No. |
Title and Author |
Area |
Country |
Page |
1 |
An Improvement of Web browser
-Amita Shah ; Pooja Shah
Recent advances in perfect theory and hetero-geneous algorithms are regularly at odds with B-trees. In this position paper, we prove the evaluation of checksums, which embodies the key principles of machine learning. In order to surmount this question, we disprove not only that extreme programming and multi-cast algorithms can synchronize to overcome this riddle, but that the same is true for wide area networks. Read More...
|
Computer Engineering |
India |
52-55 |
2 |
Recharging Mechanism of Wireless Sensor Network: A Survey
-Ankit Patel ; Chirag Pandya
WSN have been extensively researched during recent years helping in diverse employment of sensor networks in various systems and applications. One of the key challenges that preclude the sustained operation of these networks is their limited energy resources. One of the most critical limiting factors for a Wireless Sensor Network (WSN) is its battery life. Therefore, a very desirable feature of WSN would be its rechargability to remain operational over longer period of times. The wireless sensor node, being a limited form factor device, can only be equipped with a limited power source. In this paper, we have presented several existing techniques for recharging a sensor node in wireless sensor networks. Read More...
|
Computer Engineering |
India |
56-58 |
3 |
Detecting Wormhole Attack in Mobile Ad-hoc Networks: A Survey
-Mayur Panchal ; Chirag Pandya
A Mobile Ad Hoc Network (MANET) is a self organizing, infrastructure less, multi-hop network. The wireless and distributed nature of MANETs poses a great challenge to system security designers. Ad hoc networks are by nature very open to anyone. Anyone with the proper hardware and knowledge of the network topology and protocols can connect to the network. This allows potential attackers to infiltrate the network and carry out attacks on its participants with the purpose of stealing or altering information. A specific type of attack, the Wormhole attack does not require exploiting any nodes in the network and can interfere with the route establishment process. It does not require any cryptographic primitives. This attack targets specifically routing control packets, the nodes that are close to the attackers are shielded from any alternative routes with more than one or two hops to the remote location. All routes are thus directed to the wormhole established by the attackers. The entire routing system in MANET can even be brought down using the wormhole attack. Read More...
|
Computer Engineering |
India |
59-61 |
4 |
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
-Ladumor Dhara ; Chirag Pandya
The use of Wireless Sensor Networks (WSNs) is anticipated to bring lot of changes in data gathering, processing and dissemination for different environments and applications. However, a WSN is a power constrained system, since nodes run on limited power batteries which shorten its lifespan. Prolonging the network lifetime depends on efficient management of sensing node energy resource. Energy consumption is therefore one of the most crucial design issues in WSN. Hierarchical routing protocols are best known in regard to energy efficiency. By using a clustering technique hierarchical routing protocols greatly minimize energy consumed in collecting and disseminating data. To prolong the lifetime of the sensor nodes, designing efficient routing protocols is critical. In this paper, we have discussed various energy efficient data aggregation protocols for sensor networks. Read More...
|
Computer Engineering |
India |
62-65 |
5 |
Crumb rubber infill Synthetic turf
-Bhakti D. Patel ; Prof. Rupande N. Desai
Synthetic – turf or Astroturf, is a grass-like man-made surface manufactured from synthetic polymers. It is most used for sports field and in residential area where natural grass is difficult to grow. Synthetic turf consist three basic components – grass filaments, Infill and backing. Grass filaments require softness and impact strength. Through several generations, grass filaments developed from initially nylon, polypropylene and now from polyethylene. Crumb rubber is used as infill material which contains toxic chemicals present in tyre. Some of the drawbacks of these materials can be solved by modifications in materials like by introduction of TPE –thermoplastic elastomer, which has been presented in this paper. Read More...
|
Rubber Technology |
India |
66-69 |
6 |
Macromodel of High Speed Interconnect using Vector Fitting Algorithm
-Naresh Punani ; Ravi Mehta; Ashish Sarvaiya
At high frequency efficient macromodeling of high speed interconnects is all time challenging task.
We have presented systematic methodologies to generate rational function approximations of high-speed interconnects using vector fitting technique for any type of termination conditions and construct efficient multiport model, which is easily and directly compatible with circuit simulators. Read More...
|
Electronics and communication Engineering |
India |
70-73 |
7 |
Survey of Optimization of FFT processor for OFDM Receivers
-Nirav Chauhan ; Dr. Shruti Oza; Dr. Kiran Parmar
In the last few years wireless communications have experienced a fast growth due to the high mobility that they allow. However, wireless channels have some disadvantages like multipath fading that make them difficult to deal with. A modulation that efficiently deals with selective fading channels is OFDM. There are a large number of FFT algorithms and architectures in the signal processing literature. Therefore, the state of art algorithms and architectures should be analyzed and compared. Based on different algorithms and architectures, different power consumptions, area and speed of the processor will be achieved. So their ASIC suitability should be analyzed and the effort should be focused on the choosing algorithms and architectures and optimization. In this paper FFT Processor with Pipelined Architecture and CORDIC based ROM-free twiddle factor generator is proposed. The proposed algorithm and architecture should be validated by MATLAB simulation before implementation. After that, it is implemented on DSP Processor kit with Code Composer Studio. The synthesis results will be compared with other published FFT processor results. Read More...
