scispace - formally typeset
Search or ask a question

Showing papers in "International Journal of Modern Trends in Engineering and Research in 2016"



Journal Article
TL;DR: Light is shed on the essential elements that recognize phishing sites from authentic ones and how great standard based information mining arrangement methods are in foreseeingphishing sites and which characterization procedure is turned out to be more solid.
Abstract: Phishing is depicted as the specialty of reverberating a site of a noteworthy firm meaning to snatch client's private data, for example, usernames, passwords and standardized savings number. Phishing sites involve an assortment of signs inside its substance parts and the program based security pointers furnished alongside the site. A few arrangements have been proposed to handle phishing. All things considered, there is no single enchantment shot that can explain this risk drastically. One of the promising strategies that can be utilized in anticipating phishing assaults depends on information mining, especially the prompting of order principles since hostile to phishing arrangements intend to foresee the site class precisely and that precisely coordinates the information mining characterization procedure objectives. In this study, the creators shed light on the essential elements that recognize phishing sites from authentic ones and evaluate how great standard based information mining arrangement methods are in foreseeing phishing sites and which characterization procedure is turned out to be more solid. Phishing assault traditionally begins by sending an email that appears to originate from a legitimate undertaking to casualties requesting that they upgrade or affirm their own data by going to a connection inside the email. Despite the fact that phishers are presently utilizing a few methods in making phishing sites to trick and charm clients, they all utilization an arrangement of common elements to make phishing sites on the grounds that, without those components they lose the benefit of misdirection. This helps us to separate in the middle of fair and phishing sites taking into account the elements removed from the went to site. By and large, two methodologies are utilized in recognizing phishing sites. The first depends on boycotts, in which the asked for URL is contrasted and those in that rundown. The drawback of this methodology is that the boycott as a rule can't cover all phishing sites, subsequent to, inside seconds; another deceitful site is required to be propelled. The second approach is known as heuristic-based strategy, where a few elements are gathered from the site to arrange it as either phishing or authentic. Rather than the boycott technique, a heuristic-based arrangement can perceive crisply made phishing sites. Keywords- Website features, Phishing, Security, Data Mining, Rule based Classification.

46 citations


Journal Article
TL;DR: In this article, the authors have done an analysis of the parameters that are concerned with cost and efficiency of solar dryer and have also made a design of solar drier which would be having a critical low cost or have less cost/kg for drying and maximum efficiency by varying some parameters.
Abstract: In many countries of the world, the use of solar thermal system in the agricultural area to conserve vegetables, fruits, coffee and other corps has shown to be practical, economical and the responsible approach environmentally. Solar heating system is used to dry food and other corps which can improve the quality of product while reducing the waste product. We are going to do an analysis of the parameters that are concerned with cost and efficiency of solar dryer. We are also going to make a design of solar dryer which would be having a critical low cost or have less cost/kg for drying and maximum efficiency by varying some parameters. Keywords— Solar Dryer; Forced Convection; Indirect type; Temperature; double pass polycarbonate; Velocity; Pressure; Humidity. I. INTRODUCTION Solar drying is in practice since the time in memorable for preservation of food and agriculture crops. This was done particularly by open sun drying under open the sky. This process has several disadvantages like spoilage of product due to adverse climatic condition like rain, wind, moist, and dust, loss of material due to birds and animals, deterioration of the material by decomposition, insects and fungus growth. Also the process is highly labor intensive, time consuming and requires large area. With cultural and industrial development artificial mechanical drying came into practice. This process is highly energy intensive and expensive which ultimately increases product cost. Solar energy is one of the most promising renewable energy sources in the world compared to nonrenewable sources for the purpose of drying of agriculture and industrial products.The concept of a dryer powered by solar energy is becoming increasingly feasible because of the gradual reduction in price of solar collectors coupled with the increasing concern about atmospheric pollution caused by conventional fossil fuels used for drying crops. Thus solar drying is the best alternative as a solution of all the drawbacks of natural drying and artificial mechanical drying. Solar dryers used in agriculture for food and crop drying ,for industrial drying process, dryers can be proved to be most useful device from energy conservation point of view. It not only save energy but also save lot of time, occupying less area, improves quality of the product, make the process more efficient and protects environment also. Solar dryers circumvent some of the major disadvantages of classical drying. Solar drying can be used for the entire drying process or for supplementing artificial drying systems, thus reducing the total amount of fuel energy required. Solar dryer is a device which removes water content from food. In different food water content is different. So requirement of solar Dryer is also different and drying time also different as per moisture content. If moisture content is less then drying time is less and if the moisture content is high then drying time also high.

