No. |
Title and Author |
Area |
Country |
Page |
1 |
Fifth Law of Thermodynamics - A Review
-Nairit Pal
Thermodynamics is the branch of natural science which deals with heat and its relation to energy and work. The laws of thermodynamics govern the relationships between them. Each law either states some biblical fact with scientific proof or introduces some new terminology so that its violation can be avoided. With the recent development in technology, it has been become possible to create 'negative absolute temperatures'. This causes several odd consequences and also violates the already established laws of thermodynamics. This paper summarizes some of the information about the negative absolute temperature and its possibilities. A fifth law of thermodynamics which would be able to stop the violations of the other laws is also looked into. Read More...
|
Mechanical Engineering |
India |
1532-1534 |
2 |
Fault Detection of A Hot Metal Body
-Debasis Maji ; Mainak Biswas; Supriyo Nath; Sushovan Bhaduri
In this paper a new methodology is proposed to
provide a constructive solution to the problem of fault
detection when processing metals and steel manufacturing
process for automatic hot spots detection and histogram of
the hot body by Blob analysis. We used a method that at
first convert the original color of the picture into B/W using
a particular threshold value. B/W image provides statistic of
all the white pixels. Here statistics are the coordinates and
the dimensions of the rectangle of the hot spot. At first the
hottest region of the image is detected and then the
histogram of the whole image is plotted. Simulation is
carried out and results are discussed to illustrate the
proposed procedure. The result is very good as compared to
other procedures. Read More...
|
Electrical Engineering |
India |
1535-1536 |
3 |
Cloud Computing Using Encryption and Intrusion Detection
-Tony Durgadas Jagyasi
Cloud computing provides many benefits to the users such as accessibility and availability. As the data is available over the cloud, it can be accessed by different users. There may be sensitive data of organization. This is the one issue to provide access to authenticated users only. But the data can be accessed by the owner of the cloud. So to avoid getting data being accessed by the cloud owner, we will use the intrusion detection system to provide security to the data. The other issue is to save the data backup in other cloud in encrypted form so that load balancing can be done. This will help the user with data availability in case of failure of one cloud. Read More...
|
Computer Science & Enginnering |
India |
1537-1538 |
4 |
An Approximate Analysis Procedure for Piled Raft subjected to Vertical Loading
-Ankur Shah
Piled raft is a geotechnical composite construction consisting of three elements raft, piles and soil. Addition of piles in raft strategically improves ultimate load carrying capacity, decreases overall and differential settlement .The design of piled raft is complicated due to complex interaction between rafts, pile and soil. In recent years due to advent of multistory buildings there has been a significant rise in usage of piled raft in India. This paper presents a simplified method for analysis of piled raft with use of software SAFE considering all the interactions. In the scope of this paper, the design procedure for piled rafts is discussed and results are verified with that available from literature. Read More...
|
Civil Engineering |
India |
1539-1541 |
5 |
Air Programming on Sunspot with use of Wireless Networks
-Vimal Adodariya ; Dhaval Shingala; Darshak Sojitra; Rajnik Vaishnav; Nirav Kansagra
Wireless Sensor Networks (WSN) provides us an effective means to monitor physical environments. The computing nodes in a WSN are resource constrained devices whose resources need to be used sparingly. The main requirement of a WSN is to operate unattended in remote locations for extended periods of time. Physical conditions, environmental conditions, upgrades, user preferences, and errors within the code can all contribute to the need to modify currently running applications. Therefore, reprogramming of sensor nodes is required. One of the important terminologies that are associated with WSN network is that of OVER THE AIR PROGRAMMING. This concept has been utilized so far as for Imote2 sensors that has been relatively utilized for the processing of the Deluge port (DP). They have so far been able to successfully reboot each application. But this rebooting is still not reliable and secure as there are certain security features that are affected in the processing. I will provide a more reliable, robust and secure system that would have enriched functionalities of that of OTA programming on SUNSPOT. Some important features of the SUN SPOT that I will be utilizing in this practical approach is that it supports isolated application models such as sensor networks, it allows running multiple applications in one. It does not create overhead on the entire system node as it provides lower level asynchronous for proper message delivery. It also supports migration from one device to another. This paper focuses on developing a multi-hop routing protocol for communication among Sun SPOT sensor nodes and a user front-end (i.e. visualizer) to visualise the collected values from all the nodes. To test the routing protocol before deploying it to sensor nodes, a simulation using J-Sim is created. Read More...
