No. |
Title and Author |
Area |
Country |
Page |
51 |
Voltage Stability Improvement Using Static Synchronous Series Compensator (SSSC) Using PI Controller
-Rituparna Guchhayat
This paper presents the enhancement of voltage stability using Static Synchronous Series Compensator (SSSC). The continuous demand in electric power system network has caused the system to be heavily loaded leading to voltage instability. Under heavy loaded conditions there may be insufficient reactive power causing the voltages to drop. This drop may lead to drops in voltage at various buses. The result would be the occurrence of voltage collapse which leads to total blackout of the whole system. Flexible AC transmission systems (FACTS) controllers have been mainly used for solving various power system stability control problems. In this project, a static synchronous series compensator (SSSC) is used to investigate the effect of this device in controlling active and reactive powers as well as damping power system oscillations in transient mode. The PI controller is used to tune the circuit and to provide the zero signal error. Simulation results have been presented in MATLAB/Simulink environment for four bus system. Read More...
|
Electrical Engineering |
India |
2745-2747 |
52 |
Camless Engine
-Ravi Shah
Since the invention of internal combustion engines, camshafts have been used to operate the valves on the cylinder head to bring in air and fuel and expel exhaust gases. The conventional valve train has its limitations: the single lobed cam is designed to operate the valves at only specific periods of the Otto cycle, thus preventing the engine from achieving maximum torque at higher rpms. The opening and closing of the valves is constrained by the geometry of the cam profile. The concept of camless engines allows for greater optimization of overall engine performance during different phases of running. Read More...
|
Mechanical Engineering |
India |
2748-2749 |
53 |
Heat Exchanger
-Devendra kumar Pandey
Heat exchangers are an excellent application for magnetic water treatment. They are used to rise or lower the temperature of water (occasionally hey will use some Medium other than water such as ethylene glycol). Consumption of heat exchangers is normally cylindrical \internal diarneters from less than ones foot to up to three feet. The length can vary from two to eight feet. Water from a boiler, cooling tower and occasionally a geothermal system is pumped through a series of tubes inside the heat exchanger.
Water is circulated between the outer shell of the heat exchanger and the tubes. The heat.transfer takes place as the controller water transfers a temperature change through the tubes into the water inside the shell. Scaling takes place on the tubes inside of the heat exchanger. This scaling greatly reduces the efficiency of the heat exchange and requires shut down and either acid or mechanical cleaning of the exchanger Read More...
|
Mechanical Engineering |
India |
2750-2751 |
54 |
Low Heat Rejection Engine
-Ravi Shah
Insulated engines have become popular ideas with the development of new materials and material processing techniques. Several research groups have been involved and are producing needed, quality information about low-heat-rejection engines. To date, a comprehensive review has not been presented, like the work included here that identifies and discusses the various programs and results, or even the breadth of the different topics being undertaken. This paper presents a comprehensive literature review of low-heat-rejection engine concepts and brief discussions of some modeling techniques, both heat transfer models and engine models, being used to further the knowledge base in this field. The general, established concepts and history of low-heat-rejection engines are briefly covered before each individual area of interest is presented. These are temperatures of low-heat-rejection engines, new material requirements, new construction techniques to facilitate the new materials, tribology, emissions, noise concerns, new fuel capabilities, and exhaust heat utilization. The importance of a "whole system" approach is stressed. Inconsistencies in the literature are also discussed. Read More...
|
Mechanical Engineering |
India |
2752-2754 |
55 |
Scope of Solar Energy in India
-Harshil Shah
The world is facing problem of energy sources we don't have enough energy sources to comprehend even the basic need of the present and future is going to be worse as most of our conventional energy sources will be gone in nearly 10-15 years in future. So scientists today are trying their best to use non-conventional energy sources for our daily use of energy. In this context we can say India is lucky as it has a vast supply of non-conventional energy source and that is sun. In India sun shines for nearly 300 days a year. Being an agriculture country India is blessed with sunlight. 90% of solar energy is being wasted and just converted in to heat energy.
India has a great substitute of conventional energy sources in the form of solar energy. Vehicles can run on using solar energy by placing solar cells on the roof we can get enough energy to run basic house hold products of the house which can save a lot of money on day to day need and even a lot of conventional resources can be save. Read More...
|
Mechanical Engineering |
India |
2755-2756 |
56 |
Energy Conservation in Day To Day Life
-Sunil H.Bharati
Energy conservation has become very important today in our day to day life. In view of tightening energy supplies and sharply rising costs, new approaches to controlling energy consumption were put into effect. Initially, energy conservation was largely based on operations and maintenance approaches. Now, it is important to periodically review buildings to be sure they are being operated and maintained in an energy efficient manner. Energy conservation today involves much more in way of capital improvements than it did a few years ago. Today, there are many proven products and services available in market to reduce utility costs. Early, energy conservation efforts were sometimes seen as a nuisance to building occupants. Today, many of improvements primarily made to conserve actually improve attractiveness, comfort and usefulness of building. At today's energy prices strongest argument to energy conservation and energy management program is the cost of not conserving. Read More...