35 citations


Journal Article
TL;DR: A new image encryption method based on the well-known Chaotic Logistic Map (CLM) and the Rivest Cipher 4 (RC4) encryption methods is proposed and it is proved that it is really a key sensitive encryption that can be decrypted easily by using brute force or any other kind of attacks.
Abstract: In recent years, because of the frequent flow of digital images across the world over the transmission media, image encryption become one of the most substantial topics. In this paper, we propose a new image encryption method based on the well-known Chaotic Logistic Map (CLM) and the Rivest Cipher 4 (RC4) encryption methods. Here, we use the secret key, and the CLM to produce a one-dimensional array of different numbers. Then the RC4 algorithms used to make some sort of random shuffling (relying on the contents of the array created by the CLM) to the array that is created by the RC4 first algorithm. After that, the second algorithm of RC4 used inside a loop to change the value of each color (using the resultant array of the first RC4 algorithm) of a pixel until all the pixels of the image be changed. And by doing that we have produced a cipher image that is completely different and does not reveal any information of the plain image, also we proved that it is really a key sensitive encryption that can't be decrypted easily by using brute force or any other kind of attacks.

26 citations






Journal Article
TL;DR: A prototype model for generation of electricity through speed breaker mechanism is prepared and the observations from it are studied and this power can be utilized near the toll gates on highways and lighting in remote areas.
Abstract: 1,2 B.Tech student, Department of Mechanical Engineering, SVCE Nellore 3 Assistance. Professor, Department of Mechanical Engineering, SVCE Nellore Abstract – This paper is going to present the study on generation of electricity through speed breaker mechanism. For this purpose, a prototype model is prepared and the observations from it are studied. The setup consists of a DC generator which is driven by a gear through the belt drive. The electricity produced in the generator is given to the inverter and is converted into AC. Finally, this power can be utilized near the toll gates on highways and lighting in remote areas. KeywordsSpeed breaker, DC generator, Inverter, Battery, Belt drive, Electricity

14 citations


Journal Article
TL;DR: This paper considers opportunities with data generate by the online learning platform and can mine the education data for calculating learner performance interest problem face by the learner knowledge level for different knowledge point.
Abstract: Education institute are the nursery for the future minds of the nation. Knowledge represents the intangible assets of the education institutes, industries and nations. With development of the information and telecommunication technology activities like commerce, communication, entertainment and learning are occurring on internet. As universities and colleges are started using an online learning platform for providing content to students and started using student management system for better management of the students personal data. Education institute have large amount of student data like basic personal information, attendance, marks, achievements etc. Online learning platform provide an opportunity to capture fine gain data about student online activities like course content he browse, time spent on each unit, post on forum, practice test, sequence of activity will generate large amount of structured and unstructured data. But it is found that educational system are notoriously poor in managing the data and taking advantage of this generated data. There are two research area for Big Data mining in education called educational data mining and learning analytics. Educational data mining is suit for the computational and psychological methods and research approach for the understanding how student learn, predict student future learning behavior. Learning analytics is becoming defined as an area of research and application and is related to academic analytics actions and predication analytics. Recently waste amount of work has been done in other area like ecommerce portal and increase the click through rate. So now considering opportunities with data generate by the online learning platform we can mine the education data for calculating learner performance interest problem face by the learner knowledge level for different knowledge point. As recently there are lot of research in education data mining and some researcher started treating data in education system as big data problem, we have done survey of various research in education. Keywords—Education, Data Mining, Predictive analysis, Big Data, Hadoop, Association Rules.

