No. |
Title and Author |
Area |
Country |
Page |
1 |
The Effect of Social Networking sites On Hotel Industry in Pune Region
-Prof. Rakesh Shirase
There are various platforms provided by the social Networking sites networks such as Facebook, LinkedIn, Twitter, Google, Trip advisor, holidayiq.com & YouTube and Twitter to the marketing of products and services for the hotel industry. Social networking sites offers media technologies that can facilitate online functionality and monitoring perspectives wherein the data gathered can be used to develop their services for customer satisfaction. The hotel industry can market themselves in social networking sites. Hotel industry can use social networking sites to engage customers and clients in dialogue and recognize their needs. Through these networking sites, hotel industry can interact with consumers before, during, and after the vacation experience. Social networking sites is relatively new and the advantages are abundance such as it is affordable, it is viral and has the potential to spread brand awareness quickly and far and it is said to be able to develop link baits, attention and massive amounts of traffic. However, it may not be appropriate for all hotel chains. The purpose of this study is to evaluate the effects of social networking sites in the hotel industry. Read More...
|
Computer Engineering |
India |
2322-2327 |
2 |
A Study of Change in Rainfall Pattern in Dhatarwadi Reservoir Catchment, Amreli, Gujarat
-Dr. N. J. Shrimali ; Prof. K. B. Gohil; Mr. Pratik N. Solanki
The impact of climate change on water resources have received much attention globally especially in last 30 years. Rainfall, the main driver of the hydrological cycle, has been varying in part of the world in various ways. Rainfall is the main source of water. But rainfall is scares and erratic in Gujarat especially in Saurashtra region. So, its preservation and conservation has become the most important aspect in relation to the water resources development planning. Its magnitude, variation and distribution plays important role in hydrological response of the area. The analysis of rainfall records for long period provides information about rainfall pattern and variability. And also rainfall studies are utmost utility for understanding nature and behavior of climate change. In this study, trends in rainfall, maximum rainfall intensity and rainy day for 1961-2011 were examined for Dhatarwadi reservoir catchment, Amreli and also decade wise monthly rainfall variation were examined. Linear regression technique were used to determine climatic trends and conclusions are derived. Read More...
|
Civil Engineering |
India |
2328-2331 |
3 |
PCA Based Robust Face Recognition Using Eigenface
-Prof. Virendrasingh ; Ankit B. Shah
Face recognition systems is a field of multidimensional application, so it has been grabbing high attention from pattern recognition field. It also stands high in researcher's community. Face recognition have been fast growing, challenging and interesting area in real-time applications. A large number of face recognition algorithms have been developed from decades. The present paper refers to different face recognition approaches and primarily focuses on principal component analysis, for the analysis and the implementation is done in free software, Matlab. This face recognition system detects the faces in a picture taken by web-cam or a digital camera, and these face images are then checked with training image dataset based on descriptive features. Descriptive features are used to characterize images. Matlab's Image Processing toolbox is used for performing the image analysis. Read More...
|
Electronics & Communication |
India |
2332-2335 |
4 |
Robust Face Recognition Method - A Review
-Prof. Virendrasingh ; Ankit B. Shah
Face recognition is considered one of the most important biometrics. It has a number of advantages over other human identification methods. Firstly, it is non-intrusive. While many biometrics require the subject's co-operation and awareness in order to perform an identification or verification such as looking into an eye scanner or placing hand on a fingerprint reader, face recognition could be performed even without the subject's knowledge. Robustness of a face recognition system is measured by the ability to identify human subjects even in the presence of many variations in appearance of their faces. While most research efforts have concentrated on recognizing a human face from two dimensional (2D) images, recently three - dimensional (3D) approaches have been receiving more attention. Our objective in this research is to develop a face recognition system that overcomes the problem of changes in gesture and mimics in 3D range images. Read More...
|
Electronics & Communication |
India |
2336-2338 |
5 |
Analysis of Disparity Map for Stereo Matching Algorithm
-Prof. Virendrasingh ; Komal D. Bhavsar
This paper presents an analysis to determine
disparity map useful for 3D scene reconstruction. Stereo
vision systems aim the same by matching two or more
images taken from slightly different viewpoints. The main
problem that has to be solved is the identification of
corresponding pixels, i.e. pixels that represent the same
point in the scene. Stereo Matching is not difficult to
understand in theory but it is not easy to solve in practice.
We describe the quality metrics use for evaluating the
performance of stereo correspondence algorithms and the
techniques used for acquiring our image data sets and
ground truth estimates. Read More...
|
Electronics & Communication |
India |
2339-2342 |
6 |
Object Segmentation Based Disparity Map Determination for Stereo Images - A Review
-Komal D. Bhavsar ; Prof. Virendrasingh
Aiming at establishing stereo correspondence for the extraction of the 3-D structure of a scene, major recent developments are reviewed. Wide categories of stereo algorithms are identified based upon differences in image geometry, matching primitives, and the computational structure used. The matching approach to solve the supposed correspondence problem in static, binocular stereo vision has its limitations. Specifically, matching is of no use in occluded areas because there is nothing to match in those regions. Other kinds of problems, like large regions of the image with a very uniform surface result in erroneous matching in almost every case. Disparity in such regions can be determined with a different approach, based on well-known details and principles of stereo vision. Here Performance of these Disparity map on various classes of test images is reviewed and the possible direction of future research is indicated. Read More...