|
Mechanical Engineering |
India |
2757-2758 |
57 |
Role of Embedded Systems in Automobile Technology
-Bhavik Sharma
Automobiles are one of the most widely used machines and are now being used all across the globe, which in turn is leading to rapid development and enhancement of the automotive sector. Manufacturers are working hard to introduce new technologies in their vehicles, for which they are using Embedded Systems. Embedded Systems are being used in automobiles to achieve energy saving and lower emissions, safety (active and passive), comfort, convenience, entertainment and cost & weight reduction. While this has led to many breakthrough technologies being introduced in cars, it has also resulted in decreasing the complexity of the mechanical and electrical structure. Read More...
|
Electronics Instrumentation & Control |
India |
2759-2761 |
58 |
Optimization of Monoblade Windshield Wiper System to Improve Wiping Actuals in the Residual Area
-R. Agasthee Jain
A single wiper mounted to a conventionally located, non-centre wiper post is adapted to wipe generally a rectangular windshield. A primary arm and wiper blade are long enough to cover a main wipe pattern that covers most of the driver side of the windshield. To cover the residual area on the passenger side, a secondary arm and blade pivoted to the tip of the primary arm are continuously pivoted by a drag link over a supplemental wipe pattern. The ultimate aim of the project is to calculate the optimal design parameters of the secondary wiping element and the appended area covered in the residual area. Read More...
|
Mechanical Engineering |
India |
2762-2765 |
59 |
Particle Swarm Optimization Technique for Temperature Process
-N. Nithya Rani ; Dr. S. M. Giriraj Kumar
The increasing complexity of the modern control systems has emphasized the idea of applying new approaches in order to solve design problems for different control engineering applications. Proportional-Integral-Derivative (PID) control schemes have been widely used in most of process control systems represented by chemical process for a long time. However, it is still a very key problem on how to determine or to tune the PID parameters, because these parameters have a great manipulate on the stability and the performance of the control system. In this paper, we discusses in detail about the Particle swarm Optimization (PSO) is an optimization method that belong to the swarm intelligence unit and its implementation in PID tuning for a controller of a Temperature Process. Compared to other conventional PID tuning methods like PID-ZN II, IMC-PID the result shows that improved performances are achieved with the proposed one. The ability of the PSO designed controller in terms of servo operation is also compared with conventional techniques and the results are simulated by using MATLAB. Read More...
|
Instrumentation and Control Engineering |
India |
2766-2770 |
60 |
Distributed System - Recent Innovations
-Sana ; Saman; Shahnawaz Anwer; Saquib Anwer
In this era, we are living in the world where a large percentage of population is dependent on the internet or World Wide Web. Distributed system is a collection of computer that act or work and appear as one large computer. A number of distributed computing projects are present on the internet that works on complex problems by sharing the processing power. Distributed system is one in which components located at networked computers communicate and co-ordinate their actions only by passing messages. Read More...
|
Computer Science & Engineering |
India |
2771-2773 |
61 |
Review on Performance and Emission Test of Allumina Coated Four Stroke Single Cylinder SI Engine using LPG as Fuel
-Mr. Hitesh Buhecha ; Prof. I. H. Bhoraniya; Prof. D. J. Patel
he Review covers different aspects for improve engine performance & exhaust emissions in SI & CI Engines, using thermal barrier coating application with Fuel blends & without blends & its impact on performance & emissions of Engine. This paper intense to improve engine performance & reduce exhaust emission level by testing of LPG fuelled four stroke single cylinder thermal barrier coated SI Engine. Allumina have high thermal resistance compared to another metals. So, Allumina is used as thermal barrier coating in valves bottom surface & piston crown & observation of impact on performance & exhaust Emissions. Read More...
|
Mechanical Engineering |
India |
2774-2777 |
62 |
A Review on Predict the Frequent Pattern of Amino Acids using Data mining Techniques
-Nikit P. Patel ; Pratik Kumar
In recent years, rapid developments in genomics and proteomics have generated a large amount of biological data. So A critical problem in biological data analysis is to classify the biological sequences and structures based on their critical features and functions. Protein is one among the important factor and acts as the constituents of all living organisms. Protein plays the most predominant role for causing viral diseases like viral fever, fluid diseases, poliomyelitis, hepatitis, swine flu, tumour, etc. Our approach aims at extracting the hidden and the most dominating amino acids among the infected protein sequence which causes some infections in human. We handle this problem by predicting patterns apply strong association rules along with genetic algorithm and fuzzy logic provides a way to obtain interesting correlations and patterns from datasets. It also eliminates human error and provides high accuracy of results. Read More...
