<?xml version='1.0' encoding='UTF-8'?><rss version='2.0'><channel><title>Volume 2 Number 4 (April 2016)</title>
		<link>http://ijaems.com/</link>
		<description>Open Access international Journal to publish research paper</description>
		<language>en-us</language>
		<date>April 2016</date><item>
		<title>Multibiometric Authentication System Processed by the Use of Fusion Algorithm</title>
		<description>The present day authentication system is mostly uni-model i.e having only single authentication method which can be either finger print, iris , palm veins  ,etc. Thus these models have to contend with a variety of problems such as absurd or unusual data,   non-versatility; un authorized attempts, and huge amount of error rates. Some of these limitations can be reduced or stopped by the use of multimodal biometric systems that integrate the evidence presented by several sources of information. This paper converses a multi biometric based authentication system based on Fusion algorithm using a key. Our work mainly focuses on  the fusion algorithm, i.e fusion of finger and palm print out of which the greatest features from the above two traits are taken into account. With minimum possible features the fusion of the both the traits is carried out. Then some key is generated for multi biometric authentication. By processing the test image of a person, the identity of the person is displayed with his/her own image. By the fusion algorithm, it is found that it has less computation time compared to the existing algorithms. By matching results, we validate and authenticate the particular individual.</description>
		<link>http://ijaems.com/detail/multibiometric-authentication-system-processed-by-the-use-of-fusion-algorithm/</link>
		<author>Prashanth Purastu, Mr. T. Arul Kumaran, Sagar Bhattacharyya</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1459616250-1 IJAEMS-MAR-2016-40-Multibiometric Authentication System Processed by the Use of Fusion Algorithm.pdf</pdflink>
                
		</item><item>
		<title>Experimental Parametric Study of Biodiesel to Develop Economic Zero Effluent Discharge (ZED) for Diesel System</title>
		<description>In this globalization realm, there in constant growth in the rate of expenditure of fossil fuels, consequent on ever increasing population and urbanization. This gives charge to depletion of finite resources in the near future. Fossil fuel emission causes global-warming also green-house gases are intangible factor which collectively degrading the planet. As such, the situation demands for an alternate source of energy that can be used to overcome the conjectured energy crisis. In contrast to this, if the energy source is clean and renewable, it will reduce the environmental trouble as well. In the quest an alternate and renewable energy resources, scientists have plead with a variety of options among which biodiesel-diesel blends as alternative fuels has become a popular option and is getting the attention of many researchers. This is because scientists have enlist the properties of biodiesel prepared from vegetable oils are very close to commercial diesel and thus it has a promising future as an alternative fuel for diesel engine. Biodiesel being renewable, biodegradable and green fuel can reduce our dependence on conventional/non-renewable fossil fuels and it also helps to keep pure quality of air by reducing obnoxious automotive/vehicular emissions. Possible solution of this problem is to replace or find renewable and economically feasible fuel as an alternative source. Already a lot of work for source which fulfill the criteria of sustainability and economical carried out. But the effluent is critical issues. So characterization and formation of biodiesel with zero effluent is prime objective.</description>
		<link>http://ijaems.com/detail/experimental-parametric-study-of-biodiesel-to-develop-economic-zero-effluent-discharge-zed-for-diesel-system/</link>
		<author>Komal D Pawar, Sagar M Gawande, Dhiraj V Godase</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1460039953-2 IJAEMS-MAR-2016-39-Experimental Parametric Study of Biodiesel to Develop Economic Zero Effluent Discharge (ZED) for Diesel System.pdf</pdflink>
                
		</item><item>
		<title>A Study of nature of the Photovoltaic modules under the influence of partial shading effect</title>
		<description>The behaviour of the solar photovoltaic array will be rapidly changing under the influence of partial shading phenomenon. When two (or) more photovoltaic modules are embedded in series, then the total output voltage and the net output power obtained from the series connected photovoltaic modules will mainly depends upon the solar insolation which is being projected upon each and every module respectively.  Small perturbation in solar irradiation levels will lead to large considerable change in the output parameters. This paper mainly focuses on observing the effect of partial shading on photovoltaic modules which are connected in series. The main objective of this paper is to examine about the mismatching phenomenon that occurs while tracking the global maxima point which plays a vital role in extracting maximum power from solar photovoltaic array in an effective manner.</description>
		<link>http://ijaems.com/detail/a-study-of-nature-of-the-photovoltaic-modules-under-the-influence-of-partial-shading-effect/</link>
		<author>B.Kailash Krishna Prasad, S.Ekambaram, D.Vannurappa, S.Md.Mazhar-ul-Haq, S.Masum Basha</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1459616473-3 IJAEMS-MAR-2016-41-A Study of nature of the Photovoltaic modules under the influence of partial shading effect.pdf</pdflink>
                
		</item><item>
		<title>Analysis on IoT Challenges, Opportunities, Applications and Communication Models</title>
		<description>Internet of Things (IoT) is a novel communication standard and it is researcherâ€™s preferred topic, which integrates heterogeneous systems seamlessly. Designing a universal architecture for IoT is a challenging task due to the integration of wide variety of the devices. The main objective of this paper is to provide comprehensive knowledge on challenges, applications, Security issues, and different communication models of IoT. This paper also focuses on the marketing trends of IoT with respect to variety of application with the end users. This motivates the researchers to contribute more productive work in this field by analyzing various parameters.</description>
		<link>http://ijaems.com/detail/analysis-on-iot-challenges-opportunities-applications-and-communication-models/</link>
		<author>Narasimha Swamy S, Shantharam Nayak, Vijayalakshmi M N</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1459838947-4 IJAEMS-MAR-2016-30-Analysis on IoT Challenges, Opportunities, Applications and Communication Models.pdf</pdflink>
                
