No. |
Title and Author |
Area |
Country |
Page |
1 |
Grid Computing with different Fault Tolerant Mechanisms
-Mr. Gaurav Prajapati ; Mr. Ramesh Prajapati; Dr. Samrat Khanna
Grid is beyond simple communication between computers but it aims ultimately to turn the global network of computers into one wast computational resource. Grid is a service of sharing computer power and data storage capacity over the Internet and Intranet. The goal of Grid computing is to create the illusion of a simple but large and powerful self-managing virtual computer out of a large collection of connected heterogeneous systems sharing various combinations of resources. Grid computing is defined as a hardware and software infrastructure that enables coordinated. Resource sharing within dynamic organizations. In grid computing, the probability of a failure is much greater Therefore, the fault tolerance is an important property in order to achieve reliability, availability and QOS. Fault tolerance is an important property for large scale computational grid systems, where geographically distributed nodes co-operate to execute a task In this paper, we give a Review on various fault tolerance mechanisms, types of faults in system and management the various fault in different systems and related issues and how to develop fault tolerant system and recover the faults in the system. Read More...
|
Computer Science & Engg. |
India |
1-4 |
2 |
TRIP GENERATION ANALYSIS IN THE DEVATHANAM WARD OF TIRUCHIRAPPALLI CITY(TAMIL NADU, INDIA)
-SIVAPRAKASH G ; Nisha Radhakrishnan
Transportation planning involves a four step planning process in which trip generation plays a vital role. The most common method of analyzing trips generated is to utilize a travel demand model that considers socio economic factors based on anticipated land use, household and employment changes. This project estimates the trip generations and choice of transport modes in the study area. The current travel trends are analyzed by conducting Home Interview Survey in the study area. Numbers of trips made in the study area in terms of trip purpose, mode of travel, travel time were analyzed. Based on these data, statistical models were developed by considering population, employment, socio economic characteristics. For the present population and employment, the travel characteristics are estimated from the travel demand model. Read More...
|
Civil Engineering- Transportation Engineering and Management |
India |
5-10 |
3 |
Mitigation of Voltage of Sag in Distribution system using D-STATCOM
-VARLEKAR KRISHNA MADHUBHAI ; Mrs. Zenifar B. PAREKH
this paper present aims to about the performance of D-STATCOM, to mitigate voltage sag, hence improve the power quality of the power system. Various loads like Starting of induction motor, Transient fault & Arc furnace will create voltage sag in the power system, by using D-STATCOM, this paper simulation models for the mitigation of voltage sag due to above mentioned causes are done & maintain the voltage profile using MAT-LabR-2011a software. Read More...
|
Electrical engineering |
India |
11-15 |
4 |
Hybridisation of Extended Embedded VC and Progressive VC to Enhance the Security of the Scheme
-saloni gupta ; Mr. M. Mohan
the basic (k, n)-threshold visual cryptography (VC) scheme is to share a secret image with n participants. The secret image can be recovered while stacking k or more shares obtained; but we will get nothing if there are less than k pieces of shares being overlapped. On the contrary, progressive VC can be utilized to recover the secret image gradually by superimposing more and more shares. If we only have a few pieces of shares, we could get an outline of the secret image; by increasing the number of the shares being stacked, the details of the hidden information can be revealed progressively. In this paper, we proposed a brand new sharing scheme of progressive VC to produce pixel- unexpanded shares. In our research, the possibility for either black or white pixels of the secret image to appear as black pixels on the shares is the same, which approximates to 1/n. Therefore, no one can obtain any hidden information from a single share, hence ensures the security. When superimposing k (sheets of share), the possibility for the white pixels being stacked into black pixels remains 1/n, while the possibility rises to k/n for the black pixels, which sharpens the contrast of the stacked image and the hidden information, therefore, become more and more obvious. After superimposing all of the shares, the contrast rises to (n − 1)/n which is apparently better than the traditional ways that can only obtain 50% of contrast. Read More...
|
data security |
India |
16-18 |
5 |
Disaster Tolerance for IaaS Built Upon Open Cloud Platform
-MR KAUSHAL JANI ; Mr. Mitesh Patel; RAMESH PRAJAPATI
The New advances of virtualization technology in Data Centre lead to the development of features such as High Availability, Disaster Recovery and Fault Tolerance. However, Infrastructure as a Service (IaaS) computing clouds that span across distributed areas require evens a more advanced mechanism. A Disaster Tolerance (DT) enablement solution that covers storage and VM migration in IaaS clouds computing. Technical aspects of implementation are highlighted, detailing the DT algorithm using cloud computing. Read More...
