No. |
Title and Author |
Area |
Country |
Page |
1 |
A Survey on Moving Object Detection in Static and Dynamic Background for automated video analysis
-Ms. Ranjana Shende ; Ms. Dipali Shahare
Detection of moving objects in a video sequence is a difficult task and robust moving object detection in video frames for video surveillance applications is a challenging problem. Object detection is a fundamental step for automated video analysis in many vision applications. Object detection in a video is frequently performed by object detectors or background subtraction techniques. Frequently, an object detector requires manual labeling, while background subtraction needs a training sequence. To automate the analysis, object detection without a separate training phase becomes a critical task. This paper presents a survey of various techniques related to moving object detection and discussed the optimization process that can lead to improved object detection and the speed of formulating the low rank model for detected object. Read More...
|
Computer Science & Engineering |
India |
2050-2054 |
2 |
Survey of Privacy Preserving algorithm for Protect Sensitive Information
-Pratiksha Sethi ; Nishi Thakur
Privacy in the present era has become a more rational issue either it may be in the real world or in cyber world. The field of privacy has seen rapid advances in recent years because of the increases in the ability to store data but due to recent advances in the data mining field have led to increased concerns about privacy. Privacy preserving data mining is a research area concerned with the privacy driven from personally identifiable information when considered for data mining. This project addresses the privacy problem by considering the privacy and algorithmic requirements simultaneously. The proposed work has the basis of reduction of support and confidence of sensitive rule. This project is to implement an association rule hiding algorithm for privacy preserving data mining which would be efficient in providing confidentiality and improve the performance at the time when the database stores and retrieves huge amount of data. Read More...
|
Computer Science & Engineering |
India |
2055-2057 |
3 |
A Review on Analysis of Low Pressure Stage of Steam Turbine Blade with FEA (ANSYS Software)
-Dr. K. M. Srivastava ; Nilesh. H. Pancholi; Kinnarrajsinh P. Zala
Steam turbine blades are one of the most critical components in power plants Blade is a major component of
the turbine, which receives the impulse directly from the steam jet and converts this force into the driving force. Statistics has shown that LP blades are usually more predisposed to failure compared to blades in HP or IP turbines. The present research work analyses the effects of thermal and structural load on a steam turbine blade under the operating conditions. Stresses due to thermal and dynamic loads of low Pressure Steam Turbine blade of 210 MW power stations analyzed in two stages. In first stage a three dimensional model of turbine blade was prepared in CRE 2.0.
This model will import in ANSYS-14.5 for Finite Element Analysis.Maximum stress and stress distribution is compute using Finite Element Analysis (FEA) at the corresponding section. Read More...
|
Mechanical Engineering |
India |
2058-2060 |
4 |
PAPR Reduction in DFT- Spread OFDMA using Companding Transform
-Minal Jain
Orthogonal Frequency Division Multiplexing (OFDM) is an efficient transmission technique for high data rate communication systems. The major problem of OFDM system is Peak to Average Power Ratio (PAPR) which reduces the efficiency of the system and increases the system complexity. In this paper, the two different techniques are combined together, so as to give the effective reduction in PAPR for OFDM, namely, DFT spreading and Two Piece-wise Companding (TPWC). DFT spread OFDM (DFTS-OFDM) has been selected as the uplink transmission scheme for long-term 3G evolution (LTE) and TPWC transform can provide significant PAPR reduction with low computational complexity, which is similar to other existing linear transforms. TPWC is proposed so as to compress large signal amplitudes and expand small ones with two different linear functions. Read More...
|
Electronics & Communication |
India |
2061-2064 |
5 |
A Survey on Detecting Black Hole Attack in MANETs
-Ms. Avani Dadhaniya ; Nikhil G. Patel
Mobile Ad hoc Network (MANET) is a collection of mobile nodes that dynamically form a temporary network without infrastructure. It has many numbers of applications mainly in the areas of Sensor Networks (SN), medical, military and rescue operations. Routing is an important component in mobile ad hoc networks and it has several routing protocols, which are affected from different attacks. Ad hoc on demand Distance Vector (AODV) is one of the most suitable routing protocols for the MANETs and it is more vulnerable to black hole attack by the malicious nodes. A malicious node that incorrectly sends the RREP (route reply) that it has a latest route with minimum hop count to destination and then it drops all the receiving packets. This is called as black hole attack. In the case of multiple malicious nodes that work together with cooperatively, the effect will be more. This type of attack is known as cooperative black hole attack. In this paper, we have surveyed and compare the existing solutions to black hole attacks on AODV protocol and their drawbacks. Read More...
|
Computer Engineering |
India |
2065-2069 |
6 |
A Method For Determining The Residual Stresses Induced During A Modified Version Of Friction Tapered Plug Welding Process In Aluminium Alloys
-Mohamed Harraz ; Brando Okolo
in this work a method for determining the residual stresses induced at the center and around a modified friction taper plug welding (FTPW) process in aluminium alloys is introduced. The strategy developed in this work depends on the principal idea of the hole-drilling method (HDM). Basically, the hole-drilling method relies on measuring the stress relaxation when material is removed by a hole that is drilled into the center of a rosette strain gauge. From the measured magnitude and direction of the strain relaxation, principal residual stresses can be calculated. In this approach the FTPW is modified such that the tapered plug is being removed by pushing it out from the other side after being friction welded into the material. The extent of the strain relief is monitored by three gauges placed around the welded plug during the push-out test and therefore the direction and magnitude of the principal stresses can be calculated. The result of the analysis of residual stresses induced during the FTPW shows a clear correlation to the result of the push-out test and therefore gives an in-depth understanding of the effect of the modified FTPW process on the material surrounded. Read More...