|
Computer Science & Engineering |
India |
2778-2780 |
63 |
An Experimental Investigating on Performance and Emissions Analysis of Diesel engine with using Butanol: A Review
-Niraj R. Shingala ; Harsad J. Rathod; Ashis J. Modi
This work concentrates on investigating the combustion and emission characteristics of diesel engine running on butanol-diesel blends. The blending ratio of butanol to diesel was varied from 0 to 40 vol% using an increment of 10 vol%, and each blend was tested on a diesel engine equipped with an EGR system. The test was carried out fewer than two engine loads at a constant engine speed, using various combinations of EGR ratios and injection timings. Test results indicate that butanol addition to engine fuel is able to substantially decrease soot emission from raw exhaust gas, while the change in NOx emissions varies depending on the butanol content and engine operating conditions. Increasing EGR ratio and retarding injection timing are effective approaches to reduce NOx emissions from combustion of butanol-diesel blends. But the engine control strategies need to be optimized in order to achieve low levels of both soot and NOx emissions, as well as a reasonable fuel economy. Read More...
|
Mechanical Engineering |
India |
2781-2787 |
64 |
Information Technology - A Realistic Aspect of Present Era
-Er. Prashant Saxena
Information Technology is an important realistic approach of this present era. Information technology (IT) is the application of computers and telecommunications kit to store, recover, spread and deploy records, often in the framework of a professional or other initiative. The term is commonly used as a synonym for computers and computer networks, but it also incorporates other information circulation technologies such as television and telephones. Numerous industries are associated with information technology, such as computer hardware, software, electronics, semiconductors, internet, telecom equipment, and e-commerce & computer services.
In a professional context, the Information Technology Association of America has defined information technology as "the study, design, development, application, implementation, support or management of computer-based information systems". The tasks of those working in the ground include network administration, software development and installation, and the planning and management of an organization's technology life cycle, by which hardware and software is maintained, upgraded and replaced. Read More...
|
Computer Science & Engineering |
India |
2788-2789 |
65 |
Review on Experimental Investigation of Reduction in Exhaust Emission of C.I. Engine by Catalytic Converter and SCR using Blends of Biodiesel and Fuel Additives
-Mr. Valji Gadhavi ; Dr. Pravin P. Rathod
This review covers all aspects of the selective catalytic reduction of nitrogen oxides, oxidation catalyst and various fuel additives. In this paper intention is to reduce all emissions such as HC, CO, NOx, smoke and odour to be reduced by combine treatment of SCR, catalytic converter and various Fuel additives using Blends of Jatropha Biodiesel and diesel as a fuel. With varying blends of Jatropha methyl ester. This review paper discusses automotive exhaust emissions and its impact, automotive exhaust emission control by platinum(noble) group metal based catalyst in catalytic converter, history of catalytic convertor, types of catalytic convertor, limitation of catalytic convertor and also achievements of catalytic convertor, SCR Techniques to convert harmful NOx into pure water and nitrogen gas. Read More...
|
Mechanical Engineering |
India |
2790-2795 |
66 |
Sequencing Batch Reactor: A Promising Technology in Domestic Wastewater Treatment
-Nilesh S Rathod ; Prof. H. S. Syed
Sewage is the combination of water and waste products, the waste products can be organic and/or inorganic in nature so some sort of treatment is required before discharging them in to different sinks so that they don't cause any water bone diseases. There are many kinds of treatment scheme given for the treatment of sewage out of them the most common is ASP. Conventional ASP system are space oriented, where wastewater flow moves from one tank into the next on a continuous basis and virtually all tanks have a predetermined liquid volume. The SBR on the other hand is a time-oriented system, with flow energy input and tank volume varying according to some predetermined, periodic operating strategy. Hence SBR is best defined as a time oriented batch process. Further ASP is not designed to remove nitrogen due to its short detention time and the sludge produced is not well digested requiring additional sludge treatment. Comparing with ASP, SBR is a simple fill and draw treatment system having the advantage of flexibility of operation and can be used as low-energy high sludge yield process. This paper reviews the fundamentals of SBR and ASP process, design concept, operational and maintenance problem with a case studied for 10 MLD. Read More...
|
Environmental Engineering |
India |
2796-2798 |
67 |
Antenna Bandwidth Improvement for CoMP System
-Swapnil B. Patel ; Mayank A. Ardeshana; Jigar M. Patel
Mobile communication system changed the life style of the human being in the past two decades. Various research and development process is carried out to increase the effective communication system to provide sophisticated communication environment to the users. Communication between humans was first by sound through voice. With the desire for slightly more distance communication came, devices such as drums, then, visual methods such as signal flags and smoke signals were used. These optical communication devices, of course, utilized the light portion of the electromagnetic spectrum. It has been only very recent in human history that the electromagnetic spectrum, outside the visible region, has been employed for communication, through the use of radio. One of humankind's greatest natural resources is the electromagnetic spectrum and the antenna has been instrumental in harnessing this resource. This paper provides a detailed study to design a antenna improve bandwidth of antenna for a comp system. Batter bandwidth helps to improve quality of service and improve data rate. Read More...
