No. |
Title and Author |
Area |
Country |
Page |
1 |
GPS and GSM based Steered navigation and location tracking device for Visionless
-Asif Hassan ; Narendra Reddy P N; Dileep Reddy Bolla; Shashi Raj K
This paper gives a conceptual perception about a device which helps the visionless or partly sighted for navigation and tracks them in case of emergencies. It is a robotics centered hurdle evading device. The device consists of a Microcontroller and obstacle sensors that avoids collision and GPS which provides location information of the visionless person. This device is capable of moving in specific direction depending upon command received by sensor input and can change the direction before hitting the obstacle. The overall concept of this paper is the result of numerous present concepts and focusing on tracking of the blind individual. Read More...
|
Electronics & Communication |
India |
1691-1693 |
2 |
Five Port Router Architecture
-A. Umma Maheswari ; E. Nagaraju
In this paper we attempt to give a networking solution by applying VLSI architecture techniques to router design for networking systems to provide intelligent control over the network. Networking routers to have limited input/output configurations, which we attempt to overcome by adopting bridging loops to reduce the latency and security concerns. Other techniques we explore include the use of multiple protocols. We attempt to overcome the security and latency issues with protocol switching technique embedded in the router engine itself. The approach is based on hardware coding to reduce the impact of latency issues as the hardware itself is designed according to the need. We attempt to provide a multipurpose networking router by means of Verilog code, thus we can maintain the same switching speed with more security we embed the packet storage buffer on chip and generate the code as self-independent VLSI based router. Our main focus is the implementation of hardware IP .router. The approach enables the router to process multiple incoming IP packets with different versions of protocols simultaneously, e.g. for IPv4 and IPv6. The approach will results in increased switching speed of routing per packet for both current trend protocols, which we believe would result inconsiderable enhancement in networking systems. Read More...
|
Electronics & Communication |
India |
1694-1697 |
3 |
Design Fabrication and Static Analysis of Single Composite Lap Joint
-P.V.Elumalai ; R. Senthil Kumar; A.Sujatha
Mechanically fastened joints are critical parts in composite aircraft structures. The composite structural members are highly used in the following applications such as aerospace, automobiles, marine, architecture etc., In the past decades, Adhesive bonding is a practical joint method for joining composite materials which provide low shear and Tensile strength .To improve the strength material joint is to be used in the work. A Glass fibre Epoxy composite is to be fabricated by hand lay-up method. And experimentally results are to be obtained. The Experimental results are to be compared with Analytical and Numerical results. For numerical analysis ANSYS software is to be used. Read More...
|
Mechanical Engineering |
India |
1698-1703 |
4 |
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
-Dr. Arun Kumar Singh ; Shanti Prakash Gehlot
MANET(Mobile Adhoc Network) is an emerging technology and have great strength to be applied in battlefields and commercial applications such as traffic surveillance, MANET is infrastructure less without any centralized controller. Each node contains routing capability. Each device in a MANET is independent and can move in any direction. One of the major challenges wireless mobile ad-hoc networks face today is security, because no central controller exists. MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a link layer ad hoc network. There are many security attacks in MANET and DDoS (Distributed denial of service) is one of them. Our main objective is seeing the effect of DDoS in routing, Packet Drop Rate, End to End Delay, no. of Collisions due to attack on network. And with these parameters and many more also we build secure IDS to detect this kind of attack and block it. In this thesis main objective is to study and implement the security against the DDOS attack. DDoS (Distributed Denial of Service) attacks in the networks are required to be prevented, as early as possible before reaching the victim node. DDos attack causes depletion of the network resources such as network bandwidth, disk space, CPU time, data structures, and network connections. Dealing with DDoS attacks is difficult due to their properties such as dynamic attack rates, big scale of botnets. DDos attack become more difficult to handle if it occurs in wireless network because of the properties of ad hoc network such as dynamic topologies, low battery life, Unicast routing Multicast routing , Frequency of updates or network overhead , scalability , mobile agent based routing ,power aware routing etc. Thus it is better to prevent the distributed denial of service attack rather than allowing it to occur and then taking the necessary steps to handle it. The following quantitative metrics Packet Delivery Ratio (PDR), Number of Collisions are to be used to evaluate the performance of DDoS attacks and their prevention techniques under different combinations in the fixed mobile ad hoc network. In our simulation, the effect of DDoS attacks under different number of attackers is studied. Read More...
|
Computer Science & Enginnering |
India |
1704-1709 |
5 |
A Novel Management Framework for Policy Anomaly in Firewall
-Ms. S. Selvakanmani
The advent of emerging technologies such as Web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effectively. However, we still suffer from unintended security leakages by unauthorized actions in business services. Firewalls are the most widely deployed security mechanism to ensure the security of private networks in most businesses and institutions. The effectiveness of security protection provided by a firewall mainly depends on the quality of policy configured in the firewall. Unfortunately, designing and managing firewall policies are often error-prone due to the complex nature of firewall configurations as well as the lack of systematic analysis mechanisms and tools. In this paper, we represent an innovative policy anomaly management framework for firewalls, adopting a rule-based segmentation technique to identify policy anomalies and derive effective anomaly resolutions. We also discuss a proof-of-concept implementation of a visualization-based firewall policy analysis tool called Firewall Anomaly Management Environment (FAME). In addition, we demonstrate how efficiently our approach can discover and resolve anomalies in firewall policies through rigorous experiments using Automatic rule generation technique. Read More...
