Global

Creating any standard protocol having 2 or more QoS limitations might be described as an NP-complete. Swarm technology is used to solve such problem. Even so, to fix difficult problems using swarm algorithms, how many iterations essential is going to be proportional for you to problem complexity. In this a standard protocol is presented depending on hybrid swarm algorithm standard protocol. This protocol has higher bundle overheads which more often than not bring about devouring higher battery power. In the present work to reduce the higher battery power , power aware routing protocol is developed based on Swarm algorithm.
The present research work is intended to optimize the machining parameters for achieving high dimensional accuracy in wire electric discharge machining (WEDM). Experiments were designed and carried out to evaluate the best parametric setting which gives parameters like power, spark gap and corner radius using Inconel X-750 as workpiece material. These parameters are determined for a wide range of job thickness and mathematical correlations were developed for the parameters such as power and spark gap. Analysis of variance (ANOVA) is also performed to study the fitness. This procedure eliminates the need for repeated experiments which saves time and material unlike conventional machining process. The primary objective of the study is to find out the important and combination of one or more factors that influence the machining process in order to achieve the best power setting in turn machining current. Also, Machinability index of various materials which can be machined by WEDM is evaluated by referring to the present research work and literature review.
The mobile ad-hoc networks (MANET) are infrastructure less and decentralized group of mobile nodes where the routers and mobile hosts are connected over wireless links. In MANET, nodes communicate with each other using multi-hop communication system. The nodes and routers are free to move within the network and it is a difficult task to maintain the network topology as it changes every time. So, efficient algorithms are needed for routing. Due to the suddenly changing of topology every time routing of packets from source to destination using shortest path is difficult. In present work, it is proposed by adding a factor called orientation to Ant Colony Optimization algorithm for routing in MANETs in which destination nodes are selected and exchanges the packets (agents) between the source and the destination. This algorithm helps in finding the shortest path between source and destination. The results are compared with AODV by using throughput as performance metric.
An efficient method has been developed for the preparation of three novel heterocyclic compounds: Bridgehead-fused-5-methyl-6-methylketone-1,2,3-triazolo[5,1-c]-1,2,4-triazine(12), Bridgehead-fused-5-methoxyl -6- methylester-1,2,3-triazolo-[5,1-c]-1,2,4-triazine (14) and Bridgehead - fused - 5-methyl- 6-methylester-1,2,3-triazolo-[5,1-c] -1,2,4-triazine (16). The new heterocyclic systems were obtained utilizing 1H -1,2,3 – triazolo -5- diazonium salt (10) which was produced via thiourea sulphanilic acid(7). A mixture of this compound(7) with hydrazine in anhydrous acetonitrile, followed by continuous stirring afforded a solid compound: hydrazine carboximidamide (8). Addition of this hydrazine derivative to trimethyl orthoformate in a sealed vessel gave 5- amino – 1H- 1, 2,3 – triazole (9). Diazotization of this aminotriazole compound while maintaining the pH at 2, yielded the 1H – 1,2,3 – triazole -5- diazonium salt (10) in excellent yield.
Distributed Denial-of-Service (DDoS) assaults are a developing danger crosswise over Internet, disturbing access to Information and administrations. Presently days, these assaults are focusing on the application layer. Aggressors are utilizing systems that are exceptionally hard to recognize and relieve. In this task propose another technique to recognize AL-DDoS assaults. This work separates itself from past techniques by considering AL-DDoS assault location in overwhelming spine activity. In addition, the identification of AL-DDoS assaults is effectively deceived by glimmer group movement. By analyzing the entropy of AL-DDoS assaults and glimmer swarms, these model output be utilized to perceive the genuine AL-DDoS assaults. With a quick AL-DDoS identification speed, the channel is equipped for letting the real demands through yet the assault movement is halted.
As with the progression of the IT technological innovation, the quantity of gathered information is also increasing. It has led to lots of information saved in information source, manufacturing facilities and other databases. Thus the Data exploration comes into picture to discover and evaluate the information source to draw out the interesting and previously unidentified styles and rules known as organization concept exploration. This document has focused on regular itemset related based aprioi methods. The overall purpose is to find various restrictions of current methods. The regular itemset exploration has found to be crucial and most expensive step in organization concept exploration. Mining regular styles from extensive information source has appeared as an important problem in information exploration and knowledge finding community. This document ends up with suitable future guidelines to improve the regular item set further.
Medical imaging is widely used in detection of tumors and other diseases. In medicine, the enormous use of digital imaging, the quality of images becomes an important issue. The basic problem found in it is the introduction various kinds of noises whose removal becomes difficult. The technologies are working on civilizing the excellence and resolution of images but these forms as one of the major face to de-noise the image and recover its perception. This paper represents the complete review of various filters and their comparative analysis which can be used with statistical parameters in digital image processing. We can simulate the various statistical parameters and view their results using plots. We can have their relative study with the aid of MATLAB simulation to relieve the selection of best filter for a particular noise introduced in MRI and USG image.
The religious fundamentalist terrorism makes its presence felt yet again, in Europe as well in other parts of the globe. It is therefore important to find out what are its psychological resources. To this end, we have studied the thematic analyses written by the French specialist in political philosophy, André Glucksmann. The particularities of Glucksmann’s research are the ironic-essayistic and the fact that he guides his conclusions after presenting fictional literary characters from the classical universal literature. It is our conclusion that, in such cases, the presentation of unique literary characters, representative for an idea, can be more relevant than the presentation of several empirical facts.
This paper represents design and development of a low cost solar automatic vehicle with two innovative approach. In both approaches, the solar automatic vehicle will be able to move on the roadturn to leftor right and stop at any obstruction on the road automatically. The automation is done by using three photosensors in the first approach and by using photosensorsand a microcontroller (PIC 16F877A) in the final approach.In the first approach, the photo sensors detects black or white color. Depending upon the color, the left and right photosensor will generates control instructions for the vehicle by observing the road so that the vehicle can turn left or right automatically and for any kind of obstruction found in road, the front sensor will detect it and send signal to the relay, which will stop driving the main power source to the driving unit and makesthe vehiclestop.In the final approach photosensors, depending upon color of the road, detect signals from the road and produce control instruction for the microcontroller. Microcontroller then process the instruction and generate instruction for the driving section. The driving section drives the vehicle according to the road.
Steganography helps in communication of secured data in several carries like images, videos and audio. It undergoes many useful applications and well known for ill intentions. It was mainly proposed for the security techniques in the increase of computational power, in order to have security awareness like individuals, groups, agencies etc. The factors that are separated from cryptography and water making are data is not detectable; capacity of hidden data is unknown and robustness of medium. The steganography provides different methods existing and guidelines. The current technology of image steganography involves techniques of LSB in image domain but once the attacker acknowledges that medium is containing embedded data he will attack the medium and breaks into the secured content. In this paper we are discussing how to protect the steganography image by embedding it into another medium using mat lab. Here we work on image matrices to perform the steganography. Lightness adjustment on the matrix is done to reduce the brighter pixels in image. The lightness decreased image then embedded into another cover image by matrix difference technique (will be discussed in detail).