|
Electronics & Communication |
India |
2343-2347 |
7 |
A Novel approach for tuning of Power System Stabilizer (SMIB system) using Genetic Local Search Technique
-Pankaj Valand ; Mayurdhvajsinh Gohil; Ankit Rabari; Jinal Prajapati
The genetic local search technique (GLS)
hybridizes the genetic algorithm (GA) and the local search
(such as hill climbing) in order to eliminate the
disadvantages in GA. The parameters of the PSS (gain,
phase lead time constant) are tuned by considering the single
machine connected to infinite bus system (SMIB). Here PSS
are used for damping low frequency local mode of
oscillations. Eigen value analysis shows that the proposed
GLSPSS based PSS have better performance compared with
conventional and the Genetic algorithm based PSS
(GAPSS). Integral of time multiplied absolute value of error
(ITAE) is taken as the performance index of the selected
system. Genetic and Evolutionary algorithm (GEA) toolbox
is used along with MATLAB/SIMULINK for simulation. Read More...
|
Electrical Engineering |
India |
2348-2352 |
8 |
Retina Based Mouse Control System
-Hardik N. Mewada ; Dhairya Vyas
The concept presents an idea to control computer mouse cursor movement with human eyes. Number of traditional techniques such as Head and Hand Movement Tracking Systems exist for cursor control by making use of image processing in which light is the primary source.
What if you could dramatically speed up your computing by moving your cursor exclusively with your Eyes Retina?
In this project we have developed Retina Tracking Mouse Tool that works with regular camera and can be used for several real time applications. By using your eyes instead of your mouse, you can select what you're looking. This tool can be a big step for armless people using the computer.
General Terms
Matlab and OpenCV are used for the simulation of retina based mouse control system Read More...
|
Electronics & Communication |
India |
2353-2355 |
9 |
Preparation of Neem oil methyl ester from high (FFA) Neem oil in an Oscillatory Baffled Reactor
-Dr. Y. C. Bhattacharyulu ; Prof. Ganvir V. N.; Er. Amol M. Ramning
The diminishing petroleum reservoirs, concern for environment and increasing prices of crude oil have led to many researches, scientist and academies to quest for renewable source of energy. Among many renewable sources of energy biodiesel is one such alternative. In a developing country like India where production of edible oils is less and cost is more hence it is not economically feasible to produce biodiesel from edible oil. Therefore biodiesel preparation from non-edible oil will be an alternative. Hence in our present study we have prepared biodiesel from neem oil which is non-edible oil. Since acid value of neem oil was more than 1% i.e. 10.92 mg of KOH/gm of oil, the production of biodiesel were carried out in two stages. In first stage esterification process was carried out and the optimum combinations of parameters were found to be 1:9 Oil to Methanol Molar ratio, 3% v/v H2SO4 acid catalyst and 10 minutes reaction time. In the second stage process treated oil were converted to Neem oil methyl ester. The optimum combination for second stage transterification process were found to be 1:9 Oil to Methanol Molar ratio, 0.75 (w/w) KOH as based catalyst and 10 minute reaction time. The second stage process gives an average yield of 91.7%. The fuel calorific value of neem oil methyl ester (biodiesel) was found to be comparable to those of petro diesel. Read More...
|
Chemical Engineering |
India |
2356-2359 |
10 |
A Review on Design & Analysis Of C-Frame of Pneumatic Power Press Using FEA
-Kanaksinh Gohil ; Ravi C Patel; Rajdipsinh G Vaghela
Presses are used in industries for a wide variety of uses including blanking, piercing and pressing. There are many different types of presses. The most popular are pneumatic presses and hydraulic presses. Pneumatic presses are 10 times faster than hydraulic presses and they can perform many jobs faster and more efficiently. Metal forming is one of the manufacturing processes which are almost chip less. These operations are mainly carried out by the help of presses and press tools. These operations include deformation of metal work pieces to the desired size by applying pressure or force. Press machine always works under impact load condition. Because of continuous impact the load, frame of press machine always experience continuous tensile stress. Read More...
|
Mechanical Engineering |
India |
2360-2364 |
11 |
Computational Modeling and Docking for H1N1 virsus using Bioinformatics
-Pradeep Kumar Sharma ; Jagdeep Gurjar
This research work will be carried out using the retrieval of H1N1virsus Hemagglutinin protein sequence of Influenza A virus[AEN79399] in FASTA format, these sequence are retrieve from the NCBI database that have unknown structure. The aim of present study was to carry out the computational modeling study of the mentioned protein sequence using 3DJigsawn protein comparative modeling server, Verify-3D structure evaluation server, CHIMERA. Validation process done by Verify3D analyzes, the compatibility of an atomic model (3D) with its own amino acid sequence (1D).Collect all the results for possible Ligand/drug candidate finding in-silico. The last step is Docking study for H1N1 protein with Tamiflu (possible Ligand) that help for finding a correct medicine. Read More...
|
Computer Science & Engineering |
India |
2365-2368 |
12 |
Comparison of Stack Fingerprinting between TCP Variants
-Prof. Jay R. Bhadeshiya ; Mr. Akash R. Bhatt
This paper is intended to compare two most important parameter of three different TCP Reno, Tahoe, SACK. In communication congestion control depends on traffic of the network and algorithm to overcome it. Each TCP has different algorithm. Based on algorithm, window size can be decided. It dictates the amount of data can send at any particular time. We considered two most vital parameters Round trip latency and end to end bandwidth on network to decide most efficient window size. Bandwidth-delay product also defines the number of packets transmitted at given time. After analyzing packet numbers, we are able to find throughput for each TCP. Read More...
