No. |
Title and Author |
Area |
Country |
Page |
1 |
Parametric Optimization of Process Parameter for Roller Burnishing Process
-Prof. Kiran A. Patel ; Nikunj K. Patel; Disha B. Patel
Burnishing is a very simple and effective method for improvement in surface finish and can be carried out using lathe machines. In this project work, a roller burnishing tool is used to perform roller burnishing process on Al alloy material under different parameters. Moreover, the burnished surface has a high wear resistance and better fatigue life. It has been used to impart certain physical and mechanical properties, such as corrosion, friction, wear and fatigue resistance. One of the most effective representatives is the roller burnishing. This can simply achieved by pressing a hard and highly polished ball or roller against the surface of metallic work pieces. The impact of burnishing speeds, burnishing force and number of passes of the tool on the surface qualities and tribological properties were investigated to determinate the influence of each process parameter, several tests were carried out. Once the optimum parameters were established, a complete analysis of the surface characteristics was performed. Roller burnishing is an economical process, where skilled operators are not required. Applying Taguchi's design of experiments and analysis of variance (ANOVA) on the specimens, the aim is to find optimized values for enhancing the surface quality and hardness economically. This process can be effectively used in many fields such as Aerospace Industries, Automobiles Manufacturing sector, Production of Machine tools, Hydraulic cylinders, etc. Read More...
|
Mechanical Engineering |
India |
806-811 |
2 |
A Study of Various Projected Data Based Pattern Mining Algorithms
-Prof. Jigar Patel ; Ashish Prajapati
The time required for generating frequent patterns plays an important role. Some algorithms are designed, considering only the time factor. Our study includes depth analysis of algorithms and discusses some problems of generating frequent pattern from the various algorithms. We have explored the unifying feature among the internal working of various mining algorithms. The work yields a detailed analysis of the algorithms to elucidate the performance with standard dataset like Mushroom etc. The comparative study of algorithms includes aspects like different support values, size of transactions. Read More...
|
Computer Science & Enginnering |
India |
812-815 |
3 |
Fault Diagnostics of Rolling Bearing based on Improve Time and Frequency Domain Features using Artificial Neural Networks
-Dr. Jigar Patel ; Amit Patel; Vaishali Patel
The neural network based approaches a feed forward neural network trained with Back Propagation technique was used for automatic diagnosis of defects in bearings. Vibration time domain signals were collected from a normal bearing and defective bearings under various speed conditions. The signals were processed to obtain various statistical parameters, which are good indicators of bearing condition, then best features are selected from graphical method and these inputs were used to train the neural network and the output represented the bearing states. The trained neural networks were used for the recognition of bearing states. The results showed that the trained neural networks were able to distinguish a normal bearing from defective bearings with 83.33 % reliability. Moreover, the network was able to classify the bearings into different states with success rates better than those achieved with the best among the state-of-the-art techniques. Read More...
|
Computer Science & Enginnering |
India |
816-823 |
4 |
Analysis Increasing Network Signal of Dongle
-Mr. Darshan Chauhan ; Mr. Ankur P. Desai
This paper gives now a day's everywhere there is the need of internet. Everyone wants to access internet on mobile phones, system and laptops. Internet can be accessed on a system either wired or wireless. Internet dongle is used to access internet on systems wirelessly. The aim of this paper is increase network signal strength of dongle with increasing speed of internet Read More...
|
Computer Science & Enginnering |
India |
824-826 |
5 |
Novel Database-Centric Framework for Incremental Information Extraction
-Mr. P. Sasikumar ; K. Keerthana
Information extraction (IE) has been an active research area that seeks techniques to uncover information from a large collection of text. IE is the task of automatically extracting structured information from unstructured and/or semi structured machine-readable documents. In most of the cases this activity concerns processing human language texts by means of natural language processing (NLP). Recent activities in document processing like automatic annotation and content extraction could be seen as information extraction. Many applications call for methods to enable automatic extraction of structured information from unstructured natural language text. Due to the inherent challenges of natural language processing, most of the existing methods for information extraction from text tend to be domain specific. In this project a new paradigm for information extraction. In this extraction framework, intermediate output of each text processing component is stored so that only the improved component has to be deployed to the entire corpus. Extraction is then performed on both the previously processed data from the unchanged components as well as the updated data generated by the improved component. Performing such kind of incremental extraction can result in a tremendous reduction of processing time and there is a mechanism to generate extraction queries from both labeled and unlabeled data. Query generation is critical so that casual users can specify their information needs without learning the query language. Read More...
|
Computer Science & Enginnering |
India |
827-830 |
6 |
Microcontroller Based Sign Language Glove
-Solanki Krunal M
The people who are speech impaired and paralyzed patients those have difficulty in communication. So that patients cannot speak and hear properly and they have problem in communication to other people who don't understand sign languages. So at that time electronic hand glove is used for communication and for that one hand is used for making position of different fingers using flex sensors. The objective of my project is to develop a electronic device for the people who suffer from speech impairment and paralyzed patients. In this, Flex sensor glove is used and Indian sign language's alphabets make using different position of fingers and thumb and their output are shown in the LCD. Read More...
|
Bio-medical Engineering |
India |
831-833 |
7 |
Quality of Service for Video Streaming using EDCA in MANET
-Krupa U. Thakkar
Mobile Ad-hoc network(MANET) is a collection of wireless terminals that are able to dynamically form a temporary network. To establish such a network no fixed infrastructure is required. Here, it is the responsibility of network nodes to forward each other's packets and thus these nodes also act as routers. In such a network resources are limited and also topology changes dynamically. So providing Quality of service(QoS) is also necessary. QoS is more important for real time applications for example Video Streaming. IEEE 802.11e network standard supports QoS through EDCA technique. This technique does not fulfill the requirements of QoS. So, in this project modified EDCA technique is proposed to enhance QoS for Video Streaming application. This technique is implemented in NS2 and compared with traditional EDCA. Read More...
