A Study on Effect of Temperature on Lubricating Oil Using Bare and Bent Optical Fibre Sensor: A Theoretical and Experimental Approach
Research Paper | Journal Paper
Vol.04 , Issue.07 , pp.1-6, Dec-2016
Abstract
This paper describes a bare and bent multimode optical fibre sensor to study the effect of temperature on a pure lubricating oil sample. It describes both mathematical and experimental analysis of the oil sample when subjected to high temperature. The sensor system consists of (i) a bare and bent multimode optical fibre (BBMOF) sensor (ii) LM35 temperature sensor (iii) microcontroller system for sampling of data. The BBMOF is immersed in a lubricating oil sample and subjected to varying temperature. The BBMOF is used to measure the refractive index (RI) of the oil sample and the LM35 is used to provide the measure of temperature of the lubricating oil sample. The measure of the refractive index (RI) and temperature are sampled by an ATmega 32 microcontroller based system for processing and further analysis of measured data.
Key-Words / Index Term
Lubricating oil, optical fibre, refractive index, microcontroller
References
[1]. A Study of Motorcycle oils, AMSOIL Power Sports Group, Tech. Rep. 2, pp. 1- 27, 2009.
[2]. Vojtěch Kumbįr, Petr Dostįl, Jiří Čupera and Artūras Sabaliauskas, “Kinematic Viscosity of Four-Stroke Engine Oils”, Technologijos Mokslai. Mechaninė Inžinerija, vol. 3, no. 36, pp. 134-139, 2012.
[3]. L. Leugner, “SAE oil Viscosity Classification” in The Practical Handbook of Machinery Lubrication”, 4th ed, Noria Publishing, pp. 180, 2005.
[4]. E.C. Fitch, “Temperature Stability”, Machinery Lubrication Magazine, vol. 3, pp. 35-39, 2002.
[5]. A Carey, “The Dielectric Constant of Lubrication Oils”, Computational Systems Incorporated 835 Innovation Drive Knoxville, TN 37932, 423, pp. 675-683, 1998.
[6]. B. Abedian, K. N. Baker, “Temperature Effects on the Electrical Conductivity of Dielectric Liquids”, IEEE Transactions on Dielectrics and Electrical Insulation, vol. 15 (3), pp. 888-892, 2008.
[7]. A. Agoston, C. Otsch, B. Jakoby, “Viscosity sensors for engine oil condition monitoring-Application and Interpretation of results”, Sensors and Actuators A, vol. 121, pp. 327-332, 2005.
[8]. D. Knežević, V. Savić, “Mathematical modeling of changing of dynamic viscosity, as a function of temperature and pressure, of mineral oils for hydraulic systems”, Facta Universitatis Series: Mechanical Engineering, vol. 4(1), pp. 27 – 34, 2006.
[9]. S Laskar and S Bordoloi, “Monitoring of Moisture in Transformer Oil Using Optical Fibre as Sensor”, Journal of Photonics, pp. 1-7, 2013.
[10]. Report on Test Plan: Lubricating oil Basestocks category- submitted to US EPA by The Petroleum HPV testing group, Constrium registration # 1100997, March 24, 2003
[11]. Datasheet on LM35 Precision Centigrade Temperature Sensors, Literature Number: SNIS159B, Texas Instruments, pp. 1-12, 2016.
[12]. ATMEL Datasheet on 8 bit AVR microcontroller with 32 kbytes In-System Programmable flash (ATmega 32 and ATmega 32L), pp. 1-340, 2011.
Citation
S Bordoloi and S Laskar, "A Study on Effect of Temperature on Lubricating Oil Using Bare and Bent Optical Fibre Sensor: A Theoretical and Experimental Approach", International Journal of Computer Sciences and Engineering, Vol.04, Issue.07, pp.1-6, 2016.
Performance Analysis of OLSR in both UDP and TCP environment
Research Paper | Journal Paper
Vol.04 , Issue.07 , pp.7-13, Dec-2016
Abstract
In this paper we have discussed about advanced version of Link State Protocol i.e. OLSR (Optimized Link State Protocol. OLSR is a Proactive routing protocol which mainly can be used for dense network because of its nature to reduce the retransmission of packets substantially. Here we have seen how the performance of OLSR protocol varies when number of nodes are changed and how it perform when the speed of nodes changes with change of pause time interval of fixed position. The discussion is based on graph of 2 dimensions in both TCP and UDP environment where the performance metrics are on x-axis, and number of node and node mobility are on y-axis.