|
Electronics & Communication |
India |
2369-2371 |
13 |
DoS Attacks in Wireless Sensor Network: A Survey
-Purvi N. Jani
Wireless Sensor Networks are characterized as computational and energy resources & an ad hoc operational environment. Wireless Sensor Networks are used in many applications include the monitoring of sensitive information so security is prime issue. This paper examines the possible potential attacks on sensor network. Owing to the wireless communication‟s broadcast nature, wireless sensor networks are vulnerable to denial of service attacks. This paper also provides the qualitative analysis of different types of attacks in DOS. Read More...
|
Computer Engineering |
India |
2372-2376 |
14 |
Performance Analysis of Limestone Coated WIREMESH Catalytic Converter for Emission Control of C.I Engine
-Prof. Keyur D. Tandel ; Jay M. Parmar
Exhaust emissions of much concern are Hydrocarbon (HC), Carbon Monoxide (CO) and Carbon Dioxide (CO2) from the automotive vehicles. Catalytic converter oxidizes harmful CO and HC emission to CO2 and H2O in the exhaust system and thus the emission is controlled. There are several types of problems associated with noble metal based on catalytic converter. Catalytic converter with different catalyst for compression ignition engine to reduce pollute gases is chosen for present work. The catalytic converter was designed and developed with different catalyst. These factors encourage for the possible application of Non noble Metal based material such as limestone as a catalyst, which may by proper improvements be able to show the desired activity and can also offer better durability characteristics due to its poison resistant nature. The present work is aimed at using limestone as a catalyst for catalytic converter for measuring the pollutants from the emission like CO, CO2, NOx and HC. The experiment is carried out on four stroke single cylinder CI engine by using limestone based catalytic converter and OEM make. Thus though not a noble metal, limestone works as a catalyst for the conversion of pollutants in exhaust but in a limited proportion. It is therefore concluded that the design and development of perforated limestone plate catalytic converter is feasible since it gave satisfactory results for given operating conditions and reduction of HC, CO, NOx and CO2 emissions. In this study a simple low-cost exhaust gas after-treatment filter using limestone was developed and tested on a single cylinder DI diesel engine coupled with dynamometer under variable engine running conditions. Limestone was placed in cast iron housing through which exhaust gases passes. The concentration of both carbon dioxide and nitrogen oxides were measured with and without the filter in place. It was found that both pollutants were decreased significantly when the filter is in place, with no increase in the fuel consumption rate. Read More...
|
Mechanical Engineering |
India |
2377-2380 |
15 |
A Review On Differential Time Lapse Video Techniques
-Dr. Ashish M. Kothari ; Rajesh Vansdadiya
Time lapse technique is a video generation technique in which each and every frame is capture and stored after some time interval. This time interval or frame selection can be based on a time period the framing device or difference between successive frames. If event is periodic or certain than we can use periodic time lapsing in which record each and every frame after a certain fixed duration. Differential Time Lapse video is a non-periodic time lapse technique. It is generated by capturing each frame and comparing with the previous stored frame by pixel to pixel mapping method. If the number of difference pixel is greater than predefined threshold then the frame is stored otherwise frame is discarded. Then generating a video from these differential frames is a differential time lapse video. It is important for the records, particularly, which are not natural and with this the size of recording is very less as well as it is efficiently helpful to analyze the non-natural event like movement of any human bodies, animal movement etc. A differential time-lapse technique allows us to remove the unnecessary data from the normal video, in order to save the time to visualization and storage space. Time-lapse techniques if used for documentary, not only saves the time to understand how thing are changed but also reduces the size of documentary. Differential time lapse video does not give the information about at which time the event is occurred so in order to find the same in the video output loss less visual watermarking can be used. MATLAB based algorithm is used for generating the differential time lapse video along with the date and time stamping using the loss less visual watermarking. Read More...
|
Electronics & Communication |
India |
2381-2384 |
16 |
Unobservable Secure On-Demand Routing Protocol (USOR) For MANET
-Prof. Yogadhar Pandey ; Saveetha Paramasivam
A number of privacy-preserving routing schemes has been proposed. But the existing anonymous routing protocols mainly consider anonymity and partial unlinkability in MANET due to incomplete content protection. The design of USOR (Unobservable Secure On-Demand Routing Protocol) provides complete unlinkability and content Unobservability for all types of packets. It is efficient as it uses a novel combination of group signature and ID-based encryption for route discovery. Security analysis demonstrates that USOR can well protect user privacy against both inside and outside attackers. The simulation results on ns2 shows that the USOR has satisfactory performance compared to AODV and also achieves stronger privacy protection than existing schemes. Read More...
|
Computer Science & Engineering |
India |
2385-2389 |
17 |
A study on Identity Based Encryption Methods for Cloud Computing
-Mr. Sunil Gupta ; Milan Kadivar; Girraj Khandelwal; Kapil Patel; Salman Bhimla
Cloud computing has become the important
platform to provide the infrastructure for computation, data
storage, software services using the virtualization concept.