|
Computer Science & Enginnering |
India |
1710-1715 |
6 |
Influence of Metal Temperature on Strength of Rolled Steel Product
-Rohit kumar ; Lakshman Singh; Yadwinder Singh; Avinder Singh
Rolling is extensively used metal forming process. Almost 90% of cast iron or steel products pass through rolling process at least once in its life cycle. Rolling products are most extensively used in daily life. Use of these products can be seen in bridges, towers, leaf springs, boilers, constructional structural parts and also in daily life products like knives pipes etc. In today's era, quality of products is one of most important factor considered for its use. Quality of a product can either be controlled or improved by changing in composition or by using heat treatment processes. In rolling products composition is not only the factor which improve the quality of product but temperature plays a vital role in maintaining and improving quality. By changing temperature of rolling we can change grain structure and its mechanical properties without changing its composition. Read More...
|
Mechanical Engineering |
India |
1716-1719 |
7 |
Stress Induced in Two Nodal Fixed System is Directly Proportional to Nodal Displacement only
-Shukla Asitkumar N
In this research work we found that the stress concentration in rope ways or any two system having only two nodes and having load somewhere in between the nodes then the stress generated in the system is directly proportional to nodal displacement only. To have idea of such physical system we have considered practical example of rope ways in mind. Read More...
|
Mechanical Engineering |
India |
1720-1721 |
8 |
Sustainable vegetables and flowers cultivation Practices Adopted by Greenhouse Growers in the Sabarkantha
-A. D. Chendake ; P. M. chauhan
This paper analyzes vegetables and flowers cultivation practices of randomly selected farmers in the Sabarkantha district of Gujarat on the basis of personal interviews and observation. Growers were asked about different cultivation practices of vegetables (Capsicum, tomato), flowers like gerbera they were followed in the greenhouse. 70 per cent and 20 per cent of capsicum growers fell under high and low adoption cultivation practices categories. While 83 per cent of the gerbera growers belonged to high adoption category as well as 17 per cent respondents fell under low adoption cultivation practices categories respectively. Read More...
|
Renewable Energy and Rural Engineering |
India |
1722-1725 |
9 |
A Study of CADS approach in Collaborative Information System for Detecting Anomalous Insiders
-Gayatri K. Chaturvedi
A group of users are allowed to communicate and cooperate over a common task with the help of Collaborative Information System. Collaborative information systems (CISs) are deployed within a diverse array of environments that manage sensitive information. Recent breakthroughs in networking, storage and ubiquitous computing have facilitated an explosion in the deployment of CIS across a wide range of environments. Current security mechanisms detect insider threats but they are not efficient to monitor systems in which users function in dynamic teams. In this paper, we introduce the community anomaly detection system (CADS), an unsupervised learning Framework to detect insider threats based on the access logs of collaborative environments. A CADS consists of two components: 1) Relational pattern extraction, which derives community structures and 2) Anomaly prediction, which leverages a statistical model to determine when users have sufficiently deviated from communities. We further extend CADS into MetaCADS to account for the semantics of subjects (e.g., patients' diagnoses). Based on the analysis of result illustrates when the number of illicit users is low, MetaCADS is the best model. But as the number grows, commonly accessed semantics lead to hiding in a crowd such that CADS is more prudent. Read More...
|
Computer Science & Enginnering |
India |
1726-1730 |
10 |
Gesture Recognition using Wireless Signal
-Nikul A. Patel ; Chandrakant D. Prajapati
This paper presents WiSee, a novel gesture recognition system that leverages wireless signals (e.g., Wi-Fi) to enable whole-home sensing and recognition of human gestures. Since wireless signals do not require line-of-sight and can traverse through walls, WiSee can enable whole- home gesture recognition using few wireless sources. Further, it achieves this goal without requiring instrumentation of the human body with sensing devices. Read More...
|
Computer Science & Enginnering |
India |
1731-1736 |
11 |
A Review Paper on Network Layer attacks in MANETs
-Prof. Hardik Patel ; Dhruvi Marsonia
The security issues are the major consideration while implementing Mobile Ad hoc Networks (MANETs). Misbehavior of any node can do serious implications in this kind of dynamic network. A malicious or selfish node wants to preserve own resources along with using the services of other nodes and consumed their resources. Malicious nodes can break the rules and reduce the performance of well-behaved nodes significantly. This paper describes the different attacks and analysis of within Network Layer in MANETs. Read More...
|
Computer Science & Enginnering |
India |
1737-1740 |
12 |
Analysis on a Waveguide Mode Converter
-P.D.Kanani ; V. M. Unadkat; S. P. Dave
There is a mainly two types of waveguide which are mainly used in microwave transmission. A Rectangular waveguide and a circular waveguide. Microwave Propagation is being through these waveguides via different modes at different frequencies. But in practical implementation many problems arise like an ascetic excitation method, efficiency of particular mode, complex calculation etc., and an alternation is used. It is called a waveguide converter. In this paper different types of methods are analyzed and describe an output of these methods. Read More...