		</item><item>
		<title>Brakes Analysis of BAJA ATV</title>
		<description>In the modern day and age where automobiles are an essential part of our day to day life, the requirements of each are different. Some demand for a high-performance machine whereas others require a comfortable ride. The modern engineering helps in achieving all the aspects of a safe, reliable and fast vehicle. With the change in time, the need for an all-terrain vehicle has gradually increased. The research paper includes the optimisation of braking system for minimum stopping distance and locking all four tyres simultaneously. The SolidWorks struct-static analysis and simulation are done to obtain a better braking system which can provide the best in class arrangements for the customer. The research focused on disc, master cylinder position. The designs provide the sturdiness and durability which is the primary requirement for an all-terrain vehicle. The study comprises of braking for BAJA-ATV. The all-terrain conditions require active braking and all wheels locking at the instant time. The research paper includes the parameters for the efficient disc, callipers, master cylinder position for effective braking.</description>
		<link>http://ijaems.com/detail/brakes-analysis-of-baja-atv/</link>
		<author>Aditya Pratap Singh, Harshit Soni, Keshav Padia, Achintya Sharma</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1459839049-5 IJAEMS-MAR-2016-33-Brakes Analysis of BAJA ATV.pdf</pdflink>
                
		</item><item>
		<title>Suspension Assembly of BAJA ATV</title>
		<description>In the modern day and age where automobiles are an essential part of our day to day life, the requirements of each are different. Some demand for a high-performance machine whereas others require a comfortable ride. The modern engineering helps in achieving all the aspects of a safe, reliable and fast vehicle. With the change in time, the need for an all-terrain vehicle has gradually increased. The research paper includes the optimisation of wheel assembly for better stability, comfort ride along with better handling. The analysis and simulation are done to obtain a better wheel assembly which can provide the best in class arrangements for the customer. The research mainly focused on the wheel hub, wishbones and knuckle. The designs provide the sturdiness and durability which is the primary requirement for an all-terrain vehicle. The key focus is given to material selection which provides durability and comfort. The material is inexpensive which presents an edge for the market competition as well as is value for money for the customer point of view. The Static load on wheel hub is calculated and analysed for elucidating the characteristics. The material EN-24 provides better machinability and welding applications making it more suitable for mass production.</description>
		<link>http://ijaems.com/detail/suspension-assembly-of-baja-atv/</link>
		<author>Aditya Pratap Singh,Rajesh Pandey,Pratik Jaiswal, Nikit Gupta,Mohit Bhandwal</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1459839158-6 IJAEMS-MAR-2016-36-Suspension Assembly of BAJA ATV.pdf</pdflink>
                
		</item><item>
		<title>An Enhanced Multi-layered Cryptosystem Based Secure and Authorized De-duplicaton Model in Cloud Storage System</title>
		<description>Data de-duplication is one of the essential data compression techniques for eliminating duplicate copies of repeating data, and it has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the privacy of sensitive data while supporting de-duplication, the salt encryption technique has been proposed to encrypt the data before its outsourcing. To protect the data security in a better way, this paper makes the first attempt to formally address the problem of authorized data de-duplication. Different from traditional de-duplication systems, the derivative privileges of users are further considered in duplicate check besides the data itself. We also present various new de-duplication constructions which supports the authorized duplicate check in hybrid cloud architecture. Security analysis demonstrates that the scheme which we used is secure in terms of the definitions specified in the proposed security model. We enhance our system in security. Specially, we present a forward-looking scheme to support a stronger security by encrypting file with differential privilege keys. We show that our proposed authorized duplicate check scheme incurs minimal overhead compared to normal operations.</description>
		<link>http://ijaems.com/detail/an-enhanced-multi-layered-cryptosystem-based-secure-and-authorized-de-duplicaton-model-in-cloud-storage-system/</link>
		<author>Rajshree H. Marshinge, Shubhangi D. Sapkal, Dr. R. R. Deshmukh</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1459851183-7 IJAEMS-MAR-2016-37-An Enhanced Multi-layered Cryptosystem Based Secure and Authorized De-duplicaton Model in Cloud Storage System.pdf</pdflink>
                
		</item><item>
		<title>RF Controlled Robotic Vehicle with Metal Detection Project</title>
		<description>The project is intended to cultivate a robotic vehicle that can sense metals ahead of it on its path similar to detecting land mines. The robot is controlled by a remote using RF technology. It consists of a metal detector circuit interfaced to the control unit that alarms the user behind it about a doubted land mine ahead. An 8051 series of microcontroller is used for the preferred operation. 
For controlling the movement of robot either to forward, backward &amp; right or left commands are sent to the receiver by using push buttons of the transmitter. At the receiving end two motors are interfaced to the microcontroller where they are used for the movement of the vehicle. The RF transmitter acts as a RF remote control that has the advantage of sufficient range (up to 200 meters) with proper antenna, while the receiver decodes before serving it to another microcontroller to drive DC motors via motor driver IC for necessary work. A metal detector circuit is attached on the robot body and its operation is carried out automatically on sensing any metal underneath. The instant the robot senses this metal it produces an alarm sound through buzzer. This is to aware the operator of a probable metal (eg: land mine) ahead on its path.
Further the project can be enhanced by mounting a wireless camera on the robot so that the operator can govern the movement of the robot remotely by observing it on a screen.
</description>
		<link>http://ijaems.com/detail/rf-controlled-robotic-vehicle-with-metal-detection-project/</link>
		<author>Sunita Kumari,Sonali Pareek ,Nagma Parveen, Rajesh kr. Jangid,Pushpendra Singh Gurjar, Prof. Jitendra Sharma</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1459869263-8 IJAEMS-MAR-2016-38-RF Controlled Robotic Vehicle with Metal Detection Project.pdf</pdflink>
                