Key-Words / Index Term
OLSR; TCP; UDP; MPR; PACKET
References
[1]. Boppana Rajendra V. Marrina Mahesh K.,P Jacquet, Styadeva P.: An Analysis of Routing Techniques for Mobile and Ad Hoc Networks, 1999.
[2]. Rahman M. and Muktadir A. Al, ―The impact of data send rate, node velocity and transmission range on QoS parameters of OLSR and DYMO MANET routing protocols‖, In proceedings of IEEE 10th international Conference on Computer and Information Technology, ICCIT, Dec. 2007. pp. 1–6.
[3]. Chen Tsu-Wei and Gerla Mario: Global State Routing: A New Routing Scheme for Ad Hoc Wireless Networks. http://www1.ics.uci.edu/~atm/adhoc/paper-collection/gerla-gsr-icc98.pdf
[4]. E.Mahadipour, Francisco J. Ros, ―um-olsr-1.0.tgz‖, University of Murcia, Spain, available online at http://masimum.inf.um.es/ fjrm/development/um-olsr/ and http://sourceforge.net/ projects/um-olsr/, 2006. Accessed in Jan. 2015.
[5]. Zhen Yihui ,Chen T.-W., Tsai J. T. and Gerla M.: QoS Routing Performance in Multihop, Multimedia, Wireless Networks, 1997. http://www1.ics.uci.edu/~atm/adhoc/paper- collection/gerla-qos-routing-icupc97.pdf
[6]. Deepali Arora, Huhtonen Aleksandr, ―Comparing AODV and OLSR Routing Protocols‖, Telecommunication Software and Multimedia Laboratory. HUT T-110.551 Seminar on Internetworking, Sjokulla, available online at www.tml.tkk.fi/ Studies/T- 110.551/2004/ papers/ Huhtonen.pdf, 2004, pp. 1-9.
[7]. Mohapatra S. and Kanungo P., ―Performance Analysis of AODV, DSR, OLSR and DSDV Routing Protocols using NS2 Simulator‖, International Conference on Communication Technology and System Design, available online at www.sciencedirect.com, www.elsevier.com/locate/procedia, Procedia Engineering, 2012, pp.69-76
[8]. L.Sakeer, Kumawat Ramprasad and Somani Vinay, ―Comparative Analysis of DSDV and OLSR Routing Protocols in MANET at Different Traffic Load‖, In proceedings published by International Journal of Computer Applications-International Conference on Computer Communication and Networks (CSI-COMNET), 2011, pp. 34-39.
[9]. Utpal Barman et al.,Performance Analysis of DSDV, in IJARCCE vol 5, Issue 1, January 2016
[10]. Ritika Kachal et al. “Comparative Study and Analysis of DSR, DSDVAND ZRP in Mobile Ad-Hoc Networks” in IJCSEonline vol 2. Issu 5 and E-ISSN: 2347-2693
Citation
Diganto Sahu and Utpal Barman, "Performance Analysis of OLSR in both UDP and TCP environment", International Journal of Computer Sciences and Engineering, Vol.04, Issue.07, pp.7-13, 2016.
Automatic Feedback Control of A DC Motor Using PWM With P-Controller
Research Paper | Journal Paper
Vol.04 , Issue.07 , pp.14-19, Dec-2016
Abstract
An automatic feedback control system has been developed to regulate the speed of a dc motor by using PWM with P-controller. The voltage applied to the motor can be controlled by controlling the PWM duty cycle. The principle involved is armature voltage control of speed of a dc motor at varying load conditions. Adapting close-loop control system gives a better and more precise operating condition of a motor under varying load conditions which is often met in practical situations. Comparison of the output voltage with the reference value is carried out with the help of a feedback circuit which includes a P-Controller. It determines the deviation and generates a control signal to reduce the deviation to a small value. Other types of controller, namely PI and PID, are envisaged as a part of future work.