|
computer |
India |
19-22 |
6 |
Reaping Cloud by Ensuring Data Storage Security
-Ms. Khushboo Sandhi ; Ms. Trupti Manik
the use of cloud computing has increased rapidly in many organizations. Cloud computing provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive information with cloud storage providers but these providers may be untrusted. Dealing with "single cloud" providers is predicted to become less popular with customers due to risks of service availability failure and the possibility of malicious insiders in the single cloud. A movement towards "multi-clouds", or in other words, "interclouds" or "cloud-of-clouds" has emerged recently. This paper surveys recent research related to single and multi-cloud security and addresses possible solutions. It is found that the research into the use of multi-cloud providers to maintain security has received less attention from the research community than has the use of single clouds. This work aims to promote the use of multi-clouds due to its ability to reduce security risks that affect the cloud computing user. Read More...
|
Computer Science & Engg. |
India |
23-27 |
7 |
Design and Implementation of MPPT Controlled Grid Connected Photovoltaic System
-Mr.Mehul B Patel ; Mr.Ravi B Patel; Prof. Vinesh Agarwal
A Renewable Energy Sources (RES) plays an important role in electricity generation. Various Renewable Energy Sources like wind, solar, geothermal, ocean thermal, and biomass can be used for generation of electricity and for meeting our daily energy needs. Energy from the sun is the best option for electricity generation as it is available everywhere and is free to harness. On an average the sunshine hour in India is about 6 hrs. annually also the sun shine in India for about 9 months in a year. Electricity from the sun can be generated through the solar photovoltaic modules (SPV). The SPV comes in various power output to meet the load requirement. Maximization of power from a solar photo voltaic module (SPV) is of special interest as the efficiency of the SPV module is very low. A peak power tracker is used for extracting the maximum power from the SPV module Read More...
|
Electrical Engineering |
India |
28-32 |
8 |
Design and Implementation of Battery Management System using Solar Power
-Mr.Ravi Patel ; Mr.Mehul Patel; Mr.Ashish Maheshwari; Mr.Vinesh Agarwal
Solar Power Management is a project based on automatically switching of the battery to the load and to the solar panel. Most of the previous work in this field is based on the charging of battery with solar panel but the difficulties is faced during that process is a manual operation is required to check and change the battery status. Thus manual help is required to do all this work.
Solar Power Management is the project in which the controller automatically checks the status and switches the battery having highest voltage to the load and the battery having lowest voltage to the solar panel for charging. In this project we also display the voltage status of four batteries and also the voltage status of solar panel on Liquid Crystal Display (LCD). LCD also displays the number position of the battery which is connected to the load and solar panel. In this project an attempt is made to use a PIC controller which is an advance version of microcontroller with the help of this a program is made for the appropriate switching of the battery in desired condition. Thus by this dissertation we try to do the efficient management of solar power
Read More...
|
Electrical Engineering |
India |
33-39 |
9 |
FPGA Implementation of Discrete Wavelet Transform for Image Processing
-Vineetha Soman
in recent world, video and image compression have become very essential. There are many applications where we need to use different transform techniques to convert the signal or data in frequency domain. That’s why; availability of powerful software design tool is a fundamental requirement to take advantage of many advanced and specialized resources included in the latest devices. As we move in to the future there is a rising demand for high performance, high capacity and high bit rate wireless communication systems to integrate wide variety of communication services such as high-speed data, video and multimedia traffic. The separation of the sub carriers is theoretically minimal such that there is a very compact spectral utilization. DWT is faster than FFT hence it’s replaced by transform technique for OFDM. In this project we propose a multiplier less structure for FPGA hence cost effective. The main advantage of this improvement is that it can get the same throughput as traditional polyphase methodology. This project presents a novel approach to realize the DA algorithm. We propose to implement the architecture of DWT processor and verify the results on Spartan 3E FPGA. We will use MODELSIM for the verification of functional results of our scheme. We will try and compare the results with other proposed designs. We propose to implement DWT using Verilog HDL and it will be synthesized using Xilinx ISE. Read More...