8 citations


Journal Article
TL;DR: In this article, the effect of tool pin offset on the tensile properties of dissimilar materials was investigated and it was found that the optimum toolpin offset for defect free nugget zone was 1mm and tool rotational speed was 1400 rpm and tool feed rate was 60 mm/min.
Abstract: In this paper an attempt has been made to investigate the effect of tool pin offset on the mechanical properties of dissimilar materials. In this article aluminium alloy 8011 and 99.65%pure copper was friction stir lap welded and their tensile properties were evaluated. On evaluation it was found that optimum tool pin offset for defect free nugget zone was 1mmand tool rotational speed was 1400 rpm and tool feed was found to be 60 mm/min. A cylindrical pin profile is adopted as its geometry had been proven to yield better weld strengths. Friction Stir Welding (FSW) is basically eco-friendly process in which the metal to be welded is not melted during welding, thus the cracking and porosity often associated with fusion welding processes are eliminated. Many emerging applications in power generation, petrochemical, nuclear, aerospace, transportation, and electronics industries lead to the joining of dissimilar materials by different joining methods especially by friction stir welding (1). Due to different chemical, mechanical and thermal properties of materials, dissimilar materials joining present more challenging problems than similar materials joining (2). However, when joining dissimilar materials by friction stir welding (FSW), the problems not only arise from a material properties point of view, but also from the possibility of the formation of brittle inter-metallic compound (3). Friction Stir Welding (FSW) is a solid-state joining technique invented and patented by The Welding Institute (TWI) in 1991 for butt and lap welding of ferrous and non-ferrous metals. FSW is a continuous process that involves plunging a portion of a specially shaped rotating tool between the butting faces of the joint. The relative motion between the tool and the substrate generates frictional heat that creates a plasticized region around the immersed portion of the tool (4). Friction stir welding process uses a non-consumable rotating tool consisting of a pin extending below a shoulder that is forced into the adjacent mating edges of the work pieces as illustrated in Fig.1.The rotation of the tool results in the stirring and mixing of material around the rotating pin during the welding process which in turn affect the evolving properties of the weld. There are fewer defects in solid- state welding because the metals do not reach their melting temperatures during the welding process. The major advantage of FSW is that it follows local thermo mechanical metal working process without influencing properties of surrounding areas as observed in other welding process. However, the base metals being joined retain their original properties, and the Heat Affected Zone (HAZ) is small as compared with the fusion welding techniques (5). The micro structural weld zones of FS weld is shown in Fig.2.

Journal Article
TL;DR: In this paper, the authors examined high school students' attitudes towards physical education activity and their sports activities preferences, and found significant differences in attitude towards PEAAS with respect to participants' gender and Socio-economic status.
Abstract: 1 Lecturer, Govt. College of Physical Education, Bhubaneswar 2 Sports Officer, Odisha Engineering College, Bhubaneswar 3 PhD Scholar, LNIPE, Gwalior Abstract-Present study examined high school students’ attitudes toward Physical Education Activity and their sports activities preferences. There were 1317 (603 boys and 714 girls) participants. All the participants were from 9 th -12 th standard from five rural districts. The Physical Education Activity Attitude Scale was used for the collection of data. The overall mean score (70.16+3.95) indicated positive attitude towards physical education activity (ATPEA) for the participants. A significant (p<0.01) differences was found in attitude towards physical education activity with respect to participants’ gender and Socio-Economic Status. In the item number 2, 13 and 15Girls out classed boys. In Item, medium level SES students scored higher than students with low and high SES. Results were of indication that the students’ attitude towards physical education activity was positive. There are some crucial factors like which were found to be related to students’ perception, benefit, care and value about physical education and sports activities. Key Words-ATPEA, PEAAS, Socio Economic Status

