Manuscripts

Recent Papers

Implementation of Pulse Compression for Space Applications

Pulse Compression is one of the key steps in the signal processing of a Radar system. Radar system uses Pulse compression techniques to provide the benefits of larger range detection and high range resolution. This is gained by modulating the transmitted signal and after that matching the received echo with the transmitted signal. Matched filter is used as the pulse compression filter which provides high SNR at the output. Matched Filter is a time reversed and conjugated version of the received radar signal. There are several methods of pulse compression that have been used in the past, out of which most popular technique is Linear Frequency Modulation (LFM). This paper deals with the design to develop and simulate pulse compression and matched filter algorithm in MATLAB to study the LFM pulse compression technique. Matched filter is used as the pulse compression filter which provides high SNR at the output. Matched Filter is mathematically equivalent to convolving the received signal with a conjugated time-reversed version of the reference signal. The main application of pulse compression Radars includes tracking of launch vehicles, unwanted particles in space, Missile guidance etc. Here, in this paper we are discussing the pulse compression application in tracking the launch vehicle so as to check whether it had followed the predetermined path or not.

Published by: Arya V. J, Subha .V

Author: Arya V. J

Paper ID: V3I3-1372

Paper Status: published

Published: May 25, 2017

Full Details

Preventing the Anonymous Authentication Using Cashma Technique

Security in web based session management is a serious concern, due to the recent increase in the frequency and complexity of cyber attacks. Traditionally most of the system are based on the pairs of username and password which verify the identification of the user only at the login phase. Once the user can be identified, no checks are performed during the working sessions, which are terminated by an explicit logouts or expire after an idle activity period of the user. In this approach a single shot of verification is less efficient and the user identity is permanent during the entire session. To overcome this aspect, a secure protocol authentication is used for continuous user verification. This protocol makes adaptive time outs and periodically request the user to input his authentication attributes over and over. For this adaptive method, CASHAMA authentication system is used which provides different verification methods such as Keystroke timing, Mathematical event and CASHMA certificate. The use of this CASHMA system will provide secure web service and prevent the loss of data.

Published by: Santhosh, Prof. Dr. V. JayaRaj

Author: Santhosh

Paper ID: V3I3-1379

Paper Status: published

Published: May 25, 2017

Full Details

Renal Cell Carcinoma Nuclear Grading Using 2d Textural Features for Kidney Images

Cancer identification system is proposed based on the features present in the kidney images. Different algorithms such as CLACHE (Contrast limited adaptive histogram equalization), GLCM (gray level Co-occurrence matrices) and SVM (support vector machine) algorithm are used for the identification of cancer. CLACHE algorithm is used for the enhancement of the image. GLCM algorithm is used to improve the overall accuracy of the system and to extract the textural features. SVM algorithm is used to classify the different grading levels to identify the cancer present in the image. Images that are acquired for the identification of cancer are noisy. Noise is removed by the ROI extraction. Then the images are enhanced using CLACHE algorithm. Once the images are enhanced, features are extracted using GLCM. 21 textural features are extracted. Out of the 21 features extracted two best features are selected. The two best features are compared with the trained features for the increase in the accuracy of the system. After that based on the features different grading levels are obtained for the identification of the cancer. Grade 1 indicates the presence of cancer in starting stage, grade 2 indicates the presence of cancer in the moderate stage, grade 3 indicates the presence of cancer in the mild stage, grade 4 indicates the presence of cancer in the severe stage. In this study, 2D textural features are extracted and using these extracted features cancer identification is done which improves the overall accuracy of the system.

Published by: Jayashree G. R, Dr. K. M Ravi Kumar, Ravi Kiran .R

Author: Jayashree G. R

Paper ID: V3I3-1377

Paper Status: published

Published: May 25, 2017

Full Details

Tumor and Edema Segmentation Using Efficient MFCM and MRG Algorithm

Momentarily, categorizing of brain tumor and segmentation is truly an exciting task in MRI. Numerous researches work in generating divergent plus interesting techniques and algorithms for this specified work of medical image processing. On behalf of enhancing a precise brain tumor extraction, we provide an effective methodology for both classification and segmentation i.e., separation of brain MRI images as well as labeling of brain MRI images in terms of edema, tumor, white matter (WM),gray matter (GM) plus cerebrospinal fluid (CSF). At this instant and in our recommended system of brain tumor detection encompasses six segments, i.e. pre-processing, filtering, Image registration, Feature extraction, Classification, Segmentation. At this moment, in case of preprocessing, the input MRI image is firstly fetched from the MRI database and as well subjected to skull stripping for rejecting the undesirable area from the image. In addition, by the utilizing Gaussian filter, the skull stripped image has been smoothened. Subsequently by utilizing Automatic image registration the filtered images are recorded into one coordinate system wherever the movement of the head is a situation often encountered during the imaging process. Shape, intensity and texture are the features that will be extricated from the registered images.On the basis of extricated features, the Brain MRI images are characterized into normal or abnormal images. Finally by utilizing the modified FCM segmentation algorithm tumor portion is extracted and edema is segmented applying modified region enhancing from the abnormal images. Therefore in case of normal image, the Gray matter, the white matter and the cerebrospinal fluid can be segmented. The outcomes are analyzed for illustrating the representation of the suggested classification plus segmentation methodology with prevailing techniques.

Published by: Rehna Kalam, M. Abdul Rahman

Author: Rehna Kalam

Paper ID: V3I3-1357

Paper Status: published

Published: May 25, 2017

Full Details
Research Paper

A Novel Technique to Remove Duplicacy of Files and Encrypt the Data Files Symmetrically In Cloud Environment

With the help of cloud computing users are allowed to store, retrieve and share their data from anywhere. Cloud computing provides sharing of hardware, software and infrastructural storage to different users at a time. Encryption of cloud is a need of new technology because clouds have data of different clients so encryption on cloud is essential for data security but cloud computation is also important so to reduce duplicacy is one more parameter , which is reduce by digest in this paper and encryption with the help of AES and blowfish.

Published by: Sandeep Kaur

Author: Sandeep Kaur

Paper ID: V3I3-1353

Paper Status: published

Published: May 25, 2017

Full Details

Replace of Asphalt with Waste Polythene in Bitumen Road

In India consumption of Plastic is 15 million tons up to 2015 and is set to be the third largest consumer of plastics in the world. India is a top 20 number country that dump maximum plastic in the ocean. As per a survey conducted by Central Pollution Control Board (CPCB) in 60 cities of the country the quantum of plastic waste generation is estimated to be 15,342.6 tons per day. Plastic is a non-biodegradable material and researchers found that the material can remain on earth for 4500 years without degradation

Published by: Mr. Yakub Ansari, Prof. F. I Chavan, Prof. M. Husain, Prof. Vajed Shaikh

Author: Mr. Yakub Ansari

Paper ID: V3I3-1352

Paper Status: published

Published: May 25, 2017

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X