|
Mechanical Engineering |
Egypt |
2070-2073 |
7 |
An efficient FPGA implementation of the AES Algorithm With Reduced Latency
-V. Viswanadha ; R. Seelanand Kumar
a proposed FPGA-based implementation of the Advanced Encryption Standard (AES) algorithm is presented in this paper. This implementation is compared with other works to show the efficiency. The design uses an iterative looping approach with block and key size of 128 bits, lookup table implementation of S-box. This gives low complexity architecture and easily achieves low latency as well as high throughput. Simulation results, performance results are presented and compared with previous reported designs. Read More...
|
Computer Engineering |
India |
2074-2077 |
8 |
A Coupled Thermal-Displacement Simulation Model for Friction Stir Welding of Thin Aluminium Sheets
-M. Tawadros ; M. Harraz
Friction stir welding is a novel innovative solid state welding process that is mainly used nowadays to join aluminium sheets. Due to the time and economic constraints, the verification of the experimental work using appropriate simulation models has become essential to reduce the hassle of the practical approaches. Many simulation models were designed to verify different process parameters but very little of the simulation approaches were conducted on the complete process. This present work focuses on a complete coupled thermal-displacement analysis model that is simulating the whole friction stir welding process from the 'penetration' to the final 'feed step'. For the simulation process two models were designed using Abaqus-Explicit, the first simulating the 'penetration' and 'dwelling' processes only and the second simulating 'feed steps' as well. The results of the simulation models are compared and calibrated with previous experimental work that is done on friction stir butt welded 1.5 mm aluminium sheets A6061-T6. The comparison of the experimental and simulation data has shown 95% matching of the results especially for the temperature distribution and shape of deformation obtained by the friction stir welding tool during the penetration process. The designed simulation model is therefore a proven consistent tool for simulating the unpredictable process parameters of the friction stir welding for a reliable optimization process. Read More...
|
Mechanical Engineering |
Egypt |
2078-2081 |
9 |
A Survey on various Sensors used in Greenhouse
-Tarulata H. Chauhan ; Prakash M. Patel
Wireless sensor network can be described as a network of node that cooperatively sense and may control the environment enabling interaction between persons or computers and surrounding environment through wireless link. Sensors are used for the sense the data and send it to sink. A greenhouse is an indoor covered place in which plants, crops are grown. For the increase production of crops it should be take care of crops from light, Temperature, Humidity etc. Conditions, for this sensor are used in greenhouse. In the greenhouse most used sensors like Temperature, Humidity, and Light Sensors. Read More...
|
Computer Engineering |
India |
2082-2084 |
10 |
The Role of Facts and HVDC in Development of an Efficient Electrical Power Transmission System in India-Prospects & Challenges
-Anil Sharma ; Tarunkumar P. Modi; Piyush R. Patel
the present paper focuses on FACTS (Flexible Alternating Current Transmission System) and HVDC (High Voltage Direct Current) transmission technologies, Particular attention is paid to different specific technical, economic and environmental features of these power electronics-based devices. Final aim of the paper is the investigation of the role that FACTS and HVDC may play towards the development of the future Indian transmission system. Read More...
|
Power Engineering |
India |
2085-2093 |
11 |
A Review paper on White Blood Cells Segmentation
-Priyanka Premnath ; Srilatha.L.Rao; Anand Jatti
Diagnosis of various blood related diseases
adopts differential WBC count which plays an important
and vital role. Counting the cells manually is a tedious task
and, time consuming. Hence many automatic techniques
have been developed which gives a faster and more accurate
ways to count the blood cells. This paper describes the
various techniques for WBC segmentation the basic steps
involved are segmentation, feature extraction and
classification. Few techniques discussed are Fuzzy C,
Snake contours, NDA, Segmentation Based on Gram-
Schmidt Orthogonalization, White Blood Cell Segmentation
in Microscopic Blood Images Using Digital Image
Processing, Modified Fuzzy Clustering, and
Magnetophoretic separation of blood cells at the microscale. Read More...
|
Biomedical Engineering |
India |
2094-2098 |
12 |
A Survey on Web Cache Techniques used for Web Performance Tuning
-Jasmine Jha ; Kushal Mehta
Internet is growing exponentially in today's world. Data on web servers is getting high and high in terms of size. Many servers reach their limit of serving web pages to requests. That is why the concept of web cache arises. So the server does not have to serve each request actually and requester gets requested data also. This paper represents the survey of different web caching techniques and their performance ratios. Web caching is one of the best techniques to improve web performance. It reduces server load and user wait time. In this paper we will describe caching elements and its characteristics. Then we will do a survey of different existing cache techniques. Read More...
|
Computer Engineering |
India |
2099-2101 |
13 |
A Literature Review on Effect of Laser Welding Parameters on Mechanical Properties and Microstructure
-Ketan Patel ; Chintan P. Mazmudar
Laser welding is a high speed welding process, capable of automated production of consistent quality welds. Compared with many other arc welding processes, fewer passes or higher welding speeds can be used, with lower usage of welding consumables. With proper optimization of welding procedures, full advantage can be taken of the low heat input nature of laser welding for a wide variety of materials, producing welds with acceptable hardness and toughness properties. This paper reviews the various notable works in field of laser welding and magnifies on the effect of various laser welding parameters on the mechanical properties and the microstructure. Read More...