Journal Article
TL;DR: How skin cancer can be detected in early stages using smartphone application by analyzing properties of the cancer, Asymmetry, Border, Color variation, Diameter and Expansion(ABCDE) is spoken about.
Abstract: Smartphones are playing major role in e-health in such a way that m-health is playing a significant role in healthcare industry. Image processing techniques are instrumental in healthcare industry to detect abnormalities in human body. Skin cancer (Melanoma) is one of the most deadly cancers, but when diagnosed early, it can be cured. Reports tell that more than million deaths occur due to Skin cancer itself. This paper speaks about how skin cancer can be detected in early stages using smartphone application by analyzing properties of the cancer, Asymmetry, Border, Color variation, Diameter and Expansion(ABCDE).These properties are analyzed using different image processing techniques like Grey scale conversion, Segmentation, contour tracing and histogram analysis. KeywordsSkin cancer, Melanoma, ABCDE, segmentation, contour tracing, edge detection.

Journal Article
TL;DR: In this paper, the major advantages of MAR, technical methods to establish any MAR project, and sources of water that can be recharged for subsequent recovery and for withdrawal at a later date.
Abstract: Managed aquifer recharge (MAR) is the method of intentionally recharging of depleted aquifers for subsequent recovery and for withdrawal at a later date, or to prevent saltwater or other pollutants from entering the aquifer. This review paper explains about the major advantages of MAR, technical methods to establish any MAR project schemes and the sources of water that can be recharged. Keywords— Managed aquifer recharge, Ground water recharge, depletion of water table, Artificial ground water recharge

Journal Article
TL;DR: In this paper, the effect of octane number of the fuel on the performance of the spark ignition engine was investigated, and the results showed that the engine performance were increased step by step according to the increases of the octane numbers of fuel, and this appeared clearly in the obtained results of samples (70 and 90) as follows: At the speed 2800 r.p.m.
Abstract: This research aimed to an experimental study the effect of octane number of the fuel on the performance of the spark ignition engine. The study included the preparation of fuel with octane number (70,75,80,85,90) by using a standard engine (CFR).The experiments had been carried out using four stroke, single cylinder type (TD110), with compression ratio(6:1), coupled to hydraulic dynamometer type (TD115).The study showed that, using fuel with octane number (70 and 75) had problems at the beginning of starting and acceleration. The difficulty are knock and delay in warming up of the engine. The results show that the engine performance are increased step by step according to the increases of the octane number of fuel, and this appeared clearly in the obtained results of samples (70 and 90) as follows: At the speed 2800 r.p.m. the torque and the brake thermal efficiency are increased by 9.75% and 12.48% respectively. While at the speed 3400 r.p.m the brake power and exhaust temperature are increased by 8.97% and 3.7% respectively. also the brake specific fuel consumption decreased by 15% at 2800 r.p.m. . Key wordsOctane number, Performance, Spark ignition engine