		</item><item>
		<title>Comparative analysis of FACTS controllers by tuning employing GA and PSO</title>
		<description>Stability exploration has drawn more attention in contemporary research for huge interconnected power system. It is a complex frame to describe the behaviour of system, hence it can create an overhead for modern computer to analyse the power system stability. The preliminary design and optimization can be achieved by low order liner model. In this paper, the design problems of SMIB-GPSS and SMIB-MBPSS are considered to compare the performance of PSO and GA optimization algorithms. The performance of both optimization techniques are then compared further. Simulation results are presented to demonstrate the effectiveness of the proposed approach to improve the power system stability.</description>
		<link>http://ijaems.com/detail/comparative-analysis-of-facts-controllers-by-tuning-employing-ga-and-pso/</link>
		<author>E.Kirankumar, Prof. V. C. Veera reddy</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1459877090-9 IJAEMS-APR-2016-6-Comparative analysis of FACTS controllers by tuning employing GA and PSO.pdf</pdflink>
                
		</item><item>
		<title>A Novel Hybrid Approach for Stability Analysis of SMIB using GA and PSO</title>
		<description>Stability exploration has drawn more attention in contemporary research for huge interconnected power system. It is a complex frame to describe the behaviour of system, hence it can create an overhead for modern computer to analyse the power system stability (PSS).The preliminary design and optimization can be achieved by low order liner model. This paper presents a hybrid approach for the stability analysis of single machine infinite bus system using generic power system stabilizer (GPSS) and proportional-integral-derivative.</description>
		<link>http://ijaems.com/detail/a-novel-hybrid-approach-for-stability-analysis-of-smib-using-ga-and-pso/</link>
		<author>E.Kirankumar, Prof. V. C. Veera reddy</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1459877247-10 IJAEMS-APR-2016-7-A Novel Hybrid Approach for Stability Analysis of SMIB using GA and PSO.pdf</pdflink>
                
		</item><item>
		<title>Efficient Image Based Searching for Improving User Search Image Goals</title>
		<description>The analysis of a user search goals for a query can be very useful in improving search engine relevance and the user experience. Although the research on inferring by user goals and intents for text search has received much attention, so small has been proposed for image search. In this paper, we propose to leverage click session information, which will indicate by high correlations among the clicked images in a session in a user click-through logs, and combine it with the clicked image visual information for inferring the user image-search goals. Since the click session information can serve as past usersâ€™ implicit guidance for the clustering the images, more precise user search goals can be obtained. The two strategies are proposed because of combine image visual information for the click session information. Furthermore a classification risk based on approach is also proposed for automatically selecting the optimal number of search goals for a query. Experimental results based on the popular commercial search engine for demonstrate the effectiveness of the proposed method.</description>
		<link>http://ijaems.com/detail/efficient-image-based-searching-for-improving-user-search-image-goals/</link>
		<author>Manisha Nath, Mr. N Praveen</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1459962880-11 IJAEMS-MAR-2016-35-Efficient Image Based Searching for Improving User Search Image Goals.pdf</pdflink>
                
		</item><item>
		<title>Design, Modeling and Failure Analysis of Rolling Key in 10-Ton C-Type Mechanical Power Press </title>
		<description>Mechanical presses (c-type) are dangerous machines  and  have caused major  accidents over the years, these accidents are mostly occurring  due to failure of different type of components in mechanical press like key (clutch pin) , shaft , gears. When working with either full or part revolution    out  of  failure  of  key  leads ,  failure  of  other  components  and  ultimately mechanical press system. The objective of present work is to study about causes of failure of key and by analysis to reduce failure of key. due to shearing  and  crushing . it is find out shearing  and crushing  are the major criteria for the failure of key. In this project work modeling of key by using CREO software and analysis using finite  element  analysis  (ANSYS  software)  help  to  prevent  and  safe  designing  key  of   mechanical power press.</description>
		<link>http://ijaems.com/detail/design-modeling-and-failure-analysis-of-rolling-key-in-10-ton-c-type-mechanical-power-press/</link>
		<author>Prof. Amit B Solanki, Vishal Chuahan, Gajjar Mitesh, Shah Darshan</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1460476950-12 IJAEMS-APR-2016-25-Design Modeling and Failure Analysis of Rolling Key in 10-Ton C-Type Mechanical Power Press .pdf</pdflink>
                
		</item><item>
		<title>Impact of Distributed Generator for Loss Reduction and Improvement in Reliability of Distributed System</title>
		<description>Distributed Power generation has gained a lot of attention in recent times due to constraints associated with conventional power generation and new advancements in DG technologies .The need to operate the power system economically and with optimum levels of reliability has further led to an increase in interest in Distributed Generation. By placing distributed generator on an optimal location lead to improvement in voltages. This paper investigates the impact of DG unit installation on electric losses, reliability and voltage profile of distribution networks. To find optimal distributed generator allocation for loss reduction subjected to constraint of voltage regulation in distribution network. Distributed Generator offers the additional advantage of increase in reliability levels as suggested by the improvements in various reliability indices such as SAIFI, SAIDI, CAIDI, ASAI and ASUI. Comparative studies are performed and related results are addressed. The suggested technique is programmed to IEEE-33 bus system by using MATLAB software. The results clearly indicate that DG can reduce the electrical line loss while simultaneously improving the reliability of the system.</description>
		<link>http://ijaems.com/detail/impact-of-distributed-generator-for-loss-reduction-and-improvement-in-reliability-of-distributed-system/</link>
		<author>K Siva Ramudu, K Mounika, B Sree Ramulu</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1460477184-13 IJAEMS-APR-2016-1-Impact of Distributed Generator for Loss Reduction and Improvement in Reliability of Distributed System.pdf</pdflink>
                