These services are provided over internet, so security issue
of data must be taken into consideration. Intruder can attack
to access data or interrupt the communication. To prevent
the attacks like man-in-the-middle attack, chosen plaintext,
chosen cipher text, denial of services, need to implement
number of techniques. The encryption through Public Key
Infrastructure (PKI) using private key and public key is most
known technique but the computational process, storage and
certificate management effort to high and difficult for the
Certificate Authority (CA). To reduce this effort and
difficulties, the other technique is Identity Based Encryption
(IBE) which reduces the overhead of Certificate
Management and all other difficulties. IBE does the task
easy to prevent communication against above attacks. In this
paper, different schemes will be analyzed used against
different attacks under the different strategies. To provide
better key management, IBE uses the Private Key Generator
(PKG), instead of CA, generates Private Key from the
Identity of user. It uses the Hash Functions to provide better
security. Read More...
|
Computer Science & Engineering |
India |
2390-2394 |
18 |
A Review of Scope of Operation Research in Life Skills
-Sweta Patel
Operation research is the most important techniques for obtaining maximum advantage or output or efficiency. The scope of Operation research mainly in different fields like Agriculture, Marketing Industry etc. we aware of the scope of operation research and its methods in our life skills the we gain maximum advantages. Read More...
|
Applied Science |
India |
2395-2396 |
19 |
A Review of Different Phases of Operation Research
-Sweta Patel
In Operation research, the mathematical model is the most important task for Linear programming problem. We have to obtaining maximum advantage or output or efficiency while we use appropriate model and for this we have to face major phases. Read More...
|
Applied Science |
India |
2397-2398 |
20 |
Survey of Scheduling Algorithms in Vehicular Ad Hoc Networks
-Asst. Prof. Ketan Goswami ; Dhiraj maheshwari
As vehicular networks become popular, more and more people want to access data from their vehicles. When many vehicles want to access data through a roadside unit than service scheduling becomes an important problem. to solve this problem In this paper we see the different scheduling algorithms and comparing them in terms of dead line miss rate, throughput and average response time and find that DSIN algorithm is give better performance for data transmission in vehicular ad hoc network. Read More...
|
Electronics & Communication |
India |
2399-2401 |
21 |
Image Watermarking Using Spatial Domain Technique To make it more Robust and Cropping
-Jagruti D. Patel ; Nirav Patel
Piracy in the presence of internet and computers proves to be a biggest jolt to the concerned industry. To reduce the piracy and duplicity of the images, digital watermarking technique is having an edge over the other available techniques. The aim of this project is to simulate the Image Watermarking using MATLAB.
The simulation is done in Spatial Domain, techniques used are "Threshold Based Correlation", "Comparison Based Correlation", "Least Significant Bit Substitution". Threshold Based Correlation is more robust as 'k' increases. In Least Significant Bit Substitution method cropping is possible. The main advantage of such a technique is that the modification of the LSB plane does not affect the human perception of the overall image quality as the amplitude variation of the pixel values. Comparison Based Correlation increases the probability of a correct detection, even after the image has been subject to attack. It can improve the method by pre-filtering the image before applying the watermark. It is possible to reduce the correlation between the cover image and the PN sequence, can increase the immunity of the watermark to additional noise. Read More...
|
Electronics & Communication |
India |
2402-2405 |
22 |
DSP Based Laboratory System for Exploring Communication Engineering Concepts
-Hardik N. Mewada ; Dipti A. Patel
This title represents that communication
engineering has been used in many fields. One problem with
communication laboratories is the lack of flexibility. Current
laboratories either use specialized equipment with little or
no ability to change system parameters or extremely general
equipment with limited modulation types and pulse shaping
options. This can discourage students from further
exploration because of the apparent irrelevance to real world
problems. A common solution is to provide a hands-on
laboratory to illustrate applications of abstract concepts. One
solution to this problem is to use digital signal processing
techniques. DSP systems are extremely flexible and provide
the ability to implement a wide range of modulation types
and pulse shapes.
And so here we will implement all the communication
engineering concepts on TMS320C6713 by developing the
algorithms, compiling them on CCS, and implement it on
TMS320C6713.
General Terms: Digital Signal Processing (DSP), Code
Composer Studio (CCS), DSK6713 Read More...
|
Electronics & Communication |
India |
2406-2407 |
23 |
Salvation of Information Exchange Over Cloud Service Provider by Predicate Based Algorithm and Finest Access Control by Attribute Based Signature
-Asso. Prof. Narensingh S Yadav ; Nihil R. Khagram
Storage on cloud space is one of the impeach issues towards salvation of information. This challenging issue of security leads to development of different cryptographic methods. Cryptographic methods are designed to achieve system stability, data access, key management etc. One of the most excellent manners for depot of information on a storehouse like cloud is Attribute-based encryption (ABE). This thesis concentrates on combination of Cipher-policy attribute-based encryption (CP-ABE) and Attribute-based signature (ABS) yield assurance of unforgeability and secrecy for information swapping from cloud service provider (CSP) to subscriber. Information swapping to the CSP is done using CP-ABE encryption method. CP-ABE tool kit encrypts documents based on attributes of user. It includes master_key, public_key and private_key for individual users. Information can be decrypted by the users who possess the correct attributes. Hence, when subscriber requires information to be fetched from CSP, the CSP will apply ABS to validate information for correct subscriber. Read More...