|
Computer Enginnering |
India |
1542-1547 |
6 |
Study of the Barrier Probability in a Classical Risk Model for two different claim amount distributions with same Mean
-Palash Ranjan Das
In this paper, we have considered a classical risk model with dividend barrier, in which claim inter-occurrence times are exponentially distributed. Our aim is to obtain explicit expression for the barrier probability B (u, b), the upper barrier being assumed to be 'b', before ruin occurs when the claim amount distribution is either exponential or erlangian. It is to be noted that the premium loading factor is taken to be 20% in both the cases. In order to ensure fair comparison we have chosen the exponential and erlangian parameters in such a way that their mean and hence the expected total claims is same for both the distributions over a given time interval. Ultimately through numerical evaluation of the barrier probability for both the claim amount distributions, we will investigate whether there is any significant difference between the two. Read More...
|
Engineering Maths |
India |
1548-1550 |
7 |
A Review Study on Methods of Tunneling in Hard Rocks
-Hiren A. Rathod ; Chirag J. Shah
This article presents a review on the different methodologies that are used for tunnels excavations in hard rocks in present era. Growing needs for modern transportation and utility networks have increased the demand for a more extensive and elaborate use of underground space or through high mountains / hills. As a result, more projects have to be completed in various ground conditions and one of which is more challenging is to carry out excavation work in hard rocks. Significant technological advances have rendered these projects possible, but have also given rise to new challenges as many of these projects have to be completed in difficult conditions, with very strict environmental constraints, particularly in urban areas where the potential impact of tunneling on existing structures is a major concern. This paper addresses the main aspects of tunneling and underground works performed in hard rocks. A summary is presented of the more recent advances and widely adopted techniques in these regards. Read More...
|
Civil Engineering |
India |
1551-1555 |
8 |
A Single-Phase Clock Multiband Low-Power Flexible Divider
-Mrs. Haneefa ; Mr. Narsimha Badri
In this paper, a low-power single-phase clock multiband flexible divider for Bluetooth, Zigbee, and IEEE 802.15.4 and 802.11 a/b/g WLAN frequency synthesizers The frequency synthesizer was implemented using a charge-pump based phase-locked loop with a tri-state phase/frequency detector and a programmable pulse-swallow frequency divider. Since the required frequency of operation can be as high as 1.4GHz, the speed of the digital logic used in the frequency divider is a critical design factor. A custom library of digital logic gates was designed using MOS current-mode logic (MCML). These gates were designed to operate at frequencies up to 1.4GHz. This report outlines the design of the phase/frequency detector and the programmable pulse-swallow frequency divider. The design, layout, and simulation of the MCML logic family are also presented. Read More...
|
Electronics and Communication |
India |
1556-1560 |
9 |
A Review on Cost Overruns and its Remedies for Effective Construction Management
-Dr. Neeraj D. Sharma ; Rushabh A. Shah; Hiral H. Patel
In construction industry cost is amongst the major considerations throughout the project management life cycle and thus can be regarded as one of the most important parameters of a project and the driving force of project success. Despite of its proven importance it is not uncommon to see a construction project failing to achieve its objectives within the specified cost. Cost overrun is a very frequent phenomenon and is almost associated with nearly all projects in the construction industry. Read More...
|
Civil Engineering |
India |
1561-1564 |
10 |
Analysis of Different Parking Space and its Comparison
-Manoj Kumar Biswal ; Tarapada Mandal; Arumuga Subhashini N; R. V. Kumar; Ujjal Chattaraj
In the "Analysis of different parking space and its comparison" we collected data from different parking space of our institute N.I.T Rourkela. Initially we figured out what is the variation of PCU with a certain time and then we compared all these data with the help of "t- test" to find out whether these parking pattern and demand are same or different. In another part we find out the "spatial and temporal distribution" of main road traffic vehicle, here "spatial distribution" is the variation of PCU (passenger car unit) with distance and in "temporal distribution" variation of PCU with time. Read More...