Journal Article
TL;DR: In this paper, the results showed that the combination of metal chelating agent (Ethylene diamine tetraactetic acid) and an surfactant (sodium dodecyl sulfate (SDS) and sodium hydroxide were able to clean fouled membranes very effectively than the individual cleaning agent.
Abstract: The Ultra filtration membranes are used for treatment and reused of oily waste waters. The fouling of the ultra filtration membranes is caused due to inorganic and organic materials present in waste water that adhere to the surface and pores of the membranes and resulted in fouling and deterioration perforformance with increase in cost of energy and membranes replacement. In this experiment, Ultra filtration membranes fouling and cleaning were performed with oily waste water and selecting cleaning agents using laboratory scale cross flow membrane test unit. The result showed that the combination of cleaning agent that is metal chelating agent (Ethylene diamine tetraactetic acid) and an surfactant (sodium dodecyl sulfate (SDS) and sodium hydroxide were able to clean fouled membranes very effectively than the individual cleaning agent. The flux recovery percentage was found to improve with increasing cross flow velocity, temperature, pH and concentration of the cleaning solutions. Keywords-ultrafiltration; fouling; cleaning; surfactant; oily waste water. I. INTRODUCTION The fouling of membranes is typically caused by inorganic and organic materials that adhere to the surface and pores of the membrane and result in deterioration of performance (reduce flux of the membrane) with consequent increase in costs of energy and membrane replacement. A. Fundamental of Separation The forces of interaction between the membrane surface and particles in the solution are important in understanding the fouling phenomena. The normal basis for quantifying particle surface interaction is DLVO theory where the particle surface interactions in aqueous environments could be predicted by the summation of van der Waals and electrostatic double layer forces. Reducing the interaction between the particles and the membranes as much possible can reduce the fouling phenomena. This can be achieved when the critical value (flux and pressure) arises as a balance between the hydrodynamic force driving solute towards the pore and electrostatic forces opposing the motion. Critical flux stems from the concept that the higher the flux the stronger is the drag force towards the membranes. The stronger concentration polarization and higher the compaction of particles. Critical flux is defined as the limiting flux value below which a flux decline over time does not occur.(1).the number of parameter influenced this critical flux have been discussed in detail can be found(2).It is maintained that if one operates below the critical flux the fouling can be avoided or minimized. The fouling is common to all types of membrane separation. B. Fouling Membranes fouling are an extremely complex phenomenon that has not been defined precisely. In general the term used to describe the undesirable formation of deposits on membrane surfaces. This occurs when rejected particles are not transported from the surface of the membrane back to the bulk stream. The foul ant are typically colloidal materials of one types or another and their properties and interaction with membranes dominant fouling /cleaning processes. Colloids are defined as fine suspended particles in the size range of few nanometers to few micrometers. Examples of common colloids sizes foulant includes inorganic(clay, silica salt and metal

Journal Article
TL;DR: This paper studies the two global features appearance based algorithm i.e. Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA) in which every face image is converted into 1D and then compares these two algorithm with the help of FAR (False Acceptance Rate), FRR (False Rejection Rate), Time, Memory and checks which algorithm gives the better result.
Abstract: Face recognition is one of the most successful applications of image analysis and understanding and has gained much attention in recent years. Various algorithms were proposed and research groups across the world reported different and often contradictory results when comparing them. There are two approaches for the face recognition i.e. face Geometry based and face appearance based. The appearance based technique is also sub divided into two technique i.e. local feature and global feature based. The technique of local feature based are Discrete Cosine Transform (DCT).In this paper we study the two global features appearance based algorithm i.e. Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA) in which every face image is converted into 1D, we are using 1D for all the calculation and then compare these two algorithm with the help of FAR (False Acceptance Rate), FRR (False Rejection Rate), Time, Memory and checks which algorithm gives the better result.

Journal Article
TL;DR: A new load balancing algorithm for cloud performance improvement, is introduced which based on “Modified fuzzy Logic and Advance Particle Swarm Optimization Model (MFL-APSOM)”, to optimize the total execution time of tasks in the workflow applications.
Abstract: In cloud computing better performances of computing resources are always a desirable task for cloud researchers. In this research paper we are presenting a new load balancing algorithm for cloud performance improvement, is introduced which based on “Modified fuzzy Logic and Advance Particle Swarm Optimization Model (MFL-APSOM)”, to optimize the total execution time of tasks in the workflow applications. The key objective of applying the MFL-APSOM method is to minimize the total tasks execution time by verifying the load fluctuations of the interconnected tasks. The variance of the algorithm considers factors such as load variations and optimization of the data retrieval time. The proposed MFL-APSOM model is validated by applying various workflow structures with different data block sizes. The results are compared with existing HEFT (Heterogeneous Earliest Finish Time) algorithm and Scalable Heterogeneous Earliest Finish Time methods (SHEFT).Simulation results clearly shows that proposed method performs outstanding in terms of cloud performance parameters over existing methods. KeywordsCloud Computing, Performance of Cloud computing, MFL-APSOM and Fuzzy logic