|
Mechanical Engineering |
India |
2102-2105 |
14 |
The Evolution of Big Data
-Hiren H Darji
this paper provides brief idea about Big Data, various sources which generate rich amount of Big Data and how Big Data are analyzed by using various tools or technology. Also this paper briefly describes three very important characteristics about Big Data. This paper also includes survey of Big Data in Global and Financial/Banking Sector. Read More...
|
Computer Engineering |
India |
2106-2107 |
15 |
Quality Improvement By Apply Seven Quality Control (7 QC) Tool in Process Industry
-Sanjay C. Shah ; Chiragkumar S. Chauhan; Shrikant P. Bhatagalikar
This project basically deals with improve quality by apply seven quality control tools technique sum of the prominent problems which are face in the small scale to top level scale of industries .the problem are related to the mass production industries. To decrease variance in quality. (7QC tools).The research was carried out in different areas that include power plant, process industry, government, and health and tourism services. The aim of the research was to show on practical examples that there is real possibility of application of 7QC tools. Conducted research has shown that there is possibility of systematic application of all of the 7QC tools in the frame of companies' overall quality management system. The paper is dedicated to present basic concepts on process improvement and to show how the basic quality tools can be used to solve problems and improve quality in modern organizations. An innovative approach on teaching these concepts and tools is discussed. Finally, a personal contribution in the area of quality tools is presented. Read More...
|
Mechanical Engineering |
India |
2108-2110 |
16 |
Design and fabrication of highway wind turbine
-Mr. Kalpesh chavda ; Tushar thakar; Jigar parekh; Jinesh sathwara; Himalay Panchal
in today's life the demand on electricity is much
higher than that of its production the main objective of our
project is to produce electricity by using the force of air
created by the moving vehicle in highways. In highways the
vehicle suffers a lot to travel in night time because of
lightning problem. This problem can be overcome by using
the VERTICLE AXIS HIGHWAY TURBINE (VAHT).This
is a new unique method of power generation. In this method
the windmill blade is designed in a vertical direction and it
is kept at the middle of the highway divider by a series
combination. The force in the middle portion is higher than
the side of the road .This force will rotate the vertical
turbine blade. And this blade is coupled with the generator
and this generator will produce electricity. In our method we
have coupled one more generator and we have increased its
efficiency. Read More...
|
Civil Engineering |
India |
2111-2114 |
17 |
A Review of some Popular High Utility Itemset Mining Techniques
-Abhishek Raghuwansi ; Pradeep K. sharma
Data Mining can be defined as an activity that
extracts some new nontrivial information contained in large
databases. Traditional data mining techniques have focused
largely on detecting the statistical correlations between the
items that are more frequent in the transaction databases.
Like frequent item set mining, these techniques are based on
the rationale that item sets which appear more frequently
must be of more importance to the user from the business
perspective. In this thesis we throw light upon an emerging
area called Utility Mining which not only considers the
frequency of the item sets but also considers the utility
associated with the item sets. The term utility refers to the
importance or the usefulness of the appearance of the item
set in transactions quantified in terms like profit, sales or
any other user preferences. In High Utility Item set Mining
the objective is to identify item sets that have utility values
above a given utility threshold. In this thesis we present a
literature review of the present state of research and the
various algorithms for high utility item set mining. Read More...
|
Computer Science & Engineering |
India |
2115-2117 |
18 |
Recent Trends on Rock Bolting in Tunnel Construction
-Dr. Hasmukh R. Patel ; Mr. Dhiren K. Paghdar; Mr. Bhavin K. Kashiyani; Mr. Harshad M. Patel
In this study regarding rock bolt in tunnel
construction, the effect of rock bolts and shotcrete method
on the stability of a tunnel below the ground as well as with
in the mountains are studied. Rock bolts installed at the
tunnel crown played a more important role in ensuring the
stability of the tunnel roof than those installed at the tunnel
sidewalls if the length and spacing were appropriate. Rock
bolts installed with a certain inclination to the horizontal in
the longitudinal section had the same effect as the rock bolts
installed in the direction normal to the tunnel wall if the rock
bolts of a certain length were installed with fairly dense
spacing. This study review contains basic role of rock bolt
techniques in tunnel construction. Also contains initial or
construction cost at starting stage and maintenance cost,
what kind of material, manpower and machinery required
for construction of tunnel with this technique .for the
different place which technique is better for saving time and
cost of construction. Read More...
|
Civil Engineering |
India |
2118-2121 |
19 |
A Review on Application of Shotcrete in Tunnel Construction for Better Performance
-Dr. Hasmukh R. Patel ; Mr. Bhavin K. Kashiyani; Ajaykumar R. Patel; Mr. Harshad M. Patel
in tunnel construction Shotcrete is using as a
support & stabilization of excavated section and also as a
lining inner. Shotcrete is a process where concrete is likely
to apply under pressure, using a gun onto a surface to form
structural shapes including walls, floors, and roofs. This
paper highlights shotcrete technology with admixtures
effects, strength development control and its importance,
spraying & flow processes, proportions of ingredients,
mechanical properties, application criteria's, advantages and
advancement. It also covers a case study of Hong Kong
Tunnel works. Read More...
|
Civil Engineering |
India |
2122-2127 |
20 |
Improving Accuracy of Text Classification for SMS Data
-Prof. Purvi Rekh ; Hiral Padhiyar
Text classification has become one of the major
techniques for organizing and managing online information;
similarly SMS classification is also an important task now
a day. In this paper, we have focused on the issue of short
words used in SMS (hpy for happy, bday for birthday)
which reduces classification accuracy, so after removing
such words with original words, we got better accuracy. We
used Decision tree Algorithm for classification of SMS data
as it is giving better accuracy then other classifiers. But still
replacing all possible short words for the given word
dynamically by the original word is an issue. Read More...