		</item><item>
		<title>Employee's Attitude toward Electronic Administration Adoption: A Case Study of Al-Mustansiriyah University</title>
		<description>The advancement of the information and communications technology has helped almost all governments across the world as they have exploited these technologies for delivering services to their citizens. However, this phenomenon may face several challenges and barriers that lead to the failure in its adoption, use, or continuous usage. In the Arab countries, the rate of failure in the use of electronic services is high in the public sector. Therefore, previous studies have concentrated on this critical issue and highlighted on the citizensâ€™ perspective andignored the perspective of employees in the government organizations.In addition, very few previous studies dealt with the quality of the services based on the employeesâ€™viewpoint. Thus, based on the arguments that have been stated earlier, this preliminary study strives to identify the factors that may affect the electronic administrative adoption according to the employeesâ€™ perspective. With regard to the data collection, the quantitative method, self-administered questionnaires will be distributed among the staff of the Al-Mustansiriyah University, Iraq.With regard to data analysis, a partial least squares structural equation modelling will be used as a technique to analyse the collected data from a key respondent (Employee). In fact, this research strivesto enrich the literature by adding more information about the factors that may hinder theadoption of modern technologies in general and electronic administration in particular. With regard to the Al-Mustansiriyah University, the present study is considered as the first study conducted in this area; therefore the outputs will assist the government to remedy these obstacles before beginning any project in the public sector including the use of ICT instead of the conventional manner.The result of the analysis showed that system quality, service quality, trust of organization, and usefulness were found as significant factors that affect the employeesâ€™ adoption of e-administration services in University.</description>
		<link>http://ijaems.com/detail/employee-s-attitude-toward-electronic-administration-adoption-a-case-study-of-al-mustansiriyah-university/</link>
		<author>Sabeha K. Dawood, Jihan Salman Allawi, Nassir Jabir Al-Khafaji</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1460477344-14 IJAEMS-MAR-2016-44-Employeeâ€™s Attitude toward Electronic Administration Adoption_ A Case Study of Al-Mustansiriyah University.pdf</pdflink>
                
		</item><item>
		<title>RFID Based Automatic Car Parking System</title>
		<description>RFID based vehicles parking technique uses micro controller with sensing circuits which sense entry and outgoing of the vehicles. In this technique the RFID card is swiped with the permission of vehicleâ€™s parking owner. The RFID card which is given by the parking owners will be recharged by using the two push switches i.e. SW1 and SW2. When the vehicles enter in the parking system the money will automatically be reduced from the RFID card and it displays on the screen. By using the H bridge concept we operate the entry and exit. In this concept DC motors are used for the operation of entry and exit boom. The DC motors operate clock wise and antilock wise as per the program. When the vehicles enter in the parking system the space available in the parking system reduces and vice versa. A standard power supply of 5 volt is given for the operation. An LCD displays all the activities of the parking system.</description>
		<link>http://ijaems.com/detail/rfid-based-automatic-car-parking-system/</link>
		<author>Rakshit Soni, Rahul Malav, Nishant Sharma, Rahul Sharma, Manish Navlakha</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1461032697-15 IJAEMS-APR-2016-16-RFID Based Automatic Car Parking System.pdf</pdflink>
                
		</item><item>
		<title>Active Learning Method for Interactive Image Retrieval</title>
		<description>With many possible multimedia applications, content-based image retrieval (CBIR) has recently gained more interest for image management and web search. CBIR is a technique that utilizes the visual content of an image, to search for similar images in large-scale image databases, according to a userâ€™s concern. In image retrieval algorithms, retrieval is according to feature similarities with respect to the query, ignoring the similarities among images in database. To use the feature similarities information, this paper presents the k-means clustering algorithm to image retrieval system. This clustering algorithm optimizes the relevance results by firstly clustering the similar images in the database. In this paper, we are also implementing wavelet transform which demonstrates significant rough and precise filtering. We also apply the Euclidean distance metric and input a query image based on similarity features of which we can retrieve the output images. The results show that the proposed approach can greatly improve the efficiency and performances of image retrieval.</description>
		<link>http://ijaems.com/detail/active-learning-method-for-interactive-image-retrieval/</link>
		<author>Varsha Hole, Bhumi Dave, Sumitra Gauda, Priyanka Gawas</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1461423566-16 IJAEMS-APR-2016-26-Active Learning Method for Interactive Image Retrieval.pdf</pdflink>
                
		</item><item>
		<title>Raspberry PI Based Artificial Vision Assisting System for Blind Persons</title>
		<description>The main aim of this paper is to implement a system that will help blind person. This system is used by a RASPBERRY PI circuit to provide for the identification of the objects, the first level localization. It also incorporates additional components to provide more refined location and orientation information. The input process is to capture every object around 10m and it is convert into the output processing in voice command which is adopted in Bluetooth headset which is used by blind people using RASPBERRY PI component.</description>
		<link>http://ijaems.com/detail/raspberry-pi-based-artificial-vision-assisting-system-for-blind-persons/</link>
		<author>A. Neela Madheswari, R. Dinesh Kumar, R. S. Sabarinathan, M. Manikandan</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1461033021-17 IJAEMS-APR-2016-27-Raspberry PI Based Artificial Vision Assisting System for Blind Persons.pdf</pdflink>
                
		</item><item>
		<title>Simulation on probabilistic anti collision protocols of RFID using variable delay</title>
		<description>In RFID System, it is important to avoid tag collision for identifying tag faster. In this paper, we proposed concept of variable delay for tag estimation &amp; identification. The scheme is based on the Multi-level dynamic framed ALOHA protocol. Simulation results indicate that the time delay is added to each tag for avoiding collision. The main advantage of this is the delay is in microseconds which will not create problem of more time consumption.</description>
		<link>http://ijaems.com/detail/simulation-on-probabilistic-anti-collision-protocols-of-rfid-using-variable-delay/</link>
		<author>Samidha Chalke, Madhuri Shirsat, Prof. K. T. Patil, Dr. S. K. Narayankhedkar</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1461033126-18 IJAEMS-APR-2016-28-Simulation on probabilistic anti collision protocols of RFID using variable delay.pdf</pdflink>
                