Key-Words / Index Term
Automatic feedback control, Multi-vibrator, PWM technique, Duty cycle, Speed control, P-controller, Motor Driver
References
[1]http://digital.ni.com/public.nsf/allkb/294E67623752656686256DB800508989
[2] Mohd Samsul Islam and V.K Tripathi,”A Study of D.C Motor Speed Control through Pulse Width Modulation Implemented by MATLAB Simulation” International Journal of Advanced Research in Computer and Communication Engineering, Vol. 5, Issue 6, June 2016
[3] J. A. Mohammed, “Pulse Width Modulation for DC Motor Control Based on LM324”, Eng. &Tech. Journal, Vol. 31,Part (A), No.10, pp. 1882-1896, 2013
[4] J. S. Chauhan and S. Semwal, “Microcontroller Based Speed Control of DC Geared Motor through RS-232 Interface with PC”, International Journal of Engineering Research and Applications (IJERA), ISSN: 2248-9622, vol. 3, Issue 1, January –February 2013, pp.778-783.
[5] A. K. Dewangan, N. Chakraborty, S. Shukla and V. Yadu, “PWM Based Automatic Closed Loop Speed Control of DC Motor”,International Journal of Engineering Trends and Technology, vol. 3, Issue 2, pp. 110-112, 2012.
[6] S. Shrivastava, J. Rawat and A. Agrawal, “Controlling DC Motor using Microcontroller (PIC16F72) with PWM”, International Journal of Engineering Research, vol.1, Issue 2, pp. 45-47
[7] Surekha Bhanot, Process Control Principles and Applications, 1st ed., vol. 1, Publisher- Oxford University Press, 2008, pp.53
Citation
M. S. Mazinder, S. Ahmed, S. Devya, P.K Bordoloi, T Roy, "Automatic Feedback Control of A DC Motor Using PWM With P-Controller", International Journal of Computer Sciences and Engineering, Vol.04, Issue.07, pp.14-19, 2016.
Secure Data Sharing in Cloud Storage Using Key Aggregation Cryptography
Review Paper | Journal Paper
Vol.04 , Issue.07 , pp.20-23, Dec-2016
Abstract
Secure Cloud Storage is an online platform for storing user data with sharing facilities among other users. The data is optionally encrypted before storing and decrypted on download by the system and the process is transparent to the end user. The platform also provides marking data private or public such that all public data are visible to end user and can perform search or download request to the owner. The data owner or user can audit all such request and grant download access to individual or multiple files accordingly. Each file on our system is encrypted using different AES key and the real challenge come when multiple file needs to be shared between users. This constraint is addressed by applying a concept known as Key Aggregation which states the generation of constant size key for a single or multiple files and thereby end user can easily decrypt the shared files.
Key-Words / Index Term
Data Sharing, Key Aggregation, Java Keystore, Private Key Cryptography, Encryption, Decryption
References
[1]. Cheng-Kang Chu, Sherman S.M. Chow, Wen-Guey, Tzeng, Jianying Zhou and Robert H. Deng, "Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage” IEEE Transactions On Parallel and Distributed System, Vol 25, No. 2 February 2014.
[2]. Mewada, Shivlal, Arti Sharivastava, Pradeep Sharma, S. S. Gautam, and N. Purohit. "Performance Analysis of Encryption Algorithm in Cloud Computing.", International Journal of Computer Sciences and Engineering Vol.-3(2), PP(83-89) Feb 2015,
[3]. Ramakrishna Jadhav1, Snehal Nargundi,"A Review On Key-Aggregate Cryptosystem For Scalable Data Sharing In Cloud Storage", IJRET: International Journal of Research in Engineering and Technology, Volume: 03 Issue: 11 | Nov-2014.
[4]. Shivlal Mewada, Sharma Pradeep, Gautam S.S., “Exploration of Efficient Symmetric Algorithms”, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom)”, pp(663 – 666), March, 2016,
[5]. Wang, S. S. M. Chow, M. Li, and H. Li, “Storing Shared Data on the Cloud via Security Mediator,” in International Conferenceon Distributed Computing Systems - ICDCS 2013. IEEE, 2013.
[6]. M.Chase and S. S. M. Chow, “Improving Privacy and Security in Multi-Authority Attribute-Based Encryption,” in ACM Conferenceon Computer and communications security Pp 121-130.