|
Computer Engineering |
India |
2128-2130 |
21 |
Particle Swarm Optimization - The Fundamental Insight
-Dr. G. H. Upadhyay ; Prof. B. C. Khatri; Prof. U. V. Shah; Mr. J. R. Vaghela; Mr. Nanji N. Chaudhary
Optimization is the act of obtaining the best result under
given circumstances. In design, construction, and
maintenance of any engineering system, engineers have
to take many technological and managerial decisions at
several stages. The ultimate goal of all such decisions is
either to minimize the effort required or to maximize
the desired benefit. Since the effort required or the
benefit desired in any practical situation can be
expressed as a function of certain decision variables.
Read More...
|
Mechanical Engineering |
India |
2131-2134 |
22 |
Analytical study of Improvement in MANET with AODV and OLSR by using TCP Vegas
-Umang J . Modi
We exaggeration the performance of the TCP
protocol. Provided further, work on using TCP
(Transmission Control Protocol) to provide reliable data
transmission has been performed for the purpose of smooth
integration with the wired Internet. In the wired Internet,
TCP-Vegas is a well-known transport protocol which takes
into account existing network conditions. In this research
paper I perform the survey of the congestion control
mechanism of TCP reacts adversely to packet losses due to
temporarily broken routes in wireless networks. Through
simulations using ns-2, we observed that TCP-Vegas-Ad
Hoc outperforms the standard TCP-Vegas protocol
especially under high mobility scenarios over both reactive
and proactive ad hoc routing protocols such as AODV and
OLSR. Compare AODV and OLSR with different network
parameters and conclude solution with simulation tools
OPNET, NS-2 etc. Read More...
|
Computer Science & Engineering |
India |
2135-2140 |
23 |
Digital Watermarking Methods in Spatial Domain and Transform Domain
-Dhruv Dave ; Nilay B. Mistry
The ease of digital media modification and
dissemination necessitates content protection beyond
encryption. Information hidden as digital watermarks in
multimedia i.e. text, image, video, audio enables protection
mechanism in decrypted contents. In a way that protects
from attacks several common image processing techniques
are used in Spatial Domain and Transform Domain. In
Spatial Domain Least Significant Bit(LSB) is used and in
Transform domain Discrete Cosine Transform(DCT) &
Discrete Wavelet Transform(DWT) are used. Among these
DWT is best method due because of using embedded zero
tree wavelet image compression scheme and high frequency
sub bands. Read More...
|
Computer Engineering |
India |
2141-2144 |
24 |
A survey of black hole attacks in wireless mobile Adhoc networks
-Pooja Bavarva ; Pratik Modi
The black hole attack is one of the well-known
security dangers in remote mobile ad hoc network. The
interlopers use the escape clause to complete their malicious
behaviors in light of the fact that the track revelation process
is important and inescapable. Numerous scientists have led
diverse location methods to propose distinctive sorts of
recognition plans. In this paper, we review the existing
results and examine the state-of-the-symbolization steering
routines. We not just group these suggestions into single
black hole attack and community black hole attack
additionally dissect the classifications of these results and
give a correlation table. Read More...
|
Computer Engineering |
India |
2145-2153 |
25 |
Effect of various process parameters on Surface roughness in CNC turning: A Review
-D.R. Shah ; J.R.Vaghela; Nanji N. Chaudhary
The general manufacturing problem can be
described as the achievement of a predefined product quality
with given equipment, cost and time constraints.
Unfortunately, for some quality characteristics of a product
such as surface roughness it is hard to ensure that these
requirements will be met. This paper aims at presenting the
review on various methodologies and practices that are
being employed for the prediction of surface roughness. The
objective of this research is to analyze the effects of
machining parameters on surface roughness quality. Read More...
|
Mechanical Engineering |
India |
2154-2159 |
26 |
Understanding Concept of DVFS for Real-Time VM on Cloud Computing
-Richa Sinha ; Kruti Shah; Manthan Shah
Reducing power consumption has been an
essential requirement for Cloud resource providers not only
to decrease operating costs, but also to improve the system
reliability. A cloud system uses virtualization technology to
provide cloud resources (e.g. CPU, memory) to users in
form of Virtual Machines (VM).We have proposed Power-
Conscious provisioning of virtual machines policy for user
services. In our approach user is asking for the virtual
platform to deploy his application on the Cloud system
.After receiving request from the user, Resource Broker will
compose the request to Data Centre. We have propose
scheme to provision the virtual machine which consumes
less energy so, it will increase the profit of Data center and
at the same time user will have to pay minimum price if two
hosts are consuming same power. It uses Dynamic Voltage
Frequency Scaling (DVFS) scheme. Read More...
|
Computer Engineering |
India |
2160-2164 |
27 |
Copper Oxide Coated Diesel Particulate Filters
-B.Vasa n than
Automotive emission standards have become
stringent worldwide, because of the growing vehicle
population and persistent air quality problems.
vehicle population increasing rapidly, if all the worlds motor
vehicles are lined up bumper to bumper, the line of traffic
would circle the globe 120 times, according to world motor
vehicle market. Attainment of emission standards will
require advance exhaust after treatment systems. Diesel
particulate filter (DPF) is recognized as visible solution to
reduce the particulate matter emission from diesel engines.