|
Civil Engineering |
India |
1565-1568 |
11 |
Bit Error Rate Performance of MIMO Spatial Multiplexing with MPSK Modulation over Rayleigh Fading Channel
-Mahesh Kumar Porwal ; Vishal Jethava
Wireless communication is one of the most effective areas of technology development of our time. Wireless communications today covers a very wide array of applications. In this, we study the performance of general MIMO system, the general V-BLAST architecture with MPSK Modulation in Rayleigh fading channels. Based on bit error rate, we show the performance of the 2x2 schemes with MPSK Modulation in noisy environment. We also show the bit error rate performance of 2x2, 3x3, 4x4 systems with BPSK modulation. We see that the bit error rate performance of 2x2 systems with QPSK modulation gives us the best performance among other schemes analysed here. Read More...
|
Electronics and Communication |
India |
1569-1572 |
12 |
Data Security Model Enhancement in Cloud Environment
-Abhilash Pulipati
With the rapid developments across the information technology usage of cloud infrastructure has increased a lot. There are lots of services offered by cloud where data storages occupies the primary stand when compared to rest of the services. Data security across the cloud is the main aspect to be considered while storing the data of any organization across a remote location. There are many parameters to be considered while providing security to cloud integrity, confidentiality and availability. There was ample research done in this context where there are many security models available for all the three aspects discussed. The main aim of the proposed system is to make the cloud data server available by blocking unwanted traffic with a firewall. OPNET simulation is done to evaluate the performance of the cloud data storage and the corresponding security issues. From the overall analysis of the results it is clear that blocking the unwanted web traffic over the cloud storage security has improved a lot in terms of traffic and packet managements. Read More...
|
Electronics and Communication |
India |
1573-1575 |
13 |
Comparison of different Sub-Band Adaptive Noise Canceller with LMS and RLS
-Dr. Sanjeev Dhull ; Lalita Varma
Sub-band adaptive noise is employed in various fields like noise cancellation, echo cancellation and system identification etc. It reduces computational complexity and improve convergence rate. In this paper we perform different Sub-band noise cancellation method for simulation. The Comparison with different algorithm has been done to find out which one is best. Read More...
|
Electronics and Communication |
India |
1576-1579 |
14 |
Development and theoretical analysis of mathematical expressions for change of entropy for exothermic reactions in different reacting environments and conditions for minimization of energy losses in the process
-P. V. Kherdekar
This paper introduces a novel technique and algorithm for theoretical study of entropy changes for exothermic reactions by mechanistic modelling and dynamic simulation; considering factors such as kinetics, reaction environment and flow patterns with an ultimate objective of minimization of energy loss and entropy generation in the system. It mainly focuses on exothermic reactors cooled by means of a constant inlet temperature utility fluid which flows along the external surface of the reactor vessel. Using basic concepts of heat and mass balances and definitions in thermodynamics, variation of related system variables with time is modelled and by simulation in MS-Excel, a polynomial fit is generated for sample problems in order to make the illustrations handier. Usages of the developed expressions for energy optimization are also commented upon. Read More...
|
Chemical Engineering |
India |
1580-1586 |
15 |
Grid computing: An Emerging Technology
-G. S. Rohit
Internet is the networking infrastructure which helps in connecting many users through interconnected networks through which users can communicate to each other. The World Wide Web is built on top of the internet to share information. The grid is again a service that is built on top of internet but is able to share computational power, databases, disk storage and software applications. The paper mainly focuses on significance Grid computing, its architecture, the grid middleware Globus toolkit and wireless grid computing. Read More...
|
Computer Science & Enginnering |
India |
1587-1591 |
16 |
Comparitive study on Improvement on the Concrete Cracks by using Bacillus Pastuerii and Bacillus Sphaericus
-Mr. Abhijitsinh Parmar ; Mr. Ankit Patel; Mr. Parin Patel; Mr. Harshad Patel; Mr. Harsh Patel
Cracks are one of the naturally weaknesses of concrete and they are irreversible. Bacillus Sphaericus and Bacillus Pastuerii are common soil bacterium induce the precipitation of calcite exhibited its positive potential in selectively consolidating simulated fractures in the consolidation of sand. A comparative study on effect of crack repair by different bacteria on compression, flexural and durability tested on mortar cubes and concrete beams. The effect of different depth of crack on the compression, flexural and durability of concrete was studied. It was found that all the increase in depth of crack reduce the strength of cubes and beams. Read More...