|
Computer Enginnering |
India |
834-836 |
8 |
A Framework for Performance Analysis of Computing Clouds
-Mintu M. Ladani ; Vinit kumar Gupta
Cloud Computing provides data storage capacity and use of Cloud Computing have increased scalability, availability, security and simplicity. As more use of cloud computing environments increases, it is more difficult to deal with the performance of this environments. We have presented Some virtualization and network related communication issues and finally we have designed and implemented modified load balancing algorithm for performance increase. In market use of cloud many issues occurred like as security, privacy, reliability, legal issues, open standard, compliance. so, we have stated to solve these issues such algorithm to assess increase performance of computing clouds. Secondly, i.e. 'Modified Weighted Active Monitoring Load Balancing Algorithm' on cloud, for the balancer on Cloud Controller to effectively balance load requests between the available Node Controller, in order to achieve better performance parameters such as load on server and current performance on the server. By Existing Algorithm like in RRA (Round Robin Algorithm) load balance sequentially, we have designed this proposed algorithm on cloud and how to balance load randomly and display by existing algorithm and proposed algorithm comparison. Read More...
|
Computer Enginnering |
India |
837-840 |
9 |
Design and Simulation of Radix-8 Booth Encoder Multiplier for Signed and Unsigned Numbers
-Minu Thomas
This paper presents the design and simulation of signed-unsigned Radix-8 Booth Encoding multiplier. The Radix-8 Booth Encoder circuit generates n/3 the partial products in parallel. By extending sign bit of the operands and generating an additional partial product the signed of unsigned Radix-8 BE multiplier is obtained. The Carry Save Adder (CSA) tree and the final Carry Look ahead (CLA) adder used to speed up the multiplier operation. Since signed and unsigned multiplication operation is performed by the same multiplier unit the required hardware and the chip area reduces and this in turn reduces power dissipation and cost of a system. The simulation is done through Verilog on xiling13.3 platform which provide diversity in calculating the various parameters. Read More...
|
Electronics & Communication |
India |
841-844 |
10 |
Packed Bed Reactor for Catalytic Cracking of Plasma Pyrolyzed Gas
-Dr. Nema S.K ; Murugan P.V; Rana P.H; Nayak M. G.
Packed bed reactors play vital role in chemical industries for obtaining valuable product, like steam reforming of natural gas, ammonia synthesis, sulphuric acid production, methanol synthesis, methanol oxidation, butadiene production, styrene production. It is not only used for production but also used in separation process like adsorption, distillation and stripping section. Packed bed reactors are work horse of the chemical and petroleum industries. Its low cost, and simplicity makes it first choice to any chemical processes. In our experimental work vacuum residue is used as a feed which is pyrolyzed in the primary chamber with the help of plasma into hydrogen and hydrocarbon gases which is feed stream to the Ni catalyst containing packed bed reactor called catalytic cracker. Ni loading in the catalyst about 70 % is used to crack or decompose lower molecular hydrocarbon in to hydrogen to maximize the energy content per mass flow of gas steam and also to minimize the carbon dioxide equivalent gases at outlet of the reactor. Since cracking is surface phenomena so the catalyst play important role in designing of reactor shape. Parallel Catalytic packed bed with regeneration and deactivation can be used for commercial production of clean fuel. Read More...
|
Chemical Engineering |
India |
845-849 |
11 |
Quality Evaluation Technique For Phyllanthus Emblica(Gooseberry) Using Computervision With User Friendly GUI
-Rohini K. Patel
This paper proposes quality assessment method to classify a phyllanthus emblica (gooseberry) using computer vision by surface and geometric features. India is one of the most important gooseberry producers in North Asia, than Germany, Poland, U.K, Russia etc., but fruit sorting in some area is still done by hand which is tedious and inaccurate. Thus, the need exists for improvement of efficiency and accuracy of this fruit quality assessment that can meet the demands of international markets. Low-cost and non-destructive technologies capable of sorting gooseberry according to their properties would help to promote the gooseberry export industries. This paper propose the method of colorization and extracting value parameters, by this parameters the detection of browning or affected part and identification of the uniform shape and size. This differentiates the quality of gooseberries processed as well as fresh. For classification the decision tree is used. Read More...
|
Computer Enginnering |
India |
850-856 |
12 |
Detection Of Saccadic Eye Movements to Switch the Devices For Disables
-Prof. K. C. Dave ; Sampan N. Shah
The paper presents the alternate means of communication to the person with severely disable. Here, the work aimed to detection of fast eye movement and switching the devices for disable person for satisfaction of basic their needs with the help of their care takers. Read More...
|
Instrumentation & Control Engineering |
India |
857-858 |
13 |
Performance, Optimization and CFD Analysis of Submersible Pump Impeller
-Ankurkumar. H. Vyas
To improve the efficiency of submersible flow pump, Computational Fluid Dynamics (CFD) analysis is one of the advanced tools used in the pump industry. A detailed CFD analysis was done to predict the flow pattern inside the impeller which is an active pump component. From the results of CFD analysis, the velocity and pressure in the outlet of the impeller is predicted. CFD analyses are done using ANSYS CFX software. In this research paper we will modified the impeller design by choosing some parameter. Read More...