		</item><item>
		<title>A Study on Performance Appraisal at Future Lifestyle Fashion Ltd. (FLF) Mumbai</title>
		<description>In this competitive world, business is playing a major role and performance appraisal (PA) has increasingly become part of strategic approach to integrating HR activities and business policies. Today we can see this standard term covering a variety of activities through which organizations seek to assess employees and develop their competence, improve performance and achieve rewards. The success of an organization depends on the performance of the employees and it is the human tendency. Appraising performance is both a difficult and an essential supervisory skill. Every organization judges formally or informally. If there are no fixed standards of judging they will start judging based on informal standards that can create lack of enthusiasm and impact the performance of the employee and in turn, the organization. Hence, it is essential that we set the right standards to judge the performance of the employees. At a strategic level, the need for speedy and effective organizational change in today&#039;s vibrant social, economic, and political environment requires that employees continually re align their performance with goals and objectives of the organization.</description>
		<link>http://ijaems.com/detail/a-study-on-performance-appraisal-at-future-lifestyle-fashion-ltd-flf-mumbai/</link>
		<author>Ms. M. B. Karambli, Dr. D. S. Jadhav</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1461036609-19 IJAEMS-APR-2016-33-A Study on Performance Appraisal at Future Lifestyle Fashion Ltd. (FLF) Mumbai.pdf</pdflink>
                
		</item><item>
		<title>Design, Modeling and Analysis of Structural Strength of Cylinder and Cylinder Head of  4-stroke (10 H.P.)  C.I. Engine - A Review</title>
		<description>The proficiency of any automobile engine is deals with the structural strength of its cylinder and cylinder head. Cylinder and cylinder head are most important parts of an engine because the piston moving inside the cylinder, so friction between cylinder wall and piston is very higher and due to this the mechanical load or fatigue load acting on the cylinder. So that structure of cylinder should be stronger. The combustion chamber, crank case, piston, connecting rod, crankshaft and cylinder are placed under the cylinder head. Cylinder head provides the protection against the high thermal and mechanical load on an engine, so the cylinder head is     â€œa protectorâ€ of an engine and its parts.
The review of existing literature on design, modeling and analysis of cylinder and cylinder head is presented. 3D-model of cylinder and cylinder head were created using Pro/Engineer software and ANSYS was used to analyze the thermal and structural analysis. So finally design considerations, material specifications, failure analysis, these all are reviewed successfully over here.
</description>
		<link>http://ijaems.com/detail/design-modeling-and-analysis-of-structural-strength-of-cylinder-and-cylinder-head-of-4-stroke-10-h-p-c-i-engine-a-review/</link>
		<author>Mahammadrafik J. Meman, Amit B. Solanki, Akshay J. Parmar</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1461340938-20 IJAEMS-APR-2016-34-Design, Modeling and Analysis of Structural Strength of Cylinder and Cylinder Head of 4-stroke (10 H.P.)  C.I. Engine â€“ A Review.pdf</pdflink>
                
		</item><item>
		<title>Introduction of Smokeless Stove to Gari Producers at Koryire in the Yilokrobo Municipality of Ghana</title>
		<description>This work sought to promote the construction and use of smokeless stove as well as record keeping among gari producers at Koryire, which is one of the 237 communities in the YiloKrobo Municipality of the Eastern Region of Ghana. The study employed Action Research Methodology with the formation of a 10 member group, comprising four men and six women.A prototype smokeless stove was constructed together with its flue in order to adequately equip the group members with the requisite skill for the stove construction. The cost of constructing the smokeless stove in the target community as at the time the study was carried out was One Hundred and Fifty Five New Ghanaian Cedis and Fifty Pesewas (GhÈ¼155.50) about One Hundred and Twenty Four US Dollars($124.00). It was concluded from the results obtained from the study that awareness on the use of smokeless stove in frying gari was adequately created in the target community. In terms of firewood consumption, the smokeless stove consumed about 20 % less firewood than the traditional stove in the community. The members of the target group became skillful in the construction, operation and maintenance of their own local stove by sourcing the required raw materials from within their locality. The use of the smokeless stove in frying gari created more comfort for the processors as they were no longer exposed to smoke and heat stress as was the case with the use of the traditional stove. Not only did the total involvement of the target group lead to the use of the indigenous knowledge, it also led to the re-invention of some key components  of the research work especially the stove design, materials used for its construction and  the construction process. The processors were encouraged to cooperate with the Municipality Agriculture Development Unit (MADU) in order to be able to derive the fullest benefit possible from their services available.</description>
		<link>http://ijaems.com/detail/introduction-of-smokeless-stove-to-gari-producers-at-koryire-in-the-yilokrobo-municipality-of-ghana/</link>
		<author>AdewunmiTaiwo, Ato Bart-Plange</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1461423919-21 IJAEMS-APR-2016-20-Introduction of Smokeless Stove to Gari Producers at Koryire in the Yilokrobo Municipality of Ghana.pdf</pdflink>
                