|
Computer Science & Engineering |
India |
2408-2411 |
24 |
Review of Performance Evaluation of Canal Irrigation System
-Dr. N.J. Shrimali ; Prof. M.A. Modi; Mr. Ronak .B. Patel
Water is one of the most important essentials for the existence of life. Agricultural industries are fully dependent on supply of water. Irrigation is the key element for development of agricultural sector. Canal irrigation is a very popular and reliable approach of irrigation. Its evaluation is very much necessary for assessment of any irrigation system. Many researchers have tried to evaluate irrigation systems by different approaches worldwide; here an attempt is made to review some such researches done, with particular reference to canal irrigation, in India and abroad. Read More...
|
Civil Engineering |
India |
2412-2414 |
25 |
Study & Analysis of Multi-Band Microstrip Patch Antenna
-Asst. Prof. Niraj Tevar ; Nisarg Vaghela
Microstrip patch antennas are increasing in popularity for use in wireless applications due to their low-profile structure, light weight and low cost. However, use of conventional Microstrip antennas is limited because of their poor gain, low bandwidth and polarization purity. There has been a lot of research in the past decade in this area. These techniques include use of Stacked Patch, slots and sorting pins, increasing the thickness of the patch, use of Square, circular and triangular patches with proper slits and antenna arrays. Various feeding techniques are also extensively studied to overcome these limitations. In this paper, study and analysis of Multi band frequency operation in single high performance Microstrip patch antenna using stacked patch configuration is presented. Read More...
|
Electronics & Communication |
India |
2415-2417 |
26 |
Review on 1D & 2D Barcode with QR Code Basic Structure and Characteristics
-Prof. Kalpesh R Jadav ; Rathod Rinkalkumar M; Archit Somani
In this Review paper discusses about the last few
years, Two-Dimensional (2D) codes to get the importance in
the industrial sector, and the greater storage capacity
information gradually replace many applications of One
Dimensional Barcode. Quick response (QR) codes are one
of the most popular types of 2D codes. QR Code widely
used in many commercial applications due to their highspeed
decoding. Read More...
|
Electronics & Communication |
India |
2418-2421 |
27 |
Image Registration Using Euclidean Warping
-Prof. Dipti Khurge ; Vivek R.Shah
This paper is about the review of image registration techniques and approaches. It also includes the image registration process using Euclidean warping. In image processing, when we want to combine the information of two or more images then we need to find the correspondence between that images and this task of setting up the correspondence is called registration. Registration comes into picture when there is overlaying of two or images. It geometrically aligns two images and set up the correspondence. It includes feature detection, feature matching, image transformation and re-sampling. The main goal of this paper is to understand and apply the Euclidean warping for registration and to analyze the results. Read More...
|
Electronics & Communication |
India |
2422-2425 |
28 |
Wireless Monitoring of Body Temperature & SP02 Using World's ultra-Low Power MCU MSP430
-Mr. Dhaval J. Sheth
In this paper we represent a Wireless Sensor Monitoring which integrates the three biological parameter of patient's body like: Body temperature and pulse oximetery (SPO2), which is measured by ultra-low power MCU MSP430. It consumes <270 μA in standby mode. The outcome of this work is to build a compact and cost effective device capable of monitoring several medical parameters while patients conduct their normal daily activities. All the sensor data wirelessly transmitted to the access point and Doctor can monitor patient's parameter on screen. A communication protocol and patient monitoring software are developed to store data that can be later downloaded to physicians' workstation for analysis and diagnosis. Read More...
|
Electronics & Communication |
India |
2426-2429 |
29 |
Implementation of Content based Image Retrieval using LBP and Avg RGB Algorithms
-Rajashekaramurthy.S ; Dr. Nagaraja.G. S.; Manas. M. N.
The effective multimedia information has drastically increased over the network since complexity and overheads are very high due to network traffic and network applications. Users are not satisfied with the traditional way of context or text based image retrieval due to more time and inaccurate results. Image retrieval is more challenging due to the large set of database in the network. In order to reduce the complexity and easy access a new technique is introduced to retrieve the image contents efficiently and more precisely. We proposed integrated solution by using Local Binary Pattern, Average RGB algorithms for extracting image features, which are then compared for similarity for more accurate results from the existing database. Read More...
|
Computer Science & Engineering |
India |
2430-2433 |
30 |
E-Waste Recycled Water Tank Overflow Alarm
-Sanjeev N K ; Prashanth G
A considerable amount of water will be lost every day, during the refilling of water tank by overflowing it in our houses. We can avoid this by introducing the simple circuit or device which can be developed by using available Electronic waste (E-waste) at home. This paper aims at developing a water tank overflow alarm using the damaged mobile charger (one of the E-waste). This type of recycling of E-waste will greatly reduce the disposal rate of E-waste to environment. Read More...
|
Mechanical Engineering |
India |
2434-2436 |
31 |
Neural Network based Soft Computing Technique for Image Compression and Decompression
-Asst Prof. Haresh A. Suthar ; Manjoor S.Mansuri
Image compression is the technique used to minimize memory space and decrease bandwidth (reduce high data rate) for transmission without deteriorating image quality. The various methods and standards for image and video like JPEG, Wavelet, M-JPEG, H.26x etc. have been proposed by researchers. Even though, Increase in mass-storage density, speed of processor, and digital communication system performance, demand for data storage capacity and data-transmission bandwidth continues to outrage the capabilities of available technologies. Apart from the above mentioned existing technology on image & video compression, a method of image compression using soft computing have been proposed. Two layer Feed forward neural network will be considered and will be trained off-line using Levenberg Marquardt algorithm. The weights of trained network of hidden and output layers are used for image compression and decompression respectively for any test image. MATLAB will be used as software tool to carry out for training neural network, image compression and image decompression. The performance parameters like compression efficiency, complexity of algorithm and quality, for image compression & decompressions will be analyzed. Read More...