|
Mechanical Engineering |
India |
859-861 |
14 |
Performance Optimization of Clustering On GPU
-Prof. Sumitra Menaria ; Vijal D. Patel
In today's digital world, Data sets are increasing exponentially. Statistical analysis using clustering in various scientific and engineering applications become very challenging issue for such large data set. Clustering on huge data set and its performance are two major factors demand for optimization. Parallelization is well-known approach to optimize performance. It has been observed from recent research work that GPU based parallelization help to achieve high degree of performance. Hence, this thesis focuses on optimizing hierarchical clustering algorithms using parallelization. It covers implementation of optimized algorithm on various parallel environments using Open MP on multi-core architecture and using CUDA on may-core architecture. Read More...
|
Computer Science & Enginnering |
India |
862-865 |
15 |
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Networks for Downlink
-Hina Patel ; Gaganbhai R. Dabhi
In the development, standardization and implementation of LTE Networks based on Orthogonal Freq. Division Multiple Access (OFDMA), simulations are necessary to test as well as optimize algorithms and procedures before real time establishment. This can be done by both Physical Layer (Link-Level) and Network (System-Level) context. This paper proposes Network Simulator 3 (NS-3) which is capable of evaluating the performance of the Downlink Shared Channel of LTE networks and comparing it with available MatLab based LTE System Level Simulator performance. Read More...
|
Electronics & Communication |
India |
866-869 |
16 |
A New Method to Mine Frequent Item Sets using Frequent Itemset Tree
-Prof. Jigar N. Patel ; Mr. Hardik S. Patel
The analysis of observational data sets to find unsuspected relationships and to summarize the data in novel ways that are both understandable and useful to the data owner. To find the association rules among the transactional dataset is the main problem of frequent itemset mining. Many techniques have been developed to increase the efficiency of mining frequent itemsets. In this paper, we denote a new method for generating frequent itemsets using frequent itemset tree (FI-tree). Also we describe the example of new method and its result analysis using wine dataset. Our method execution time is better compare to SaM method. Read More...
|
Computer Science & Enginnering |
India |
870-872 |
17 |
Simulation Of Interline Power Flow Controller in Power Transmission System
-Mr. A. M.Upadhyay ; Mr. Jaimin Patel
The interline power flow controller (IPFC) is one of the latest generation flexible AC transmission systems (FACTS) controller used to control power flows of multiple transmission lines. The IPFC is the multifunction device, such as power flow control, voltage control, oscillation damping. This paper presents an overview and study and mathematical model of Interline Power Flow Control. The simulations of a simple power system of 500kV/230kV in MATLAB and simulation results are carried out on it. The results without and with IPFC are compared in terms of voltages, active and reactive power flows to demonstrate the performance of the IPFC model. Read More...
|
Electrical Engineering |
India |
873-876 |
18 |
GreenSQL Security
-Ass. Prof. Tarun K. Sureja ; Jaydeep K. Dabhi
In today's modern world, security is a necessary fact of life. GreenSQL Security helps small to large organizations protect their sensitive information against internal and external threats. The rule-based engine offers database firewall, intrusion detection and prevention (IDS/IPS). GreenSQL Security Engine applies exception detection to prevent hacker attacks, end-user intrusion and unauthorized access by privileged insiders. The system provides a web based intuitive and flexible policy framework that enables users to create and edit their security rules quickly and easily. GreenSQL interfaces between your database and any source requiring a connection to it. This approach shields your database application and database operating system from direct, remote access.
GreenSQL Database Security
1) Stops SQL Injection attacks on your web application
2) Blocks unauthorized database access and alerts you in real time about unwanted access
3) Separates your application database access privileges from administrator access
4) Gives you a complete event log for investigating database traffic and access
5) Ensures you achieve successful implementation with 24/7 support Read More...
|
Computer Enginnering |
India |
877-879 |
19 |
A Collaborative Intrusion Detection System for Cloud Computing
-Mr. Krunal Kantharia ; Ms. Riddhi Mistry; Mr. Sandip Chauhan
Cloud computing is a computing paradigm that shifts drastically from traditional computing architecture. Although this new computing paradigm brings many advantages like utility computing model but the design in not flawless and hence suffers from not only many known computer vulnerabilities but also introduces unique information confidentiality, integrity and availability risks as well due its inherent design paradigm. To provide secure and reliable services in cloud computing environment is an important issue. To counter a variety of attacks, especially large-scale coordinated attacks, a framework of Collaborative Intrusion Detection System (IDS) is proposed. The proposed system could reduce the impact of these kinds of attacks through providing timely notifications about new intrusions to Cloud users' systems. To provide such ability, IDSs in the cloud computing regions both correlate alerts from multiple elementary detectors and exchange knowledge of interconnected Clouds with each other. Read More...
|
Computer Enginnering |
India |
880-883 |
20 |
Analysis of VoIP Forensics with Digital Evidence Procedure
-Aditya K. Sinha ; Riddhi Patel
The invention of Voice over Internet Protocol (VoIP) in communication technology created significant attractive services for its users, it also brings new security threats. Criminals exploit these security threats to perform illegal activities such as VoIP malicious attacks, this will require digital forensic investigators to detect and provide digital evidence. Finding digital evidence in VoIP malicious attacks is the most difficult task, due to its associated features with converged network. In this paper, a Model of investigating VoIP malicious attacks is proposed for forensic analysis. VoIP spoofing is being a common and most important threat to the VoIP users. It is technically possible for an attacker to masquerade as another VoIP caller (VoIP spoofing). A design of a SIP which will try to capture all of the data on a VoIP network and process it for forensic analysis with also detection of the spoofing or the fake caller address. Read More...