		</item><item>
		<title>TDMA- MAC Protocol based Energy- Potency for Periodic Sensing Applications in Wireless sensing Networks</title>
		<description>Energy potency could be a major demand in wireless sensing element networks. Media Access management is one in every of the key areas wherever energy potency is achieved by planning such MAC protocol that&#039;s tuned to the necessities of the sensing element networks. Applications have different necessities and one MAC protocol can&#039;t be best TDMA-based MAC (TDMAC) protocol that is specially designed for such applications that need periodic sensing of the sensing element field. TDMAC organizes nodes into clusters. Nodes send their knowledge to their cluster head (CH) and CHs forward it to the bottom station. CHs removed from the bottom station use multi-hop communication by forwarding their knowledge to CHs nearer than themselves to the bottom station each put down-cluster and intra-cluster communication is only TDMA-based that effectively eliminates each inter cluster further as intra-cluster interference.</description>
		<link>http://ijaems.com/detail/tdma-mac-protocol-based-energy-potency-for-periodic-sensing-applications-in-wireless-sensing-networks/</link>
		<author>A.Rajasekaran, Dr V.Nagarajan</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1461423996-22 IJAEMS-APR-2016-2-TDMA- MAC Protocol based Energy- Potency for Periodic Sensing Applications in Wireless sensing Networks.pdf</pdflink>
                
		</item><item>
		<title>Study of Pruning Techniques to Predict Efficient Business Decisions for a Shopping Mall</title>
		<description>The shopping mall domain is a dynamic and unpredictable environment. Traditional techniques such as fundamental and technical analysis can provide investors with some tools for managing their shops and predicting their business growth. However, these techniques cannot discover all the possible relations between business growth and thus, there is a need for a different approach that will provide a deeper kind of analysis. Data mining can be used extensively in the shopping malls and help to increase business growth. Therefore, there is a need to find a perfect solution or an algorithm to work with this kind of environment. So we are going to study few methods of pruning with decision tree. Finally, we prove and make use of the Cost based pruning method to obtain an objective evaluation of the tendency to over prune or under prune observed in each method.</description>
		<link>http://ijaems.com/detail/study-of-pruning-techniques-to-predict-efficient-business-decisions-for-a-shopping-mall/</link>
		<author>Jayesh Ambekar, Mohit Berika, Sarang Ambotkar, Sachin Desai</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1461424149-23 IJAEMS-APR-2016-37-Study of Pruning Techniques to Predict Efficient Business Decisions for a Shopping Mall.pdf</pdflink>
                
		</item><item>
		<title>A Brief study on Steganography techniques</title>
		<description>As there is a lot of advancement in the field of internet or communication technology, we have various means of storing, accessing and distribution of the data in the digital format. Due to the rapid advancement in this field has also introduced many challenges to the researchers to provide security to the information which is transmitted over the network. The digital information circulating over the network also includes the medical information. In order to provide security, confidentiality and integrity, the steganographic techniques can be employed. In the section 1, it gives the introduction about available hiding techniques; the section 2 explains the various steganography properties, the section 3 gives the types of steganographic techniques, the section 4 gives the applications of steganography, the section 5 gives the quality parameters to be measured for medical information, and the section 6 gives the steganographic algorithms available. Finally the section 7 concludes that to prevent unauthorized access steganography is the suitable technique.</description>
		<link>http://ijaems.com/detail/a-brief-study-on-steganography-techniques/</link>
		<author>Kavitha K J, Pushpalatha O</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1461424235-24 IJAEMS-APR-2016-43-A Brief study on Steganography techniques.pdf</pdflink>
                
		</item><item>
		<title>BS Mathematics Studentâ€™s Personal Beliefs in Engaging in and Learning Mathematics</title>
		<description>Belief-change among students in mathematics learning is an elemental source of concern in the field of mathematics education. In the Philippines, BS Mathematics is one of the programs less chosen by many students. In spite of the efforts of the schools to market the program, it remains in the last options for those who are planning to take mathematics in the tertiary level. This study, through a qualitative research, explores the beliefs and feelings of BS Mathematics students of De La Salle Lipa about engaging in and learning Mathematics. It presents the change in beliefs of the students particularly those who did not intend to enroll in the said program. The views and feelings expressed by the subjects during a face-to-face interview reflect the kind of experience they have in school. The findings of the study indicate that (negative) beliefs of the students about pursuing mathematics as a program and learning the subject can change with the sound support of the school to provide an encouraging and learning environment. Such can eventually promote positive reception and achievement in the subject among the students. </description>
		<link>http://ijaems.com/detail/bs-mathematics-student-s-personal-beliefs-in-engaging-in-and-learning-mathematics/</link>
		<author>Ivee K. Guce</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1461775213-25 IJAEMS-APR-2016-29-BS Mathematics Studentâ€™s Personal Beliefs in Engaging in and Learning Mathematics.pdf</pdflink>
                
		</item><item>
		<title>Development and Validation of Responsible Environmental Behavior Scale towards Solid Waste Management (REBS-SWM)   in School Setting</title>
		<description>This study aimed to develop a valid and reliable instrument to measure undergraduate studentsâ€™ responsible environmental behavior towards solid waste management.  Data gathered from 418 undergraduate students provided evidence for validity and reliability of the new instrument consists of 34 behavior items on a six point Likert type scale.  Results of the factor analysis with varimax rotation showed that items constituting Responsible Environmental Behavior Scale towards Solid Waste Management (REBS â€“ SWM) were grouped under three subscales: (1) Personality factors; (2) Knowledge on action strategy; and (3) Knowledge on issues.   Each item had a factor loading of 0.40 or above with its own scale and the alpha reliability coefficient for all of the three subscales was 0.81.   Thus, REBS â€“ SWM is a valid and reliable instrument that can be used in the field of environmental and science education and can be used as basis for management of wastes in school setting.</description>
		<link>http://ijaems.com/detail/development-and-validation-of-responsible-environmental-behavior-scale-towards-solid-waste-management-rebs-swm-in-school-setting/</link>
		<author>Joy D. Talens</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1462010129-26 IJAEMS-APR-2016-30-Development and Validation of Responsible Environmental Behavior Scale towards Solid Waste Management (REBS-SWM).pdf</pdflink>
                
