December 2012 Vol 1 No 1

Author (s) :


1). Dr.S.Selvakani, Francis Xavier Engineering College, Tirunelveli, Tamilnadu, India, Tamilnadu, India
2). N.Suresh Kumar, Francis Xavier Engineering College, Tirunelveli, Tamilnadu, India, Tamilnadu, India

Abstract :


Wireless mesh network plays a vital role in our day to day life, Networks are mainly used to deliver voice, video and data but using WMN’s we can communicate in outdoor environments without wired. A wireless mesh can deliver network capacity, reliability and security along with the flexibility. Nowadays the WMN’s are used by municipalities, public safety agencies, port authorities, and industrial organizations to connect to their workers and constituents. However, many technical issues still exist in this field. In order to provide a better understanding of the research challenges of WMNs, In this paper we propose MobiSEC, a complete security architecture protocols and algorithms for WMNs that provides both access control for mesh users and routers as well as a key distribution schemes that supports layer-2 encryption to ensure security and data confidentiality of all communications that occur in the WMN.


No of Downloads : 92

Author (s) :


1). Dr.P.J.Gundaliya, L.E.College, Morbi, Gujarat, India, Gujarat, India
2). V.H.Khokhani, Darshan Institute of Engineering & Technology, Rajkot, Gujarat, INDIA, Gujarat, India

Abstract :


The effects of traditional development practices on the hydrologic cycle have been well documented. Increases in the impervious surfaces associated with urbanization have resulted in increased surface Runoff decreased base flow changes in stream morphology, increased stream temperature, aquatic/riparian loses. The goal of this paper to widely explores concept of low impact development as an innovative approach to stormwater management and ecosystem protection that integrates hydrologic controls into every aspect of site design to mimic the predevelopment hydrologic. This paper presents low impact development modeling of Rajkot city and compare various LID model by using Storm water Management Modelling system 5.0 After calibration and validation of the SWMM 5.0 it is applied over small watershed.. Various models are prepared i.e. LID1, LID2, Traditional curb and gutter model. Finally concluding Best Management Practice for stormwater management.


No of Downloads : 53

Author (s) :


1). Dr.S.Selvakani, Francis Xavier Engineering College, Tirunelveli, Tamilnadu, India, Tamilnadu, India
2). R.Pearline Ranjana, Francis Xavier Engineeing College, Tirunelveli, Tamilnadu, India, Tamilnadu, India

Abstract :


In rapid growing today’s world, technology increased so far beyond the normal life .Each and every day new electronic product entered into market. The electronic escalation predetermined its intense enlargement leads the world towards modernization and technological superior. But, on other side every inspired technology insists that the present electronic equipment moves to end stage. Thus the lifetime of the electronic equipment getting its expiring dates as earlier. Modernization of life shows the extreme growths of our lifestyle but a major question arise is “What about the ancient and out dated product”. As technology is reinstated, the disposition procedure of expired equipment is the major challenge. E-Waste is the term used to indicate the electronic device which enter expire date and also the useless product. These Electronic devices get junk and gets dumped into the garbage. These electronic wastage makes harm to the environment and also to human health. These may also one of the reasons for the global warming. So that all the techno creators must have an intention to invent a new electron device, but they need to find a correct way to disposing off the same. In all the emerging countries they are taking many steps to recycling the products to make environment nontoxic. This research paper highlights why e-waste is so harmful and the information about the waste management in India. The remedies for the E-Waste problem are also stated. The major intention of this paper is to attenuate the E-Waste volume and to make our world safe and healthy.


No of Downloads : 33

Author (s) :


1). A. K. Somkuwar, M.A.N.I.T, Bhopal, Madhya Pradesh, India, Madhyaparadesh, India
2). V. S. Vora, Dr. K. N. Modi University, Newai, Rajasthan, India, Rajasthan, India

Abstract :


It is essential necessity of embedded system to generate response or output within deadline. Various Scheduling algorithms are used for this purpose to enhance performance, accuracy and security of embedded system applications. These algorithms are either fixed or dynamic type, which are designed for various constraints. Real time scheduling algorithms are mainly depending on type of task i.e. either aperiodic or sporadic. Some real time scheduling algorithms like Pre-emptive & Non Pre-emptive, Round Robin Scheduling, & Time Slicing are few of the favorites for various embedded applications. The type of task and accordingly type of scheduling algorithm used for various applications, where in, in this paper three industrial applications are discussed as case studies and they are Watch making, Conveyor belts and Chair manufacturing.