|
Computer Enginnering |
India |
884-888 |
21 |
Fingerprinting Based Indoor Positioning System using RSSI Bluetooth
-Disha Adalja ; Girish Khilari
Positioning is basis for providing location information to mobile users, however, with the growth of wireless and mobile communications technologies. Mobile phones are equipped with several radio frequency technologies for driving the positioning information like GSM, Wi-Fi or Bluetooth etc. In this way, the objective of this thesis was to implement an indoor positioning system relying on Bluetooth Received Signal Strength (RSS) technology and it integrates into the Global Positioning Module (GPM) to provide precise information inside the building. In this project, we propose indoor positioning system based on RSS fingerprint and footprint architecture that smart phone users can get their position through the assistance collections of Bluetooth signals, confining RSSs by directions, and filtering burst noises that can overcome the server signal fluctuation problem inside the building. Meanwhile, this scheme can raise more accuracy in finding the position inside the building. Read More...
|
Computer Enginnering |
India |
889-894 |
22 |
Improved Video Transmission over MANETs using MDSR with MDC
-Kavita Tandel ; Hiteishi Diwanji; Rachana Shelat
MANET does not have any fixed infrastructure, so the mobile nodes are free to move within a network which results in dynamic change of network topology. The Real-time video transport has rigid bandwidth, delay, and a loss requirement to support this application in Mobile Ad-Hoc Networks is a challenge. MANET consists of mobile nodes that cause frequent link failures. This link failure causes two main problems. First, when a route break occurs, all packets that have already transmitted on that route are dropped which degrades the video quality and it decreases the average packet delivery ratio (PDR). Second, the transmission of data traffic is halted for the time till a new route is discovered and it increasing the average end-to-end delay. For that we have proposed Node-Disjoint Multipath Routing Based on DSR Protocol with Multiple Description Coding Technique (MDC). Node-Disjoint Path means there is no common node between two paths and MDC encode a media source into two or more sub-bit streams. The sub-streams, also called descriptions. The experiment has been done using NS2 simulator with Evalvid for evaluating the video quality. Our proposed scheme will improve Packet Delivery Ratio, Throughput and Decreased Average End-to-End Delay. Read More...
|
Computer Enginnering |
India |
895-901 |
23 |
Performance and emission analysis of four stroke twin spark single cylinder SI engine fuelled with gasoline and CNG
-Prof. R. J. Jani ; Imran G. Qureshi
An internal combustion (IC) engine has a predominant role in a low power generation and a virtual monopoly in mobile applications today. One of the best methods to improve the engine performance and reduce the exhaust emission in a SI engine is by using introduction of twin spark into the combustion chamber. The main purpose of this study is to investigate the effects of twin spark using CNG fuel in SI engine. The performance and emission analysis of an engine are investigated by experiment with CNG kit and gas analyzer. From this study the fuel consumption is reduce in twin spark arrangement for the same power output as compare to single spark using both of the fuel gasoline as well as CNG. Engine emission is considerably reduced using twin spark plug. Read More...
|
Mechanical Engineering |
India |
902-906 |
24 |
Simulation of Elbow Movement with MSMS and MATLAB
-K. B. Bhoyania ; Ms. R. A. Khoja; J. B. Vyas
This paper describes Biomechanical model of arm which is totally computational approach for modeling the complex mechanical properties of muscles of Hand. This can be embodied as a simulation model for use with Matlab and Simulink. The model allows the creation of realistic Muscle structure and movement of arm. Here we have considered elbow movement and the muscle which are activated during the elbow movement. Flexion and extension of elbow and associated muscles are studied. This paper also gives relation between force and given stimulation to particular muscle. The model presented here can be employed to design FES controller for subject who suffered from quadriplegia due to spinal cord injury (SCI) or multiple sclerosis (MS) Read More...
|
Biomedical Engineering |
India |
907-910 |
25 |
Design and Analysis of Modified Photonic Crystal Fiber with Low Confinement Loss
-Gayathri B ; Syam Prasad N. Pearson; Divya K. N.
Fluorine doped silica tubes are used instead of air holes to reduce the problem associated with deformities during manufacturing of Photonic Crystal Fiber (PCF). But when fluorine doped silica tubes are used the confinement loss of fiber will be greater than that of air holed one. In this paper, we propose a new structure for this type of modified PCF which gives very low confinement loss. Also, we analyze some of the optical properties of the proposed structure such as effective refractive index, effective area and compared it with the normal hexagonal PCF. Read More...
|
Electronics and Communication |
India |
911-914 |
26 |
Introduction to Wavelet Transform and Two Stage Image DE noising Using Principal Component Analysis with Local Pixel Grouping (LPGPCA) method
-Mr. Ankur N. Shah
In past two decades there are various techniques are developed to support variety of image processing applications. The applications of image processing include medical, satellite, space, transmission and storage, radar and sonar etc. But noise in image effect all applications. So it is necessary to remove noise from image. There are various methods and techniques are there to remove noise from images. Wavelet transform (WT) has been proved to be effective in noise removal but this have some problems that is overcome by PCA method. This paper presents an efficient image de-noising scheme by using principal component analysis (PCA) with local pixel grouping (LPG). This method provides better preservation of image local structures. In this method a pixel and its nearest neighbors are modeled as a vector variable whose training samples are selected from the local window by using block matching based LPG. In image de-noising, a compromise has to be found between noise reduction and preserving significant image details. PCA is a statistical technique for simplifying a dataset by reducing datasets to lower dimensions. It is a standard technique commonly used for data reduction in statistical pattern recognition and signal processing. This paper proposes a de-noising technique by using a new statistical approach, principal component analysis with local pixel grouping (LPG). This procedure is iterated second time to further improve the de-noising performance, and the noise level is adaptively adjusted in the second stage. Read More...
|
Computer Enginnering |
India |
915-918 |
27 |
Welding of Duplex Stainless Steel
-Jatandeep Singh ; Nishant Goswami
Duplex stainless steels are unrivalled in a large number of applications in the temperature range -50 ° C to 250 ° C where a combination of corrosion resistance and mechanical strength is required. The key to the unique properties is the duplex structure and the synergistic interaction between the two phases. Duplex stainless steels (DSS) have somewhat different welding requirements than those of the more familiar austenitic stainless steels. They also provide high immunity to stress corrosion cracking (SCC). The purpose of this paper is to give an overview of welding of DSS. The discussion includes the importance of balancing ferrite to austenite, reducing formation of deleterious intermetallic and non-metallic phases, effect of hydrogen on duplex stainless steel and measuring ferrite contents. Read More...
|
Manufacturing Processes and Automation Engineering |
India |
919-925 |
28 |
Assessing the sustainability of forest plantations in Mezam Division of the North West Region, Cameroon
-Shidiki A. A. ; Marie A. L.