|
Electronics and Communication |
India |
2799-2804 |
68 |
A Review of Intrusion Detection Technique Based On Classification and Feature Optimization
-Jaykaran Singh ; Sunil Chavda; Mukesh Tiwari
Classification and optimization play an important role in intrusion detection system. The process of classification depends on data mining and neural network approach. For the improvement of classification result, feature optimization is used. The process of feature optimization such as genetic algorithm, particle of swarm and ant colony optimization improved the detection of intrusion detection system. In this paper review of intrusion detection technique based on classification and feature optimization process, the process of classification consist of binary classifier, rule based classifier. The binary classification technique plays a major role in intrusion detection system. Feature optimization is a process of feature reduction, which gives the reduced feature set for intrusion detection. The reduced feature improves the classification ratio of intrusion detection system and decreases the false and negative detection of intrusion. Read More...
|
Electronics and Communication |
India |
2805-2809 |
69 |
Review and Analysis of Different Image Inpainting Methods
-Mr. Tusharsinh Chauhan ; Prof. Arvind Meniya
Image inpainting is the process of filling of missing region so as to preserve its overall continuity. Image inpainting is manipulation and modification of an image in a form that is not easily detected. Digital image inpainting is relatively new area of research, but numerous and different approaches to tacked the inpainting problem have been proposed since the concept was first introduced. This paper compares two separate techniques viz, Exemplar based inpainting technique and Wavelet based inpainting technique, each portraying a different set of characteristics. This paper proposes a novel exemplar-based inpianting algorithm based upon the color distribution analysis. Color distribution is proposed to determine the confidence of the target patches situated on the boundary of the missing region by measuring the variation of variances of neighboring source patches. A review and analysis for different method were analysed which are explained below and image inpainting using TV model weighted method are analysed. Finally, the results of numerical experiments comparing this approach to inpainting to numerous others will be presented. Read More...
|
Computer Science & Engineering |
India |
2810-2814 |
70 |
A Review of Channel Estimation Techniques for OFDM
-Vimal K .Valand ; Prof. Krunal N. Patel
During the past few years, the developments in digital communication are rapidly increasing to meet the ever increasing demand of higher data rates. Data rate is decreases due to multipath fading in multiuser environment. OFDM becomes promising technique for achieving higher data rate. Orthogonal Frequency Division Multiplexing (OFDM) has an edge over other frequency multiplexing techniques by using more densely packed carriers, thus achieving higher data rates using similar channels. The primary importance of channel estimation is that it allows the receiver to take into account the effect of channel on the transmitted signal, secondly channel estimation is essential for removing ISI, noise rejection techniques etc. In this report the channel estimation techniques for OFDM is examined and its implementation in MATLAB using pilot based block type channel estimation techniques.. In the end, results of different simulations are compared to conclude that LS algorithm gives less complexity but MMSE algorithm provides comparatively better results. The focus of this paper is non-blind channel estimation technique & compare with blind techniques. Read More...
|
Electronics and Communication |
India |
2815-2817 |
71 |
GSM Based Condition Monitoring of Transformer
-Monika Agarwal ; Akshay pandya
In normal ways all the Industrial or Electrical machineries are controlled by the manual operation. Hence there is step by step progress but most of the time there is not actually instant cooperation between system and operator in case of emergency or fault type situation .Therefore we are designing a system where there exits communication between system and operator. For this we are using Transformer, microcontroller, logic level converter and GSM i.e. global system for mobile communication modem. This GSM modem helps to monitor transformer health by sending message to the system. As we know, transformer is a major component of power system and its correct functioning is vital to system operations.
To reduce the risk of unexpected failure and the ensuring unscheduled outage, on-line monitoring has become the common practice to assess continuously the condition of the transformer. This paper presents design and implementation of a mobile embedded system to monitor and record key operation of a distribution transformer like overvoltage, over current, temperatures, fall of oil level. Also it is important to keep an eye on transformer health when operator is not present actually at transformer site so we are introducing system named as two way communication systems between transformer and operator through GSM modem where person can ask any related parameter value of transformer health by sending message to the system. This system is designed to send SMS alerts whenever related parameter value exceeds the predefined limits. Read More...
|
Electrical Engineering |
India |
2818-2821 |
72 |
A Review Paper on Key Frame Extraction
-Jignesh M. Chhaiya ; Ashish M. Kothari
In the recent years, use of video bases information in increasing more and more. Due to this many research is done in the area of video. Owing to the decreasing cost of storage devices, higher transmission rates, and improved compression techniques, digital video is becoming available at an ever increasing rate. To extract valid information from video, without any loss of information, much attention is being paid to video processing technology. For this key frame is very useful technique. Extracting a small number of key frames that can abstract the content of video is very important for efficient browsing and retrieval in video databases. Consequently, technologies for video segmentation and key-frame extraction have become crucial for the development of advanced digital video systems. In this paper, different methods of key-frame extraction are shown and a comparison is done between the outputs of all these methods. Read More...