No of Downloads : 23

Author (s) :


1). Chintan B. Desai, Charotar University of Science & Technology, Changa, Gujart, India, Gujarat, India
2). S.K.Hadia, Charotar University of Science & Technology, Changa, Gujart, India, Gujarat, India
3). Viral B. Thakar, Charotar University of Science & Technology, Changa, Gujart, India, Gujarat, India

Abstract :


A Wireless Sensor Network is a network of sensors with capabilities to sense particular entities related to environment, to process data locally & to communicate information to the Base Station. The self- organizational ability of ad-hoc Wireless Sensor Networks (WSNs) has led them to be the most popular choice in ubiquitous computing. Routing in Wireless Sensor Networks is the most challenging issues due to several individualities that distinguish them from existing communication networks. Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol is one of the renowned hierarchical routing approaches for Wireless Sensor Networks. This paper presents a novel clustering hierarchy using evenly distributed clusters in terms of energy consumption & number of nodes. The proposed approach improves the life span of the network & amount of data transmitted to the BS.


No of Downloads : 44

Author (s) :


1). Chintan B. Desai, Charotar University of Science & Technology, Changa, Gujart, India, Gujarat, India
2). S.K.Hadia, Charotar University of Science & Technology, Changa, Gujart, India, Gujarat, India
3). V.N.Pandya, C.K. Pithawalla College of Engineering and Technology, Surat, Gujarat, India, Gujarat, India

Abstract :


Regarding to recent scenario, wireless communication has become very pervasive. The number of mobile phones and wireless Internet users has increased significantly in recent years. Wireless networking has evolved to extend to existing wired networks. In wireless Network multiple wireless terminals jointly create and maintain Ad-hoc networks without the help of central entities. Whenever two nodes are in their radio coverage, they use single hop connection for information exchange. Whenever two nodes are not within each other’s proximity, they use multi hop connections for data exchanges. To establish multi hope connections, different types of Ad-hoc routing protocols are utilized. This paper investigates the performance of AODV, DSDV and DSR Ad-hoc routing protocols in terms of Throughput, Packet Delivery Ratio, and Average channel Throughput of the network. To achieve the satisfactory result we have used well known Network Simulator NS2 as a core simulation software.


No of Downloads : 35

Author (s) :


1). A. M. Kothari, Atmiya Institute of Tech. and Science, Rajkot, Gujarat, INDIA, Gujarat, India
2). Ved Vyas Dwivedi, C U Shah University, Wadhwan, Gujarat, India, Gujarat, India

Abstract :


In this paper we concentrated on the transform domain watermarking wherein we took video as a cover medium and some binary images as watermark to be embedded behind the video. In this proposed method we combined two of the most important and useful transformations, namely Discrete Wavelet Transform and Discrete Cosine Transform, for the purpose of digital watermarking. We evaluated the proposed method with some visual quality matrices.


No of Downloads : 71

Author (s) :


1). R.R. Tank, Darshan Institute of Engineering & Technology, Rajkot, Gujarat, INDIA, Gujarat, India
2). U.J. Solanki, Darshan Institute of Engineering & Technology, Rajkot, Gujarat, INDIA, Gujarat, India

Abstract :


This paper based on literature review on California Bearing Ratio behaviour of sub-grade soil with respect to stabilization agent added to evaluate economic cost with respect to pavement structure based on the sub-grade stabilization. In order to achieve the above mentioned objectives, it is required to study the geotechnical properties of the expansive soil and the effects of stabilizers i.e. by adding fly ash, lime and combination of both on the properties of expansive soil, especially CBR behaviour, solely based on the literature experiments has been studied and the comparative analysis is carried out between the stabilized and non-stabilized flexible pavement from the economic point of view. As per economic point of view the best option of stabilization is found that the Fly ash plus Lime, combination of two stabilizers are the best option for the expansive sub grade soil stabilization with optimum Lime : Fly ash - 4 : 2 % respectively, Lime stabilization is the second option for the expansive sub grade soil stabilization with optimum 6% of lime, Fly ash stabilization is the third option for the expansive sub grade soil stabilization with optimum 15% fly ash.