		</item><item>
		<title>Public-Private Partnership Approach to Governance of Solid Waste Management Program of Batangas City</title>
		<description>This research intended to determine the performance of the PPP Approach to governance in the Solid Waste Management Program of Batangas City. It utilized descriptive research design involving 393 urban and rural households. The tasks of solid waste collection and disposal were given to a private contractor based on a mutually agreed Terms of Reference. The PPP approach was found efficient in terms of cost efficiency, quick response time, manpower, and minimization of backlogs and  effective in four dimensions â€“ promptness, sustainability, equity and progressiveness, and ineffective on adequacy. Rural residents viewed the PPP approach as ineffective in terms of said dimensions. There is significant difference between the perception of urban and rural residents on the effectiveness of the PPP approach. The results of this study would seem to suggest that in developing countries, like the Philippines, it might be necessary to tap the private sector to partner with local government units, so that the management of solid wastes could be done in a more efficient and a more effective way.</description>
		<link>http://ijaems.com/detail/public-private-partnership-approach-to-governance-of-solid-waste-management-program-of-batangas-city/</link>
		<author>Hermogenes B. Panganiban</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1461776783-27 IJAEMS-APR-2016-31-Public-Private Partnership Approach to Governance of Solid Waste Management Program of Batangas City.pdf</pdflink>
                
		</item><item>
		<title>Studying the effect of managerâ€™s Strategic Thinking on Corporate entrepreneurship</title>
		<description>The purpose of this research is to explore the effect of managers&#039; strategic thinking on corporate entrepreneurship. To this end, one main hypothesis and five secondary hypotheses were proposed. This study is descriptive-applicable and  Lidka studies (1998) were employed to measure managers&#039; strategic thinking and Robins and Kutler&#039;s questionnaire (1996) was used to measure corporate entrepreneurship. The statistical population included 118 managers and employees of a manufacturing company in Kermanshah industrial estate. The research sample was equal to 90 using Cochran formula. The results disclosed that managers&#039; strategic thinking has a positive and significant effect on corporate entrepreneurship and all hypotheses were confirmed</description>
		<link>http://ijaems.com/detail/studying-the-effect-of-manager-s-strategic-thinking-on-corporate-entrepreneurship/</link>
		<author>Vajihe Vafaei, Faranak Safari Shad, Najibeh Abbasi Rostami</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1461831557-28 IJAEMS-APR-2016-60-Studying the effect of managerâ€™s Strategic Thinking on Corporate entrepreneurship.pdf</pdflink>
                
		</item><item>
		<title>Application of STATCOM for Enhancing Steady and Dynamic Performance of Distribution System with DFIG Wind Power Generation</title>
		<description>The paper presents the application of Static Synchronous Compensator (STATCOM) for enhancing steady and dynamic performance of distribution system with Doubly Fed Induction Generator (DFIG) wind power generation. The mathematical models of STATCOM, wind energy conversion system such as wind, wind turbine, drive train, DFIG, and converter are systematically derived. The dynamic behavior of the power system with STATCOM controller is also investigated by using MATLAB/Simulink. It was found in the simulation results that the STATCOM can improve the dynamic behavior of the system.</description>
		<link>http://ijaems.com/detail/application-of-statcom-for-enhancing-steady-and-dynamic-performance-of-distribution-system-with-dfig-wind-power-generation/</link>
		<author>K. Prechanon</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1462010181-29 IJAEMS-APR-2016-51-Application of STATCOM for Enhancing Steady and Dynamic Performance of Distribution System with DFIG Wind Power Generation.pdf</pdflink>
                
		</item><item>
		<title>Digital Audio Watermarking using EMD for Voice Message Encryption with Added Security</title>
		<description>Several accurate watermarking methods for image watermarking have being suggested and implemented to secure various forms of digital data, images and videos however, very few algorithms are proposed for audio watermarking. This is also because human audio system has dynamic range which is wider in comparison with human vision system. In this paper, a new audio watermarking algorithm for voice  message encryption based on Empirical Mode Decomposition (EMD) is introduced. The audio signal is divided into frames and each frame is then decomposed adaptively, by EMD, into intrinsic oscillatory components called Intrinsic Mode Functions (IMFs). The watermark, which is the secret message that is to be sent, along with the synchronization codes are embedded into the extrema of the last IMF, a low frequency mode stable under different attacks and preserving the perceptual quality of the host signal. Based on exhaustive simulations, we show the robustness of the hidden watermark for audio compression, false decryption, re-quantization, resampling. The comparison analysis shows that our method has better performance than other steganography schemes recently reported. </description>
		<link>http://ijaems.com/detail/digital-audio-watermarking-using-emd-for-voice-message-encryption-with-added-security/</link>
		<author>Kunal Gawale, Harshali Chaudhari, Vasundhara Kandesar, Smita Sakharwade (Makade)</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1462031495-30 IJAEMS-APR-2016-46-Digital Audio Watermarking using EMD for Voice Message Encryption with Added Security.pdf</pdflink>
                
		</item><item>
		<title>Rural Development through Womenâ€™s Health</title>
		<description></description>
		<link>http://ijaems.com/detail/rural-development-through-women-s-health/</link>
		<author>Dr. Sakshi Tewari</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1462123004-31 IJAEMS-APR-2016-52-Rural Development through Womenâ€™s Health.pdf</pdflink>
                