Journal Article
TL;DR: In this paper, Moore's Law is derived from a preferential growth model of successive production technology generations, which predicts that products manufactured with a new production technology generating lower costs per unit have a competitive advantage on the market.
Abstract: Moore suggested an exponential growth of the number of transistors in integrated electronic circuits. In this paper, Moore's law is derived from a preferential growth model of successive production technology generations. The theory suggests that products manufactured with a new production technology generating lower costs per unit have a competitive advantage on the market. Therefore, previous technology generations are replaced according to a Fisher-Pry law. Discussed is the case that a production technology is governed by a cost relevant characteristic. If this characteristic is bounded by a technological or physical boundary, the presented evolutionary model predicts an asymptotic approach to this limit. The model discusses the wafer size evolution and the long term evolution of Moore's law for the case of a physical boundary of the lithographic production technology. It predicts that the miniaturization process of electronic devices will slow down considerably in the next two decades. It has been forty years since Gordon Moore first posited what would one day come to be known as Moore's Law. Gordon's ideas were more than a forecast of an industry's ability to improve; they were a statement of the ability for semiconductor technology to contribute to economic growth and even the improvement of mankind in general. More importantly, Moore's Law set forth a vision of the future that harnessed the imaginations of scientists and engineers to make it all possible .

Journal Article
TL;DR: This paper is introducing a method that when the drunk driver is found then the vehicle ignition function should get disabled and a massage in the form of vehicle location will be sent to the driver’s relative whose number is pre-defined in the system.
Abstract: 1,2 Department of ENTC, SSGMCE Shegaon Abstract— The most of the accidents in every country are caused by the drunken driving. But still in many places the rules are being violated, hence to avoid these situations we need a more efficient system which will be firstly able to verify that whether the drive is in intoxicated situation or not. In this paper we are introducing a method that when the drunk driver is found then the vehicle ignition function should get disabled and a massage in the form of vehicle location will be sent to the driver’s relative whose number is pre-defined in the system. Keywords— Alcohol detection system, Vehicle controlling system, ARM Controller, GPS, GSM.

Journal Article
TL;DR: In this article, a comparison of energy in different types of masonry has been made and compared with the energy of conventional reinforced concrete (RC) slab roof, and total embodied energy of a multi-storeyed building, a load bearing brickwork building and a soil-cement block building using alternative building materials has been compared.
Abstract: Considerable amount of energy is spent in the manufacturing processes and transportation of various building materials. Conservation of energy becomes important in the context of limiting of greenhouse gases emission into the atmosphere and reducing costs of materials. The paper is focused around some issues pertaining to embodied energy in buildings particularly in the Indian context. Energy consumption in the production of basic building materials (such as cement, steel, etc.) and different types of materials used for construction has been discussed. Energy spent in transportation of various building materials is presented. A comparison of energy in different types of masonry has been made. Energy in different types of alternative roofing systems has been discussed and compared with the energy of conventional reinforced concrete (RC) slab roof. Total embodied energy of a multi-storeyed building, a load bearing brickwork building and a soil-cement block building using alternative building materials has been compared. It has been shown that total embodied energy of load bearing masonry buildings can be reduced by 50% when energy efficient/alternative building materials are used. Keywords- Energy and building material, Embodied energy, Energy efficient materials

Journal Article
TL;DR: A comprehensive review of the work done on streambed hydraulic conductivity is presented in this article, placing special emphasis on their spatial and temporal variations and the problems associated with these methods.
Abstract: The hydraulic properties of a streambed are major control in the hydrologic connection between a stream and an aquifer. Streambed characteristics such as thickness, width, bed material, and vertical hydraulic conductivity (Kv) have a great influence on streambed hydraulic properties and water movement. The vertical hydraulic conductivity (Kv) of streambed plays an important role in river water and groundwater interaction. Determination of the vertical hydraulic conductivity (Kv) of the entire riverbed has significant importance for the study of groundwater recharge. This review attempts to summarize the importance and factors influencing streambed hydraulic conductivity. In this paper a large amount of literature has been explained on methods to determine streambed hydraulic conductivity and the problems associated with these methods. A comprehensive review of the work done on streambed hydraulic conductivity is presented placing special emphasis on their spatial and temporal variations. Keywords- hydraulic properties, vertical hydraulic conductivity, groundwater interaction, spatial and temporal variation.