|
Electronics and communication Engineering |
India |
74-77 |
8 |
Construction on cohesionless soil – A review
-Urvi Patel ; Brijesh Darji
In India, specifically in Gujarat region like Kutch, Bhuj, Kandla large deposits of cohesionless soil are observed. Cohesionless soil is defined asthe soil which is not containing water andthe shear strain does not exist (or is negligible)between two particles. Loose and sandy material in which there is no bond between the particles is also termed as cohesionless soil. Cohesionless soil is also known as frictional soil. Cohesionless soil have lessload bearing capacity, less shear strength, less specific surface and they do not have any plasticity. Therefore, the cohesionless soil is mostly settled during earthquake and in heavy rainy season.Owing to such properties of cohesionless soil,it is very difficult to carryout construction work on such soil in a normal way.Here, need is felt to find some problems encountered during construction on cohesionless soil and methods for preventionof these problems. This paper aims at focusing the most predominant problems encountered while doing construction on such cohesionless soil and remedial measures taken for the same. Read More...
|
Civil Engineering |
India |
78-82 |
9 |
A New Transmission Scheme for MIMO – OFDM
-Kushal V. Patel ; Mitesh D. Patel
This contribution introduces a new transmission scheme for multiple-input multiple-output (MIMO) Orthogonal Frequency Division Multiplexing (OFDM) systems. The new scheme is efficient and suitable especially for symmetric channels such as the link between two base stations or between two antennas on radio beam transmission. This survey Paper presents the performance analysis of V-BLAST based multiple inputs multiple output orthogonal frequency division multiplexing (MIMO-OFDM) system with respect to bit error rate per signal to noise ratio (BER/SNR) for various detection techniques. A 2X2 MIMO-OFDM system is used for the performance evaluation. The simulation results shows that the performance of V-BLAST based detection techniques is much better than the conventional methods.
Alamouti Space Time Block Code (STBC) scheme is used with orthogonal designs over multiple antennas which showed simulated results are identical to expected theoretical results. With this technique both Bit Error Rate (BER) and maximum diversity gain are achieved by increasing number of antennas on either side. This scheme is efficient in all the applications where system capacity is limited by multipath fading. Read More...
|
Electronics and communication Engineering |
India |
83-88 |
10 |
Classification of Multi-date Image using NDVI values
-Ms. Neha Bhatt ; Mr. Indrjeet Rajput; Mr. Vinitkumar Gupta
Advance Wide Field Sensor (AWiFS) of IRS P6 is an improved version of WiFS of IRS-1C/1D. AWiFS operates in four spectral bands identical to LISS III (Low-Imaging Sensing Satellite). Normalized Difference Vegetation Index (NDVI) is a simple graphical indicator that can be used to analyze remote sensing measurements. These indexes can be used to prediction of classes of Remote Sensing (RS) images. In this paper, we will classify the AWiFS image on NDVI values of 5 different date's images (Captured by AWiFS satellite). For classifying images, we will use an algorithm called Sum of Squared Difference (SSD). It will compare the clustered image with the Reference image based on SSD and the best match on the basis of SSD algorithm, it will classify the image. It is simple 1 step process, which will be faster compared to the classical approach. Read More...
|
Computer Engineering |
India |
89-92 |
11 |
Membrane Separation Process in Wastewater Treatment of Food Industry
-Sejal J. Solanki ; Prof. Rupande N. Desai
Wastewaters produced in the food industry depend upon the particular site activity. Animal processors and rendering plants will generate effluents with different characteristics to those from fruit/vegetable washers and edible oil refiners (suspended/colloidal and dissolved solids, organic pollution and oil and greases as well as microbial contamination). The favourable characteristics (modular) of membrane technologies allow to use different techniques as it has be seen all along this chapter. These hybrid processes can include traditional techniques as centrifugation, cartridge filtration, disinfection and different membrane techniques building a "cascade design" very used in many of the applications reviewed. The risk of membrane damage due to the contact with particles, salt conglomerates, chemicals or others substances must be minimized to prevent short membrane life. Read More...
|
Rubber Technology |
India |
93-96 |
12 |
Lower Limb Musculoskeletal Modeling for Standing and Sitting Event by using Musculoskeletal Modeling Software
-Rahulsinh Chauhan ; Jignesh Vyas
This paper shows how the musculoskeletal modeling for standing and sitting event of lower limb of humans is possible using MSMS (Musculoskeletal Modeling Software). Concept, significance and factors of musculoskeletal modeling of lower limb have been detailed. It presents how the complexity of biomechanics related to lower limb can modeled with MSMS and also represents how such model can be useful in generating MATLAB/SIMULINK ® model that can be further used in the development of prototype neuroprosthesis model for paraplegic patients having lower extremity disorders. Proposed modeling includes 12 leg virtual muscles which shows its accuracy for event of standing to sitting event with due consideration of the coordinating position, Mass, Inertia used for rigid body segment, and Joint Type, Translational Axes, Rotational Axes used for lower limb joints. The result generated by MSMS for proposed modeling has been presented. Merits and demerits of proposed modeling have also been discussed. Read More...
|
Biomedical Engineering |
India |
97-100 |
13 |
Guidelines to Understanding Design of Experiment and Reliability Prediction
-Kevin Chauhan ; Prof. Nilesh Pancholi
This paper will focus on how to plan experiments effectively and how to analyse data correctly. Practical and correct methods for analysing data from life testing will also be provided. This paper gives an extensive overview of reliability issues, definitions and prediction methods currently used in the industry. It defines different methods and correlations between these methods in order to make reliability comparison statements from different manufacturers' in easy way that may use different prediction methods and databases for failure rates. The paper finds however such comparison very difficult and risky unless the conditions for the reliability statements are scrutinized and analysed in detail. Read More...