|
Electronics and Communication |
India |
1741-1745 |
13 |
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
-S. S. Dhakad ; Umesh Barahdiya; Manoj Jakheniya; Bharat Raj Pandey; Deepak Gupta
In Wireless Adhoc Network is a group of wireless mobile nodes is an autonomous system of mobile nodes connected by wireless links. Every node operates as an end system and as a router to forward packets. In this paper mainly focused on Mac layer because this layer is most important for the data communication using control the packet loss and we worked on the comparison based performance of wimax802.16 and wireless802.11 networks using Ad hoc on- demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol. In this paper we used the different maximum speed for the network. And this comparison based on unicast On-demand routing procedure and our simulation for mobile ad hoc networks discover and maintain only needed the design and follows the idea that each node by sending routing packets whenever a communication is requested and compared various parameter packet delivery ratio, normalized routing load and e-e delay. These simulations are carried out using the Network simulator version-2. The results presented in this work illustrate the importance in carefully evaluating and implementing routing protocols in an ad hoc environment. Read More...
|
Computer Enginnering |
India |
1746-1749 |
14 |
A Review of different method of Medical Image Segmentation
-Kinjal Patel ; Avani Dave
Image Segmentation is a most important task of image analysis. Number of method used for image segmentation. Image segmentation mainly used in different field like medical image analysis, character re-congestion etc. A segmentation method finds the sets that are different structure from each other and completion of segmentation process that cover entire image. Read More...
|
Computer Enginnering |
India |
1750-1751 |
15 |
A review on techniques for optimizing process parameters for TIG Welding Aluminium
-Parthiv T. Trivedi ; Ashwin P. Bhabhor
Tungsten inert gas welding is one of the widely used techniques for joining ferrous and non-ferrous metals. TIG welding offers several advantages like joining of dissimilar metals, low heat affected zone, absence of slag etc. Gas tungsten arc welding, GTAW, uses a non consumable electrode to produce the weld. Weld area is protected from atmospheric contamination by a shielding gas (usually inert gas such as argon) and a filler material is normally used. The weld pool is easily controlled such that unbaked root passes can be made, the arc is stable at very low welding currents enabling thin components to be welded and the process produces very good quality weld metal, although highly skilled welders are required for the best results. The welding parameters are selected by operator based on experience or from a handbook. However, this does not ensure that the selected welding process parameters can produce the optimal or near optimal weld pool geometry for that particular welding machine and environment. The aim of this paper is to review the techniques of optimizing process parameters of TIG welding process. Read More...
|
Electrical and Electronics Engineering |
India |
1752-1755 |
16 |
A survey on Efficient Enhanced K-Means Clustering Algorithm
-Prof. Nirali Mankad ; Prof. Vimal Pambhar
Data mining is the process of using technology to identify patterns and prospects from large amount of information. In Data Mining, Clustering is an important research topic and wide range of unverified classification application. Clustering is technique which divides a data into meaningful groups. K-means clustering is a method of cluster analysis which aims to partition n observations into k clusters in which each observation belongs to the cluster with the nearest mean. In this paper, we present the comparison of different K-means clustering algorithms. Read More...
|
Computer Enginnering |
India |
1756-1758 |
17 |
Detecting Intrusion in Data Mining using Naive Bayes Algorithm
-Shyara Taruna R. ; Mrs. Saroj Hiranwal
With the tremendous increase of network-based services and information sharing on networks, network security is getting more and more importance than ever. Intrusion poses a serious security risk in a network environment. The human classification of the available network audit data instances is usually tedious, time consuming and expensive. Data mining has become a very useful technique for detecting network intrusions by extracting useful knowledge from large number of network data or logs. Naive Bayes classifier is one of the most popular data mining algorithms for classification, which provides an optimal way to predict the class of an unknown example. We tested the performance of our proposed algorithm by employing KDD99 benchmark network intrusion detection dataset, and the experimental results proved that it improves detection rates as well as reduces false positives for different types of network intrusions. Read More...
|
Computer Science & Enginnering |
India |
1759-1762 |
18 |
An Efficient Approach for Image Enhancement Based on Image Fusion with Retinex and Gamma Correction
-Avnish Patel ; Mohit Bhadla; Jaydeep Tadhani
Aiming at problems of poor contrast and blurred edges in degraded images, a novel enhancement algorithm is proposed in present research. Image fusion refers to a technique that combines the information from two or more images of a scene into a single fused image.The Algorithm uses Retinex theory and gamma correction to perform a better enhancement of images. The algorithm can efficiently combine the advantages of Retinex and Gamma correction improving both color constancy and intensity of image. Read More...