This paper mainly focused on the use of CuO coated
particulate filters in a single cylinder naturally aspirated four
stroke DI Diesel engine. Experimental study was made to
find the performance and emission characteristics of the
engine. The investigation shows that the DPF was effective
for reducing the PM by 60-70%.Further, the investigation
shown that there is a moderate increase in power output
compared to bare filter and specific fuel consumption also
reduces appreciably. Read More...
|
Automobile Engineering |
India |
2170-2171 |
28 |
A Hybrid Approach to Sizing Problem in Software Project Estimation
-Manas Kumar Yogi ; Vijayakranthi Chinthala
Software Project Estimation is the process of
predicting the most realistic use of effort required to develop
or maintain software based on incomplete, uncertain and/or
noisy input. Effort estimates may be used as input to project
plans, iteration plans, budgets and investment analyses,
pricing processes and bidding rounds. There are many ways
of categorizing estimation approaches like Expert
estimation where the estimate is produced based on
judgmental processes. The Formal estimation model where
the usage of a formula derived from historical data.
Combination-based estimation is based on a judgmental or
mechanical combination of estimates from different sources.
We present a hybrid technique to the sizing problem in
Estimation which is very much critical to a project's
success. Read More...
|
Computer Science & Engineering |
India |
2172-2173 |
29 |
Qualitative and Quantitative Analysis Of Phytochemical Variation in G. corticata And K. alvarezii
-R. Chithra ; S. Chandra
Seaweeds are one of the most important
renewable wealth of marine source which have been used as
food in diet for centuries. They are source of wide range of
secondary metabolites such as carotenoids, dietary fibres,
proteins, essential fatty acids, vitamins and minerals. For
these study seaweeds samples of Gracilaria corticata and
Kappaphycus alvarezii were collected from Rameshwaram.
These samples were subjected to preliminary phytochemical
screening and then quantitative estimation of photochemical.
The samples were found positive for alkaloids,
anthraquinones, flavinoids, lignin, proteins and saponins. In
our observation phenolic compound and flavonoids were
founf in these species which have been reported to be potent
free radical scavengers. In our study Gracilaria corticata was
found to contain more phenolic content and flavonoids
compared to Kappaphycus alvarezii. Read More...
|
Chemical Engineering |
India |
2174-2176 |
30 |
Determination of unique Feature set for AM Bitewing Dental Radiographs as a Bio-metric information
-Shaishavkumar Parmar ; Mehul Amin
Recent growth in the number of studies for
automating the process of post-mortem (PM) identification
of deceased individuals based on various features of teeth is
remarkable. Hence, nowadays dental X-ray has played an
important role in human identification. Particularly, in cases
of severe accidents (Airplane crashes,9/11 bombing,
Car/Train accidents), natural disasters (Asian Tsunami,
Flood, Earthquake, Volcanic eruption, Typical cyclone), etc.
wherein other identification clues like fingerprint, iris, face,
etc. are not available for human identification. Dental
features remain less invariant over longer time period. The
purpose of dental image processing is to match the postmortem
(PM) radiograph with the ante-mortem (AM)
radiograph based on some features of the dental X-ray
images. The dental radiograph images acquired may be of
poor quality and contrast. Therefore, first it is important to
classify and then enhance the quality of image and thereafter
applied various segmentation algorithms on enhanced dental
radiograph image. Various features of individual tooth are
being extracted and identification can be possible based on
matching of these feature vectors for PM images which are
calculated and compared with AM images. This paper
provides a basic idea of various classification, enhancement,
segmentation and detail feature extraction techniques for
human identification using dental radiographs. Read More...
|
Electronics & Communication |
India |
2177-2181 |
31 |
Multi-Dimensional Modeling of Internal Combustion Engine Processes
-Dr. R.R. Lal ; Rajiv Saxena; Vivek Kumar Pandey
As growing capacity of the computational
techniques, multi-dimensional Computational Fluid
Dynamics (CFD) has found more and more applications in
diesel engine research, design and development. It is proved
by the practice that the reliability of using multi-dimensional
CFD tools to assist in IC engine research, design and
development. By using CFD tools optimally it is easy to
forecast and analyses various details that are technically
difficult like in cylinder process of fuel combustion,
temperature & pressure contours, emission etc. prior to
experimental tests to reduce the number of investigated
parameters as well as time and thus costs. A
multidimensional model was created and analysis of
combustion was done using FLUENT, ANSYS 14.5
packages and the 2D geometry was modeled and meshed
using GAMBIT 2.4.6. Read More...
|
Mechanical Engineering |
India |
2182-2184 |
32 |
Effect on voltage profile of grid connected wind farms and its improvement
-Prof. R. H. Bhesdadiya ; K.C.Chande
Ecological and Supporting impact for a
Sustainable development have Inspired the growth of
electrical generation from renewable energies. A imperative
demand for more electric power coupled with Convectional
resources has led to an increased need for energy production
from renewable energy sources such as wind and solar. The
latest technological Development in wind energy conversion
and an increased support from governmental and private
institutions have led to increased wind power generation in
recent years. Wind power is the fastest growing renewable
source of electrical energy Wind power generation of
electricity is seen as one of the most practical options and
with better relation Techno commercial inside the active
matrix now a days. This study provides the results of a study
conducted to assess the "effect on voltage profile of grid
connected wind farm it's improvement though application of
SSSC" system. Read More...
|
Electrical Engineering |
India |
2185-2186 |
33 |
Quantum Transistors: Toward Nanotechnology
-Rahul Wadhwani ; Viral Shah
―THE SMALLER WE ARE, the better we
perform.‖That is the siren song of quantum transistors, in
which electrons skip on and off quantum dots or tunnel
through barriers thought impenetrable in the world of
classical physics.