Objectives: The study examined the sustainability of plantation forestry in Mezam Division of the North West Region.
Methodology and results: Respondents drawn from a cross-section of plantation owners in five (5) sub-divisions (i.e. Tubah, Bali, Bafut, Santa and Bemenda central) of Mezam Division. Fifty- (50) plantation owners selected through a system of random sampling. Data collected through the administered questionnaires were on social, economic, ecological, profitability, management strategies and constraints to plantation forestry in the study area. Structure questionnaires were instrument used for data collection. Analytical tools used were descriptive statistic including tables, means, and percentages to describe the socio-economic characteristic of respondents, while chi-square and Benefit Cost Ratio models were used to determined profitability and opinion of plantation owners respectively. The results reveal that majority of plantation owners were men 84.5% and widows make up 15.5% of the respondents. They all owned families. Benefit Cost Ratio B/C calculated was 0.7 (B/C . 1) this results implies that plantation business is not profitable compared to an alternative land use system, although they was a marginal profit of eight thousand five hundred francs 8500f ($ 17 USD) for the sale of one acre of plantation. Chi-square test of equal probability showed that they were no significant difference at 0.05% probability level for private plantation owners. The main constraints confronting plantation forestry business in the study area are access to finance, followed by wildfires, unfavorable government policies and finally bad road networks leading to their plantation. The Benefit Cost Ratio B/C calculated (B/C . 1) mean plantation business is not profitable compared to an alternative land use system, although they were marginal benefits. The study therefore recommend that private plantation be encourage to ensure less dependence on natural forest and to also mitigation climate change and through this jobs created and livelihood improved to the rural communities Read More...
|
Forestry |
India |
926-931 |
29 |
Modeling and Simulation of Base Plate of Friction Stir Welding-Advanced Welding Technique
-Prof. Hitesh G. Suthar ; Mr. Ajay S. Gupta
Friction stir processing is an emerging technique based on the principles of friction stir welding (FSW). It is a solid-state joining method that is energy efficient, environmentally friendly, and versatile. It is considered by many to be the most significant development in metal joining in a decade. The basic concept of friction stir processing is remarkably simple. A rotating tool with pin and shoulder is inserted in the material to be joined, and traversed along the line of interest. The heating is localized, and is generated by friction between the tool and the work piece, with additional adiabatic heating from metal deformation. A processed zone is produced by movement of material from the front of the pin to the back of the pin. Read More...
|
Mechanical Engineering |
India |
932-936 |
30 |
Solar Based Autonomous Ship for Cleaning Garbage & Surveillance
-Prof. P. P. Jagtap ; Arvind Vasudevan
Water pollution with floating garbage is getting more and more serious in many countries. The design of an autonomous ship for cleaning the garbage floating on a lake has been proposed. The ship is powered by a solar battery. Circuit for protection of the excessive charge and discharge of the battery system has been used. Ultrasonic sensors have been equipped to detect the distance between the ship and the bank of the lake. The position and the orientation of the ship can be determined by measuring the distance between the ship and the bank at two successive times, which is used for controlling the running direction of the ship to make the ship autonomously run in an annular zone of a short distance away from the bank. The ship has also been equipped with a system to detect the occurrence of obstacles and to bypass the detected obstacles. Two screw propellers have been installed at the two sides of the ship to drive the ship, which makes the ship change its direction nimbly. A photo-resistance has been used to determine if it is in daytime or nighttime. The ship circulates the lake only one time at nighttime to save power energy. Wireless remote control is also available, which makes the ship user friendly. Experiments have demonstrated the applicability of the design. Read More...
|
Electrical Engineering |
India |
937-938 |
31 |
Development of Adaptive Neuro Fuzzy Inference System for Estimation of Evapotranspiration
-Dhruv Patel ; Dr. T. M. V. Suryanarayana
The accuracy of an adaptive neurofuzzy computing technique in estimation of reference evapotranspiration (ETo) is investigated in this paper. The model is based on Adaptive Neurofuzzy Inference System (ANFIS) and uses commonly available weather information such as the daily climatic data, Maximum and Minimum Air Temperature, Relative Humidity, Wind Speed and Sunshine hours from station, Karjan (Latitude - 22°03'10.95"N, Longitude - 73°07'24.65"E), in Vadodara (Gujarat), are used as inputs to the neurofuzzy model to estimate ETo obtained using the FAO-56 Penman.Monteith equation. The daily meteorological data of two years from 2009 and 2010 at Karjan Takuka, Vadodara, are used to train the model, and the data in 2011 is used to predict the ETo in that year and to validate the model. The ETo in training period (Train- ETo) and the predicted results (Test-ETo) are compared with the ETo computed by Penman-Monteith method (PM-ETo) using "gDailyET" Software. The results indicate that the PM-ETo values are closely and linearly correlated with Train- ETo and Test- ETo with Root Mean Squared Error (RMSE) and showed the higher significances of the Train- ETo and Test- ETo. The results indict the feasibility of using the convenient model to resolve the problems of agriculture irrigation with intelligent algorithm, and more accurate weather forecast, appropriate membership function and suitable fuzzy rules. Read More...