|
Computer Engineering |
India |
1763-1766 |
19 |
A Novel Approach of Image Ranking based on Enhanced Artificial Bee Colony Algorithm
-Foram Joshi ; Nidhi Gondalia; Nirali Mankad
In recent years researchers have provided novel problem solving techniques based on swarm intelligence for solving difficult real world problems such as traffic, routing, networking, games, industries and economics. Artificial bee colony algorithm (ABC) was first developed by Dervis Karaboga [1]. When the robust performance is desired by means of searching something, the swarms does it better; by adaptation of greedy selection and random search. The ABC algorithm simulates the foraging behavior of honey bees. The local search in two stages in each step and global search are responsible for making this algorithm a robust search technique. The details of this algorithm are discussed here. Because of its very strong search process, computational simplicity and ease of modification according to the problem, the ABC algorithm is now finding more widespread applications in business, scientific and engineering circles. In this paper, we provide a thorough and extensive overview of most research work focusing on the application of ABC, with the expectation that it would serve as a reference material to both old and new, incoming researchers to the field, to support their understanding of current trends and assist their future research prospects and directions. Also new proposed architecture of Enhanced ABC algorithm for image ranking is also given here. Read More...
|
Computer Engineering |
India |
1767-1771 |
20 |
Investigation on Optimization of Machining Parameters in Wire EDM using Taguchi Technique
-G. Lakshmikanth ; Nirmal Murali; G. Arunkumar; S. Santhanakrishnan
In this paper, the parameters used in the cutting of Cemented Tungsten Carbide using wire electrical discharge machining (WEDM) with a Brass electrode was optimized using Taguchi method. Taguchi method is used to formulate the experimental layout and to analyze the effect of each parameter on the machining characteristics. Also it is used to predict the optimal choice for each parameter such as peak current, voltage, and pulse duration and interval time. It was found that these parameters have significant influence on machining characteristics such as Metal Removal Rate (MRR) and Surface Roughness (SR). The result of the work reveals that, the peak current significantly affects the Surface Roughness (SR) and the pulse duration mainly affects the Metal Removal Rate (MRR). Read More...
|
Mechanical Engineering |
India |
1772-1774 |
21 |
Introduction to Geographical Information System, GIS data models, spatial data, spatial database, A Location based Secure Access Control Method for Geospatial Data
-Miss. Jalpa K. Goswami ; Mr. Chetan Chauhan
Geospatial data is data about the geographic location of earth surface features and boundaries on Earth. Nowadays spatial data is used in every field of society and due to the advancements in spatial data acquisition technologies, such as the advancements in the satellite sensor technologies, high precision digital cameras used in the capturing of photogram metric images and high precision land surveys are producing mass high precision spatial data. Due to these issues nowadays sensitivity of spatial data has increased too many folds. To store such high precision data onto the database is a big challenge today. Major security concerns of the geospatial data are based on authorization, authentication, access control, integrity, security and secure transmission of spatial data over the network and transmission media. In this paper the major security concerns of geospatial data, various data models, introduction to Geographical Information System, GIS data models, spatial data, and spatial database. The basic objective is to developed secure access control mechanism. Read More...
|
Computer Engineering |
India |
1775-1776 |
22 |
Multiparameter Web Sensor
-Tushar Dave ; Vijayprakash Singh; Mohit Vekariya; Yashit Tita; Chintan Jani
Design a multi-parameter data acquisition system for an Air Quality Monitoring and publish the data over internet through embedded web server The most common causes of CO exposure are fires, faulty combustion heating systems, exhaust from internal combustion engines and heating gases other than natural gas. Leading cause of accidental poisoning deaths is due to carbon monoxide. CO impairs oxygen delivery and has its most lethal effects on organs requiring high levels of oxygen like the brain and heart. Air quality monitoring system presents a network for indoor and outdoor air quality monitoring. Each node is installed in a different room and includes tin dioxide sensor arrays connected to an acquisition system. The nodes are hardwired or wirelessly connected to a central monitoring unit. To increase the gas concentration measurement accuracy, two gas sensor influence quantities like temperature and humidity are also measured. Therefore, the proposed work is multi parameter data acquisition system for air quality monitoring and to publish the data over internet through embedded web server. The data of the different sensors are transmitted using the wireless transmission technique and it is published over the internet. Read More...
|
Computer Science & Enginnering |
India |
1777-1779 |
23 |
Analysis of Cryptographic Algorithms
-Sneha Shah ; Kushal Patel
Presently on a daily basis sharing the information over web is becoming a significant issue due to security problems. Thus lots of techniques are needed to protect the shared info in academic degree unsecured channel. The present work target cryptography to secure the data whereas causing inside the network. Encryption has come up as a solution, and plays an awfully necessary role in data security. This security mechanism uses some algorithms to scramble info into unclear text which can be exclusively being decrypted by party those possesses the associated key. This paper is expounded the varied forms of algorithmic rule for encryption & decryption: DES, AES, RSA, and Blowfish. It helps to hunt out the best algorithmic rule. Read More...
|
Electronics and Communication |
India |
1780-1782 |
24 |
A Survey Paper on Image Encryption Techniques
-Jasmine Jha ; Monika Gunjal
Security is an important issue in digital data transmission and storage. The security can be provided by image encryption. Encryption is one of the ways to provide high security when images are transmitted over the network. Image encryption techniques scrambled the pixels of the image and decrease the correlation among the pixels, so that we will get lower correlation among the pixel and get the encrypted image which is hard to understand. There are so many different image encryption techniques available to protect confidential image data from unauthorized access. Image encryption techniques which provide transmission of digital images in more secure way. Encryptions algorithms that are good for textual data may not be suitable for multimedia data because images contain large data. This paper present survey of various encryption methods with its advantages and disadvantages. Read More...