|
Civil Engineering |
India |
1592-1594 |
17 |
Design and Implementation of Vehicle Gaseous Fuel Leakage Detection System using GS
-S. Harish
In this paper, a new method of designing and development of a microcontroller based toxic gas detection system is proposed. If the toxic gas or fuel leakage has been detected, the system automatically alerts the driver through buzzer, opens the car door automatically and transmits the warning message to the authorized user through the GSM module attached. User can send SMS and receive SMS through GSM Modem, based on that message User can control some appliances in host section. This system aims to modify an existing safety model employed in automotive field. It can be used in any Vehicle like Car, Bus Van etc. The advantage of this automated detection/alarm system is that, it offers faster response time and accurate detection of an emergency in turn leading to faster diffusion of the situation, compared to manual methods. This is a very compelling reason that justifies designing such a safety system. Read More...
|
Electronics and Communication |
India |
1595-1599 |
18 |
1x2 Digital Optoelectronic Switch using MZI structure and studying the Effect of Bi-Polar Voltage on Electrode
-Prof. Sarman K. Hadia ; Chetan B. Bambhroliya; Rahul J. Thumar
The electro optic switch has wide application in optical network due to capability of route the light path from one port to the desired port. In this paper, we propose a 1x2 digital optoelectronics switch based on mach-zehnder interferometer structure on a single titanium diffuse lithium niobate substrate. The design is simulate on BPM-cad simulator for switch analysis and study the effect of bipolar voltage 0v to ± 5.75v applied at 1st and center electrode region for switching. A short study of wavelength dependent switch for first optical window 8.5 µm and third optical window 1.55 µm has been simulated without use of voltage with changing titanium stripe thickness to 0.07µm. Read More...
|
Communication Engineering |
India |
1600-1603 |
19 |
Sodium Alginate composite film preparation with Nano clay and enhancing its properties
-M. Divyabharathi
Use of natural polymers from renewable resources has been increasing in recent years due to their excellent performance over existing petro-polymers which are non-environmental friendly. Films prepared from natural polymers such as polysaccharides, proteins, lipids etc., have wide application over packaging sector. Sodium alginate is the sodium salt of alginic acid, which a polyuronide is made up of a sequence of two hexuronic acids: beta-D mannuronic acid and alpha-L guluronic acid. Films obtained from Sodium Alginate hydrocollidal compounds are bio-degradable and bio-compatible with better gel forming and film forming capabilities. The objective of this follow up is to enhance the physical properties of sodium alginate film, prepared with various compositions of CaCl2 and Nanoclay compounds using casting method. Read More...
|
Printing Technology |
India |
1604-1608 |
20 |
Hadoop and Big Data Readiness in Africa: A Case of Tanzania
-Augustine Malero ; Hassan Seif
Big data has been referred to as a forefront pillar of any modern analytics application. Together with Hadoop which is open source software, they have emerged to be a solution to the processing of massive generated both structured and unstructured data. With different strategies and initiatives taken by governments and private institutions in the world towards deployment and support of big data analytics and hadoop, Africa cannot be left isolated. In this paper, we assessed the readiness of Africa with a case study of Tanzania in harnessing the power of big data analytics and hadoop as a tool for drawing insights that might help them make crucial decisions. We used a survey in collecting the data using questionnaires. Results reveal that majority of the companies are either not aware of the technologies or still in their infancy stages in using big data analytics and hadoop. We identified that most companies are in either awakening or advancing stages of the big data continuum. This is attributed by challenges such as lack of IT skills to manage big data projects, cost of technology infrastructure, making decision on which data are relevant, lack of skills to analyze the data, lack of business support and deciding on what technology is best compared to others. It has also been found out that most of the companies' IT officers are not aware with the concepts and techniques of big data analytics and hadoop. Read More...