Journal Article
TL;DR: Short Message Service is one of the most important media of communication due to the rapid increase of mobile users, so there is needed to perform SMS collection, feature selection, pre-processing, vector creation, filtering process and updating system.
Abstract: Short Message Service is one of the most important media of communication due to the rapid increase of mobile users. A hybrid system of SMS classification is used to detect spam or ham, using various algorithms such as Naïve Bayes classifier and Apriori Algorithm. So there is needed to perform SMS collection, feature selection, pre-processing, vector creation, filtering process and updating system. Two types of SMS classification exists in current mobile phone and they are enlisted as Black and White. Naïve Bayes is considered as one of the most effectual and significant learning algorithms for data mining and machine learning and also has been treated as a core technique in information retrieval. KEYWORDS— Short Message Service (SMS); Naïve Bayes; Apriori algorithm; ham; spam.


Journal Article
TL;DR: In this article, the authors describe the empirical technique to estimate the solar radiations for given location, which suggests the proper estimation and more efficient utilization solar radiation on earth surface on the basis of measured meteorological data.
Abstract: For solar-based renewable energy technologies as solar photovoltaic or thermal conversion systems, the basic resource or fuel available is solar radiation. Measurement of solar radiation is important for the evaluation and deployment of solar renewable energy systems. In order to calculate the amount of solar radiation falling on a collector at a given time and location, the beam or diffuse radiation should be either measured or estimated using empirical equations. Due to economic reason, it is not possible to measure the solar radiation for all location. Therefore, often it is required to estimate the radiation from the empirical relations. Through the relationships are not completely empirical, they use the parameters that are based on measured meteorological data. This paper describes the empirical technique to estimate the solar radiations for given location. Calculation suggests the proper estimation and more efficient utilization solar radiation on earth surface.

Journal Article
TL;DR: This paper discusses in detail and provides a standard way for web developers to recognize actual usage behavior and anticipated usage behavior with the use of server side access log record file and provides facility for updating web links in an automated manner based on sequential pattern mining and thereafter pattern analysis results.
Abstract: ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract World Wide Web consists of huge source of information resources and services. That’s why there is an explosive growth in web traffic. Each and every website has some form of navigation which is decided by the web developer. And most of the time we knew that these navigational paths are decided without looking into users web interest, which results into the navigational problems have to face by user. This paper “Enhancing web navigation usability by using web usage mining techniques” discusses in detail and provides a standard way for web developers to recognize actual usage behavior and anticipated usage behavior with the use of server side access log record file. Along with this it discusses and provides facility for updating web links in an automated manner based on sequential pattern mining and thereafter pattern analysis results. Anticipated Usage behavior helpful for user to provide better effectiveness and efficiency for their tasks as well as updating links in an automated manner reduces the time expended by developer. Overall this system is more useful from web developers’ as well as users’ point of view.




Journal Article
TL;DR: The main aim of this work is to generate the ramp shaped radiation pattern from an array of isotropic radiating elements using Particle Swarm Optimization to realize the patterns, for meeting its demand and requirements in radar and satellite communication systems for tracking applications.
Abstract: The main aim of this work is to generate the ramp shaped radiation pattern from an array of isotropic radiating elements using Particle Swarm Optimization. It is focused to realize the patterns, for meeting its demand and requirements in radar and satellite communication systems for tracking applications. There are many analytical methods available for beam shaping, but PSO acquires its significance importance and capable of solving complicated search problems. Results are obtained for finite ramp width by varying element number. All the results are simulated using matlab software. The simulated results are more close to the desired radiation patterns. The optimized data and radiation patterns are extremely useful for array designers. Any array can be designed for an application specific.