[7]. Anjali Nigam, Vineet Singh, "Securing Data Transmission in Cloud using Encryption Algorithms", International Journal of Computer Sciences and Engineering, Volume-04, Issue-06, Page No (21-25), Jun -2016, E-ISSN: 2347-2693
[8]. Shivlal Mewada, Sharma Pradeep, Gautam S.S., “Classification of Efficient Symmetric Key Cryptography Algorithms”, International Journal of Computer Science and Information Security (IJCSIS) USA, Vol. 14, No. 2, pp (105-110), Feb 2016
[9]. Sadiya Shakil and Vineet Singh, "Security of Personal Data on Internet of Things Using AES", International Journal of Computer Sciences and Engineering, Volume-04, Issue-06, Page No (35-39), Jun -2016, E-ISSN: 2347-2693
[10]. R. Durga Prasad, R.N.D.S.S Kiran, Andey Krishnaji, "Advanced Data Encryption/Decryption using Multi Codes for One Character", International Journal of Computer Sciences and Engineering, Volume-03, Issue-09, Page No (34-38), Sep -2015, E-ISSN: 2347-2693
[11]. Shivlal, P Sharma, S.S Gautam, “Exploration of Efficient Symmetric AES Algorithm”, 2016 Symposium on Colossal Data Analysis and Networking (CDAN), pp(1-5), Mar, 2016. Doi: 10.1109/CDAN.2016.7570921
Citation
Tulip Dutta and Amarjyoti Pathak , "Secure Data Sharing in Cloud Storage Using Key Aggregation Cryptography", International Journal of Computer Sciences and Engineering, Vol.04, Issue.07, pp.20-23, 2016.
Energy efficient WSN Protocols: A Survey
Research Paper | Journal Paper
Vol.04 , Issue.07 , pp.24-29, Dec-2016
Abstract
The wireless sensor networking mainly suffers from the fact that the nodes have low energy backup. Some issues in WSNs are that sensor nodes have constrained in terms of processing power, communication bandwidth, and storage space. Due to low energy backup several nodes may die out soon and there may be loss of data. Various routing algorithm have been developed to increase the lifetime of the network. Some of the types of routing protocol are cluster based routing protocol, chain based routing protocol, hierarchical routing protocol and hybrid routing protocol .In this paper we discuss the various protocols such as LEACH, PEGASIS, IEEPB, PDCH, TEEN, APTEEN, CCM, CCBRP, TSCP and see how they are simulated.
Key-Words / Index Term
LEACH, TEEN, APTEEN, CCM, PEGASIS, CCBRP, TSCP, IEEPB, PDCH
References
[1]. Prabhdeep Singh, Max Bhatia, Ravneet Kaur, “Energy-Efficient Cluster Based Routing Techniques: A Review”, International Journal of Engineering Trends and Technology- Volume4Issue3- 2013.
[2] Payel Ray, Ranjan Kumar Mondal, Debabrata Sarddar, "Efficient Path Reconstruction for Wireless Sensor Network", International Journal of Computer Sciences and Engineering, Volume-04, Issue-05, Page No (140-146), May -2016
[3] Jigish Rana , Sangeeta Vhatkar, Mohommad Atique, “Comparative Study of PEGASIS and PDCH Protocols in Wireless Sensor Network”, International Journal of Computer Applications (0975 – 8887) International Conference and Workshop on Emerging Trends in Technology (ICWET 2015).
[4] Amr M. Kishk, Nagy W. Messiha, Nawal A. El-Fishawy, Abdelrahman A. Alkafs, Ahmed H. Madian, "Proposed Jamming Removal Technique for Wireless Sensor Network", International Journal of Scientific Research in Network Security and Communication, Volume-03, Issue-02, Page No (1-14), Mar -Apr 2015
[5] Atul Rana, Manju Bala and Varsha , "Review Paper on MSEEC: Energy Efficient Clustering Protocol in HWSN", International Journal of Computer Sciences and Engineering, Volume-04, Issue-05, Page No (71-75), May -2016
[6] Gurbax Kaur, Ritesh Sharma, "A Review on Sweep Coverage in Wireless Sensor Networks", International Journal of Computer Sciences and Engineering, Volume-04, Issue-06, Page No (113-117), Jun -2016, E-ISSN: 2347-2693
[7] Leena Pal, Pradeep Sharma, Netram Kaurav and Shivlal Mewada, "Performance Analysis of Reactive and Proactive Routing Protocols for Mobile Ad-hoc –Networks", International Journal of Scientific Research in Network Security and Communication, Volume-01, Issue-05, Page No (1-4), Nov -Dec 2013
[8] Kareem, Husam, Shaiful Jahari Hashim, Shamala Subramaniam, and Aduwati Sali. "Energy efficient Two Stage Chain Routing Protocol (TSCP) for wireless sensor networks." Journal of Theoretical and Applied Information Technology 59, no. 2 (2014): 442-450.