|
Computer Science & Engineering |
India |
2822-2825 |
73 |
Link Mining in Social Networks
-Zow Afshan ; Mr. Sauod Sarwar
In data mining a social network is a diversion content and multi-relational data set represented by a graph. A graph is very large, with nodes corresponding to objects and edges corresponding to links representing relationships or interactions between objects. Both nodes and links have attributes. Objects may have class labels. Links would be one-directional and are not required to be binary. A key challenge for data mining is tackling the problem of mining richly structured datasets, where the object is linked in some way. Links among the objects can find certain patterns, which may be helpful for many data mining tasks and are typically hard to capture with traditional statistical models. Recently it has been a surge of interest in this area, fueled largely by interest in web and hypertext mining, but also by interest in mining social networks, security and law enforcement data, bibliographic citations and epidemiological records. Traditional data mining tasks such as association rule mining, market basket analysis and cluster analysis commonly attempt to find patterns in a dataset characterized by a collection of independent instances of a single relation. This is consistent with the classical statistical inference problem of trying to identify a model given a random sample from a common underlying distribution. A key challenge for data mining is tackling the problem of mining richly structured, heterogeneous datasets. Naively applying traditional statistical inference procedures, which assume that instances are independent, can lead to inappropriate conclusions. Care must be taken that potential correlations due to links are handled appropriately. In fact, record linkage is knowledge that should be exploited. Clearly, this is information that can be used to improve the predictive accuracy of the learned models: attributes of linked objects are often correlated and links are more likely to exist between objects that have some commonality. Link mining is a newly emerging research area that is at the intersection of the work in link analysis, hypertext and web mining, relational learning and inductive logic programming and graph mining. Link mining is an instance of multi-relational data mining (in its broadest sense); however, we use the term link mining to put an additional emphasis on the links moving them up to first-class citizens in the data analysis endeavor. Link mining encompasses a range of tasks including descriptive and predictive modeling. Both classification and clustering in linked relational domains require new data mining algorithms. But with the introduction of links, new tasks also come to light. Examples include predicting the numbers of links, predicting the type of link between two objects, inferring the existence of a link, inferring the identity of an object, finding co references, and discovering sub graph patterns. Read More...
|
Computer Science & Engineering |
India |
2826-2831 |
74 |
Data Center Networking
-Zow Afshan ; Mr. Sauod Sarwar
The magic of the cloud is that it is always on and
always available from anywhere. Users have come to expect
that services are there when they need them. A data center
(or warehouse-scale computer) is the nexus from which all
the services flow. It is often housed in a nondescript
warehouse-sized building bearing no indication of what lies
inside. Amidst the whirring fans and refrigerator-sized
computer racks is a tapestry of electrical cables and fiber
optics weaving everything together-the data-center
network. This paper provides a "guided tour" through the
principles and central ideas surrounding the network at the
heart of a data center-the modern-day loom that weaves
the digital fabric of the Internet.
Large-scale parallel computers are grounded in HPC (highperformance
computing) where kilo-processor systems were
available 15 years ago. HPC systems rely on fast (lowlatency)
and efficient interconnection networks capable of
providing both high bandwidth and efficient messaging for
fine-grained (for example, cache-line size) communication.
This zealous attention to performance and low latency
migrated to financial enterprise systems where a fraction of
a micro-second can make a difference in the value of a
transaction. Read More...
|
Computer Science & Engineering |
India |
2832-2836 |
75 |
Tollgate Billing and Security of Vehicle Using RFID
-T. Mahaboob Rasool ; M. L. S. N. Murthy; V. Anjaneyulu; M. Balamunaiah
This paper deals with an improved from of
tollgate billing system. An efficient utilization of
communication link between RF modems over a wireless
channel to facilitate vehicle monitoring, vehicle
authentication and automated toll collection on the
highways is proposed. The system is implemented to
automatically register vehicles getting on or of a motorway
or highway, cutting the amount of time for playing toll in
large queues. In this we are using active RFID tag. Which
takes power supply from vehicle battery itself? Mainly
concentrate on the security of the vehicle and authentication
process whether the driver is correct person or not to use
the vehicle. In this paper we are proposing 3 solutions for
authentication of vehicle. They are
1. GSM technology
2. Using finger prints
3. Password through passive RFID technology Read More...
|
Electronics and Communication |
India |
2837-2839 |
76 |
Role of Geographical Information System in Water Resources And Management - An Overview
-Chandresh G. Patel
Water is one valuable resource and is a primary necessity for the people, agricultural production and for the industries. Looking in to the history of the numerical modeling in the water resources area it can be seen that the general trend of modeling approach is moving from periods of 'function-centric', 'data-centric' and 'map-centric' where models would be supported by or written in GIS. This paper attemps to aware role of Geographical Information System (GIS) and the contribution of Remote Sensing (RS) in Water Resources Management.Presanted work describes importance of GIS in the flood plain management,hydrologic modeling,spatial information, watershed delination,water quality assessment and planning,Constructing a ground water simulation model and connecting the spatially referenced time series data. Limitations and constraint working with GIS mention in the presented work. Also advantages and dis advantages using GIS are narrated in the paper. Read More...