|
Electronics & Communication |
India |
2437-2440 |
32 |
Real Time Virtual Vision Editor Using MATLAB
-Prof. Mitul M. Patel ; Priyesh G. Patel
The concept presents an idea to editing captured image should be around visual and intuitive as photography itself. This is to enable the rapid, accurate, flexible, and provide user the ability to embody their ideas in an innovative way and effective. The goal of this dissertation is to create a visual user interface completely new; which provides various tools available at the same time and convenient and immediate access up to four parameters simultaneously. To study about different techniques of object detection & motion detection. To interface changing the parameters of the selected image depending on the location of objects in relation to the frame and also to design a GUI of virtual vision editor in real time using MATLAB.
General Terms -- Virtual image editing Read More...
|
Electronics & Communication |
India |
2441-2443 |
33 |
Effect of biodiesel blend on performance Of low heat rejection engine
-Vishnu Vijayan ; V. Nadanakumar; G. Lakshmikanth; G. Arunkumar
In this paper a detailed study has been performed to compare the performance, emission characteristics of a LHR engine with a standard CI engine using a standard diesel and biodiesel blend as fuel. Neat Mahua oil available in store is transesterified to prepare biodiesel. It is then blended with diesel. A Kirloskar make single cylinder four stoke DI Diesel engine is used. The piston cylinder head, inlet and outlet valves were coated with Al2O3 by plasma spray process. Performance, emission test were conducted with and without the ceramic coating. LHR engine showed a better performance and reduced emission when compared with the engine without ceramic coating. Read More...
|
Mechanical Engineering |
India |
2444-2447 |
34 |
Survey of Image Registration techniques for Satellite Images
-Utsavkumar S. Shah ; Darshana Mistry
This paper aims to survey of Image Registration techniques for Satellite Images. Image Registration is a process of arranging two images (references and sense images) of the same scene taken at different times, from different sensors, and/or different viewpoints into a common coordinate system. They can be classified according to their nature (area based and feature based) and four basic steps of image registration procedures: feature detection, feature matching, and transform model estimation and image transformation and Re-sampling. There are different errors like localization errors, alignment errors, matching errors, are main challenges of image registration. To minimize error methods like Correlation like methods, Fourier transfer methods etc. are used for image registration. Read More...
|
Computer Engineering |
India |
2448-2452 |
35 |
Evaluation of Metakaolin for use in Concrete
-Dr. Deepa A Sinha
Extensive research work for decades also is in progress throughout the globe in concrete technology in finding alternative materials which can partially or fully replace ordinary Portland cement (OPC) and which can also meet the requirements of strength and durability aspects. Amongst the many alternative materials tried as partial cement replacement materials, the strength, workability and durability performance of industrial by products like flyash, blast furnace slag, silica fume, metakaolin, rice husk ash, etc., now termed as complimentary cementitious materials (CCM) are quite promising. In this paper the evaluation of Metakaolin for use in Concrete is done. Read More...
|
Structural Engineering |
India |
2453-2455 |
36 |
A Study of Financial Literacy among Working Women in Pune
-Mrs. Malti Chijwani
Financial literacy means understanding of personal financial matters. It is ability to use knowledge and skills to manage financial resources effectively for a lifetime of financial well-being. Financial literacy making personal finance decisions in areas like real estate, insurance, investing, saving tax planning and retirement. It also involves intimate knowledge of financial concepts like compound interest, financial planning, the mechanics of a credit card, advantageous savings methods, consumer rights, time value of money, etc. Low level of financial literacy can lead to financial decisions that can have adverse effects on the financial health of an individual. The paper studies the level of financial literacy among working women in Pune region. The research also aimed at assessing the knowledge of females towards investment in various financial instruments. Thus the structured closed ended questionnaire was distributed among working women in Pune to judge the level of financial literacy. Read More...
|
Engineering Management |
India |
2456-2458 |
37 |
A Survey Paper on Wavelet Transform And Other Fault Diagnosis Techniques Used In Transmission Line Protection
-Mayur Chavda ; Niketan Dobariya; Ankur Pansuriya
The fault diagnosis of Electric Power System is a process of discriminating the faulted System elements by protective relays and subsequent tripping by circuit breakers.The adaptation of protective distance relay to determine the presence and location of faults in a transmission based on the measure of fixed settings such as line impedance has been achieved by the application of several different techniques. Fault location estimation is very important factor in power system, for the modern power systems a fast, accurate and robust technique for real-time purposes is required. Therefore the stable operation of power system is achieved by good fault diagnosis technique. In this paper, present the literature survey of various techniques for fault diagnosis. Read More...
|
Power Electronics |
India |
2459-2461 |
38 |
A New Approach to Downlink Burst Assignment Algorithm For WiMAX OFDMA System
-Prof. Mary Grace Shajan ; Mr. Nilesh H. Katariya
The WiMAX is a rapidly developing technology for broadband wireless access system. The resource allocation problem in OFDMA system is how to assign Burst to multi-users. OFDMA resource allocation algorithms manage the distribution and assignment of shared OFDMA resources among the users serviced by the base station. The OFDMA resource allocation algorithms determine which users to schedule, how to allocate subcarriers to them, and how to determine the appropriate power levels for each user on each subcarrier. It is require doing performance analysis of Burst Mapping algorithm on a WiMAX downlink OFDMA subframe structure subject to minimizing the wastage of bandwidth. Variable length Burst mapping algorithm tries to allocate burst across several subframe so that the bandwidth wastage can further be decreased. Read More...