|
Computer Engineering |
India |
1783-1786 |
25 |
Review of Various Techniques for Energy Aware Routing Protocol for MANET
-Dr. Kalpesh Wandra ; Mitesh Thakkar; Parthesh S. Raval
MANET is mobile adhoc network which is relay on power of network. Battery is important factor in MANET. MANET is collection of nodes which are move freely and changing the topology of network. AODV is on demand protocol. Energy of nodes is effect of network lifetime. Blind flooding in aodv which are improving contention in network also it increased higher number retransmission. In the proposed algorithm which modifies the conventional aodv which find more stable path improve the performance better than conventional AODV. Read More...
|
Computer Engineering |
India |
1787-1790 |
26 |
A Survey Paper on Character Recognition
-Avani Dave ; Rinku Patel
Nowadays character recognition has gained lot of attention in the field of pattern recognition due to its application in various fields. It is one of the most successful applications of automatic pattern recognition. Research in OCR is popular for its application potential in banks, post offices, office automation etc. HCR is useful in cheque processing in banks; almost all kind of form processing systems, handwritten postal address resolution and many more. This paper presents a simple and efficient approach for the implementation of OCR and translation of scanned images of printed text into machine-encoded text. It makes use of different image analysis phases followed by image detection via pre-processing and post-processing. This paper also describes scanning the entire document (same as the segmentation in our case) and recognizing individual characters from image irrespective of their position, size and various font styles and it deals with recognition of the symbols from English language, which is internationally accepted. Read More...
|
Computer Engineering |
India |
1791-1795 |
27 |
Analysis and Detection of Image Forgery Methodologies
-Vidhi P. Raval
"Forgery" is a subjective word. An image can become a forgery based upon the context in which it is used. An image altered for fun or someone who has taken a bad photo, but has been altered to improve its appearance cannot be considered a forgery even though it has been altered from its original capture. The other side of forgery are those who perpetuate a forgery for gain and prestige. They create an image in which to dupe the recipient into believing the image is real and from this they are able to gain payment and fame. Detecting these types of forgeries has become serious problem at present. To determine whether a digital image is original or doctored is a big challenge. To find the marks of tampering in a digital image is a challenging task. Now these marks of tampering can be done by various operations such as rotation, scaling, JPEG compression, Gaussian noise etc. called as attacks. There are various methods proposed in this field in recent years to detect above mentioned attacks. This paper provides a detailed analysis of different approaches and methodologies used to detect image forgery. It is also analysed that block-based features methods are robust to Gaussian noise and JPEG compression and the key point-based feature methods are robust to rotation and scaling. Read More...
|
Computer Engineering |
India |
1796-1798 |
28 |
Experimental and Analytical Performance of Gas Gap Cryogenic Thermal Switch using N2 gas
-Mr. Khalid Siddiqui ; Mr. Bhavesh parekh
Heat switches are important devices in many cryogenic setups, especially in space applications and many systems have been used to allow a good ability to make or break a thermal contact. Among them, the so-called gas gap heat switches are known to be very reliable and simple due to the nonexistence of moving parts. The ON (conducting) state of the switch are obtained by varying the gas pressure and OFF (insulating) are obtained by creating vacuum in gap. In this paper, the gas gap cryogenic thermal switch is fabricated and tested using LN2 storage vessel. The thermal characteristics (Conductance in the ON and OFF state) of a "Gas Gap Heat Switch" are obtained experimentally and analytically using nitrogen as exchange gas. It is concluded that for both ON and OFF state, thermal conductance increases as heat load increases. Read More...
|
Mechanical Engineering |
India |
1802-1805 |
29 |
A Survey on Big Data Analysis Techniques
-Himanshu Rathod ; Tarulata Chauhan
There is a growing trend of applications that ought to handle huge information. However, analysing huge information may be a terribly difficult drawback nowadays. For such data many techniques can be considered. The technologies like Grid Computing, Volunteering Computing, and RDBMS can be considered as potential techniques to handle such data. We have a still in growing phase Hadoop Tool to handle such data also. We will do a survey on all this techniques to find a potential technique to manage and work with Big Data. Read More...
|
Computer Engineering |
India |
1806-1808 |
30 |
Multiple Channel Serial I/O Interfacing using FPGA Kit
-Sneha Shah ; Krupa Patel
The Digital input and output interface (DIO) could be an important part for a machine needed to be interacted with its setting. Even though a main processing unit (MPU) utilized within the machine has its own DIO channel, for some cases, the machine should use plenty of DIO channel than those the MPU can offer. To avoid this downside, a DIO board interfaced on to the MPU via serial communication is intended. If the MPU connect with multiple DIO boards directly, it's going to waste sometime to process of communication data. The inessential measure of the MPU and likelihood to have many DIO boards connected, a serial interface unit supported FPGA is developed to help the MPU to talk with DIO boards. The FPGA unit automatically browses serial signals from each DIO boards and save understood data to share registers for MPU to scan. The FPGA unit put together impromptu reads registers written by MPU and send registers values to DIO boards automatically. Read More...