|
Information Science |
Tanzania, United Republic of |
1609-1612 |
21 |
A Review on Sky Bus Technology: A Mass Transportation System
-Dr. Neerajkumar D. Sharma ; Bhavin K. Kashiyani; Bhaveshkumar M. Kataria
India is one of the leading developing countries in the world community today. But, the main obstacle it is facing is its large population and mass transportation. One of the most important aspects where our country is concentrating to work on, for its development is mass transportation. Mass transportation plays a vital role as we always have to think about moving of a large population in very denser area. That's why our Government is planning to implement the new technologies in mass public transportation. There are many new technologies in mass transportation such as Metro rail, Mono Rail, Underground railway, Sky bus Technology, Bus Rapid Transit System (BRTS) etc. In this seminar, we aim to explore Sky Bus Technology. Read More...
|
Civil Engineering |
India |
1613-1615 |
22 |
Advanced Security System for ATM with Tracking and SMS Indication - An advance and viable approach
-Akshay R. Jadav ; Dhruv B. Vasava; Gaurav K. Pandey; Manoj B. Nandvana
The inspiration for our project is got from newspapers and issues which are happening in our routine life. Nowadays stealing of ATM is too much increased so due to that we are just trying to find out solution for it. At some ATM centres there is no availability of security man, due to it some circumferences get chance at there. Police investigation exposed that nevertheless the bank had employed guards for round-the-clock duty, the night time guards in no way turned up. Besides, the police say, rather than setting up or fixing the ATM device to the ground, the financial institution had kept it on a desk like a TV arranged, creating it much easier for that robbers. At present thieves are not just stealing the rupees from ATM but they take away the whole cash box so because of it the security of ATMs failed to stop them, so we want to find out how we can make that cash box safe as much as possible and also will apply some security systems if we will get that something going wrong there. Nowadays money is the important thing for all the human being so that protection of it is also very important. Concentrating just on these we have choose this project. Read More...
|
Computer Science & Enginnering |
India |
1616-1619 |
23 |
Theoretical assessment of E-Ball: A diminutive PC obscuring the traditional PC
-Ratika Bali ; Harshita Tomar; Gunjesh Sahney
This yet embryonic technology sobriquet as E-ball technology is the most prodigious research artifact imminent in the arena of personal computers (PC). The E-Ball concept PC, a sphere-shaped computer avowal to deliver the smallest physical design among all the hitherto extant laptops and desktops. This work of genius consists all the features pertaining to conventional computer elements like keyboard, mouse, DVD, large screen display but the line of attack incorporated by E-ball technology PC for integrating these elements is impeccable which outweighs the services offered by traditional systems. E-Ball PC magnanimously boasts a petite 6 inch diameter sphere and a seamless 120x120mm motherboard. E-Ball is premeditated to be positioned on two stands, which open simultaneously using buttons located on each side. After opening the stand and switching on the PC, a detachable optical mouse and laser keyboard can be activated and put into use to experience this flummoxing technical revolution which has revolutionized the landscape of Personal Computers. Read More...
|
Computer Science & Enginnering |
India |
1620-1622 |
24 |
Survey on Exact Pattern Matching Algorithm
-Mr. Mitesh Thakkar ; Urmila Patel
In today's scenario many computer science field working on the Pattern matching problem like Intrusion Detection System, Search in Text Editor, DNA Sequence Match, Digital Libraries and many more. Exact Pattern Matching Problem defined as a finding Pattern P [1...m] in to long Text String T [1...n] with its all occurrence of exact match where n>>m. This Paper having survey of Exact string matching algorithm with their working methodology, its pre-processing logic, complexity of both the pre-processing and searching phase and also the comparison table for the same . According to this survey, all the researcher focus to reduce number of character comparisons and pre-processing time. Read More...