|
Civil Engineering |
India |
939-944 |
32 |
Analysis of Highly Birefringent Photonic Crystal Fiber Employing Different Geometries and Determination of Optical Parameters
-Gayathri B ; Divya K N; Syam Prasad N Pearson
In this paper we are proposed three different types of photonic crystal fibers and compared them for higher birefringence by using finite element method. Using elliptical holes instead of circular air holes we are getting high birefringence. We also obtained low dispersion for the same structure consist of a defect in the center design flexibility and high index contrast give a better birefringence in the range of 10-3 to 10-2.Also the characteristics of PCF are plotted for a range of wavelength Read More...
|
Electronics and Communication |
India |
945-948 |
33 |
A Survey of Key Pre Distribution Schemes in Wireless Sensor Networks
-Jyothish K John ; Leenu Rebecca Mathew
Wireless Sensor Network (WSN) is an area of research that has various applications both for mass public and military. A wireless sensor network is composed of many sensors which can be used to monitor physical or environmental conditions, such as temperature, sound, pressure. After collecting these data they should pass this data through the network to a main location. A Sensor Node in Wireless Sensor Network lacks resources such as processing capability, memory capacity, battery power, and communication capability. Because of the limited resources on sensor nodes, the use of conventional key management techniques in wireless sensor networks is limited. Key establishment is the most important cryptographic primitive in all kinds of applications where security is a concern. Authentication and pair wise key establishment are critical in sensor networks. In this paper, we provide a survey of key management schemes in wireless sensor networks. Read More...
|
Computer Science & Enginnering |
India |
949-952 |
34 |
ON Fuzzy Linear Programming Technique Application
-Dr. R. S. Chanda
A solution approach based on fuzzy linear programming is proposed and applied to optimal machine scheduling problem. In this solution approach errors in the demand of various products during the next production period are considered to be fuzzy in nature. In conventional linear programming approach it is assumed that there is no error in the expected demand of various products. A fuzzy linear programming approach is proposed to obtain an optimal solution under fuzzy conditions. In the proposed method expected demand of products & profit are expressed by fuzzy set notations. The proposed fuzzy linear programming formulation is then transformed to an equivalent conventional linear programming problem and solutions obtained by solving this transformed linear programming problem. For illustration purpose the proposed method is applied to a profit maximization related machine scheduling problem. Read More...
|
Computer Science & Enginnering |
India |
953-957 |
35 |
Comparative study on growth status of Teen age Male Volleyball players on selected Physical and Physiological Parameters
-Dr. Sudip Sundar Das ; Mr. Anirban Misra
The game of Volleyball was invented a long way since 1895 when W. G. Morgan hang a tennis net six feet across the Holyoke "Y" gym and volleyed a basketball bladder back and forth and named it as "mignonette. Initially, the game was managed by Indian Olympic Association and the Interstate volleyball Championship was conducted every two years between the years 1936 and 1950.The purposes of the study were to find out the relationship of growth status between the variables of U-14 years and U-19 years groups. Sixty two (62) male subjects were selected for this study. Among them, thirty one (31) male subjects for U-14 and thirty one (31) male subjects for U-19 years groups. Findings revealed that the relationship between variables of the three growth variables, relationship existed in all of the two age groups except in height and BMI of two groups. Read More...
|
Physical Education |
India |
958-961 |
36 |
Design of Low Power, High Speed 3-Bit Pipelined ADC
-Prof. H. G. Bhatt ; Vaishali Doctor
The design of high speed, lower power A/D converter architectures have been investigated and can be found in several applications. The low power techniques used in this design include the dynamic comparators and capacitor scaling which are made possible with this architectural selection. To be compatible with the digital integrated circuit now running at 3.3V power supply, some techniques for low supply voltage are introduced, which include a 3.3V Op Amp and low voltage SC circuits.
In order to reduce the power even more, one can reduce the per-stage resolution and cascade more stages to get the full resolution. This particular architecture is called the Pipelined architecture, mainly because the analog input signal is passed through a pipeline of flash A/D (sub-ADC) and interstate gain blocks. The advantage of this architecture is its reduced complexity. With a given per-stage resolution, an A/D converter of a given resolution can be achieved by cascading an appropriate number of identical pipelined stages. In any A/D converters, some reference voltages are generally required to set a reference for the sampled input to be compared to.
Tspice simulation results & Layout using 1.2μm CMOS Technology parameters for the proposed design of Low Power - Low Voltage 3 bit Pipelined ADC are discussed. Read More...
|
Electronics and Communication |
India |
962-966 |
37 |
Wireless Telemetry System
-Tanvi G.Badheka
In this stress filled life, so many people are suffering from cardiac diseases. Patients of cardiac ailments are required to admit in hospitals for cardiac treatment and hence require close observation. In today's era telemedicine has been proved boon for both doctors and patients. Now invention in this area have changed the old and traditional practices .Not even that but they can live at home instead of hospital and can get treatment for their cardiac ailment in case of emergency. In this thesis, I propose wireless telemetry system in which doctor can real time visualizes physiological parameters ECG and temperature of patient via GPRS/WI-FI on mobile anywhere in globe. In critical condition of the patient emergency call can be transmitted to the doctor and doctor can guide care taker person via phone for emergency treatment and can keep himself in touch whenever needed. In this thesis we also develop and design ECG application on the platform of Android. Read More...