|
Electronics and Communication |
India |
1814-1817 |
31 |
A Review on Various Approach for Process Parameter Optimization of Burnishing Process and TAGUCHI Approach for Optimization
-Prof. Kiran Patel ; Yatin Patel
The aim of this paper is review for different optimization methods used for process parameter optimization of roller burnishing process and Taguchi approach used for process parameter optimization for various processes. The quality of burnishing processed parts are highly depends upon various process parameters of burnishing process. Hence optimization of burnishing process parameters is necessary in order to improve the quality of parts. The purpose of this paper is to explore the reviews for various optimization methods used for process parameter optimization of burnishing process and application of Taguchi approach for design of experiments. Read More...
|
Mechanical Engineering |
India |
1818-1820 |
32 |
Analysis of SEPIC for PV-Applications using PI Controller and Current Mode Control
-Tadi G L Krishna Reddy ; Ramam urthyraju. P; Revanth kumar.V
A SEPIC (single-Ended Primary Inductor
Converter) DC-DC converter is capable of operating in
either step-up or step-down mode and widely used in
battery-operated equipment. This paper presents two various
closed loop techniques of SEPIC Converter, namely current
mode control and PI control using PV panel. For PI
controller voltage is taken as reference, for current mode
controller current has taken as reference, by using the
current mode controller chaos has also controlled. Read More...
|
Electrical and Electronics Engineering |
India |
1821-1824 |
33 |
Catalytic Converter Made of Non-noble Material for an Automobile
-Diptesh Patel ; Nikit B. Patel; Saurabh B. Patel; Milan S. Patel
This paper is reports on the review of catalytic converter made of non - noble material for an automobile. The converter made of the noble material is highly efficient but there is some major problem associated with these converters. First problem is the cost of the catalytic converter increased due to high cost of the noble material. Second problem is that they are operated at the higher temperature. Third problem is that the noble material is rarely available in earth crust and hence they are exhausted one day. Due to above problem associated with the noble material there is some option required for the noble material which is easily available at the lower cost. The non - noble material (Copper, Nickel, Zinc etc.) is perfect for the use into the catalytic converter instead of the noble material as they are easily available at low cost and operated at lower temperature than the noble material. Read More...
|
Mechanical Engineering |
India |
1825-1827 |
34 |
A Review on Effect of Process Parameters on Tensile Strength of Friction Stir Welded Aluminium Alloys
-Chetan Patel ; Siddhartha J. Raval; Neel N. Patel; Sagar A. Mehata
Friction stir welding (FSW) is an innovative solid state joining process. This paper discuss about the friction stir welding of joining heat treated aluminum alloys for Aerospace and Automobile industries. These welded joints have higher tensile strength to weight ratio and finer micro structure. FSW of aluminum alloys have the potential to hold good mechanical and metallurgical properties. An attempt is made to determine and evaluate the influence of the process parameters of FSW on the weldments. The aim of this study was to investigate the effect of process parameters on the tensile strength of the welded joints. Read More...
|
Mechanical Engineering |
India |
1828-1831 |
35 |
Garbage Management using Android Smartphone
-Dr. Rajasimha A Makaram ; Shivu Gururaj; S.K Pushpa; Vishaka Yadav
Environmental pollution nowadays is a major aspect to be considered. Pollution has to be avoided and there are several ways to control it. In this paper, we propose an innovative software application, via which a user can send an alert text message and location details to the garbage/waste management department in the campus and also post the same details on the dedicated web server. This information essentially helps the respective department to take care of garbage present in the campus. Read More...
|
Computer Science & Engineering |
India |
1832-1834 |
36 |
Implementation and Design of High Speed FPGA-based Content Addressable Memory
-Anupkumar Jamadarakhani ; Shailesh Kumar Ranchi
CAM stands for content addressable memory. It is a special type of computer memory used in very high speed searching application. A CAM is a memory that implements the high speed lookup-table function in a single clock cycle using dedicated comparison circuitry. It is also known as associative memory or associative array although the last term used for a programming data structure. Unlike standard computer memory (RAM) in which user supplies the memory address and the RAM returns the data word stored in that memory address, CAM is designed in such a way that user supplies data word and CAM searches its entire memory to see if that data word stored anywhere in it. If the data word is found, the CAM returns a list of one or more storage address where the word was found. This design coding, simulation, logic synthesis and implementation will be done using various EDA tools. Read More...
|
Computer Engineering |
India |
1835-1842 |
37 |
A Review on Parametric optimization of MIG Welding for Medium Carbon Steel using FEA-DOE Hybrid Modeling
-Jayesh V. Desai ; Tushar M. Patel; Satyaduttsinh P. Chavda
Welding is a manufacturing process, which is
carried out for joining of mostly all metals. Metal inert gas
(MIG) welding also known as Gas Metal Arc Welding
(GMAW) process consists of heating, melting and
solidification of parent metals and a filler material in
localized fusion zone by a transient heat source to form a
joint between the parent metals. A consumable electrode is
used which also plays the role of conductor. MIG welding
gives little loss of material and can be operated as semi as
well as fully automated. A review of the techniques used for
Design of Experiment (DOE) for this work has been
indicated in this paper. Also the techniques used for
obtaining optimal process parameters with the use of
experimental data have been reviewed. The success of MIG
welding process in terms of providing weld joints of good
quality and high strength depends on the process conditions
used in the setup. This review aims at identifying the main
factors that have significant effect on weld joint strength and
weld pool geometry (depth of penetration, weld width, etc.).