|
Mechanical Engineering |
India |
101-104 |
14 |
Speciality Elastomer Paint
-Atul J. Shah ; Prof. G. B. Bhagchandani
The main objective of this review is to describe some of the important topics related to the use of marine and protective coatings for anti-corrosive purposes. In this context, "protective" refers to coatings for containers, off shore construction, pipe lines, pumps, steel structures, chemical equipment, bridged, storage tanks and petrochemical plants. The review aims at providing a thorough picture of state-of-the-art in anti-corrosive coatings systems. International and national legislation aiming at reducing the emission of volatile organic compounds (VOCs) have caused significant changes in the anti-corrosive coating industries. An important aspect in the development of new VOC -compliant, high performance anti-corrosive coating system is a thorough knowledge of the components in anti-corrosive coatings, their interaction, their advantages and limitations as well as detailed knowledge on the failure modes of anticorrosive coatings. The different types of anticorrosive coatings are presented, and the most widely applied generic types of binders and pigments in anticorrosive coatings. Read More...
|
Rubber Technology |
India |
105-108 |
15 |
Continuous water supply system against existing Intermittent Supply system
-Rutva N. Gohil
The declining availability of water supplies is one of the most important environmental issues facing various countries at the present time. Climate change, affluence and population growth have resulted in vast requirements of water for use in domestic, industrial and agricultural settings. Water has remained the most severe issue confronting the Urban Local Bodies (ULB), whether they are located in water abundant or water starved region. Most of the issues are related to improper operation of the system. The present water supply practice followed by Local Bodies for various towns and cities undertaking reduced supply hours is not only non-confirming to designed hydraulic parameters, but also the system is severely afflicted by adverse hydraulics leading to many of the prevailing critical issues which engages the Local Authorities in an evitable vicious circle. Serious efforts with utmost concentration ought to be the top-most priority of the Local Authority to emerge out of the severe critical water issue. Using data from the local government body, the paper presents the status of existing water supply network condition, and comparing it with continuous water supply system of selected DMA of Bhavnagar town in Gujarat (India). Read More...
|
Civil Engineering |
India |
109-110 |
16 |
Optimization of Numerically Controlled Oscillator in digital communication systems
-Ronak P. Mistry ; Dr. Shruti Oza
We will develop Optimized Numerically controlled Oscillator for digital communication systems. In order to achieve this goal, several steps need to be followed. The first step is to find the different structure of NCO, and choose a traditional NCO structure. After defining the NCO structure, optimized NCO by algorithm and different technique. There are a large number of algorithms and methods in the signal processing literature. Therefore, the state of art algorithms and different methods should be analyzed and compared. Based on different algorithms and methods, different power consumptions, area and speed of the NCO will be achieved. So their ASIC suitability should be analyzed and the effort should be focused on the choosing algorithms and architectures and optimization. Furthermore, the improvement space should be analyzed and the architecture should be further optimized. The proposed algorithm and architecture should be validated by MATLAB simulation before implementation. After that, it is implemented on DSP Processor kit with Code Composer Studio. The synthesis results will be compared with other published FFT processor results. The proposed CORDIC based algorithm can significantly reduce the die size. Read More...
|
Electronics and Communication |
India |
111-113 |
17 |
Parametric quality analysis of Indian Ponia Oryza Sativa ssp Indica (rice)
-Chetna V. Maheshwari ; Kavindra R. Jain
Quality assessment of grains is a very big challenge in the Agricultural industry.The paper presents a solution for parametric quality analysis and grading of Rice. Machine vision provides one alternative for an automated, non-destructive and cost-effective technique. With the help of proposed method for solution of quality assessment via computer vision, image processing there is a high degree of quality achieved as compared to human vision inspection. This paper proposes a method for counting the number of Oryza sativa L (rice seeds) with long seeds as well as small seeds with a high degree of quality and then quantify the same for the rice seeds based on combined measurements . Read More...
|
Computer Engineering |
India |
114-118 |
18 |
A new move towards updating pheromone trail in order to gain increased predictive accuracy in classification rule mining by implementing ACO algorithm
-Vimal G.Bhatt ; Priyanka Trikha
Ant miner algorithm is used to find the classification rule which helps to do classification of the data. Ant miner uses the Ant Colony Optimization (ACO) which deals with artificial systems that is inspired from the foraging behavior of real ants. Here the task is to improve the pheromone update method in the current system. Pheromone updating is dependent mainly on the initial pheromone of the term, and term Q (quality of term) which is added to current accumulated pheromone. In this methods a try is made to lay pheromone on trail such that selection of terms is not biased and unified behavior for the system as a whole, produce a robust system capable of finding high-quality solutions for problems. Here in this approach amount of pheromone added with the used term is not directly dependent on accumulated pheromone but also on the Q (quality of rule). So here in Q is modified and multiplied in ways that help to get better solution. For this use of rule length is done and manipulated in ways that support approach to achieve goal. Thus, aim is to improve the accuracy and sustaining rule list simplicity using Ant Colony Optimization in data mining. Read More...
|
Computer Engineering |
India |
119-125 |
19 |
To Perform SIL And PIL Testing on Fast Dynamic System using Economical AVR Controller
-Ashish V. Patel ; Prof. Keerti Vashishtha
Embedded Systems is indubitable the core of the current electronic era. From simple calculators to high-end control of the spacecraft it plays the key role. With development in embedded system, it's also used extensively in control domain. Applying Rapid Control Prototyping (RCP) methodology in controller development in model based design shorten the development period and provide higher accuracy compared to normal flow. Here we provide the economical way to perform the SIL (software in the loop) and PIL (processor in the loop) testing with low cost AVR controller compare to high-end expensive modules available in market. This paper focuses on performing SIL and PIL testing of DC motor with Arduino having Atmega328 microcontroller. Read More...