|
Electronics & Communication |
India |
2462-2464 |
39 |
New Approach for Improving Security Measures of Private Key Algorithm in Wireless Sensor Network Environment
-Asst. Prof. Rashmi Agrawal ; Priyanka Dudhatra; Bhoomi Pipaliya; Hardik Kothadiya
A wireless sensor network (WSN) is mainly made of distributed manually working sensors to monitor both physical and environmental conditions like temperature, sound, pressure, etc. and it collect the data from the all thee node and pass their data by the network to a main location. Nowadays many modern sensor networks are bi-directional, and it also control of sensor activity. Wireless sensor networks is mainly developed by the motivation of military applications like battlefield surveillance; today wireless sensor networks are mainly used in industrial and consumer applications like monitoring process of industry and health monitoring control industries and so on. So Many algorithms are already exits with many security limitations in wireless sensor network but with many limitation .For instance key maintenance is a great problem faced in less security level is a major problem of private key encryption methods even though key maintenance is hard .So by improving the security of this algorithm we can solve this problem. Read More...
|
Electronics & Communication |
India |
2465-2467 |
40 |
To Study the Pollution Load Reduction Potential of Eichhornia Crassipus (Water Hyacinth) In the Kadodara Khadi, Surat
-Tank. S. ; Sidi. S.
The textile city of Surat contributes to a large amount of textile effluent being treated in the CETP's and treated water being release into the Tapi river via various khadi's and ultimately river Tapi empties it into Arabian sea. The study was conducted using Eicchornia crassipus as a potential bio remediating agent in treating the untreated effluent entering the PEPL CETP and treated effluent being released in to kadodara khadi; Surat. The plant was kept in effluent tanks of 0.02cu.m volume for 10 days. After the treatment it was observed that COD, TDS, TKN and PO4 reduced considerably. Thus proving Eichhornia to be a potential remediating agent; that could be used at the preliminary stage of effluent treatment process at the CETP. Thus reducing the effluent treatment costing and increasing the efficiency of cleanup with lesser amount of dosing chemicals in an environmental friendly manner. Read More...
|
Biosciences |
India |
2468-2471 |
41 |
A Review on Routing Protocol in MANET
-Ankur Goyal ; Girraj Khandelwal
A Mobile Ad-Hoc Network (MANET) is a self-configuring network and the nodes are connected through wireless link. It is an infrastructure less network. The wireless network topology may change rapidly. Each node in the network act as router and it communicate other nodes. There is no centralized administration. Nodes in ad hoc networks are differentiated by their limited resources like power, memory and mobility. Due to the limited transmission range of the nodes, multiple hops may be needed for a node to send data to any other node in the network. Thus each node acts as a host and router. If a node needs to communicate with another that is outside its transmission range, an intermediate node acts as a router to relay or forward packets from the source to the destination. For this purpose, a routing protocol is needed. This paper presents a survey on various routing protocols. Read More...
|
Computer Science & Engineering |
India |
2472-2475 |
42 |
A review on WiMAX 802.16 in MIMO-OFDM Receiver
-Patel Hardik N. ; Geeteli Mohammedikram Mohammedyusuf
MIMO-OFDM technology is a combination of multiple-input multiple-output (MIMO) wireless technology with orthogonal frequency division multiplexing (OFDM) that has been recognized as one of the most promising techniques to support high data rate and high performance in different channel conditions. The purpose of this research work is to implement of Wi-MAX system for MIMO-OFDM receiver. To improve system performance of Wi-MAX Radio Technology communication, using transmit and receive mode and with suitable modulation technique. We have focused on developing the six symbol detection algorithm of WiMAX system for the MIMO-OFDM receiver. To find best signal detection technique for WiMAX system in MIMO-OFDM environment. MIMO-OFDM system gives BER that we required for next generation wireless system i.e WiMAX and also gives high data rates that can be useful for many wireless systems. Read More...
|
Electronics & Communication |
India |
2476-2478 |
43 |
A Novel Technique for Image Steganography Techniques Based on LSB and DCT Coefficients
-Kanzariya Nitin K. ; Rathod kirit R.; Ranpura Avalik K.; Jadeja Vijaysinh K.; Nimavat Ashish V.