The aim of this paper is to review the techniques of
optimizing process parameters of MIG welding process and
compare the experimental result with FEA for optimizing
parameter. Read More...
|
Mechanical Engineering |
India |
1843-1846 |
38 |
Parametric Optimization on MIG Welded EN8 Material Joints by using Taguchi Method
-R. B. Prajapati ; Meet Shah; Div Ray; Jigar Thakkar; Dhaval Patel
Welding is a manufacturing process, which is carried out for joining of metals. By MIG Welding it is possible to weld in all positions. Optimization of the parameter will be carried out by Taguchi method. We will use EN-8 material which is more use in Automobile parts. EN8 plate with dimensions 250mm x 125mm x 6mm with V- Groove 650.Where the input parameters are welding current, Wire feed and gas flow rate and output parameters are tensile strength and Hardness. Read More...
|
Mechanical Engineering |
India |
1847-1850 |
39 |
Configuration Navigation Analysis Model for Regression Test Case Prioritization
-Manas Kumar Yogi
Regression testing has been receiving increasing attention nowadays. Numerous regression testing strategies have been proposed. Most of them take into account various metrics like cost as well as the ability to find faults quickly thereby saving overall testing time. In this paper, a new model called the Configuration Navigation Analysis Model is proposed which tries to consider all stakeholders and various testing aspects while prioritizing regression test cases. Read More...
|
Computer Science & Engineering |
India |
1851-1853 |
40 |
Hand Gesture Recognition System for Human-Computer Interaction with Web-Cam
-Narendra V. Jagtap ; Prof. R. K. Somani; Prof. Pankaj Singh Parihar
This paper represents a comparative study of exiting hand gesture recognition systems and gives the new approach for the gesture recognition which is easy cheaper and alternative of input devices like mouse with static and dynamic hand gestures, for interactive computer applications. Despite the increase in the attention of such systems there are still certain limitations in literature. Most applications require different constraints like having distinct lightning conditions, usage of a specific camera, making the user wear a multi-coloured glove or need lots of training data. The use of hand gestures provides an attractive alternative to cumbersome interface devices for human-computer interaction (HCI). This interface is simple enough to be run using an ordinary webcam and requires little training. Read More...
|
Computer Science & Engineering |
India |
1854-1859 |
41 |
Comparative Analysis: Network Forensic Systems
-Prof. R. K. Somani ; Prof. Pankaj Singh Parihar; Vishvendu M. Bhatt
Network Forensics is scientifically proven technique to accumulate, perceive, identify, examine, associate, analyse and document digital evidence from multiple systems for the purpose of uncovering the fact of attacks and other problem incident as well as performing the action to recover from the attack. Many systems are proposed for designing the network forensic systems. In this paper we have prepared comparative analysis of various models based on different techniques. Read More...
|
Computer Science & Engineering |
India |
1860-1863 |
42 |
Smart License Plate Recognition System based on Image Processing
-Jatin M. Patel ; R. K. Somani; Pankaj Singh Parihar
This report describes the Smart License Plate Reorganization System, which can be installed into a tollbooth for automated acceptation of vehicle license plate details using an image of a vehicle. This Smart License Plate Reorganization system could then be implemented to control the payment of fees, highways, bridges, parking areas or tunnels, etc. This report contains new algorithm for acceptation number plate using Structural operation, Thresholding operation, Edge detection, Bounding box analysis for number plate extraction, character separation using separation and character acceptation using Template method and Feature extraction. Read More...
|
Computer Science & Engineering |
India |
1864-1869 |
43 |
Plasmonics-A New Device Technology
-Dr. M. N. Thippeswamy ; Sativada Monica; Rishabh Chickballapur Nagaraj
Electronic circuits provide us with the ability to control the transport and storage of electrons. However, the performance of electronic circuits is now becoming rather limited when digital information needs to be sent from one point to another. Photonics offers an effective solution to this problem by implementing optical communication systems based on optical fibers and photonic circuits. Unfortunately, the micrometer-scale bulky components of photonics have limited the integration of these components into electronic chips, which are now measured in nanometers. Surface plasmon-based circuits, which merge electronics and photonics at the Nano scale, may offer a solution to this size-compatibility problem. Here we review the current status and future prospects of plasmonics in various applications including plasmonic chips, light generation, and nanolithography. Read More...
|
Electronics and Communication |
India |
1870-1874 |
44 |
A Review of some Popular High Utility Itemset Mining Techniques
-Abhishek Raghuwansi ; Pradeep K. sharma
Data Mining can be defined as an activity that extracts some new nontrivial information contained in large databases. Traditional data mining techniques have focused largely on detecting the statistical correlations between the items that are more frequent in the transaction databases. Like frequent item set mining, these techniques are based on the rationale that item sets which appear more frequently must be of more importance to the user from the business perspective. In this thesis we throw light upon an emerging area called Utility Mining which not only considers the frequency of the item sets but also considers the utility associated with the item sets. The term utility refers to the importance or the usefulness of the appearance of the item set in transactions quantified in terms like profit, sales or any other user preferences. In High Utility Item set Mining the objective is to identify item sets that have utility values above a given utility threshold. In this thesis we present a literature review of the present state of research and the various algorithms for high utility item set mining. Read More...