Nothing stands between these devices and ever- increasing
density and performance. Manufacturing processes keep on
shrinking their feature sizes, even down to atomic-scale
dimensions, and switching frequencies approaching a
terahertz are foresee-able because only a handful of
electrons is needed to operate the devices. Read More...
|
Electronics & Communication |
India |
2187-2190 |
34 |
Performance and Emission Analysis of Single Cylinder Diesel Engine Using Jatropha Oil with Supercharger
-Dr. K. Maniysundar ; V R. Selvan
Transesterified vegetable oil, also called biodiesel
is becoming increasingly important as a fuel for diesel
engine due to several reasons. Bio-diesel is a renewable,
inexhaustible and a clean burning fuel. Many studies have
shown that properties of bio-diesel are very close to petro
diesel. Bio-diesel can be used in diesel engine without
modification. Bio-diesel has no aromatic, no-sulfur and
contains 10-12% oxygen by weight. These characteristics of
bio-diesel reduce the harmful emissions of unburned
hydrocarbons and CO, research has shown that NOx,
emission is higher in case of bio-diesel fueled engine. . The
aim of present research work is to use B10, B20, B30, blend
of jatropha methyl ester. The effect of super charging also
studied and the performance of the engine are evaluated in
terms of BSFC, TFC, SEC, brake thermal efficiency and
volumetric efficiency. The investigation result shows that
the brake thermal efficiency and volumetric efficiency of the
engine with super charger was improved in comparison with
naturally aspirated engine. HC and Smoke opacity emissions
are dceresed with supercharging condition. Read More...
|
Mechanical Engineering |
India |
2191-2194 |
35 |
Analysis of Integer Transform In MPEG-4 Video Standard
-Chintan H Desai ; Dwivedi Abhishek N.; Darshna D. Jagiwala; Supriya S. Surwade
In this paper, Integer cosine transform (ICT) is
introduced in MPEG-4 instead of Discrete cosine transform
(DCT. Integer cosine transform (ICT) is adopted by
H.264/AVC for its bit-exact implementation and significant
complexity reduction. As adoption of the newly
standardized H.264 becomes increasingly more widespread,
efforts must be made to transcode video from earlier
standards, such as MPEG-4, to the H.264 format. The block
sizes of most appropriate are 8 or 16 for the transform
coding of the image data. Therefore, implementation of the
order 8 and 16 DCTs has fast computing time and costeffectiveness
for realization of a transform coding.
However, the components of the basis vectors of the DCT
exist irrational numbers then cannot be reduced to integers
by simple scaling. Therefore, it is hard to implement and
using floating point arithmetic is complex and expensive, so
integer cosine transforms (ICTs) are proposed to implement
the DCT by using simple integer arithmetic. By
investigating the structure of the transform kernels, two
efficient schemes are introduced to convert an 8 x 8 DCT
block into its corresponding four 4 x 4 integer cosine
transform blocks. This technique can be used to improve the
result of MPEG-4 video compression standard. Read More...
|
Computer Science & Engineering |
India |
2195-2197 |
36 |
A Review of Modern Hill Cipher Techniques
-Neha Sharma ; Sachin Chirgaiya
In this paper, we are presenting some modern
techniques for the encryption and decryption. Basically, all
modern version of hill cipher are discussed in brief. This
review research paper concentrates on the different kinds of
encryption techniques that exist. The advantages and
disadvantages of each method are also discussed in brief. In
modern era, the use of information and communication
technology is increasing day by day. It means that the
information is travelling at a brisk pace. It is needed to be
secured. We hope that our study will help in increasing the
efficiency of popular encryption and decryption technique. Read More...
|
Computer Science & Engineering |
India |
2198-2202 |
37 |
Exploring Security Mechanism Using Identity Based Encryption & M-RSA Within Cloud Environment
-Sunil Gupta ; Kapil Patel
Cloud computing is very eye-catching
technology which provides services for the
computation function as per need of user. It enables
the platform for the data owners and users can access
those data with different rights. In security issue, there
are number of encryption techniques used to protect
the data transmitted between users in cloud. Cloud
provider also provides techniques like public key
infrastructure, identity based encryption (IBE),
attribute based encryption (ABE), etc to avoid
communication between users from the attacks with
some assumptions. In this paper, a proposed system is
discussed which can be used to prevent data from such
attacks. This future technique is grouping of identity
based encryption (IBE) and m-RSA (mRSA)
techniques for cloud environment. Identity-based
encryption (IBE) simplifies the public key and
certificate management at public key infrastructure
(PKI) is an important alternative to public key
encryption. The IBE is used to decrease certificate
management during communication between users. It
is done by using hash functions. And m-RSA
technique is used to provide easy key generation and
key management during communication and to remove
some critical problems exist in PKI. Read More...
|
Computer Science & Engineering |
India |
2203-2207 |
38 |
Literature Review - Privacy Preserving in Association Rule mining
-Gaurav Shreevastav ; Niresh Sharma; Chetan Kumar Gehalot
In this paper, we provide here an overview of the
new and rapidly emerging research area of privacy
preserving data mining. A classification hierarchy is also
proposed that sets the basis for analyzing the work which
has been performed in this context. Also a detailed review of
the work accomplished in this area is also given along with
the coordinates of each work to the classification hierarchy.