|
Instrumentation And Control |
India |
126-129 |
20 |
Increasing Yield in the Manufacturing of MPDSA
-Mehul T. Chauhan ; Prof. R. N. Shukla; Prof. Hiral N. Pandya
Meta phenylenediamine 4 sulphonic acid (MPDSA) is one of the important products in the dyestuff sector. The present conventional manufacturing process for MPDSA being carried out at the industry is less efficient and gives an overall yield of about 60 %. But the use of alternative raw materials for the manufacture of MPDSA can give yield as high as upto 80%. In addition, this process also eliminates the use of metal catalysts which cause downstream problems. This method involves the use Metaphenylene Diamine as the raw material instead of 2, 4, dinitrochlorobenzene for the manufacture of MPDSA. A lab scale experiment has been carried out and the overall yield has been found to be higher than that obtained from the conventional process. This paper describes this new manufacturing process and its possible economic benefits. Overall yield is calculated and compared with the conventional process. Read More...
|
Chemical Engineering |
India |
130-132 |
21 |
Simulation of 3 bit Flash ADC in 0.18μmTechnology using NG SPICE Tool for High speed Application
-Jayesh L.Vyas
This paper provides the basic simulation result for the 3 bit flash type ADC in 0.18μm technology using the NG Spice device simulator tool. It includes two stages, first stage includes 7 comparators and second stage has a thermometer encoder. The simulation is done in NG spice tool developed by university of California at Berkeley (USA).The response time of the comparator and ADC are 3.7ns and 4.9ns respectively with 50.01μw power dissipation which makes the ADC more suitable for high speed application with lower power devices. Read More...
|
Electronics and communication Engineering |
India |
133-137 |
22 |
Techniques and Issues in Image Mining: Survey
-Janki Naik ; Prof. Sagar Patel
Mining image data is one essential feature in present time. Image mining is not just an extension of data mining to image domain. Analyzed images reveal useful information to the human users. Image mining manages with the extraction of knowledge, image data relationship, or other patterns which is not stored in the images. It associates techniques like computer vision, image processing, image retrieval, data mining, machine learning, database, and artificial intelligence. In this paper, we there are some techniques in image mining, research issues in image mining and image mining framework. Read More...
|
Computer Engineering |
India |
138-141 |
23 |
Real-Time Monitoring and Control System for Industry
-Rakesh Trivedi ; Prof. Vishal Vora
Industrial automation and control systems become an integral part of industries and hence the project Real-Time Monitoring and Control System is an important system. Real-Time Monitoring and Controlling System aims to monitor the environmental parameters like Temperature, Humidity, Pressure statistics in any factory and controlling peripheral systems also transmit parameter wireless to the Monitoring room using Zigbee Technology. It uses ARM 7 based embedded technologies from NXP which is sister company of Philips and made for used in highly sensitive and critical Real Time systems. Read More...
|
VLSI and Embedded System Design |
India |
142-147 |
24 |
Detection of Selfish node in Replica allocation for improving Data accessibility in MANET
-S. Geethanjali ; K. Nagendran
In a mobile ad hoc network, the mobility and resource constraints of mobile nodes may lead to network partitioning or performance degradation. Several data replication techniques have been proposed to minimize performance degradation. Most of them assume that all mobile nodes collaborate fully in terms of sharing their memory space. In reality, however, some nodes may selfishly decide only to cooperate partially, or not at all, with other nodes. These selfish nodes could then reduce the overall data accessibility in the network. In this paper, we examine the impact of selfish nodes in a mobile ad hoc network from the perspective of replica allocation. In particular, we develop a selfish node detection algorithm that considers partial selfishness and novel replica allocation techniques to properly cope with selfish replica allocation. Network partitions can occur frequently, since nodes move freely in a MANET, causing some data to be often inaccessible to some of the nodes. Hence, data accessibility is often an important performance metric in a MANET. Data are usually replicated at nodes, other than the original owners, to increase data accessibility to cope with frequent network partitions. A considerable amount of research has recently been proposed for replica allocation in a MANET. In general, replication can simultaneously improve data accessibility and reduce query delay, i.e., query response time, if the mobile nodes in a MANET together have sufficient memory space to hold both all the replicas and the original data. Read More...
|
Computer Engineering |
India |
148-152 |
25 |
Advertising Display System using LED and Graphical LED
-Darshil J. Modi ; Prof. Vishal S. Vora
This paper explains the Use of "Embedded System in Communication" in very comfort way and how it makes easy human life and also how we can merge two different technologies like GSM (Global System for Mobile Communication) and LED (Light Emitting Diode) display by use of an Embedded System for different applications like advertising. This paper provides information about how a reliable and authentic wireless communication can be done between a mobile and microcontroller by using GSM MODEM. This paper gives you information about a SMS driven automatic Display which can replace currently used programmable electronic Display. Read More...
|
VLSI & Embedded Systems Design |
India |
153-157 |
26 |
Design of Dual Frequency Antenna For Global Positioning system
-Priyank Bhambhani
In recent years low profile, light weight antennas are preferred for the applications which need mobility. In this research the polygonal-shape Microstrip Single Patch Antenna has been designed for GPS dual resonant frequencies (GPS L1 1.575 GHz & L5 1.176 GHz band). Simulated results for main parameters such as return loss, bandwidth, radiation patterns and gains are also discussed herein. The Designing, Simulation & Optimization of this antenna is done in ADS Software. Result of the simulation shows at 1.575 GHz and 1.176 GHz, the antenna has return loss at -20.862 dB and -14.162 dB respectively. . Read More...