|
Communication Engineering |
India |
40-43 |
10 |
Early detection of lung cancer using sputum cytology
-Dharmesh Ashokkumar Sarvaiya ; Prof. Mehul Barot
Lung cancer is acknowledged to be the fundamental driver of disease passing worldwide, and it is difficult to detect in its early stages because symptoms appear only in the advanced stages causing the mortality rate to be the highest among all other types of cancer. The early detection of cancer can be helpful in curing disease completely. This study paper summarizes various reviews and technical articles on Lung cancer detection using the data mining techniques to enhance the Lung cancer diagnosis and prognosis. The present work deals with the attempt to detect lung cancer at early stage based on the analysis of sputum color images The recognition of lung tumor from sputum images is a testing issue because of both the structure of the disease cells and the stained strategy which are utilized in the definition of the sputum units., This survey paper includes the survey of different techniques such as threshold classifier, a Bayesian classification and Hopfield Neural Network and Fuzzy C-mean Read More...
|
Computer Engineering |
India |
44-47 |
11 |
Improved Noise Performance of MOSFET Gate Drain Charge sharing at node capacitance
-Apna Joshi ; Reenav Shukla; Himanshu Nautiyal
This paper work is focused on problems of process variations; timing, noise tolerance, and power are investigated together for performance optimization. The existing techniques for suffer from one or more of the following shortcomings: slow speed and vulnerability to fast trapping, VD dependence, cable-changing, sensitivity to gate leakage, complex procedure, and a need for modelling or simulation. Here we can design the dynamic CMOS circuit. Dynamic logic circuits use for design of wide fan in logic gates with less number of transistors and large speed as compare of static CMOS gates. But these circuits are not susceptible to noise. Noise in digital integrated circuits refers to any phenomenon that causes the voltage fluctuations at a node from its nominal value. Of the several logic styles available, dynamic CMOS logic has been predominantly used in VLSI circuits, and their usage has increased the timing performance significantly over static CMOS circuits. Then, we introduce a novel noise-tolerant design technique using circuitry exhibiting a negative differential resistance effect. Read More...
|
Micro Electronics and VLSI Design Engineering |
India |
48-49 |
12 |
The Impact of Short Channel Effects MOSFET?s Characteristics Due to variation in Threshold Voltage
-Reenav Shukla ; Apna Joshi; Himanshu Nautiyal
to get the higher speed, low power dissipation and higher packing density MOS integrated circuits, the dimensions of MOSFETs have continued to shrink, which is done by scaling. With the scaling of MOSFETs into deep-sub micrometer regime, non-ideal effect is becoming a resurgent hot topic in the reliability community. One of the non-ideal effects is the expected increase in threshold voltage variation due to worsening short channel effect. In this paper we analyzed the role of substrate (the body effect) on the threshold voltage. The variation in MOSFET threshold voltage will affect the dynamic, static characteristics and or the short-channel effect (SCE). The most important parameters of a MOSFET are its channel length, the distance between the source and drain. It has been recognized that short-channel MOSFETs offer both speed and density advantages over their long-channel counterparts. In a given generation of technology, however, there is a minimum channel length below which the gate starts to lose control of the MOSFET current. The short channel prevention circuit uses physically meaningful parameters provides an easy way for technology benchmarking and performance projection Read More...
|
Micro Electronics and VLSI Design Engineering |
India |
50-52 |
13 |
Amalgamation of Recognition & Recall Based Graphical Technique for User Authentication
-Ishita Singh ; Mr.M.Mohan
Use of text-based passwords is common authentication system. It is no secret that users struggle to keep up with their entire (textual) password. Users often create passwords that are vulnerable to attackers guess, but system assigned passwords are hard to memorize. To address this problem, Graphical Passwords are being used as an alternative for Text passwords. In this paper we present a graphical password scheme that offers high memorability & usability. Despite existence of algorithms many have failed to achieve simultaneously both aspects. The Proposed scheme is a combination of Recognition & Recall based Technique, where user is authenticated by identifying the pre-allocated image from the panel of random images, followed by performing certain number of clicks at different locations for setting a password. Some tolerance level is also given for each clicked point of interest. When logging in if the user selects the correct image followed by correct clicks user will be treated as an authenticated user Read More...