A small evaluation is performed and some initial
conclusions are made. Read More...
|
Computer Science & Engineering |
India |
2208-2211 |
39 |
Resistance spot welding of Aluminium alloy 5182 to zinc Coated DP600 Steel using process tape technique
-A. Abdo ; M. Harraz; U. Reisgen; M. Schleser; A. Schiebahn
With the demanding need for improvement in
the strength to weight ratio in automotive and transportation
industries, joining of dissimilar materials such as aluminium
with steel has become a stimulating and challenging issue.
Many investigations were done in order to achieve a
successful joining of both materials using different welding
processes but an efficient joining using a thermal welding
process is still problematical. Not only that extreme
difference in the physical and chemical properties of both
materials has to be considered but on the other hand a brittle
intermetallic phase (IMP) is formed between steel and
aluminium leading to a poor weld or no weld at all. In all of
the thermal welding processes, due to its high economical
potentiality, resistance spot welding remains the leading
joining process used in the automotive industry.
Investigations have shown that due to the disturbance of
heat balance, a conventional resistance spot welding process
is not appropriate for joining aluminium with steel. Steel has
higher electric resistance than aluminium while aluminium
dissipates heat much faster than steel which leads to an
unbalanced heat gradient, moving the heat center towards
steel. In this work a technique that depends on correcting the
heat balance and generating heat with higher density in the
aluminium sheet using the process tape technique was found
to be efficient. Welding experiments using varying process
parameters were carried out to identify the best parameters
in terms of the shear strength of the joints. Lap-shear tensile
tests were performed and it is shown that an improvement of
at least 70% in the shear strength of joined samples of zinc
coated DP600 steel with aluminium alloy 5182 compared to
aluminium/aluminium welded samples is achieved.
Metallographic investigation and scanning electron
microscopy (SEM) have shown the formation of the
intermetallic phase (IMP) with thickness not exceeding 4μm
in optimum samples. Read More...
|
Mechanical Engineering |
India |
2212-2216 |
40 |
Data Hiding Technique using Adaptive Pixel Pair Matching
-Chithira P R ; Teena Thomas
In the new era of wireless communication and
developing information security techniques, it is very
necessary to maintain security of images which serve as a
source for data analysis for different applications. Therefore
there is rapid demand for reliable techniques, to ensure the
security of images. This proposed technique discusses the
implementation of a new data hiding technique based on
adaptive pixel pair matching. The proposed technique uses
the chaotic map based encryption to increase the rank of
security in case of attacks.. The basic idea of PPM is to use
the pixel pair values as a reference coordinate, and search a
coordinate in the neighborhood set of this pixel pair based
on a given message digit. Read More...
|
Electronics and Communication |
India |
2225-2227 |
41 |
A Generalized Approach on Cloud Computing
-T. Prasath ; J. Paul Richardson Gnanaraj; K. Sankar Ganesh
Cloud computing is recognized as one of the
most emerging technology in recent times. Cloud computing
is a model for on-demand network access in a convenient
manner to share pool of configurable computing resources
that can be rapidly checked and released with service
provider interaction. It is a combination of computation,
software, data access and also provides storage services.
Data storage and the location of stored data are not known to
the user in cloud. The cloud has more advantages and it is
easy to implement with any business logics. To explore
different areas of cloud computing considerable amount of
research has been carried out. This paper, presents you an
overview on cloud computing with its characteristics for a
better vision towards cloud computing. Read More...
|
Computer Science & Engineering |
India |
2228-2230 |
42 |
Solar Humidification- Dehumidification Technology For Pure Water Production
-Mrs. Pragna Patel ; Bhargav V. Vadalia; Jatin Patel
Solar desalination is gradually emerging as a
successful renewable energy source of producing fresh
water. This paper presents the solar humidification-
dehumidification technique to produce pure water from
brackish water. Units work on this principle, are considered
as the most viable among solar desalination units. This study
leads a step towards in the development of solar powered
water purification technology. Although a fair amount of
simulation studies have been conducted in the past, further
design simulation is required to fully understand the
complicated effects of air and water flow rates, the optimum
size of individual components or modules of the unit and to
generate a comprehensive model for the system. Read More...
|
Mechanical Engineering |
India |
2231-2235 |
43 |
A Survey of Texture Synthesis Various Techniques
-Mr. Pankaj Kumar Gautam ; Mr. Tejas Rana
Texture synthesis is a latest technology which
grows rapidly in recent ten years. Texture synthesis is a
main process of computer graphics applications, which
can enhance the realistic rendering greatly. Single texture
synthesis cannot meet the customer need because it is
straightforward approach. Multi-exemplars synthesis is a
challenging research topic to increase the richness of
texture details. We survey the algorithms for synthesizing
textures that have proposed over the synthesized textures are
given. The goal is to further understand textures, to provide
the methodology needed to generate various textures in
other studies, and pursuing better models for synthesizing
more interesting textures. Read More...
|
Computer Science & Engineering |
India |
2236-2239 |
44 |
Fuzzy Adapting PID Based Boiler Drum Water Level Controller
-Periyasamy K
The Boiler control is one of the most basic
thermal power plant controls. Boiler water level control
system includes steam drum water level, steam flow and
water supply. The control objective is to control the water
level of boiler drum. Fuzzy Adaptive PID controller is
designed for controlling the boiler drum water level at a
certain range. Fuzzy adaptive controller seeking the three
parameters of PID controller and the relationship between e
and ec, make the best adjustment for PID parameters on the
steam drum water level system automatically. MATLABSIMULINK
models of the boiler drum water level system
are developed for the PID, Fuzzy-PID, and Fuzzy Adaptive
PID controller. The simulation result of Fuzzy Adaptive PID
controller shows that the system is more stable, can meet the
load and frequent fluctuations of water supply pressure, and
improve the quality control of the internal and external
disturbances. Read More...
