Manuscripts

Recent Papers

Investigation of Phenol Adsorption Characteristics by Chemically Treated Ganga Soil

In this study, chemically modified natural clay was employed to remove phenol from its aqueous solution. The effects of various parameters on phenol adsorption were investigated through batch adsorption in order to find out the phenol adsorption characteristics onto the surface of modified adsorbent. The adsorption of phenol was found to increase at lower solution pH and comparatively lower temperature. The adsorption was also found to increase with increase in initial concentration and contact time but decrease in adsorbent dose. The maximum adsorption capacity of 87.08 mg/g was found at a solution pH of 3, initial concentration of 100 mg/L, adsorbent dose of 1 g/L and temperature of 30 °C. The adsorption capacity was found to increase with decreasing temperature indicating exothermic nature of the adsorption process. The Adsorption characteristics was correlated by Langmuir, Freundlich and Tempkin isotherms at three different temperature and Langmuir isotherm exhibited a better fit to the experimental data. The kinetics of the adsorption process was also studied by using pseudo first-order, pseudo second-order, intra-particle and Elovich model at three different temperatures and concentrations. It was found that pseudo second-order kinetic was well correlated with the given experimental data. The thermodynamic study of phenol adsorption also confirmed the exothermic nature of the adsorption process.

Published by: Adwitiya Mullick, Ayan Kumar Bhar, Bishwarup Biswas, Mahua Ghosh, Piyali Sardar, Monal Dutta, Dipankar Bhattacharyay

Author: Adwitiya Mullick

Paper ID: V3I3-1364

Paper Status: published

Published: May 27, 2017

Full Details

Efficient Timing Closure in SOC through Timing Quality Checks and Engineering Change Order

Ensuring correct operation of design despite rising levels of design complexity has been a major focus of research and development since the dawn of digital system design. As design size and complexity increase, so is the need to verify designs quickly and reliably. This, combined with the reduced design cycle of 3-6 months, makes verification an extremely challenging task. Once the chip is taped out, if the chip is not meeting timing or if the chip is consuming too much power then it is a big issue and results in huge loss. So in order to avoid these post silicon surprises, preliminary signoff checks are must. This paper covers the various kinds of timing quality checks that are used in the industry including the checks related to connectivity, clock, Max slope and Max capacitance, checks for Latch etc. Also in advanced technology nodes one has to consider the effect of PVT variation, temperature inversion, noise effect on delay, which is adding more scenarios for STA to cover. With big SOC project, one timing ECO run normally takes 3~5 days. The turn-around-time for timing ECO and timing signoff has become a bottle neck in the later stage of the project. So there is an immense need of effective implementation of ECO with new technologies including physically aware ECO with less resource, reduced design cycle time and reduced manual effort. The proposed algorithm is tested on multiple industrial design and found to achieve good improvement interms of Worst Negative Slack, Total Negative Slack and Failing End Points. Also the algorithm is physically aware meaning that the placement blockages, congestions are considered while inserting buffers. The algorithm works under Distributed Multi Scenarios Analysis (DMSA) environment and considers the effect of ECO across multiple corners and modes.

Published by: Shanthala .L, Dr. R. Jayagowri

Author: Shanthala .L

Paper ID: V3I3-1401

Paper Status: published

Published: May 27, 2017

Full Details

High Security Data Hiding in Videos Using Multi-Frame, Image Cropping and LSB Algorithm

An art of invisible communication by embedding secret information in other sources like text, image, audio, and video is called steganography. A high security data hiding technique is proposed in this paper. Selected frames from the video are cropped into four equal parts, block of secret data is hiding in each three channels of crop of a frame using LSB technique in a predefined sequence, and then image crops are joined to get stego image/ frame. This stego frame is replaced in video in its original position. Comparative study is performed between proposed approach and existing approach using different metrics such as visualization test, MSE, PSNR and CPU time. Experimental results shows that the proposed approach is more secure compared to the existing approach.

Published by: Bharathi D. A, Anitha .P, Kiran S. M

Author: Bharathi D. A

Paper ID: V3I3-1402

Paper Status: published

Published: May 27, 2017

Full Details

Recognition of Online Handwritten Characters Using Lipi Toolkit

Handwritting deformation and complex structure has been one of the most challenging problems in handwritten recognition. In this paper a online handwritten recognition tool has been for recognition. Online handwriting data is collected as strokes, where a stroke is defined as the sequence of data points captured from the event of a pen-down to the subsequent pen-lift. Lipi toolkit engine is used to develop the character recognition system. Lipi toolkit is open source engine. Engine uses backpropagation and nearest neighbour for pattern classification and recognition which employs unsupervised learning algorithms. It has shown that the Lipi engine is feasible for online handwritten English character recognition to a certain degree.

Published by: Tanvi Zunjarrao, Uday Joshi

Author: Tanvi Zunjarrao

Paper ID: V3I3-1416

Paper Status: published

Published: May 27, 2017

Full Details

Extracting Deblur Image Using Fuzzy Logic Approach from Impulse Noise in Dip

Image processing is very crucial in today world because various noises, attacks, and many more problem faced by an image from transmitter to receiver side. By applying various algorithms and filters we can remove such type of noises and attacks. Blur detection techniques are very helpful in real life application and are used in image segmentation, image restoration and image enhancement. Blur detection techniques are used to remove the blur from a blurred region of an image which is due to defocus of a camera or motion of an object. Blurring is a form of bandwidth reduction of an ideal image owing to the imperfect image formation process. It can be caused by relative motion between the camera and the original scene, or by an optical system that is out of focus. Deblurring techniques are basically used to sharp an image using different methods & parameters so that we can abundant amount of knowledge. As we know there are various types of noises occurred in an image and to remove various techniques are used. Every technique is suitable for a particular noise and we cannot apply randomly to remove a particular noise. With advancement of time old technique are replaced by advanced method and today Fuzzy Logic is much more appreciated due to simple logic function and it is fourth generation technique

Published by: Renuka Yadav, Munesh Yadav

Author: Renuka Yadav

Paper ID: V3I3-1418

Paper Status: published

Published: May 26, 2017

Full Details

Analysis of Cooling Process for Data Centre’s at Africa

Among the most popular cyber centers, there are few problems that generally interrupts the process of complete automation and cooling process. Modern data centers are generally keen to a lot of neatness’s the industry consumes a lot of heat by consuming a huge amount of heat. So, for that, a substantial cooling process is required. This paper is basically a survey on the cooling process and also the human-automation on cyber centers and also a prototype networking software that helps cyber owners to forget their worries about the login and logout time of their customers. This system supports all types of human activities and also provides security and reliability. This paper based on the literature survey finds that Africa is lagging behind this scenario. It is based on Research and process for selecting the best location to build data centers for cloud providers in West Africa. This paper studies this problem by taking main considerations on Network performance, costs, and submarine cables.

Published by: Asha Yadav, Minakshi Memoria

Author: Asha Yadav

Paper ID: V3I3-1312

Paper Status: published

Published: May 26, 2017

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X