No of Downloads : 41

Author (s) :


1). Mr. Prafulla Kumar Panda, Centurion University of Technology & Management, Paralakhemundi, Odisha, India, India

Abstract :


Kosi river is the most destructive river in India its location is mainly on north Bihar plane created long history of flooding. It causes death of indigenous people and unending immigration of native villagers from their home. It is destroying the productive power of fields by depositing bunch of sediments mostly sand through over bank flooding and inundation. Many of the paleochannels of the Kosi river also get rejuvenated during the monsoon and their flow into the present channel of the Kosi is also obstructed due to the embankments along the left bank. In fact, the embankment along the left bank is too close to the active channel and the river has no place to spread its overbank flows. Even if lot of research work has been done by flood control management of Indian government in the Kosi river basin but not proper solution is discovered till now to protect the recurrent and extensive flooding, expected reason behind that is the very high variability discharge, high sediment delivery from uplifting neighborhood. HEC –RAS based hydraulic modeling for estimating maximum carrying capacity of one paleochannel has been done in this study. Its geomorphologic information like Shape of paleochannel, flow direction identification and data generation is obtained in Arc-GIS platform, and extracted data from ArcGIS about cross section profile, longitudinal profile, and slope value for reach length used in succession to follow the proper methodology in HEC-RAS to get maximum carrying capacity of desired paleochannel. This would expect as 3500 cusec or (ft³/s). It can be use in holding approximate 2.43 percent of 144000 cusec discharges at breach point in year 2008 flooding. The Kosi river main channel flooded water can be delivering into it for safety purpose. Afterward analysis of the maximum capacity of all the paleochanel in Kosi river basin could also be utilize for this purpose to prevent flood in future. This study is performing by using hydraulic model of HEC-RAS with Arc View software to estimate maximum carrying capacity of the concerned paleochannel for the purpose to prevent flood on Kosi river basin in future.


No of Downloads : 41

Author (s) :


1). Kunal P. Acharya, L.D. College of Engineering, Ahmedabad, Gujarat, India, Gujarat, India
2). Purvi A. Patel, L.D. College of Engineering, Ahmedabad, Gujarat, India, Gujarat, India

Abstract :


This paper attempts to provide different stereo vision algorithms to obtain geometry information from stereo images. Then it provides different correlation based stereo matching algorithms. An extension of the proposed approach based on synthesis of geometry information and color information for scene segmentation and implements fusion technique for scene segmentation.


No of Downloads : 20

Author (s) :


1). H.M.Bhatt, L.D. College of Engineering, Ahmedabad, Gujarat, India, Gujarat, India
2). Prof. A.B.Nandurbarkar, L.D. College of Engineering, Ahmedabad, Gujarat, India, Gujarat, India

Abstract :


The increasing demand of data rate with limited available spectrum has motivated the researcher to find solutions which enable to cater the demands of future wireless networks. Cooperative communication is one of the solutions, which uses the cooperation of other terminals called relays to complete the communication. The node who overhears the communication cooperate with the source of information and re-transmit it towards destination is the key concept of cooperation. If many cooperators retransmit with uncontrolled power, it results in wastage of power and increased interference in the network. To achieve the fruits of cooperation, it is, therefore, very essential to choose the appropriate partner (relay) and adequate power level for all the pairs of source-relay in the network. Relay assignment and power minimization algorithm for multisource multi relay scenario is presented in this paper. The approach taken in this paper ensures that each pair of source-relay consumes minimum power, at the same minimizing the overall power consumption of the network.