|
Electrical and Electronics Engineering |
India |
2240-2244 |
45 |
Segmentation Techniques for Medical Image Analysis
-Prof. Anand Jatti ; BindushreeYadav. M
In day-to-day life, new technologies are emerging
in the field of Image processing, especially in the domain of
segmentation. Segmentation is also useful in Image Analysis
and Image Compression. Segmented images are further used
as input for various applications such as classification,
recognition and measurement. More specifically, in the case
of medical applications image segmentation is an important
step towards the study of anatomical structures, diagnosis
and the planning of surgeries or other forms of treatment. his
paper presents a brief outline on some of the most common
Medical segmentation techniques like thresholding, Region
growing, snake algorithm,Active contour method etc.,
mentioning its advantages as well as the drawbacks. Some
of the techniques are suitable for noisy images. Read More...
|
Computer Engineering |
India |
2245-2252 |
46 |
Novel Approach for Image Inpainting
-Lokesh Gagnani ; Hiral Damor
This presents a novel and efficient examplarbased
inpainting algorithm through investigating the sparsity
of natural image patches. Two novel concepts of sparsity at
the patch level are proposed for modeling the patch priority
and patch representation, which are two crucial steps for
patch propagation in the examplar-based inpainting
approach. First, patch structure sparsity is designed to
measure the confidence of a patch located at the image
structure the sparseness of its nonzero similarities to the
neighboring patches. The patch with larger structure sparsity
will be assigned higher priority for further inpainting.
Second, it is assumed that the patch to be filled can be
represented by the sparse linear combination of candidate
patches under the local patch consistency constraint in a
framework of sparse representation. Compared with the
traditional examplar-based inpainting approach, structure
sparsity enables better discrimination of structure and
texture, and the patch sparse representation forces the newly
inpainted regions to be sharp and consistent with the
surrounding textures. Read More...
|
Computer Engineering |
India |
2253-2255 |
47 |
Analysis and Perform an convolutional encoder
-Tarunkumar C. Lad ; Patel Pratik J.
this paper focused on the two different system of
the convolutional encoder. We have to present a Spartan 3E
field programmable gate array (FPGA) implementation of
Convolutional Encoder with a constraint length of 3 and two
different code rate 1/2 and 1/3. The purpose of a
convolutional encoder is to a single input and generates
encoded outputs. In this paper analysis and perform different
type of system in the convolutional encoder. The system
implication in VHDL and also simulated and synthesizes
using Xilinx for RTL design. Read More...
|
Electronics and Communication |
India |
2256-2259 |
48 |
Ant Based Black Hole Detection and Prevention in MANET
-Mr. Salman Bhimla ; Mr. Sunil Gupta
Mobile ad hoc network (MANET) consists of a
set of mobile hosts that carry out basic networking functions
like routing, packet forwarding and service discovery
without the help of an established infrastructure. The nodes
of an ad hoc network rely on one another in forwarding a
packet to its destination; due to the limited range of each
mobile host's wireless transmissions. Security in MANET is
an essential component for basic network functions like
packet forwarding and routing: network operation can be
easily jeopardized if countermeasures are not embedded into
basic network functions at the early stages of their design. In
MANET, Black hole attacks may cause packet dropping,
misrouting the information form source to destination. So
the performance of the network is totally degraded. The
biology-inspired techniques like as ant colony optimization
(ACO) which have proven to be very adaptable in other
problem domains have been applied to the MANET routing
problem as it forms a good fit to the problem. Read More...
|
Computer Engineering |
India |
2260-2263 |
49 |
Detection of False Alarm in Handling of Selfish Nodes in Mobile Ad Hoc Networks
-Jyothish K John ; Tibin Thomas; Leenu Rebecca Mathew; Karthik M
An mobile Ad Hoc network is a collection of
mobile nodes. They does not have any existing
infrastructure and they does not have any centralized
administrator. So the MANET is self-creating, selforganizing
and self-administrative wireless network. In
MANET each node act as router. In practice some of the
nodes may act as the selfish nodes. These nodes use the
network and its services but they do not cooperate with
other nodes. Such selfish nodes do not consume any energy
such as CPU power, battery and bandwidth for
retransmitting the data of other nodes. They will preserve
the resources for their own use. Several data replication
techniques have been proposed to minimize performance
degradation. Most of them assume that all mobile nodes
collaborate fully in terms of sharing their memory space. In
reality, however, some nodes may selfishly decide only to
cooperate partially, or not at all, with other nodes. These
selfish nodes could then reduce the overall data accessibility
in the network. Read More...
|
Computer Science & Engineering |
India |
2264-2268 |
50 |
Optimal location of SVC by Voltage stability index
-Sunil N M alival
Now a days the transmission lines are operated
under the heavily stressed condition, hence there is risk of
the consequent voltage instability. There is a multifunctional
control device which can be effectively control
the load flow distribution and the power transfer capability
is the Flexible Alternating Current Transmission system
(FACTS). Proper placements of FACTS devices reduce the
transmission losses and improve the voltage stability. This
paper presents an optimal location of SVC to determine the
location of SVC for improving the voltage profile in a
power system. The location of SVC is placed based on
Voltage Stability Index (VSI) or L-index. The 9 bus system
is simulated using Mipower software. Read More...
|
Electrical Engineering |
India |
2269-2271 |