|
Computer Science & Enginnering |
India |
1623-1626 |
25 |
Time Multiplexed VLSI Architecture for Real-Time Barrel Distortion Correction in Video-Endoscopic Images
-S. Vamsee Krishna ; P. G. S. Mythili
A low-cost very large scale integration (VLSI) implementation of real-time correction of barrel distortion for video- endoscopic images is presented in this paper. The correcting mathematical model is based on least-squares estimation. To decrease the computing complexity, we use an odd-order polynomial to approximate the back-mapping expansion polynomial. By algebraic transformation, the approximated polynomial becomes a monomial form which can be solved by Hornor's algorithm. With the iterative characteristic of Hornor's algorithm, the hardware cost and memory requirement can be conserved by time multiplexed design. In addition, a simplified architecture of the linear interpolation is used to reduce more computing resource and silicon area. The VLSI architecture of this paper contains 13.9-K gates by using a 0.18 μm CMOS process. Compared with some existing distortion correction techniques, this paper reduces at least 69% hardware cost and 75% memory requirement. Read More...
|
Computer Science & Enginnering |
India |
1627-1634 |
26 |
Virtual Machine Migration Techniques in Cloud Environment: A Survey
-Ompriya Kale ; Rinal M. Chawda
Cloud is an emerging technology in the world of information technology and is built on the key concept of virtualization. Virtualization separates hardware from software and has benefits of server consolidation and live migration. Live migration is a useful tool for migrating OS instances across distant physical of data centers and clusters. It facilitates load balancing, fault management, low-level system maintenance and reduction in energy consumption. In this paper, we survey the major issues of virtual machine live migration. There are various techniques available for live migration and different parameters are considered for migration. Read More...
|
Computer Enginnering |
India |
1635-1638 |
27 |
Mandatory Helmet Protection System with Inbuilt Sobriety Test Sensor and Exhaust Checking for Two Wheelers
-Adarsh Kodandapani
This paper aims at implementing mandatory helmet protection system for two wheeler vehicles and an inbuilt sobriety test system in the helmet which allows us to test the alcohol content in the driver. We aim at inhibiting the driver to start the bike without helmet or with alcohol being tested positive. Also in this paper work is done to implement easy way of detecting the blockage in the air filter at the exhaust without the need for emission test and notifying the driver about cleaning the filter. So we try to achieve strict following of traffic rules and saving fuel and control of air pollution can be achieved. Read More...
|
Electronics & Communication |
India |
1639-1642 |
28 |
GIS Based Power Distribution System: A Case study for the Junagadh City
-Prof. Yashit Tita
In this paper power distribution data (poles, transformers and transmission lines) have been mapped using GPS and high resolution remote sensing images. These details have been put in GIS using ArcGIS 9.1 software. Various things like road network and land use are also superimposed on the power distribution system GIS layer. Various types of analysis like finding a pole or circuit of specific transformer can be done using GIS tools. Read More...
|
Electrical Engineering |
India |
1643-1646 |
29 |
Noise Analysis on Indoor Power Line Communication Channel
-Avinash Shrotriya ; Juli Kumari Gupta; D. K. Saxena
The power line communication technology is now considered as a good alternative for the implementing communication network. Digital networks can be established using the same set of wires that is use to distribute the power signal through the power-line channel(PLC) because power line networks are excellent infrastructure for broadband data transmission however various noise exist due to stochastic change in the network load impedance. This paper is an attempt to identify different type of noise in PLC channel and investigate the performance of indoor channel of PLC system. The noise seen in the power-line channel varies with frequency, time and from line to line .in this paper we classify different type of noises its characteristics and the process to remove it from power line channel. Read More...
|
Electronics & Communication |
India |
1647-1650 |
30 |
Vehicles Charged Via Wireless Technology (Microwave Energy)
-Avinash Shrotriya ; Runa; Syed Nabil Akhtar
Wireless Power Transmission (WPT) is an inchoate side in every sector of science & technology. In this paper we present a model of Electric Vehicle (EV) charging with the help of renewable energy source using this WPT. We present a configuration, consist of two optimized square loop wire antennas in communication &tuned at mutual frequency with aim of showing the improvement of the size of the batteries & the power efficiency over longer distance. Through this wireless function Electric Vehicle system (EVs) get charged by microwave beam from transmitter & then receiver will capture thus microwave beam. This is then transferred into DC power & electrochemical storage is finally used to store the power. In this Li-ion battery replaces traditional fossil fuel system of automotive vehicles. Read More...
|
Electronics & Communication |
India |
1651-1653 |
31 |
Development of JTAG Verification IP in UVM Methodology
-Deepa N. R. ; Milna M. J.