|
Computer Science Engineering |
India |
53-55 |
14 |
Optimization Of Machining Parameters In CNC Turning Using Firefly Algorithm
-Dr. S. Bharathi Raja ; C. Prem Kumar; G. Gokul Rajasekar; R. P. Dinesh Prasad
now a day’s machining is done through various automated machines. One of the widely used machines is CNC. Even though the automated machines are used, the quality of the work is determined by parameters used. The cutting parameters of the CNC machine determine the productivity, surface finish, machining time and other qualities of the product. This study involves the optimization of those cutting parameters. In order to get optimized CNC parameters for a specific tool-work combination, Firefly Algorithm (FA) is used to compute the best parameters based on the experiments conducted on a CNC Turning center. The three cutting parameters are cutting speed (V), feed (f), and depth of cut (d). The practical constraints have been considered during both practical and experimental approaches. The result reveals that FA is very well suited in solving parameters selection problems. Read More...
|
Mechanical Engineering |
India |
56-61 |
15 |
A COMPARISON OF DISCRETE COSINE TRANSFORM USING CHEN'S AND CORDIC ALGORITHM
-DUDHAGARA NIKUNJ VALLABHBHAI ; POORVI H PATEL
CORDIC is an acronym for Coordinate Rotation Digital Computer. Efficient generation of trigonometric as well as exponential functions without much increase in hardware complexity has always been a challenge, owing mainly to their importance and widespread use in Digital Signal Processing (DSP) applications besides other areas. One such algorithm which is very much effective for the calculation of trigonometric, hyperbolic, exponential, linear and logarithmic functions is the CORDIC algorithm. The algorithm is very much hardware efficient because it omits the dependence on multipliers and is rather a combination of shift-add operations. Due to the simplicity of involved operation the CORDIC algorithm is well suited for VLSI implementation. This paper compares the different implementation of Discrete Cosine Transform (DCT) using Chen’s and CORDIC algorithm. Read More...
|
ELECTRONICS & COMMUNICATION ENGINEERING |
India |
62-64 |
16 |
Review on variants of Architecture against Cache-Based Side-Channel Attacks
-Niketan G. Patel ; Associate Professor Chirag A. Patel
There are various types of caches. Cache components include data and instruction caches. There are various types of cache attacks also. In hardware cache attacks are performed using cache hit and miss, power traces, Monitoring memory of cache activity. In software caches attack are performed when derive secret key use in Cryptographic operation through legitimate. Cache attacks are reducing performance and also leakage information of virtual machine. In this paper we have presented variants of architecture which stop cache based side channel attacks. Read More...
|
Computer Enginnering |
India |
65-67 |
17 |
Embedded Web Server Based Patient Monitoring System
-AMARDEEPSINH M. JADEJA
In this paper I have includes the selective section of patient monitoring: neonatal care. Several patient monitors are available in the market. Yet it is quite a daunting task in countries with high population like India, because of insufficient resource space availability. It is difficult to keep a track of several patients at a time from both inside and outside hospital premises/medical facility, which includes remote locations. The project involves with sensing the vitals of the newly born babies which are very different when compared to adult patients and transmit these signals to the computer monitor at the nursing station. Also based on the preset threshold values for the recorded values, an alarm system will be introduced with an immediate transfer of the corresponding patient data to the registered medical professional. This paper attempts to design and implement patient monitoring and real time feedback mechanism, equipped with Arduino and Ethernet platform for in-house monitoring and Webpage for worldwide internet proposed. The proposed system is likely to be efficient, economical, easy to use, and portable, have wide application potential due to flexibility in the design and software. Read More...
|
ELECTRONICS & COMMUNICATION ENGINEERING |
India |
68-69 |
18 |
Ensuring Better Network Utilization By Implementing Different TCP Protocols TCP Reno , TCP New Reno & TCP FACK
-Boriya Punit H. ; Ajani Mohit K.; Koringa Hiren C.