Citation
Utpal Barman, Amit Mundra, Kunal Gunjan Talukdar, Mrinal Goswami, Pranoy Bhowmick, "Energy efficient WSN Protocols: A Survey", International Journal of Computer Sciences and Engineering, Vol.04, Issue.07, pp.24-29, 2016.
An Approach to solve Unit Commitment Problems considering Reliability as a Constraint
Research Paper | Journal Paper
Vol.04 , Issue.07 , pp.30-33, Dec-2016
Abstract
Unit commitment is an important task in power system operation and control. Depending on the system’s load demand, the available generating units of the system are scheduled for operation so that optimum economy over the period is achieved. In addition to the economy, reliability of the system is also an important constraint in preparing the unit commitment schedule. In this paper, reliability concept is incorporated in unit commitment problems and the well-being framework is used for this purpose. The well-being analysis of a system provides the opportunity to consider both deterministic and probabilistic approaches and alleviates the weaknesses associated with the deterministic approach or interpreting a single risk index.
Key-Words / Index Term
Unit commitment, well-being analysis, reliability, system health analysis, system risk analysis
References
[1]. A. Abdulwhab, R. Billinton, “Generating system well-being index evaluation”, Electrical Power and Energy System 26 (2004) 221-229
[2]. E. E. Lewis, “Introduction to Reliability Engineering”, second edition, John Wiley & Sons Inc, Chapter 10.
[3]. Mario V. F. Pereira, Neal J. Balu, “Composite Generation/Transmission Reliability Evaluation”, proceedings of the IEEE, VOL. 80, NO.4, April 1992
[4]. L. Goel, C. Feng, “Well-being framework for composite generation and transmission system reliability evaluation”,IEE prod-Gen, Trans, Distrib. Vol 146. No. 5, September 1999
[5]. Saleh Abdulrahman Saleh Aboreshaid, “Composite Power System Well-Being Analysis”, A thesis submitted to the college of graduate studies and research in partial fulfillment of the requirements for the Degree of Doctor of Philosophy in the Department of Electrical Engineering, University of Saskatchewan, Saskatoon, 1997
[6]. R. Billinton, Fotuhi-Firuzabad, M. and Aboreshaid, S.,"An Approach to Evaluating System Well-being in Engineering Reliability Applications ", Journal of Reliability Engineering and System Safety, Vol. 50, No. 1, 1995, pp. 1-5.
[7]. R. Billinton, S. Kumar, N. Choudhury, K. Chu, K. Debnath, L. Goel, E Khan, P Kos, G Nourbakhsh, J. Oteng-Adjei, “A reliability test system for educational purpose- basic data”, IEEE Transitions power System, 1989; Vol. 4, No.3 ,August 1989.
Citation
Bipul Kumar Talukdar and Bimal Chandra , "An Approach to solve Unit Commitment Problems considering Reliability as a Constraint", International Journal of Computer Sciences and Engineering, Vol.04, Issue.07, pp.30-33, 2016.
Intrusion Detection System Based on Modified K-Means Clustering Algorithm
Research Paper | Journal Paper
Vol.04 , Issue.07 , pp.34-37, Dec-2016
Abstract
Due to the growth of Information Systems, different types of electronic attacks are happening day by day. This leads to the security breach rising every day Therefore it is of utmost important to protect highly sensitive and private information by securing the data. An intrusion detection system (IDS) monitors network or system activities and for nasty activities produces reports to a management. It monitors network traffic and its suspicious behaviour against security. Different types of intrusion detection methodologies are available, but all the current IDS are not perfect. Now a day’s Data mining concepts are used in the area of research in intrusion detection implementation. This paper tries to forward an idea of modifying the traditional K- means algorithm using fuzzy concept to prepare a model of intrusion detection system. The experiments have been done on the KDD Cup 99 dataset.
Key-Words / Index Term
IDS, Data mining, KDD Cup, Clustering, Fuzzy, False Positive
References
[1] Shakil Ghalib, Kapil Dewan “Review on Intrusion Detection Approaches with Machine Learning” ©2015,IJARCSSE All Rights Reserved.
[2] Hitesh Chandra Mahawari and Mahesh Pawar , "A Study of Various Methods to find K for K-Means Clustering", International Journal of Computer Sciences and Engineering, Volume-04, Issue-03, Page No (45-47), Mar -2016
[3]. Vidit pathak, Dr. Ananthanarayana V.S. ”A Novel Multi-Threaded K-Means Clustering Approach for Intrsion Detection ”978-1-4673-2008-5/12/$31.00_2012 IEEE.