Steganography is used to carry information from source to destination using public channel in such a way that only sender and intended receiver know that there is hidden message. This paper represents image steganography method that is based on LSB and DCT coefficients that provide randomized bits embedding inside the cover image. Firstly the Discrete Cosine Transform (DCT) apply on the cover image and then hiding the secret information in LSB of the cover image in random locations based on threshold value. Using DCT Coefficients value, Find the randomized pixel locations for hiding secret information and increase the security of system. Read More...
|
Computer Science & Engineering |
India |
2479-2482 |
44 |
Color Image Watermarking Scheme in RGB Space Using DWT-SVD
-Rajesh Kumar Mishra ; Kanchan cecil
To overcome the problem of color image this
paper proposes a watermarking scheme in B domain of color
image DWT-SVD. The singular values of B channel are
modified by singular value of watermark. Low frequency
sub-band coefficients are less robust to geometrical
distortion and histogram equalization while High frequency
sub-bands are resistant to another attacks. Hence embedding
the same watermark in all bands will make it difficult to
remove the watermark from all frequency sub-bands. So
here we embed watermark in all four sub-bands (LL, HL,
LH, HH) to increase robustness. Set of image processing
attacks are applied to watermarked image to check the
scheme performance. Read More...
|
Computer Science & Engineering |
India |
2483-2485 |
45 |
Application of HEC-GeoHMS as a Tool of Hydrologic Modeling in the Field of Water Resources Engineering
-P. H. Pandya ; J. P. Bhatt
This paper gives an approach of using Hec-GeoHMS tool for the generation of a hydrologic model. By the application of terrain processing tool of HEC-GeoHMS, user can delineate the stream network and watershed. The modelling of the watershed can be achieved by applying the series of tools available in Hec-GeoHMS. Catchment area of Bhadar-I dam which is situated in Rajkot district is selected as study area. By Use of this tool it is found out that area of Bhadar-I catchment is 2430sq.km which matches the actual data acquired from the government offices. It has been observed that the recent development of the GIS technology has found a great application in the field of water resource engineering. It has been found that the use of HEC-GeoHMS tool yields effective and accurate modelling of any watershed provided that spatial data available for the input are accurate. Hence its use must be encouraged compared to traditional techniques of watershed modelling. Read More...
|
Water Resources and Management |
India |
2486-2488 |
46 |
Literature Study on Application of HEC-HMS for Event and Continuous Based Hydrological Modeling
-Dr. N.J. Shrimali ; Prof. H.M.Gandhi; M.M Patel
Hydrologic models are simplified, conceptual representations of a part of the hydrologic cycle. The Hydrological Cycle is the journey water takes as it circulates from the land to the sky and back again. This circulation and conservation of earth's water as it circulates from the land to the sky and back again is called the "hydrological cycle" or "water cycle‟. The water cycle is never-ending cycle. Hydrological models are primarily used for hydrologic prediction and for understanding hydrologic processes.
Watershed hydrological modeling and associated calibration and validation processes require a large set of spatial and temporal data. In practice, the availability and quality of these data are often an issue to cope with. Sometimes one has to compromise the overall modeling quality because of insufficient high-resolution data for developing, calibrating and validating the model. The current paper describes the study of various literatures on development such a strategy by combining fine-scale event and coarse-scale continuous hydrological modeling with hydrologic engineering center's hydrologic modeling system (HEC-HMS). Read More...
|
Water Resources and Management |
India |
2489-2491 |
47 |
Image Stegnography Techniques
-Ankita Patel
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of stegnographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. Read More...
|
Information Technology |
India |
2492-2494 |
48 |
Compiler Construction Tools
-Mrs. Bhumika S. Zalavadia
In this basic idea of compiler and its functionality is discussed. Compiler is the most important part of computer system. When user tries to run any program in any programming language, compiler comes into picture at first. The key role of compiler is to scan the entire program and convert it not machine language. Compiler construction is very vast branch of computer science that deals with the theoretical and practical aspects of designing the compiler using different programming language. Read More...
|
Computer Engineering |
India |
2495-2498 |
49 |
Design of Helium Cryogenic Turboexpander
-Prof. N.V. Bora ; Renu Kushwah
The expansion turbine constitutes the most critical component of a large number of cryogenic process plants - air separation units, helium and hydrogen liquefiers, and low temperature refrigerators. Present day cryogenic gas turbines are in more popular as they meet the growing need for low pressure cycles. The present study is aimed at the design of helium cryogenic turboexpander of mixed flow impellers with radial entry and axial discharge. To determine the principal dimensions of the turbine wheel, optimum operating speed has been taken from design charts based on Similarity principles. The main dimensions, thermodynamic properties at different states, velocity and angles at entry and exit of the turbine wheel were worked out. A modest attempt has been made to understand, standardise and document the design of cryogenic turboexpanders. Read More...
|
Mechanical Engineering |
India |
2499-2504 |
50 |
Dynamic Authentication Technique Using Lip Movements
-Patel Hardik ; Maheshwari Nilesh
Advancement of technology has conquered every strata of human society. In this technological era the protection of important data from being intercepted is growing difficult day by day. Bio-metric security stands to be one of the most secure form of authentication techniques. Such authentication can be seen in the regions with high security such as Defense, Research head-quarters, space-missions etc. Bio-metric authentication today ranges from face recognition to retina recognition. Which are all single stage authentication techniques and cannot be heavily relied upon seeing the current advancement of technology. This concept of multi stage authentication technique which uses a total of three different characteristics / traits for identification of humans not only increases the reliability by many folds but also aid's to the robustness of the system. The first two stages consist of Face recognition and lip pattern recognition, the third stage consists of authentication based on dynamic moments of lips. By tracing and capturing the successive movements of lips during speech, the corresponding words can be detected and can be checked with the data base to authenticate an individual. The captured images are represented as points on a two-dimensional flat manifold that enables us to efficiently define the pronunciation of each word and hence analyze or synthesize the motion of lips. With multiple level of image processing, it becomes possible to set the matching parameters to a very close value and hence it becomes extremely difficult for any other brute force or hacking techniques to break into our system. Read More...
|
Electronics & Communication |
India |
2505-2507 |