|
Electronics and communication Engineering |
India |
158-160 |
27 |
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head and Better Cluster-Head Selection
-Jay R. Bhadeshiya
Wireless microsensor systems will facilitate the reliable monitoring of a variety of environments for several applications like as civil and military. In this paper, we look at modified LEACH protocol. This paper presents a new approach to clustering wireless sensor networks and determining cluster heads. LEACH is a hierarchical cluster algorithm in which Cluster-Heads are randomly selected from the nodes. Here, I apply new approach for selection of Cluster-Head according to their initial and residual energy of all the nodes and according to their initial and residual energy nodes are eligible for cluster head in the next round. Results of new approach of LEACH protocol compared with Conventional routing protocol. Read More...
|
Electronics and communication Engineering |
India |
161-166 |
28 |
Analysis for Maximum Utilization of Parking Area
-Mr. Rikshit D. Patel ; Prof. V.R.Gor
One of the problems created by road traffic is parking. Not only do vehicles require street space to move about, but also do they require space to park where the occupants can be loaded and unloaded. This results in a great demand for parking space in the CBD and other areas where the activities are concentrated. The numbers of vehicles are going on increasing at an alarming rate. The commercialization of the area is also happening at a fast rate. The investment on parking facilities have not kept in pace with these growing traffic leading to congestion and deteriorating the Traffic flow condition.
In Toranvali Mataji one of the busiest market in Mehsana city. It is the main connecting link between the central business district and the main residential areas in Mehsana city. This study was mainly aimed to find the present parking scenario in the area which included parking demand, parking supply, and analysis for maximum utilization of available parking area and to suggest suitable solution for present and future to mitigate the parking problems in the Mehsana area. Read More...
|
Civil Engineering |
India |
167-169 |
29 |
Capacity Determination of an Arterial Road - A Case study of Modasa Town (Bus station to Malpur cross road)
-Mr. Hiren V. Patel ; Prof. V. R. Gor
In Modasa, newly born City of north Gujarat (INDIA), faces severe traffic congestion due to rapid and uncontrolled development by an unacceptable level of disparity in transportation demand and supply scenario resulting in environmental degradation as well. Capacity analysis is essential for planning, design and operation of road. Planning and development of road systems require an understanding of capacity standards for assessing economic consequences of important road development schemes. Among other things, it provides the basic of determining the total width to be provided for bus-station to state bank of India with regards to volume, composition and other parameters of traffic. The factors affecting capacity of road are physical road way, traffic, environment and control conditions. Speed-flow relationship is the basic relationship depicting traffic behavior. In this study speed-flow relationship, speed-density relationship and flow-density relationship for SBI to bus-stand and bus-stand to SBI road link in Modasa city are developed using video recording technique. The capacity is derived from the speed-flow relationship, which can be helpful for working out improvement plans. Read More...
|
Civil Engineering |
India |
170-172 |
30 |
Analyzing Performance of Esterified Starch against Thin Boiling Starch for Warp Sizing Applications Part I : Comparative Study of Two Starches as Size Binders
-Parthiv R. Patel ; Prof. A. I. Thakkar
Sizing imparts the strength and increases the abrasion resistance of warp yarn in a weave-shed. Various methods were established for characterizing size films and sized yarns to establish relationships that might be useful in predicting weaving performance. A variety of natural and synthetic binders were applied to cotton yarn in a laboratory sizing apparatus, equipments and other available sources.
There are two critical factors to evaluate size material performance are : Size must from a tough but flexible film to protect the yarn from stress , strain and rubbing actions , and there must be good adhesion between size and yarn. The flexibility i.e. extensibility is correlated with tensile properties of films. The degree of adhesion was evaluated by Lap-joint test in this study. Presence of starch percentage even after desizing was determined on Tegewa scales, important for environmental concerns [4, 7]. Read More...
|
Textile Technology |
India |
173-177 |
31 |
Design of Variable Stiffness and Variable Damping Vibration Absorber
-R.B.Solase ; M.G.Thakare; R.T.Suryawanshi; V.D.Sonavane
The vibration absorbers are frequently used to
control and to minimize excess vibration in structural
systems. To reduce the vibration of the main system or
machine, the frequency of absorber should be equal to the
excitation frequency. This result in subcomponent of total
structure adding large input impedance to the primary
structure, thus 'absorbing' the internal energy transferred to
form primary structure. The aim of this work is to design the
tunable vibration absorber (TDVA) for vibration control of
primary beam system using finite element method through
an Ansys Programming. Its stiffness can be varied to adapt
the changes in excitation frequencies. Traditional means of
vibration control have involved the use of passive and active
methods. This study involves the design of variable stiffness
vibration absorber by incorporating the use of lead screw for
varying the stiffness of secondary system. Finite element
analysis is done for the dynamic vibration absorber. FEA
code is generated using Mat lab software to find numerical
performance of beam structure with dynamic vibration
absorber. The proposed absorber is suitable for vibration
isolation of beam structure with uniform cross-section and
facilitates vibration attenuation at variable excitation
frequencies. Read More...