[4].Li Tian, Wang Jianwen”Research on Network Intrusion Detection System Based on Improved k-means Clustering Algorithm”978-0-7695-3930-0/09 $26.00 _ 2009 IEEE.
[5] Kapil Wankhande, Sadia Patka”An Overview of Intrusion Detection Based on Data Mining Techniques”978-0-7695-4958-3/13 $26.00©2013 IEEE DOI 10.1109/CSNT.2013.134.
[6] Pasquale Foggia, Gennaro Percannella,Carlo Sansone andmario vento,”A Graph-Based Clustering Method and It’s Applications”F.Male et al. (Eds.):BVAI 2007, LNCS 4729, pp.277-287,2007.©Springer.Verlag Berlin Heidelberg 2007.
[7] Zhou mingqiang, Huang Hui, Wang Qian,”A Graph-based Clustering Algorithm for Anomaly Intrusion Detection ”978-1-4673-0242-5/12/$31.00©2012 IEEE.
[8] Hachi fatma, Limam mohamed, ”A two-stage technique to improve intrusion detection system based on data mining algorithms”978-1-4673-5814-9/13/$31.00©2013 IEEE.
[9] Enakshmi Nandi and Debabrata Sarddar, "A Modified MapReduce-K-Means Clustering Based Load Distribution Method for Wireless Sensor Network in Mobile Cloud computing", International Journal of Computer Sciences and Engineering, Volume-04, Issue-08, Page No (107-110), Aug -2016,
[10] Nilam Kolhe, Harshada Kulkarni, Ishita Kedia and Shivani Gaikwad, "Comparative Analysis of Cluster based Boosting", International Journal of Computer Sciences and Engineering, Volume-03, Issue-10, Page No (60-70), Oct -2015
[11] LIU Hai-tao, WEI Ru-xiang and JIANG Guo-ping” Similarity measurement for data with high-dimensional and mixed feature values through fuzzy clustering” in Proceedings of IEEE conference,2012 ,pp-617-621
[12] KddCup-99 Team, The third international knowledge discovery and data mining tools competition, Available from http://kdd.ics.uci.edu/databases/ kddcup99.html, 2002
[13] Dwipen Laskar, Nipjyoti Sarma, A Review On Intrusion Detection SystemUsing Data Mining Techniques,2013, MIT publications, Moradabad , India
[14] Li Tian, Wang Jianwen, 2009 International Forum on Computer Science-Technology and Applications, 978-0-7695-3930-0/09 $26.00 © 2009 IEEE, DOI 10.1109/IFCSTA.2009.25.
Citation
Nipjyoti Sarma, Sabyasachi Roy, Jyoti Nath, Ashapurna Sarma, Himakshi Bora, "Intrusion Detection System Based on Modified K-Means Clustering Algorithm", International Journal of Computer Sciences and Engineering, Vol.04, Issue.07, pp.34-37, 2016.
A Bluetooth Based Spoken Query System for Controlling Electronic Devices
Research Paper | Journal Paper
Vol.04 , Issue.07 , pp.38-41, Dec-2016
Abstract
This paper discusses a spoken query system developed for accessing some household electronic devices. The developed system enables the user to access these devices remotely by calling the system using a GSM modem/ Mobile phone. The spoken query system has mainly two modules i.e. interactive voice response (IVR) and automatic speech recognition (ASR) modules, which can be developed using open source resources. In the development of ASR models, the system specific data are collected from people of different ages and genders. The issues of data preparation, Training and Testing are performed by using HTK as a speech recognition tool. The system can recognize sample data i.e. the voice commands independent of vocabulary size, noise, and speaker characteristics. The recognized voice command as a text file will be used as an input into the microcontroller that is responsible to control the electronic home appliances. This speaker independent interactive voice response system is based on HMM (Hidden Markov Model) which is found to give a relative improvement of accuracy by more than 50%.
Key-Words / Index Term
IVR, Speech, ISR, HTK, Training, Testing, HMM
References
[1] Armando Roy Delgado, Rich Picking and Vic Grout, “Remote-Controlled Home Automation Systems with
Different Network Technologies”, Centre for Applied Internet Research (CAIR), University of Wales, NEWI, Wrexham, UK
[2] L. R. Rabiner, “Applications of Speech Recognition in the Area of Telecommunications,”IEEE Workshop on Automatic Speech Recognition and Understanding Proceedings, pp.501–510, 1997.