|
Biomedical Engineering |
India |
967-970 |
38 |
Trajectory Segmentation and Sampling of Moving Objects Based On Representativeness
-Mr. M. Gunasekaran ; A. Evangeline Jebakumari
Moving Object Databases (MOD), although ubiquitous, still call for methods that will be able to understand, search, analyze, and browse their spatiotemporal content. In this paper, we propose a method for trajectory segmentation and sampling based on the representativeness of the (sub) trajectories in the MOD. In order to find the most representative sub trajectories, the following methodology is proposed. First, a novel global voting algorithm is performed, based on local density and trajectory similarity information. This method is applied for each segment of the trajectory, forming a local trajectory descriptor that represents line segment representativeness. The sequence of this descriptor over a trajectory gives the voting signal of the trajectory, where high values correspond to the most representative parts. Then, a novel segmentation algorithm is applied on this signal that automatically estimates the number of partitions and the partition borders, identifying homogenous partitions concerning their representativeness. Finally, a sampling method over the resulting segments yields the most representative sub trajectories in the MOD. Our experimental results in synthetic and real MOD verify the effectiveness of the proposed scheme, also in comparison with other sampling techniques. Read More...
|
Computer Science & Enginnering |
India |
971-974 |
39 |
Extracting and Reducing the Semantic Information Content of Web Documents to Support Semantic Document Retrieval
-A. Illayarajaa ; K. MohanKumar
Ranking and optimization of web service compositions represent challenging areas of research with significant implication for realization of the "Web of Services" vision. The semantic web, where the semantics information is indicated using machine-process able language such as the Web Ontology Language (OWL) "Semantic web service" use formal semantic description of web service functionality and enable automated reasoning over web service compositions. These semantic web services can then be automatically discovered, composed into more complex services, and executed. Automating web service composition through the use of semantic technologies calculating the semantic similarities between outputs and inputs of connected constituent services, and aggregate these values into a measure of semantics quality for the composition. It propose a novel and extensible model balancing the new dimensions of semantic quality ( as a functional quality metric) with QoS metric, and using them together as a ranking and optimization criteria. It also demonstrates the utility of Genetic Algorithms to allow optimization within the context of a large number of services foreseen by the "Web of Service" vision. To reduce the semantics of the web documents then to support semantic document retrieval by using Network Ontology Language (NOL) and to improve QoS as a ranking and optimization. Read More...
|
Computer Science & Enginnering |
India |
975-981 |
40 |
A Rule based Slicing Approach to Achieve Data Publishing and Privacy
-C. Saravanabhavan ; P. Bhuvaneswari
several anonymization techniques, such as generalization and bucketization, have been designed for privacy preserving micro data publishing. Recent work has shown that generalization loses considerable amount of information, especially for high dimensional data. Bucketization, on the other hand, does not prevent membership disclosure and does not apply for data that do not have a clear separation between quasi-identifying attributes and sensitive attributes. The existing system proposed slicing concept to overcome the tuple based partition this has been done to overcome the previous generalization and bucketization. In this paper, present a novel technique called rule based slicing, which partitions the data both horizontally and vertically. We show that slicing preserves better data utility than generalization and can be used for membership disclosure protection. Another important advantage of slicing is that it can handle high-dimensional data. We show how slicing can be used for attribute disclosure protection and develop an efficient algorithm for computing the sliced data that obey the l-diversity requirement. The workload experiments confirm that slicing preserves better utility than generalization and is more effective than bucketization in workloads involving the sensitive attribute. The experiments also demonstrate that slicing can be used to prevent membership disclosure Read More...
|
Computer Science & Enginnering |
India |
982-984 |
41 |
Full-Text Retrieval in Unstructured P2P Networks using Bloom Cast Efficiently
-Mr. R. PremKumar ; S. V. Uthayasri
Efficient and effective full-text retrieval in unstructured peer-to-peer networks remains a challenge in the research community. First, it is difficult, if not impossible, for unstructured P2P systems to effectively locate items with guaranteed recall. Second, existing schemes to improve search success rate often rely on replicating a large number of item replicas across the wide area network, incurring a large amount of communication and storage costs. In this paper, we propose BloomCast, an efficient and effective full-text retrieval scheme, in unstructured P2P networks. By leveraging a hybrid P2P protocol, BloomCast replicates the items uniformly at random across the P2P networks, achieving a guaranteed recall at a communication cost of O (N), where N is the size of the network. Furthermore, by casting Bloom Filters instead of the raw documents across the network, BloomCast significantly reduces the communication and storage costs for replication. Results show that BloomCast achieves an average query recall, which outperforms the existing WP algorithm by 18 percent, while BloomCast greatly reduces the search latency for query processing by 57 percent. Read More...
|
Computer Science & Enginnering |
India |
985-988 |
42 |
A Monitor System in Data Redundancy in Information System
-Varsha Soni
The structure of a few of the Information Assurance (IA) processes currently being used in the United States government. In this paper, the general structure of the processes that are uncovered and used to create a Continuous Monitoring Process that can be used to create a tool to incorporate any process of similar structure. The paper defines a concept of continuous monitoring that attempts to create a process from the similar structure of several existing IA processes. The specific documents and procedures that differ among the processes can be incorporated to reuse scan results and manual checks that have already been conducted on an IS A proof-of-concept application is drafted to demonstrate the main aspects of the proposed tool. The possibilities and implications of the proof-of-concept application are explored, to develop a fully functional and automated version of the proposed Continuous Monitoring tool. Read More...
|
Computer Science & Enginnering |
India |
989-993 |
43 |
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
-Mr. Raj Kumar Somani ; Mr. Pankaj Singh Parihar; Ms. Namrata Maheswari
A Mobile Ad-Hoc Network is a collection of mobile nodes or a temporary network set up by wireless mobile nodes moving arbitrary in the places that have no network infrastructure in such a manner that the interconnections between nodes are capable of changing on continual basis. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. Various attacks and one of those attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. Therefore, it is a severe attack that can be easily employed against routing in mobile ad hoc networks. There are lots of detection and defense mechanisms to eliminate the intruder that carry out the black hole attack. . Virtual Infrastructure achieves reliable transmission in Mobile Ad Hoc Network. Black Hole Attack is the major problem to affect the Virtual Infrastructure. In this paper, approach on analyzing and improving the security of AODV, which is one of the popular routing protocols for MANET. Our aim is to ensuring the avoidance against Black hole attack. Read More...