|
Mechanical Engineering |
India |
178-182 |
32 |
Classification of Malware based on Data Mining Approach
-Ankita K Tiwari
In recent years, the number of malware families/variants has exploded dramatically. Automatic malware classification is becoming an important research area. Using data mining, we identify seven key features within the Microsoft PE file format that can be fed to machine learning algorithms to classify malware. In this paper, resting on the analysis of Windows API execution sequences called by PE files, we develop the Intelligent Malware Detection System (IMDS) using Objective- Oriented Association (OOA) mining based classification. IMDS is an integrated system consisting of three major modules: PE parser, OOA rule generator, and rule based classifier. An OOA_Fast_FP Growth algorithm is adapted to efficiently generate OOA rules for classification. Promising experimental results demonstrate that the accuracy and efficiency of our IMDS system outperform popular anti-virus software such as Norton Antivirus and McAfee Virus Scan, as well as previous data mining based detection systems which employed Naive Bayes, Support Vector Machine (SVM) and Decision Tree techniques. Read More...
|
IT Systems and Network Security |
India |
183-188 |
33 |
Detecting Spambot as an Antispam Technique for Web Internet BBS
-Juned M Laliwala ; Girish Khilari
Spam which is one of the most popular and also the most relevant topic that needs to be understood in the current scenario. Everyone whether it may be a small child or an old person are using emails everyday all around the world. The scenario which we are seeing is that almost no one is aware or in simple sentence they do not know what actually the spam is and what they will do in their systems. Spam in general means unsolicited or unwanted mails. Botnets are considered one of the main source of the spam. Botnet means the group of software's called bots and the function of these bots is to run on several compromised computers autonomously and automatically. The main objective of this paper is to detect such a bot or spambots for the Bulletin Board System (BBS). BBS is a computer that is running software that allows users to leave a message and access information of general interest. Originally BBSes were accessed only over a phone line using a modem, but nowadays some BBSes allowed access via a Telnet, packet switched network, or packet radio connection. The main methodology that we are going to focus is on Behavioural-based Spam Detection (BSD) method. Behavioral-based Spam Detector (BSD) combines several behaviours of the spam bots at different stages including the behaviour of spam preparation before the spam session when the spammers search for an open relay SMTP service to send e-mails through, and the behaviour of spammers while connecting to the mail server. Detecting the abnormal behaviour produced by the spam activities gives a high rate of suspicion on the existence of bots. Read More...
|
Computer Engineering |
India |
189-192 |
34 |
Priority based scheduling for Lease management in cloud computing
-Pragnesh K. Patel ; Prof. H. B. Jethva
Cloud Computing is the next generation Architecture of the most IT enterprise. It made possible, the application to run without the burden of local hardware and software. So, resource allocation is key issue in cloud computing.For better resource allocation cloud service providers use lease managers. Lease managers depend on their default scheduling algorithms and their efficiency of granting and revoking leases is dependent on efficiency of scheduler they have. Haizea, a lease manager written in python, provides three types of leases: Immediate, Best Effort (BE) and Advance Reservation (AR). AR leases are most privileged leases with "AR-preempts everything" policy, since they can preempt & suspend other BE leases when demanded. But BE or Immediate can't preempt other BE or Immediate. BE lease have to wait in queue. This work proposes priority based resource allocation algorithm to solve these problem. Experimental results of the proposed algorithm successfully demonstrate that we can get less waiting time for BE leases than default algorithm. Read More...
|
Computer Engineering |
India |
193-196 |
35 |
Automatic Metadata Tagging of Learning Resource Types
-Tripti Malviya ; Prof. Devshri Roy
Metadata is data about data. IEEE learning object metadata is a standard metadata. For relevant retrieval ofa learning material, it is tagged with metadata and kept in the learning object repository. Generally metadata tagging is done manually. Manual metadata tagging is a time consuming and tedious job. To avoid this drawback, we have worked on automatic metadata tagging. We have presented an automatic way to determine a set of metadata from the IEEE LOM 5.2 i.e. the type of learning resource type.In this work, we have mainly determined the narrative text, experiment type and experiment type learning resources. We have developed different pattern bases for different type of learning resources. Pattern matching algorithms with various rules have been developed for extracting the type of learning resource type. Experimental results are shown to depict the accuracy achieved. Read More...
|
Information Technology |
India |
197-200 |
36 |
Study of Image Inpainting Technique Based on TV Model
-Mr. S. D. Gaddani ; Prof. A. M. Kothari
This paper is related with an image inpainting method by which we can reconstruct a damaged or missing portion of an image. A fast image inpainting algorithm based on TV (Total variational) model is proposed on the basis of analysis of local characteristics, which shows the more information around damaged pixels appears, the faster the information diffuses. The algorithm first stratifies and filters the pixels around damaged region according to priority, and then iteratively inpaint the damaged pixels from outside to inside on the grounds of priority again. By using this algorithm inpainting speed of the algorithm is faster and greater impact. Read More...
|
Electronics and communication Engineering |
India |
201-204 |
37 |
To study of the genetic variations among the Azospirillum lipoferu isolates using randomly amplified polymorphic DNA (RAPD) marker
-Kavit Mehta,B. N. Patel ; Y. B. Dar; N. V. Upadhyay; B. K. Jain; Suresh C. K
Among free-living microorganisms, which can be practically used in agriculture, bacteria from the Azospirillum genus as well as other endophytes are nowadays thought of as the most active component of associative dinitrogen fixation. The investigation was carried out to study the characterization of Azospirillum lipoferu found in the soils of the ten agro-climatic zones which Karnataka, is classified. By using RAPD markers, 75 bands were scored out of which 78.6 % were found to be polymorphic. Statistical analysis of RAPD data enabled the classification of 10 Azospirillum isolates into two major groups. . In this, the cluster analysis based on 75 RAPD bands revealed that the ten A. lipoferu isolates examined clustered at a linkage distance of about 40 units on the dendrogram. There was no correlation between RAPD and geographical origin of isolates. Read More...
|
Biomedical Engineering |
India |
205-210 |
38 |
A Survey of Sequential Rule Mining Techniques
-Shabana Anwar ; Prof. Abhishek Raghuvanshi
In this paper, we present an overview of existing
sequential rule mining algorithms. All these algorithms are
described more or less on their own. Sequential rule mining
is a very popular and computationally expensive task. We
also explain the fundamentals of sequential rule mining. We
describe today's approaches for sequential rule mining.
