements to feasible development techniques. These issues are very intricate to resolve but we can start with adaptation and mitigation. The overall public of the nation should aware of the reasons and process and the consequences of climate change.||Dharmendra H. Viroja|
2018 RAIJMR - All Right Reserved | Design & Development - Beyond Web
Agree for publishing here means…
(1) My/Our research paper is originally written by me/us and all information is true. I/we will fully responsible for this research paper.
(2) There is not use any plagiarised material by using any e-data and not stolen from any hard,soft as well as from any printed material.
(3) I/We assure you that, My/Our paper has not been published anywhere in Past. If My/Our research paper will be published by your academy RAIJMR, then I/We will not publish anywhere in future.
(4) I/We are not breaking any copyright protocol of anyone.
(5) My/Our paper is not a racial or provocative incitement. If there is a complaint in the future regarding this paper, then its full responsibility will be ours.
(6) No responsibility is assumed by RAIJMR and the Publisher of RAIJMR, its staff or members or the editorial board for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products instruction, advertisements or ideas contained in a publication by RAIJMR and by the Publisher of RAIJMR.
Declaration Agreement for ISBN Book Publishing
Declaration Agreement: Agree for ISBN International Book Publishing here means…
1. I/We hereby declare that the Book work is my own original work, carried out throughout by me/us only. And I/We also declare that this entire book work is my/our own work and no part of this book has been published by me/us in any publication unit.
2. It’s restricted for this book to reproduce in any form, by Photostat, microfilm, Xerography, or any other means, or incorporated into any information retrieval System, electronic or mechanical, without the written permission of the Author and the publisher.
3. I/We further declare that no part of this work has been fully or partially published to anywhere and the said work will not publish anywhere by me/us in future except new edition of this book.
4. My/Our paper is not a racial or provocative incitement. If there is a complaint in the future regarding this paper, then its full responsibility will be ours.
5. No responsibility is assumed by RET International Academic Publishing & Rudra Education Trust, the Publisher, Acquisition Editor & Editor-in-Chief of RIAP/RET, its staff or members or the editorial board for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products instruction, advertisements or ideas contained in a publication by RIAP/RET and by the Publisher of RIAP/RET.
6. Your publication is being done in accordance with the current applicable rules and regulations of the Government and UGC or any other organization and also according to the rules of the merit base for the Appointment of any Govt. or Non-Govt. service. If such an organization or affiliate organization will change the former rules or regulations of their previously approved Merit norms after the publication of your paper or book, such change or any other claim will not be valid for your published paper or book. Not also, you will not be able to claim for get back a paid publication fees for the publication. In such circumstances, no claim will be valid even for re-publication.
7. Not any change or re publishing this current work in future.