[3] S. Goel and M. Bhattacharya, “Speech based dialog query system over asterisk pbx server,” in 2nd International Conference on Signal Processing Signal Processing Systems (ICSPS), Dalian, Jul 2010.
[4] Asterisk open source communications, http://www.asterisk.org/home
[5] Muhammad Ali Mazidi, Janice Gillispie Mazidi, "The 8051 Microcontroller and Embedded Systems Using Assembly and C “, Second Edition.
[6] S. R. Suralkar, Amol C.Wani, Prabhakar V. Mhadse “Speech Recognized Automation System Using Speaker Identification through Wireless Communication”, IOSR Journal of Electronics and Communication Engineering (IOSR-JECE), e-ISSN: 2278-2834,p- ISSN:2278-8735.Volume 6, Issue 1 (May. - Jun. 2013), PP 11-18
[7] Nurul Fadzilah Hasan, Mohd Ruzaimi Mat Rejab and Nurul Hidayah, “Implementation Of Speech Recognition Home Control System Using Arduino”, ARPN Journal of Engineering and Applied Sciences, VOL. 10, NO. 23, DECEMBER 2015 ISSN 1819- 6608
.
Author’s Profile
Dr. Manoj Kumar Deka, received the M.Sc. degree in Instrumentation in the year 2007 and Ph.D. degree in Signal Processing in the year 2011 from Gauhati University, Assam. He achieved INSPIRE Fellowship sponsored by Department of Science & Technology (DST), Govt. of India, New Delhi during his Ph.D. work. Presently he is working as Assistant Professor in the Department of Computer Science & Technology, Bodoland University, Assam. His area of interest includes Signal Processing, Embedded system, Artificial Intelligence.
Citation
Hirakjyoti Sarma and Manoj Deka, "A Bluetooth Based Spoken Query System for Controlling Electronic Devices", International Journal of Computer Sciences and Engineering, Vol.04, Issue.07, pp.38-41, 2016.
Wireless Sensor Network for Automated Irrigation System in Tea Gardens
Research Paper | Journal Paper
Vol.04 , Issue.07 , pp.42-45, Dec-2016
Abstract
The aim of this paper is to propose a wireless sensor network in tea garden to show the path to tea gardeners to replace some of the traditional irrigation technique. The present paper focuses on set of technical skills environments to overcome technical backwardness present in traditional tea garden in terms of Moisture level and PH value of soil. This paper describes the technical analysis background for development of expert moisture sensor equipped with monitoring and recording system for real time data of tea gardens soil pH in details. The present study introduces about the parameters to be considered for the design of soil moisture sensor & PH value monitoring system. The cost effectiveness of the sensor/s to be developed and its future perspective of use will depend upon the considering parameters. This paper emphasis only on basic evaluation before development of soil moisture sensor, manageable and workable in tea gardens with minimum cost of production.
Key-Words / Index Term
Expert system, Soil moisture, PH value, sensor, WSN
References
[1] Remote Sensing a Tool to Measure and Monitor Tea Plantations in Northeast India Rishiraj DUTTA; The Netherlands.
[2] Varsha V and Anooja Ali, "A Survey on Availability and Scalability Requirements in Middleware Service Platform", International Journal of Computer Sciences and Engineering, Volume-04, Issue-04, Page No (187-190), Apr -2016
[3] Nathiya, R., and S. G. Santhi. "Energy EfficientRouting with Mobile Collector in Wireless Sensor Networks (WSNs)." International Journal of Computer Sciences and Engineering 2 (2014): 36-43.
[4] Ramesh Gaonkar, “Microprocessor Architecture, Programming and Application with th 8085”, Fifth Edition, PRI.
[5] Muhammad Ali Mazidi, Janice Gillispie Mazidi, “The 8051 Microcontroller and Embedded Systems”,Low Price Edition, PEARSON.
[6] Sharma, Shamneesh, Dinesh Kumar, and Keshav Kishore. "Wireless Sensor Networks-A Review on Topologies and Node Architecture." International Journal of Computer Sciences and Engineering 1.2 (2013): 19-25.
[7] GSM Based Automated Embedded System for Monitoring and Controlling of Smart Grid, Amit Sachan, World Academy of Science, Engineering and Technology International Journal of Electrical, Robotics, Electronics and Communications Engineering Vol:7 No:12, 2013.
