Remote Learning: Android Operated Educational Robot Arm with 6 DOF
This paper addresses an intelligent optimal control for a flexible robot arm that is driven by a permanent-magnet synchronous servo motor. An intelligent optimal control of robot arm with 5 axes with servo gripper is proposed by the instructions given through Android device (android app on smart phone). This proposal was addressed to fourth-year engineering students and combines knowledge from android java programming and robotic control to complete an automation project task. The educational robotic arm initially learns to pick up a randomly placed target from a target surface and move it to a predefined destination after which it repeats the contouring process under the presence of the target. This paper presents an off-line trajectory generation algorithm and, therefore, it possesses significant industrial implications, as no hardware changes are needed for its implementation. The proposed method has been experimented with Dexter ER-1 Robotic Arm for optimum project based learning.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Securing AODV against worm hole attack using token based approach
In present scenario, ad hoc network become the prominent mode of communication for mobile devices. Hence, becoming a elementary field of research. Since ad hoc networks are infrastructure less networks and the nodes in ad hoc networks are connected by a wireless links. As nodes are connected by wireless links, its becomes easier for attacker to disrupt in the ad hoc networks. Therefore security is the major issue in ad hoc networks as compared to wired network. In this paper, we are discussing the various attacks which are possible in MANET due to fabrication and worm hole attack in AODV and how to secure AODV against wormhole attack using token based approach. The propose method reduces the packet loss due to malicious nodes to a considerable extent and hence enhance the performance.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A medical image encryption and decryption approach using chaos and LSB
Steganography is a captivating area of research in the new modern world. Steganography is a form of covert communication in which a secret message is invisible within a carrier message. Various image Steganography techniques have been proposed. The user data should be made secret in order to have the user’s privacy and security. This novel algorithm represents the encryption and decryption of medical data of the patient and the patient’s medical image using LSB and chaotic systems. In this paper, investigate diverse Steganography techniques and tools. The chaotic signal generation and the result analysis are done by using the Matlab 7.10.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Intelligent Mobile Agents for Heterogeneous Devices in Cloud Computing
Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A software agent offers a new computing paradigm in which a program, can suspend its execution on a host computer and can transfer to another agent enabled computer on network so that it could run there. Such mobile agents are used when there is limited capacity in computers. But at times, the systems could not be able to run even the mobile agents. This paper proposes an approach to execute mobile agents on any sort of systems even with limited capacity of Cloud. A platform that supports various mobile agents depending upon the capacity of the system will be developed. The mobile clients are differentiated into two types depending upon their capacity and the corresponding mobile agent is chosen for the traversal.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Off-line Human Signature Recognition System Based on Histogram Analysis using MATLAB
Handwritten signatures are considered as the most natural method of authenticating a person’s identity. Human signatures can be handled as an image and used in a scanned document is a promising facility for many banking and insurance related business activities. The signatures of the same person vary with time, age of the person and also because of the emotional state of a person. This paper present an off-line human signature recognition system based on histogram analysis. The main steps of constructing a signature recognition system are discussed and experiments on the values of cumulative distribution function (CDF). The off-line signature recognition and verification is implemented using MATLAB.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Optimizing the QoS evaluation in service based systems
In service based systems, QoS are the basic construct that aims to facilitate the quality and usability of service based system. Service based systems takes a very long time to get the result under workload, of quality evaluation when dealing with a workflow with several thousand services and multiple parameters. To address this need, we introduce a tool-supported framework for the development and to improve the evaluation performance of QoS by optimizing the QoS requirements. OQoSE approach develops adaptable service based systems which increases the evaluation result of QoS efficiently. OQoSE method which used to review every service and parameter time then it is used to discover the probabilities that are adaptable under various services with multiple parameters.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Secure chaotic modulation schemes using henon map
Future communication should operate at higher data rates, be more reliable, and operate in increasingly crowded frequency allocations. New technologies are being tried in this direction and chaotic communication is one among them. Equivalently, chaotic signals decorrelate rapidly with themselves. The autocorrelation function of a chaotic signal has a large peak at zero and decays rapidly. Same random sequence can be obtained provided we know the exact initial condition for the process. The nonlinear, unstable and aperiodic characteristic of chaotic signals has numerous features that make it attractive for communication use. Chaotic communication is rather a new field in communication research. During the past 15 years, there has been a tremendous interest worldwide in possibility of exploiting chaos in wideband communication system. In this direction already 4 generations of chaotic communication is evolved. In this project we have implemented five different types of chaotic modulation. Demodulation is either coherent or non coherent, based on the type of modulation. For coherent demodulation we used correlator receiver and adaptive filter receiver. We have made a comparison among different types of modulation techniques.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Advanced quantum concepts through soft computing using matlab
The behavior of electron and the nucleons are simulated through soft computing using MatLab language meant for Science and Engineering. Since the electrons and nucleons movement confined around nucleus and within the nucleus, to visualize the behavior the coordinates were taken with incremental value of 0.001 and less to visualize the behaviour. The graphical output shows the path and tendency of electron movement around the nucleus of Hydrogen atom. These curves show that the energy of electron is not constant but increases with the principal quantum number(n) and azimuthal quantum number(l).Some quantum mechanical problems have been solved and reported.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Efficient Biometric for Human Identification and Verification through Iris Recognition
A biometric system provides automatic identification of an individual based on a unique feature or characteristic possessed by the individual. Iris recognition is regarded as the most reliable and accurate biometric identification system available. Most commercial iris recognition systems use patented algorithms developed by Daugman, and these algorithms are able to produce perfect recognition rates. However, published results have usually been produced under favorable conditions. The work presented in this paper involved developing an iris recognition system in order to verify both the uniqueness of the human iris and also its performance as a biometric. For determining the recognition performance of the system one databases of digitized grayscale eye images were used. The iris recognition system consists of an automatic segmentation system that is based on the Hough transform, and is able to localize the circular iris and pupil region, occluding eyelids and eyelashes, and reflections. The extracted iris region was then normalized into a rectangular block with constant dimensions to account for imaging inconsistencies. The Hamming distance was employed for classification of iris templates, and two templates were found to match if a test of statistical independence was failed. The system performed with perfect recognition on a set of 450 eye images; however, tests on another set of 340 images resulted in false accept and false reject rates of 0.005% and 0.238% respectively. Therefore, iris recognition is shown to be a reliable and accurate biometric technology.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Searchability a domain quality factor for web software applications
As organizations become aware of the strategic importance of e-commerce they will also become aware of the need of quality Web sites. In early years the World Wide Web was originally designed to present information to Web surfers using simple sites that consists of hyper linked text. But, Modern Web applications run large-scale software applications for e-commerce, information distribution, entertainment, and numerous other activities. The factors that constitute software quality in traditional data processing are well defined. However, it is necessary to have a full understanding about the quality in the context of World Wide Web. This paper identifies a new quality factor, searchability for the World Wide Web with the checklist of enablers. This factor enables the Web site developers and evaluators to create quality Web sites.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]