No of Downloads : 21

Author (s) :


1). Govind Chaudhari, L.D. College of Engineering, Ahmedabad, Gujarat, India, Gujarat, India
2). Kavindra Jain, G H Patel Engineering College, V. V. Nagar, Gujarat, India, Gujarat, India
3). Kinjal Mehta, L.D. College of Engineering, Ahmedabad, Gujarat, India, Gujarat, India

Abstract :


This paper presents a methodology for identification and classification of peanut (Arachis hypogaea L.). Texture, Color and shape features are the basis used for recognition. The texture features are extracted using gray level co-occurrence matrix method like entropy, correlation, angular second moment. Color features are calculated like skewness, kurtosis, mean, and variance. Shape features are calculated using Fourier Descriptor like Minor-Major axis, Circularity, Compactness etc. Neural network is best used for decision making of complex problems. Their decision making capabilities can be best used in image analysis of biological products where the shape and size classification is not governed by any mathematical function. This paper reviews the technique of image analysis of Peanut with reference to use of neural network classifiers for decision making. The Back Propagation neural network is developed to classify peanuts.


No of Downloads : 20

Author (s) :


1). Dharmesh Vandra, L.D. College of Engineering, Ahmedabad, Gujarat, India, Gujarat, India
2). Sima Gonsai, L.D. College of Engineering, Ahmedabad, Gujarat, India, Gujarat, India

Abstract :


The Main function of wearable device is to accurately detect the object scan by sensor. Strong objective for object recognition SoC is feature key point matching, which is main aim for wearable device application like the mobile application, blind people etc. We address issues including the different performance parameters like the low recognition accuracy, dramatic changes in object view points and time consume by the complex computations to determine the feature points and matching with in-built data library. However, traditional method gives the high computation costs cause long process times. Better performance of SoC ,to achieve high-speed and accurate operation, many methods adopted like scale invariant feature transform (SIFT), gradient matching, large model bases and histograms of receptive field responses and speeded up robust features (SURF) method. This paper give overview of analysis of the improvement in the speed of matching process using HK-Means clustering , self-organizing map and visual vocabulary process (VVP).the performance of given methods and descriptor types in terms of accuracy and speed evaluated on our sign recognition method used for detecting multiple objects in high resolution real time images.


No of Downloads : 26

Author (s) :


1). Dr.K.R.Parmar, L.D. College of Engineering, Ahmedabad, Gujarat, India, Gujarat, India
2). M.N.Mehta, L.D. College of Engineering, Ahmedabad, Gujarat, India, Gujarat, India

Abstract :


This paper examine algorithms for assigning mobile users to base stations and allocating power in cellular networks. These algorithms are based on results from the problem of assigning users to base stations, and allocate power jointly. The objective in the power allocation examined in this work is either to maximize the minimum user throughput, a fair allocation, or to maximize the total system throughput. The algorithms are implemented and tested in orthogonal frequency-division multiplex in g RUNE simulator. The four different algorithms for assigning base stations to mobiles and two power allocating algorithms are described in this paper.


No of Downloads : 21

Author (s) :


1). M.B. Bhammar, L.D. College of Engineering, Ahmedabad, Gujarat, India, Gujarat, India
2). Prof. K.A. Mehta, L.D. College of Engineering, Ahmedabad, Gujarat, India, Gujarat, India

Abstract :


In modern communicative and network computing, sharing and storing image data effectively have been a great challenge. People all over the word are sharing, transmitting and storing millions of images every moment. Although, there have been significant development in storage device capacity enhancement sector, production of digital images is being increased too in that proportion. Consequently, the demand of handsome image compression algorithm is yet very high. Image compression is minimizing the size in bytes of an image without degrading of the quality of the image to an unacceptable level. There are several different ways in which images can be compressed. This paper analyses various image compression techniques. Easy and less time consuming transmission of high quality digital images requires the compression-decompression (CODEC) technique to be as simple as possible and to be completely lossless or having high degree of quality. Keeping this demand into mind, researchers around the word trying to research such a compression mechanism that can easily reach the goal specified. We have presented various steps involved in the general procedure for compressing images. This analysis of various compression techniques provides knowledge in the identifying the advantageous features and help in choosing correct method for compression.


No of Downloads : 56

About Us

International Journal of Darshan Institute on Engineering Research and Emerging Technologies (IJDI-ERET) (ISSN 2320-7590) is an open access peer-reviewed international journal publishing high-quality articles related to all domains of engineering.

Contact Us

At Hadala, Near Water Sump, Rajkot - Morbi Highway,
Gujarat-363650, India

editorijdieret@darshan.ac.in
(General queries, Comments or Suggestions)