|
Civil Engineering |
India |
2840-2844 |
77 |
Anti-Theft Vehicle Security System
-Naina Kaushik ; Mayur Veralkar; Pratik Parab; Kedar Nadkarny
This paper proposes an Anti-theft vehicle security system which aims to allow access to the car only if the person's fingerprint matches with that stored in the system [1]. The comparison will take place in Matlab and result will be shown on the LCD. In case through illegal means the car is accessed then car's fuel tank will be locked through Relay circuit so that whenever the tank gets empty, unauthorized person will no longer be able to refuel the tank[5] Read More...
|
Electronics and Communication |
India |
2845-2848 |
78 |
Biometric Systems Authentication & Multi-Modal Biometric System
-Harshil Joshi ; Chaitasee Pandya
This paper gives outline of different biometric
technologies and biometric authentication process. A
biometric system which relies only on a single biometric
trait is often not able to meet the desired performance. In
Multi-modal system more than one biometric traits are used
to identify a person. The study of methods for uniquely
recognizing based upon one or more intrinsic physical or
behavioral. In this paper we present the use of multimodal
biometric system to get the higher degree of security. Read More...
|
Computer Science & Engineering |
India |
2849-2852 |
79 |
Study on
-Naila Firdaus ; Mr.Sauod Sarwar
A software undergoes many levels of testing from unit testing to integration to system testing. As information system are becoming more complex, object oriented paradigm is gaining popularity because of its benefits in analysis, design and coding. Conventional testing cannot be applied for testing classes because of problems involved in testing class, abstract classes, inheritance, dynamic binding, message passing, polymorphism etc.
Object oriented testing methods are similar to those of conventional testing methods. Three or four levels of object oriented testing are used, depending on the choice of what constitutes a unit. If individual functions are chosen as units, we have four levels of testing namely:
Operation testing: It is testing of individual function i.e. the function works according to the requirement. Like for instance an 'addition' function does addition of two numbers and no other mathematical operation.
Class testing: It is testing of interaction among previously testing methods/operations. Like, the above tested 'addition' function works intact even after introduction of a 'subtraction' function in the class.
Interclass testing: It is a major part of out and is concerned with testing interaction among previously tested classes. Like, a class which has the mathematical operation functions when integrated with a class that contains operation for calculations of areas of various shapes, performs its mathematical operations correctly.
System testing: It is conducted at port level entry and is concerned with testing of the entire system as a whole before being delivered to the customer.
Of the three main levels of software testing interclass testing is the least understood both in object oriented and traditional testing terms. Interclass testing is referred as Integration testing in general terms. Read More...
|
Computer Science & Engineering |
India |
2853-2855 |
80 |
Dynamic Scheduling Of Task with Dynamic Load Balancing For Effective Resource Utilization in Distributed System
-Kishorkumar Madhad ; Arjun Sojitra
The dynamic load balancing was studied and also distributed system. Our work based on process scheduling and works load balancing that we proposed. Here ELBS (ERP Load Balancing Scheme) studied and create some new step that can able to balance resource and maintenance time. It is suitable for large application with number of network nodes. the ERP system relative to the system without ant load balancing strategy. Read More...
|
Computer Science & Engineering |
India |
2856-2858 |
81 |
An Active Storage Framework Based On Storage Security in Cloud Computing
-Mr.K.Karthick ; Dr. M. Kamarajan
A formal privacy model in order to extend DaaS descriptions with privacy capabilities. The privacy model allows a service to define a privacy policy and a set of privacy requirements. A privacy-preserving DaaS composition approach allowing verifying the compatibility between privacy requirements and policies in DaaS composition. A negotiation mechanism that makes it possible to dynamically reconcile the privacy capabilities of services when incompatibilities arise in a composition. We validate the applicability of our proposal through a prototype implementation and a set of experiments. In this paper, we aim at designing techniques for protecting the composition results from privacy attacks before the final result is returned by the mediator. And also we extend the previous composition approach to deal with the privacy-preserving issue within composition. Read More...
|
Computer Science & Engineering |
India |
2859-2862 |
82 |
A Dynamic Filter Based Addressing for Node Auto Configuration in Mobile AD HOC Networks
-S. Mohanalingam ; Mr. D. Bright Anand
The key challenge in ad hoc networks is the Address assignment, due to the lack of infrastructure. A distributed and self-managed mechanism, to avoid address collisions in a dynamic network with fading channels, joining/leaving of nodes, and frequent partitions, require in an autonomous addressing protocols. A bloom filter is a simple, space-efficient, randomized data structure for concisely representing a static data set, in order to support approximate membership queries. It has great potential for distributed applications where systems need to share information about what resources they have. The space efficiency is achieved at the cost of a small probability of false positive in membership queries. However, for many applications the space savings and short locating time consistently outweigh this drawback. This paper introduces Dynamic Bloom Filters (DBF) to support concise representation and approximate membership queries of dynamic sets, and study the false positive probability and union algebra operations. It proves that DBF can control the false positive probability at a low level by adjusting the number of standard bloom filters used according to the actual size of current dynamic set. The space complexity is also acceptable if the actual size of dynamic set does not deviate too much from the predefined threshold. Thus this paper propose and analyze a dynamic bloom filter based addressing that configures mobile ad hoc nodes based on a distributed address database stored in filters that reduces the control load and makes the proposal robust to packet losses and network partitions. And also it evaluates the performance of the protocol, considering joining nodes, partition merging events, and network initialization. Simulation results show that the Dynamic Bloom Filter resolves all the address collisions and also reduces the control traffic when compared to previously proposed protocols. Read More...