IEEE 1149.1/1149.6 (JTAG) Verification IP provides a smart way to verify the IEEE 1149.1/1149.6 (JTAG) component of a SOC or an ASIC. The SmartDV's JTAG Verification IP works in a highly randomized manner to generate wide range of scenarios for effective verification of DUT(device under test).JTAG VIP includes an extensive test suite covering most of the possible scenarios and detection of protocol violation using an effective protocol-checker. IEEE 1149.1/1149.6 (JTAG) VIP is supported natively in System Verilog, VMM, RVM, AVM, OVM, UVM, Verilog, SystemC, VERA, Specman E and non-standard verification environment. Read More...
|
Electronics & Communication |
India |
1654-1656 |
32 |
Risk Management in Different Construction Phases
-Dr. Neeraj D. Sharma ; Mr. Hiren A. Rathod; Nimita A.Tijore
Everyday thousands of building projects are realized all over the world. Each phase requires good decisions in order to take a step further towards the successful finish of the project. Negative consequences of made decisions or activities that can have different probabilities of occurrence and impact on other phases of the project are defined as risks. The purpose of risk management is to predict, reduce and avoid the risks and their consequences. Risks can also be transferred to other parts of the project in order to achieve the best final results in each area of the project. The goal of this paper is to show how important risk assessment and management in different phases of building projects One concept which is widely used within the field of RM is called the risk management process (RMP) and consists of four main steps: identification, assessment, taking action and monitoring the risks (Cooper et al., 2005). In each of these steps, there are a number of methods and techniques which facilitate handling the risks. Read More...
|
Civil Engineering |
India |
1657-1661 |
33 |
A review on Solar Thermal Energy
-Vipul M. Patel ; Gautam J. Ghodasara; Kalpesh C. Chheladiya; Jignesh J. Patel
The solar thermal structure yields thermal power from the heat of the sun. The vital working principle is the thermal collectors must reach a temperature higher than the object to be warmed for the system to operate with a positive energy gain. There are many types of solar energy; probably the most general is the photovoltaic energy which is based on electrical energy production by photovoltaic panels. But there are other ways to obtain electrical energy from sunlight with perhaps better results. Solar thermal power involves none of the polluting emissions or environmental safety concerns associated with conventional generation technologies. There is no pollution in the form of exhaust fumes or noise during operation. Solar-thermal power stations have several advantages over solar-photovoltaic projects. They are typically built on a much larger scale, and historically their costs have been much lower. Compared with other renewable sources of energy, they are probably best able to match a utility's electrical load, says Nathaniel Bullard of New Energy Finance, a research firm. There are many other uses for solar thermal technology. These include refrigeration, air conditioning, solar stills and desalination of salt water and more. More information on these technologies is available in the relevant texts given in the reference section at the end of this fact sheet. Read More...
|
Environment Engineering |
India |
1662-1664 |
34 |
Route Optimization to make Energy Efficient MANET using Vishal Fuzzy Genetic Approach
-Vishal Gupta
In any network QOS is one the basic requirement and when we talk about the MANET(mobile AD-HOC network) this is the highly constraint requirement of a user. To improve the quality of service we use different changes in MANET protocols, its parameter, routing algorithm etc. In this proposed work we are also improving the QOS by modifying the routing algorithm. The proposed routing algorithm is inspired from the genetic approach. The proposed algorithm will follow all the basic steps of routing algorithm in the sequence. As in initializing phase we will select the shortest path and one alternative aggregative path. The shortest path selection always returns the congestion over the network. Instead of using the shortest path we will select a genetic inspired path. In this work, the selection of the next cross over child path will be identified based on cyclic fuzzy logic. The whole process will optimize the routing algorithm to improve the QOS. In this work, the fuzzy-improved Genetic algorithm will be implemented on MATLAB 7.1 for the route generation. Read More...