		</item><item>
		<title>Factors Affecting the Utilization or Non-Utilization of the Portfolio Assessment in Evaluating Performance of High School and College Mathematics Students in De La Salle Lipa</title>
		<description>This study involved an investigation of the factors that affect the utilization or non-utilization of portfolio assessment in evaluating performance in mathematics of both college and high school students from De La Salle Lipa. Thirty-five teachers were asked to accomplish two validated brief surveys â€“ one is for gathering information about their profile and the other is for probing into the different assessment tools they are using to evaluate the performance of their students in mathematics. Out of the 35 respondents, only 9 were using portfolio assessment either in the form of report of group project, open-ended questions, or draft, revised and final versions of students work on a complex mathematical problem. The demand for considerable time in planning instructional activities and development of grading rubrics or criteria were among the limiting factors identified by the 26 respondents for not using portfolio assessment. Among the alternative forms of assessment used by these teachers were KPUP (Knowledge, Process, Understanding and Product) Oriented, UbD (Understanding by Design) approach, and online assessment tools.</description>
		<link>http://ijaems.com/detail/factors-affecting-the-utilization-or-non-utilization-of-the-portfolio-assessment-in-evaluating-performance-of-high-school-and-college-mathematics-students-in-de-la-salle-lipa/</link>
		<author>Maria Theresa B. Kalaw</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1462031696-32 IJAEMS-APR-2016-54-Factors Affecting the Utilization or Non-Utilization of the Portfolio Assessment in Evaluating Performance of High School and College Mathematics Students in De La Salle Lipa.pdf</pdflink>
                
		</item><item>
		<title>Psychosocial Factors which Influence College Studentâ€™s Academic Pathway</title>
		<description>This research purpose is to identify psychosocial factors, which influence students decision for academic field. 
In this research there were used motivational questionnaire (identifying respondentâ€™s portrait), Rosenberg Self-esteem Scale, Academic Motivation Scale  (AMS) and Motivated Strategies for Learning Questionnaire (MSLQ).  These instruments were applied on a sample of 170 students of both sexes from the faculties located in Bucharest. The data are introduced and operationalized with the Microsoft Excel (2007) and Statistical Package for the Social Sciences (IBM SPSS Statistics, v.20).
The research results identifies that family, personal skills influenced studentsâ€™ academic filed. Also, it show that high self-esteem is correlated with high academic motivation and high motivation for earning.
This is also confirmed by other studies where high self-esteem and strength is an important factor in the prediction of academic achievement in students (Mohammad, A. 2010).
</description>
		<link>http://ijaems.com/detail/psychosocial-factors-which-influence-college-student-s-academic-pathway/</link>
		<author>Ines Chicos, MS</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1462033066-33 IJAEMS-APR-2016-59-Psychosocial Factors which Influence College Studentâ€™s Academic Pathway.pdf</pdflink>
                
		</item><item>
		<title>Workability, endurance and energy shifts in consolidation and memory in aggressive and non-aggressive animals and and Neurochemical profile</title>
		<description>Aggression is a motivational behaviour which has a definite direction. On the other hand, we can consider it as a reason of social degradation or it can be viewed as a population and civilization suppressor. Insensive researches are being carried out in resent years in order to define the  characteristic mechanisms of aggression, for example, to determine the emotional condition of the subject. Emotions are specific objective changes typical for viability which are identified through biochemical, electrophysiological, motor functions (2,4,9). This is why the objective of our work is to determine endurance and workability in aggressive and non-aggressive animals. </description>
		<link>http://ijaems.com/detail/workability-endurance-and-energy-shifts-in-consolidation-and-memory-in-aggressive-and-non-aggressive-animals-and-and-neurochemical-profile/</link>
		<author>Nikolaishvili M., Chichinadze K., Nadareishvili D., Jikia G., Museliani T. Iordanishvili G. Koptonashvili L</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1463763475-34 IJAEMS-APR-2016-39-Workability, endurance and energy shifts in consolidation and memory in aggressive and non-aggressive animals and and Neurochemical profile.pdf</pdflink>
                
		</item><item>
		<title>Comparative Analysis of Anti-Collision Protocols in RFID</title>
		<description>Radio Frequency Identification, abbreviated as RFID which was originally invented as a replacement tool for bar-code scanning and identification has now evolved into a vital technology spanning across fields such as supply chain management, shipping of goods, tracking and identification, etc. However along with the widespread use of RFID, the underlying problem of collision of readers, and tags has been hampering the reliability, and integrity of RFID; thus causing a problem in the further evolution and future deployment of the same in new-born organizations. This papers aims at surveying the various anti-collision protocols which are designed and implemented in order to curb one of the major encumbrances in RFID technology viz. collision.</description>
		<link>http://ijaems.com/detail/comparative-analysis-of-anti-collision-protocols-in-rfid/</link>
		<author>K.T. Patil, Sumeet Joshi , Abhishek Bhagwat, Dr. S.K. Narayankhedkar</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1462123980-35 IJAEMS-APR-2016-63-Comparative Analysis of Anti-Collision Protocols in RFID.pdf</pdflink>
                
		</item><item>
		<title>A two-storage model for deteriorating items with holding cost under inflation and Genetic Algorithms</title>
		<description>A deterministic inventory model has been developed for deteriorating items and Genetic Algorithms (GA) having a ramp type demands with the effects of inflation with two-storage facilities. The owned warehouse (OW) has a fixed capacity of W units; the rented warehouse (RW) has unlimited capacity. Here, we assumed that the inventory holding cost in RW is higher than those in OW. Shortages in inventory are allowed and partially backlogged and Genetic Algorithms (GA) it is assumed that the inventory deteriorates over time at a variable deterioration rate. The effect of inflation has also been considered for various costs associated with the inventory system and Genetic Algorithms (GA). Numerical example is also used to study the behaviour of the model. Cost minimization technique is used to get the expressions for total cost and other parameters.</description>
		<link>http://ijaems.com/detail/a-two-storage-model-for-deteriorating-items-with-holding-cost-under-inflation-and-genetic-algorithms/</link>
		<author>Dr. Ajay Singh Yadav, Ms. Anupam Swami, Mr. Raj Kumar Singh</author>
		<pdflink>http://ijaems.com/upload_images/issue_files/1462245327-36 IJAEMS-APR-2016-55-A two-storage model for deteriorating items with holding cost under inflation and Genetic Algorithms.pdf</pdflink>
                
		</item></channel>
</rss>