|
Computer Science & Engineering |
India |
2863-2868 |
83 |
Secure Mechanism for Wireless Sensor Networks Using Keylock Matching
-R. Samantha ; Mr.A.Justine Jerold
Ensuring the security of communication and access control in Wireless Sensor Networks (shortly WSNs) is of paramount importance. In this paper, I present a security mechanism, MoteSec Aware, built on the network layer for WSNs with focus on secure network protocol and data access control. In the secure network protocol of MoteSec Aware, a Virtual Counter Manager (shortly VCM) with a synchronized incremental counter is presented to detect the replay and jamming attacks based on the symmetric key cryptography using AES in OCB mode. For access control, I investigate the Key-Lock Matching (Shortly KLM) method to prevent unauthorized access. I implement MoteSec-Aware for the TelosB prototype sensor platform running Tiny OS version 1.1.15, and conduct field experiments and TOSSIM-based simulations to evaluate the performance of MoteSec Aware. The results demonstrate that MoteSec Aware consumes much less energy, yet achieves higher security than several state of the art methods. Read More...
|
Computer Science & Engineering |
India |
2869-2872 |
84 |
A Model for Secure Data Access from Smartphones Using Short Message Service
-Afreen Khan ; Ashwini Chougule; Mahesh Mookanagoudar; Vidya R.Kulkarni
The Smartphone usage among people is increasing rapidly. To perform remote accessing of mobile contents there are many ways which make use of internet. This paper presents an Android based Application which is a secure data access from android Smartphone using any normal phone without the internet connection. This Model provides the short message service where we can access the data from Smartphone such as contacts, call log, messages, files by sending a message as well as secure deletion of the same data from android mobiles using any mobile through SMS using different commands for performing different actions. This model doesn't need internet for accessing the data. Read More...
|
Computer Science & Engineering |
India |
2871-2875 |
85 |
Performance and Emission Analysis of Two Stroke Dual and Triple Spark plug Single Cylinder SI Engine with Gasoline fuel
-Hardik A. Patel ; J. J. Goswami
Two stroke spark ignition engines have high exhaust emissions and low brake thermal efficiency due to the short circuiting losses and incomplete combustion, which occur during idling and at part load operating conditions. An effort is been made to improve the engine parameters i.e. specific fuel consumption and Thermal Efficiency of the engine. This is achieved by using dual spark plug in two stroke gasoline also its effect on the engine parameter is analyzed.A spark-ignition (SI) engine cycle model was used to study the effects of spark plug location on a four spark plug SI engine performance. Constructed simulation can be used for either single- or four-spark plug configuration. For the tetra-spark arrangement, spark plugs were considered to be located diametrically opposite to each other on cylinder head axisymmetrically. According to Dimensionless distance from the cylinder centre to spark plug location on cylinder head, rsd = rs/R, five locations (rsd = 0, 0.25, 0.50, 0.75, and 1.0) were considered. Inevitably rsd = 0 corresponds to the single spark arrangement that the plug is located at the centre. To comparison, single-spark plug configurations were also considered for other selected spark plug locations. From the result of the study it was found that centrally located single-spark plug arrangement gives the best engine performance and fuel economy, while for the all the other spark-plug locations away from the centre tetra-spark arrangement favourable to the single-spark plug configuration. Read More...
|
Mechanical Engineering |
India |
2873-2875 |
86 |
Design and Implementation of Secure Location and Group Communication System for Android Platform
-Juby Mathew ; Ms. J. B Shajilin Loret
The Navel Security based approach of integrating group communication and navigation in android gadgets provides effective group communication and navigation. The system intends to achieve two major functions. First function is the effective group communication which provides all registered users to create friend groups, implement real-time communication. Second function is navigation which provides Map service and navigation function on the mobile client for users. It can support the surrounding query, location, path planning etc. Mean while, the two parts of the system can be integrated to locate the friend's position and implant path planning between friends. Security is the major concern for such group communication, in my proposed approach an encryption scheme is implemented to ensure secure communication. When a new user comes for registration, a set of images will be provided to him for selection .The user has to enter his username and an image is also required to select. When the user selects the image that will be compared with the one that he is already selected. If the current image and the selected one match then he would be allowed to enter the password. Hence the proper security for the system can be ensured. Read More...