|
Computer Science & Enginnering |
India |
994-997 |
44 |
Implementation of 8x8 MIMO OFDM systems for higher order modulation using QOSTBC under different fading channels
-Ms. Aarti Sharma ; Prof. Mukesh Tiwari; Mr. Amol Kumbhare; Mr. Manish Korde
A general Quasi orthogonal space time block code (QOSTBC) structure is proposed for multiple-input multiple-output-orthogonal frequency division multiplexing (MIMO-OFDM) systems for 8 X 8 antenna configuration. The signal detection technology used in this work for MIMO-OFDM system is Zero-Forcing Equalization (linear detection technique). In this paper, analysis of high level of modulations (i.e. M-QAM and M-PSK for different values of M) on MIMO-OFDM system is presented. In this, AWGN, Rayleigh and Rician channels have been used for analysis purpose and their effect on BER and Spectral Efficiency for high data rates have been presented. The proposed system has better performance than the other systems in terms of SNR improvement of 3-5 dB and spectral efficiency. Read More...
|
Electronics and Communication |
India |
998-1001 |
45 |
Performance Analysis using OEE
-Mr. Kiran Bhabhor ; Mayur N. Nagdiya
Any firm typically made a large investment in a piece of capital machinery and, in theory, it could run 24 hour a day for seven days a week at its optimum Speed. If it did this you gain the maximum value from the investment. In reality there is number of element that can affect the value gained from the investment. So that fully utilization of equipment can be done. Hence for fully utilization of any equipment any firm must have to calculate OEE. This paper represents the methodology applied in increasing the OEE of an Organization by exchanging the feed mechanism from Bowl Feeder to a Conveyor. Read More...
|
Mechanical Engineering |
India |
1002-1007 |
46 |
Process parameter optimization of SLM process and application of Taguchi approach– The Review
-R. I. Patel ; Rajnikant B. Rathod
Selective Laser Melting (SLM) is an emerging powder based additive layer manufacturing technology that used to fabricate three-dimensional fully functional parts from metal powders by fusing the material in a layer by layer manner as per a CAD model. The quality of SLM produced parts is significantly affected by various manufacturing parameters of SLM machine. Hence optimization of SLM process parameters is necessary in order to improve the quality of parts. The purpose of this paper is to explore the reviews for various optimization methods used for process parameter optimization of SLM process and application of Taguchi approach. This review of work can be helpful to the other researchers to carry out further work in the same era. Read More...
|
Mechanical Engineering |
India |
1008-1010 |
47 |
Artificial Neural Network Based Graphical User Interface for Estimation of Fabrication Time in Rig Construction Project
-A. H. Makwana ; D. H. Patel; A. A. Mehta
This paper addresses the problem of estimation of fabrication time in Rig construction projects through application of Artificial Neural Network (ANNs) as this is the most crucial activity for successful project management planning. ANN is a non-linear, data driven, self adaptive approach as opposed to the traditional model based methods, also fast becoming popular in forecasting where relationship between input and output is not known but vast collection of data is available. Around 960 data regarding fabrication activity has been collected from ABG Shipyard Ltd., Dahej. 3 input parameters have been considered for estimation of output as fabrication time. 11 Feed Forward Back Propagation neural networks with different network architectures were made. Network N10 was able to predict the output with MSE 1.35337e-2. Coding was done for the Graphical User Interface (GUI) so that the GUI runs, simulates network N10, and displays the fabrication time for different combination of inputs. Read More...
|
Mechanical Engineering |
India |
1011-1014 |
48 |
A Review on Various Most Common Symmetric Encryptions Algorithms
-Prof. K. C. Dave ; Sweta K. Parmar
Security is the most challenging aspects in the internet and network application. Internet and networks applications are growing very fast, so the importance and the value of the exchanged data over the internet or other media types are increasing. Information security has been very important issue in data communication. Any loss or threat to information can prove to be great loss to the organization. Encryption technique plays a main role in information security system. This paper gives a comparison of various encryption algorithms and then finds best available one algorithm for the network security. Read More...
|
Instrumentation & Control Engineering |
India |
1015-1018 |
49 |
Edge Detection Using Different Algorithms in Raspberry Pi
-Prof. Vandana Patel ; Jignesh K. Tank
Industry is using edge detection technique to automate the process for increasing efficiency by eliminating defects or malfunctioning of any system. Edge detection system is composed of multi-disciplinary subcomponent via embedded systems and software algorithm. The Embedded system is developed using many different architectures and design philosophy. The accuracy, speed and scalability is the factor which decides this design. In this paper, I will focus on different software algorithms, which were developed to detect the edge. This will include configuration of development IDE and some python programs to detect edge from camera. Read More...
|
Computer Science & Enginnering |
India |
1019-1021 |
50 |
A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Network
-Jyothish K John ; Tibin Thomas
An adhoc network is a collection of autonomous nodes with dynamically changing infrastructure. Multicast is a good mechanism for group communication. It can be used in the group oriented applications like video/audio conference, interactive group games, video on demand etc. The security problems obstruct the large deployment of the multicast communication model. Multicast data origin authentication is the main component in the security architecture. The authentication schemes should scalable and efficient against packet loss. In this article we discuss varies authentication scheme for multicast data origin with their advantage and disadvantage Read More...
|
Computer Science & Enginnering |
India |
1022-1026 |