|
Electronics & Communication |
India |
1665-1669 |
35 |
Handwritten Script Recognition
-Sangita Panmand ; Dhanashree Shinde; Kirti Khair; Yugandhara Thumbre
OCR is abbreviated as Optical Character Recognition. Optical Character recognition is a process of recognition of different characters (printed or handwritten) from a digital image of documents. In OCR technique, characters can be recognized through optical mechanism. Various combinations of lines & curves make the characters. Characters recognition ability of human beings is very high. They can recognize all characters accurately. But same task is very difficult by OCR system. The wide usage of touch-screen based mobile devices has led to a large volume of the users preferring touch-based interaction with the machine, as opposed to traditional input via keyboards/mice. To exploit this, we focus on the Android platform to design a personalized handwriting recognition system that is acceptably fast, light-weight, possessing a user-friendly interface with minimally-intrusive correction and auto-personalization mechanisms. Read More...
|
Computer Enginnering |
India |
1670-1674 |
36 |
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
-Mr. Sanjay Tiwari ; Shivam H. Mehta
In the wireless sensor networks (WSNs), the sensor nodes (called motes) are usually scattered in a sensor field an area in which the sensor nodes are deployed. These motes are small in size and have limited processing power, memory and battery life. In WSNs, conservation of energy, which is directly related to network life time, is considered relatively more important souse of energy efficient routing algorithms is one of the ways to reduce the energy conservation. In general, routing algorithms in WSNs can be divided into flat, hierarchical and location based routing. There are two reasons behind the hierarchical routing Low Energy Adaptive Clustering Hierarchy (LEACH) protocol be in explored. One, the sensor networks are dense and a lot of redundancy is involved in communication. Second, in order to increase the scalability of the sensor network keeping in mind the security aspects of communication. Cluster based routing holds great promise for many to one and one to many communication paradigms that are pre valentines or networks. Read More...
|
Computer Science & Enginnering |
India |
1675-1678 |
37 |
A Review on Experimental Investigation of GMAW for AISI 1045 by using Taguchi Method
-Rakesh B. Prajapati ; Disha B. Patel; Tushar M. Patel
Gas Metal Arc Welding (GMAW) process is leading in the development in arc welding process which is higher productivity and good in quality .The shielding gas is used in GMA welding to protect the finished weld from the effects of oxygen and nitrogen in the atmosphere. The shielding gas can influence the weld strength, ductility, and toughness and corrosion resistance. The GMA welding parameters are the most important factors affecting the quality, productivity and cost of welding. In this study, the effects of different parameters on welding strength and hardness will be predicted. A plan of experiments based on Taguchi technique has been used to acquire the data. Read More...
|
Mechanical Engineering |
India |
1679-1682 |
38 |
VRaaS [Virtual Reality as a Service]: Integrated architecture for VR Applications
-K. Ajay Krishna Teja ; J. Vamsi Krishna
Cloud Computing is all about sharing resources and moving services, computation, data for cost and advantage. Many cloud providers host their services over the web and mobile apps for their peers. SaaS, PaaS, IaaS have been the basic providing strategies. Many applications use one of these areas of cloud computing. But all the applications may not be run accurately and cheaply using the existing strategies particularly virtual reality applications. A new architecture or strategy has to be built for such applications. In this paper, we suggest a new strategy named VRaaS (Virtual Reality as a Service) and its architecture for running such virtual reality applications. We also illustrate an example application which can be run using this architecture. Read More...
|
Computer Science & Enginnering |
India |
1683-1686 |
39 |
Analysis of Adaptive Algorithms
-Chavali Gautam Krishna ; Tushal Adusumilli; Venugopal Puripandla; Revanth Vemulapalli; Patchigolla Venkata Krishna Chaitanya
Adaptive Signal Processing has been playing a key role confining itself not just to the field of communications but also had spread into the fields of embedded systems, biological instruments, astronomy, image processing and many other fields. Adaptive filters are slowly replacing traditional filters in many areas. The development of new techniques and trends of adaptation algorithms has provided us with a broader sense of understanding the adaptation phenomena. In this paper some basic algorithms such as Least-Mean-Squares, Leaky-LMS, Normalized-LMS, and Recursive-Least-Squares algorithms have been studied and the convergence of these algorithms has been studied. The study convergence of the algorithms gives us a better picture of how fast the algorithms converge to optimum values. This is an issue of consideration in real-time signal processing as the signal processor implementing these kinds of algorithms has to be converging fast enough to the optimum values to save time and memory. Read More...
|
Electrical Engineering |
India |
1687-1690 |