|
Computer Science & Engineering |
India |
1875-1877 |
45 |
A study on Identification of Rural Consumer and Rural Marketing in Indian Perspectives
-Dr. Chanduji Thakor ; Prof. Indubhai Patel
This article deals with the issues & challenges faced by the marketers while penetrating in to rural market. It also illustrates how some companies have used the different strategies to establish themselves in the rural market. The Indian rural market is full of opportunities and has seen impressive growth in recent years. A boom is being witnessed in the rural markets and a large untapped market exists there. Companies across different sectors are foraying into the burgeoning rural markets to fuel their growth engine. Companies have to ascertain the needs of those consumers and explore the potential of rural markets with appropriate marketing strategies. To understand the social dynamics and attitude variations within each village though nationally it follows a consistent pattern looking at the challenges and the opportunities which rural markets offer to the marketers it can be said that the future is very promising for those who can understand the dynamics of rural markets and exploit them to their best advantage.
Largely, it can be concluded that there is huge rural market which is waiting to be served, ready to splurge, willing to explore new products and services. The corporate sector is, thus, increasingly looking towards the rural consumers and fine tuning its marketing strategies to tap on their wallets and promote their products. Read More...
|
Business Administration |
India |
1878-1880 |
46 |
A Two Tiered Data Origin Authentication Scheme for Adhoc Network
-Jyothish K John ; Tibin Thomas; Karthik M; Leenu Rebecca Matheew
Ad-hoc networks are becoming an effective tool for many mission critical applications such as troop coordination in a combat field, situational awareness, etc. Therefore, authenticating the source and ensuring the integrity of the message traffic become a fundamental requirement for the operation and management of the network. Since we are using small system in the adhoc network application, memory usage is also an important issue. Here we are presenting a system which reduces the memory attacks and control the memory usage of the devices in the adhoc network. By clustering the adhoc network we also achieve high scalability. One way hash function and MACs are used for the authentication purpose. The simulation demonstrates the advantage of this system to existing system in terms of throughput, memory, delay, etc. Read More...
|
Computer Science & Engineering |
India |
1881-1886 |
47 |
CIP Based BOND for Wireless Sensor Networks
-Mr. P. Dineshkumar
The lifetime of Wireless Sensor Networks restricted by the energy level of the nodes .In traditional WSN, if a sensor node dies the base station could not able to find the dead of the node. Even if predicts it can't able to get the sensing information before it going to die. The node can dies because of animal distraction, natural disaster, battery power consumption. The base station will be in critical situation because of losing node information like identity of the node, reason for dead, and sensed information. In our proposed method the WSN nodes are arranged in cellular structure, to optimize the coverage area, reliability in getting information from the nodes and minimizing loss of information's are improved. Read More...
|
Computer Engineering |
India |
1887-1892 |
48 |
Microcontroller Based Intelligent Blood Collecting System
-M. Janardhana Raju ; P. Aruna Kumari
In Hospitals Blood Plays major role, so to collect blood doctor has to conduct blood camps. To this blood camps we need more number of equipment and heavy man power. This paper mainly introduces a system to collect blood automatically and also reduce the manpower and time. In this system microcontroller is used to control all the equipment like RFID, BP Sensor, DC motor and fingerprint scanner. Here RFID is used to collect donor details of health condition to avoid accident like HIV etc. BP Sensor will sense the blood pressure in digital value. In this paper DC motor used to collect blood and Fingerprint is for doctor authentication. Finally by internetworking we can collect the blood. Read More...
|
Electronics and Communication |
India |
1893-1897 |
49 |
A Literature Review on Effect of Machining Parameters in Wire - EDM
-Prof. Ankit Darji ; Rutvik A. Shah
The recent upgradation of newer and harder materials has made the machining task in WEDM quite challenging. Thus for the optimum use of all the resources it is essential to make the optimum use of parameters to get the best output to increase the productivity. Advances in technology have impacted with an increased cutting speed and tight tolerances in WEDM. This paper reviews the various notable works in field of WEDM and magnifies on effect of machining parameters on MRR, kerf width and surface roughness. Read More...
|
Mechanical Engineering |
India |
1898-1900 |
50 |
A Review on optimization of Dry Electro Discharge Machining Process Parameters
-Prof. Chirag P. Patel ; Kashyap R. Modi; Dr. M. G. Bhatt
Dry EDM is an environmental friendly machining process were liquid dielectric is replaced by gaseous dielectrics. There are presented performance characteristics of the process, using various gases and their mixtures as dielectric medium. The main aim is to study the effect of gap voltage, discharge current, pulse-on time, duty factor, air pressure and spindle speed on Material removal Rate (MRR), Surface Roughness (Ra) and Tool Wear Rate (TWR). Influence of gas pressure, flow rate and rotational speed of the electrode are also discussed resulting in finding optimal conditions for machining, depending on the optimization criteria. Read More...
|
Mechanical Engineering |
India |
1901-1904 |