From the broad variety of efficient algorithms that have
been developed we will compare the most important ones.
We will systematize the algorithms and analyze their
performance based on both their run time performance and
theoretical considerations. Their strengths and weaknesses
are also investigated. It turns out that the behavior of the
algorithms is much more similar as to be expected. Read More...
|
Computer Engineering |
India |
211-212 |
39 |
A Survey of Modern Data Classification Techniques
-Ravijeet Singh Chauhan
In this paper, we present an overview of existing data classification algorithms. All these algorithms are described more or less on their own. Classification is a very popular and computationally expensive task. We also explain the fundamentals of data classification. We describe today's approaches for data classification. From the broad variety of efficient algorithms that have been developed we will compare the most important ones. We will systematize the algorithms and analyze their performance based on both their run time performance and theoretical considerations. Their strengths and weaknesses are also investigated. It turns out that the behavior of the algorithms is much more similar as to be expected. Read More...
|
Computer Engineering |
India |
215-216 |
40 |
A Survey of Modern Character Recognition Techniques
-Jitendra shrivastav ; Ravindra Gupta
In this paper, we present an overview of existing handwritten character recognition techniques. All these algorithms are described more or less on their own. handwritten character recognition is a very popular and computationally expensive task. We also explain the fundamentals of handwritten character recognition. We describe today's approaches for handwritten character recognition. From the broad variety of efficient techniques that have been developed we will compare the most important ones. We will systematize the techniques and analyze their performance based on both their run time performance and theoretical considerations. Their strengths and weaknesses are also investigated. It turns out that the behavior of the algorithms is much more similar as to be expected. Read More...
|
Computer Engineering |
India |
217-220 |
41 |
State of the Art in Cloud Security
-Vandana Birle ; Prof. Abhishek Raghuvanshi
In this paper, we present an overview of existing cloud security algorithms. All these algorithms are described more or less on their own. Cloud security is a very popular task. We also explain the fundamentals of sequential rule mining. We describe today's approaches for cloud security. From the broad variety of efficient algorithms that have been developed we will compare the most important ones. We will systematize the algorithms and analyze their performance based on both their run time performance and theoretical considerations. Their strengths and weaknesses are also investigated. It turns out that the behavior of the algorithms is much more similar as to be expected. Read More...
|
Computer Engineering |
India |
221-223 |
42 |
A Secure & Scalable Access Method in Cloud Computing
-Vandana Birle ; Prof. Abhishek Raghuvanshi
Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this article, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users' data in the cloud, we propose an effective and flexible cryptography based scheme. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against malicious data modification attack, The proposed scheme not only achieves scalability due to its hierarchical structure, but also inherits flexibility. We implement our scheme and show that it is both efficient and flexible in dealing with access control for outsourced data in cloud computing with comprehensive experiments. Read More...
|
Computer Engineering |
India |
224-226 |
43 |
An Analyzing of different Techniques and Tools to Recover Data from Volatile Memory
-Mr. Arpit Patel ; Prof. Nilay Mistry
Computer forensics has recently gained significant popularity with many local law enforcement agencies. It is currently employed in fraud, theft, drug enforcement and almost every other enforcement activity. There are many relatively new tools available that have been developed in order to recover and dissect the information that can be gleaned from data storage area like hard-disk, pen drive, etc. it's all like a volatile memory, but because this is a relatively new and fast-growing field many forensic analysts do not know or take advantage of these assets. Memory like Volatile memory may contain many pieces of information relevant to a forensic investigation, such as passwords, cryptographic keys, and other data. Having the knowledge which type of method use and tools needed to recover that data is essential, and this capability is becoming increasingly more relevant as hard drive encryption and other security mechanisms make traditional hard disk forensics more challenging. This research will cover the theory behind volatile memory analysis, including why it is important, what kinds of data can be recovered, and the potential pitfalls of this type of analysis, as well as techniques for recovering and analyzing volatile data and currently available toolkits that have been developed for this purpose. Read More...
|
Computer Engineering |
India |
227-233 |
44 |
Electricity Generation using Thermoelectric System from Waste Heat of Flue Gases
-Hitesh Kumar G. Suthar ; Prof. B. R. Sudani; Prof. N. M. Patel
Energy related cost have become a significant fraction of cost in any industry. The three top operating expenses are often to be found in any industry like energy (both electrical and thermal), labour and materials. If we were found the manageability of the above equipment's the energy emerges a top ranker. So energy is best field in any industry for the reduction of cost and increasing the saving opportunity. Thermoelectric methods imposed on the application of the thermoelectric generators and the possibility application of Thermoelectrity can contribute as a "Green Technology" in particular in the industry for the recovery of waste heat. Finally the main attention is too focused on selecting the thermoelectric system and representing the analytical and theoretical calculation to represent the Thermoelectric System. Read More...