|
Computer Science & Engineering |
India |
2876-2879 |
87 |
A Review on Digital Image Watermarking Techniques
-Nirav Patel ; Yogesh Jadav
Digital watermarking is a technique to protect the content of digital media like Image, Audio, Video or text using insertion of digital mark. Lot of research is going on in this field to develop secure and more robust digital watermarking algorithms. In this paper we survey recently existing and newly proposed Digital Image watermarking techniques. We classify the Digital Image watermarking techniques according to domain in which the watermark is embedded. Here, we limit to survey Image watermarking techniques only. Read More...
|
Electronics and Communication |
India |
2885-2890 |
88 |
A review of process parameter optimization of Milling process by using Harmony Search Algorithm approach
-Maulik. B. Nagarchi ; Prof. D.A. Patel
Milling is the machining process of using rotary cutters to remove material from a work piece advancing (or feeding) in a direction at an angle with the axis of the tool. The quality and productivity of the parts produced by milling process is significantly affected by various manufacturing parameters of milling machine. Hence optimization of milling process parameters is necessary in order to improve the quality or productivity of parts. The purpose of this paper is to explore the reviews for various optimization methods used for process parameter optimization of milling process and application of Harmony search algorithm approach. This review of work can be helpful to the other researchers to carry out further work in the same era. Read More...
|
Mechanical Engineering |
India |
2891-2893 |
89 |
A Survey of Different Character Recognition Techniques
-Vinit Mandloi ; Mr. Arif Khan; Mr. Deepak Kulhare; Mr. Lokendra Songare
In this paper, we present an overview of existing handwritten character recognition techniques. All these algorithms are described more or less on their own. Handwritten character recognition is a very popular and computationally expensive task. We also explain the fundamentals of handwritten character recognition. We describe today's approaches for handwritten character recognition. From the broad variety of efficient techniques that have been developed we will compare the most important ones. We will systematize the techniques and analyze their performance based on both their run time performance and theoretical considerations. Their strengths and weaknesses are also investigated. It turns out that the behavior of the algorithms is much more similar as to be expected. Read More...
|
Computer Engineering |
India |
2894-2897 |
90 |
Near Field Technology and Its Future
-M Karthik ; Krishna Kumar Bharath; Bajjuri Avinash Reddy
In the present day everything is wireless. You do not need a wired connection for transferring data or charging. Only thing that you need is to be in the wireless field of the other device. NFC is one of the several technologies that is being used for transferring data. It has a vast applications and is the future of mobile banking. Read More...
|
Electronics & Communication Engineering |
India |
2898-2899 |
91 |
Smart Locker Security System
-Bhavesh Chaudhari ; Boni Tandel; Keval Patel; Jignesh Chaudhary
The main goal of this paper is to improves the safety & security of bank lockers using microcontroller, gsm and biometric technology.. Our bank locker system is specifically designed for the convenience of the bank employee and to provide three level securities. A mobile can work as a key to open the locker which provides a safe operation. The mobile belongs to manager. To open the locker first manager sends a password through the mobile, if the password is correct then the account holder is asked to type his/her password. If both password correct, then finger print scanner scan a finger print. If it is match the locker will open. If any unauthorized people try to open locker then one alert message will send to account holder and bank manager. Read More...
|
Instrumentation and Control Engineering |
India |
2900-2902 |
92 |
Optimization of Monoblade Windshield Wiper System to Improve Wiping Actuals in The Residual Area
-R.AGASTHEE JAIN
A single wiper mounted to a conventionally located, non-centre wiper post is adapted to wipe generally a rectangular windshield. A primary arm and wiper blade are long enough to cover a main wipe pattern that covers most of the driver side of the windshield. To cover the residual area on the passenger side, a secondary arm and blade pivoted to the tip of the primary arm are continuously pivoted by a drag link over a supplemental wipe pattern. The ultimate aim of the project is to calculate the optimal design parameters of the secondary wiping element and the appended area covered in the residual area. Read More...
|
Mechanical Engineering |
India |
2903-2906 |
93 |
Particle Swarm Optimization Technique for Temperature Process
-N.NithyaRani ; Dr.S.M.GirirajKumar
The increasing complexity of the modern control systems has emphasized the idea of applying new approaches in order to solve design problems for different control engineering applications. Proportional-Integral-Derivative (PID) control schemes have been widely used in most of process control systems represented by chemical process for a long time. However, it is still a very key problem on how to determine or to tune the PID parameters, because these parameters have a great manipulate on the stability and the performance of the control system. In this paper, we discusses in detail about the Particle swarm Optimization (PSO) is an optimization method that belong to the swarm intelligence unit and its implementation in PID tuning for a controller of a Temperature Process. Compared to other conventional PID tuning methods like PID-ZN II, IMC-PID the result shows that improved performance are achieved with the proposed one. The ability of the PSO designed controller in terms of servo operation is also compared with conventional techniques and the results are simulated by using MATLAB. Read More...
|
Instrumentation & Control Engineering |
India |
2907-2911 |