[8] Sustainable Built Environment- Vol. II-Monitoring of surface water quality-Masaharu Fukue, Yoshio Sato, Catherine Mulligan.
[9] An Intelligent Smart Irrigation System Using WSN and GPRS Module, P. Manimaran, Mr. D. Yasar Arfath, International Journal of Applied Engineering Research ISSN 0973-4562 Volume 11, Number 6 (2016) pp 3987-3992
[10] http://www.coleparmer.com/TechLibraryArticle /1370.
Citation
Yashu Pradhan and Manoj Kumar Deka, "Wireless Sensor Network for Automated Irrigation System in Tea Gardens", International Journal of Computer Sciences and Engineering, Vol.04, Issue.07, pp.42-45, 2016.
Speaker Independent Speech Based Telephony Service for Agro Service using Asterisk and Sphinx 3
Research Paper | Journal Paper
Vol.04 , Issue.07 , pp.47-52, Dec-2016
Abstract
In this paper we describe the design of telephony Automatic Speech Recognition (ASR) System which can be used by low literate users. For this purpose we have deploy a spoken query system over Asterisk server using Bluetooth enabled mobile as client interface . Bodo speech data are collected by using the developed IVR module form BTAD area. All incoming calls are handled by Asterisk Server i.e. Computer telephony interface (CTI). The system asks to prompt 31 different words in Bodo which include Bodo digit, agricultural word and Yes/No. The collected speech is manually transcript and labeled for ASR system training. We discuss our experiences and fieldwork which includes design of the IVR using asterisk, Bodo ASR engine using sphinx and related study in the field of agricultural domain. We also evaluate low cost, rapidly deployable speech technologies for new languages as a means to improve equitable, affordable access to information technology (IT). The performance of a speech recognizer built using Bodo language is evaluated on the basis of word error rate and we 77.24 % word accuracy in training mode and 72.12 % in testing mode.
Key-Words / Index Term
Signal Processing, Telephony Application, Asterisk server, Interactive Voice Response
References
[1] Nitin Bhagachand Bachhav," Information Needs of the Rural Farmers : A Study from Maharashtra, India: A Survey" , in Library Philosophy and Practice (LPP) (ISSN 1522-0222), 2012
[2] Muhammad Asif Naveed and Mumtaz A. Anwar , “Agricultural Information Needs of Rural Pakistani Farmers ”, in Malaysian Journal of Library & Information Science, Vol. 18, no. 3, 2013: 13-23.
[3] Assam Small Farmers Agri-Business Consortium, http:// assamagribusiness.nic.in.
[4] Agricultural Marketing Information Network - AGMARKNET,http://agmarknet.nic.in.
[5] Joyanta Basu, Milton S. Bepari, Rajib Roy, Soma Khan, " Telephony Speech Recognition System: Challenges" in National Conference on Communication Technologies & its impact on Next Generation Computing CTNGC 2012, Proceedings published by International Journal of Computer Applications® (IJCA).
[6] https://mahtabrasheed.wordpress.com/2012/11/07/mobile-phones-based-agricultural-information-systems, accessed in Septembor, 2016
[7] Asterisk.org, "Features of Asterisk PBX", http://www.asterisk.org/features, accessed in Septembor, 2016
[8] http://cmusphinx.sourceforge.net, accessed in Septembor,2016
[9] Gautam Varma Mantena, S. Rajendran, B. Rambabu, Suryakanth V. Gangashetty, B. Yegnanarayana, Kishore Prahallad, "A speech-based conversation system for accessing agriculture commodity prices in Indian languages", IEEE Explore , ISBN: 978-1-4577-0999-9, 2011
[10] S Shahnawazuddin, Deepak Thotappa, B D Sarma, A Deka, S R M Prasanna and R Sinha,"Assamese Spoken Query System to Access the Price of Agricultural Commodities", NCC 2013, IITDelhi.
[11] Asterisk open source communications, http://www.asterisk.org/home.
[12] S. Goel and M. Bhattacharya, “Speech based dialog query system over asterisk pbx server,” in 2nd International Conference on Signal Processing Signal Processing Systems (ICSPS), Dalian, Jul 2010.
Citation
Aniruddha Deka and Manoj Kumar Deka, "Speaker Independent Speech Based Telephony Service for Agro Service using Asterisk and Sphinx 3", International Journal of Computer Sciences and Engineering, Vol.04, Issue.07, pp.47-52, 2016.