|
Mechanical Engineering |
India |
234-237 |
45 |
Low Power Design flow using Power Format
-Jinal Patel ; Ekta Chotai; Naincy Desai; Hemang Patel
The demand for portable electronic devices that offers increase in functions, performance at lower costs and smaller sizes increased rapidly. Designing complex SOCs is a challenge, especially at 90 nanometers Technology, where new problems crop up - power efficiency is being the biggest of problems. For different modes we cannot design different operating circuits, better to have technique that will have minimum circuit changes and in all modes it will save power which is wasted. This paper provides some guidelines on how Low Power design using UPF approach can be introduced for a design. Read More...
|
Electronics and communication Engineering |
India |
238-241 |
46 |
Mitigating SPIT (VOIP Spam) as an Antispam Technique
-Darshana Prajapati ; Girish Khilari
Nowadays we are getting various calls disturbing our day-to-day activities. The current example may include the bank calls that we are getting for taking various loans likes students purpose, business purpose and other purpose and whatsoever reason as we are not concerned with it. So there should be some unique method or the combination of the various Antispam techniques and this combination can be used to mitigate or reduce the spam calls or we can say Spam over Internet Telephony (SPIT). There are usually many Antispam techniques available that can be used but in this paper the main techniques that we are going to work are as follows: (1) Grey listing and (2) Handshaking/Challenge/Turing test. The combination that we are doing is with the grey list method with the Handshaking/Challenge/Turing tests. Once the user passes the Turing test he will be passed through the grey listing method and finally a decision will be made whether a call is spam or not. The main objective of this paper will be to analyse the techniques and find out the best possible combination of the techniques to Mitigate SPIT. Read More...
|
Computer Engineering |
India |
242-246 |
47 |
Selection of sensor for Cryogenic Temperature Measurement
-Ms.Dimple P. Khant ; Prof. S. T. Shah
The continuous monitoring of liquid temperature in cryogenic application is essential requirement from control and safety point of view. . Several factors must be considered when selecting the type of sensor to be used in a specific application Any temperature dependent parameter can be used as a sensor if it fits the requirements of the given application. These parameters include resistance, forward voltage (diodes), thermal EMFs, capacitance, expansion/contraction of various materials, magnetic properties, noise properties, nuclear orientation properties, etc. The two most commonly used parameters in cryogenic are voltage (diodes) and resistance. There are several reasons for choosing diode thermometry or resistance thermometry. Therefore this paper present the demand of precision measurement of temperature is addressed using semiconductor diode type sensor and resistor type sensor by sensor characteristic. Read More...
|
Electronics and communication Engineering |
India |
247-249 |
48 |
Multiband Circularly Polarized Microstrip Patch Antenna
-Krishan Gopal Sharma
In this paper, Ultra wideband circular Microstrip patch antenna is proposed. Over years, great interest was focused on microstrip antennas for their small volumes, low profiles, good integration, low costs and good performance. With the continuous growth of wireless communication service and the constant miniaturization of communication equipment, there are higher and higher demands for the volume of antennas, integration and working band. This paper presents A circular polarized (CP) Circular microstrip antenna with triple band for wireless communications system application which are suitable for the 2.6-GHz, 3.7-GHz and the 5-GHz triple-band operations. These systems may include various combinations of Bluetooth, WiMAX (Worldwide Interoperability for Microwave Access) and wireless local-area network (WLAN). A circular microstrip patch antenna is designed to operate at 2.6(GHz) with circular polarization, a U slot is inserted thereafter in the original patch to generate the second resonant at 5.4 (GHz). Another C-slot is inserted thereafter to generate the 3.7 (GHz) third band. The C slot insertion effect on the original patch is examined, first arc length effect on the return loss and axial ration is examined in order to get the optimum length, and then the arc orientation effect also is examined to find out the best orientation to place the arc. This design has several advantages as the total antenna volume can be reused, and therefore the overall antenna will be compact. The design is verified through both numerical simulations and measurement ofa fabricated prototype. The results confirm good performance of the singleand multiband antenna design. Read More...
|
Electronics and communication Engineering |
India |
250-253 |
49 |
Analysis of Searching Algorithms in Web Crawling
-Pushkar Jha ; Riddhi Patel; Aditya K. Sinha
In today's online scenario finding the appropriate content in minimum time is most important. The number of web pages and users is increasing into millions and trillions around the world. As the Internet expanded, the concern of storing such expanded data or information also came into existence. This leads to the maintaining of large databases critical for the effective and relevant information retrieval. Database has to be analyzed on a continuous basis as it contains dynamic information and database needs to be updated periodically over the internet. To make searching easier for users, web search engines came into existence. Even in forensic terms, the forensic data including social network such as twitter is over several Petabytes. As the evidence is large scale data, an investigator takes long time to search critical clue which is related to a crime. So, high speed analysis from large scale forensic data is necessary. So this paper basically focuses on the faster searching methods for the effective carving of data in limited time. Read More...
|
Computer Engineering |
India |
254-257 |
50 |
Analysis of Selfish behavior in energy consumption model based Multihop cellular networks
-Prof. K. Mathivanan ; Devi Ramalingam; Prof. R. Anbarasu; Ramya. S.
Many nodes would not transmit during data transmission and they are considered to be in cooperative. To make them cooperative a fair charging policy is used by charging the since and destination nodes so that both of them can benefit from the communication and it can secure the payment. Charging since and destination nodes almost computationally free, and significantly reduce the number of generated and submitted checks. In this way, each intermediate node earns some credits and the destination node pays the total packet relaying cost. To implement this charging policy efficiently, hashing operations are used in the ACK packets to reduce the number of public-key-cryptography operations. Moreover, reducing the overhead of the payment checks is essential for the efficient implementation of the incentive mechanism due to the large number of payment transactions. Read More...
|
Computer Science & Engineering |
India |
258-264 |