Reliable transport protocols such as TCP are tuned to perform well in traditional networks where packet losses occur mostly because of congestion .TCP responds to all losses by invoking congestion control and avoidance algorithms, resulting in degraded end-to-end performance in systems. In this paper, we analyze and compare the different congestion control and avoidance mechanisms by Network Simulator 2 (NS2 )which have been proposed for TCP/IP protocols, namely :TCP Reno, New-Reno, and TCP FACK implement different graphs of link capacity, throughput , packet loss rate , average queue ,no of packet dropped ,RTTP time and observe that which TCP protocol give the best result. Read More...
|
Computer Science and Nework |
India |
70-72 |
19 |
Review Of Detection and Removal of Cooprative Blackhole attack in MANETs
-Nilay K. Shah ; Dr. K.H.Wandra
A Mobile Ad-Hoc network in which nodes are mobile and it has dynamic topology which changes with mobility of nodes and also lack of centralization or lack of center controlling entity. These features came with undefined and unsecure boundaries makes challenging security. Black hole attack can in fact seriously compromise the performance of critical infrastructure of Mobile ad-hoc network. In this paper we proposed to detect and isolate multiple black hole attack during route discovery process and improve performance of Mobile Ad-Hoc network. Read More...
|
Networking |
India |
73-76 |
20 |
Implementation of Digital Blood Pressure Monitor From Sphygmomanometer Using Noninvasive Oscillometric Method Using FPGA
-Nayak Khushboo Jagatkishor
In this research the vital signs (blood pressure, heart rate, electrocardiogram, spo2) are measured. The systolic blood pressure and diastolic blood pressure are measured. The method improved by the approaches is superior to conventional Oscillometric method. In this project the digital blood pressure meter will be implemented on FPGA XC3S1000 using HDL language. The other components will be used for the project are BLDC Motor, Cuff Belt, Pressure Sensor, Filter, AD7450. The curve fitting software module will be developed to get the output of this definition. The output will be displayed on computer. Xilinx ISE 14.6 design suite software will be used for this project. Read More...
|
VLSI (Electronics & Communication enginnering) |
India |
77-79 |
21 |
Performance analysis of sigma delta ADC using 45nm CMOS Technology
-Arpit R Patel
We report a new architecture for a sigma delta oversampling analog to digital Convertor (ADC) in which the first order sigma delta modulator and second order Decimation Filter is designed in 45nm CMOS technology. In this work, both modulator and decimation filter is designed with the software LTspice. The sigma delta modulator is designed using Switch Capacitor Integrator and comparator with an 8 MHz sampling clock frequency. The decimator is designed using a second order Cascaded Integrator Comb (CIC) filter and can be worked with two different oversampling ratios of 64 and 16. The input to the decimator is provided from a first order modulator. The CIC filter designed includes integrator, differentiator blocks and a dedicated clock divider circuit. The Sigma Delta ADC can be operated with an oversampling clock frequency of up to 8 MHz and with an input signal bandwidth of up to 65 KHz. An inbuilt clock divider circuit has been designed which generates two output clocks whose frequencies are equal to the input clock frequency divided by the oversampling ratios 64 and 16. Read More...
|
Electronics and Communication |
India |
80-83 |
22 |
Robust color image watermarking based on DWT-HT
-Kaushal R Patel ; Ms. Nabila Shaikh
According to the analysis of the definition and
basic characteristics of digital watermarking technology, the
system model of digital watermarking is given. The system
consists of two modules which are watermark embedding
module and watermark detection and extraction module.
The experiment result shows that the digital watermark is
non-perceptible; the watermark information can be extracted
even if it has been attacked, and the expected effect can be
achieved. This technique is most useful for copyright
protection of digital images. Read More...
|
Electronics and Communication |
India |
84-86 |
23 |
Survey of Efficient Routing in VANET using Ant Colony Optimization Technique
-Jaysukh Vala ; Asst. Prof. Dhaval Varia
Recent advances in hardware, software, and communication technologies are enabling the design and implementation of a whole range of different types of networks that is being deployed in various environments. One such network that has received a lot of interest in the last couple of years is the Vehicular Ad-Hoc Network (VANET).VANET has become an active area of research, standardization, and development because it has tremendous potential to improve vehicle and road safety, traffic efficiency, and conveniences well as comfort to both drivers and passengers. Recent research efforts have placed a strong emphasis on novel VANET design architectures and implementations. A lot of VANET research work has focused on specific areas including routing, broadcasting, Quality of Service (QoS), and security. In this Paper a general overview of Vehicular Ad-Hoc network technology ,the routing protocol(AODV) and Ant Colony Optimization . We define proposed algorithm for enhance AODV protocol using Ant Colony Optimization to find efficient path between source and destination. Read More...
|
Computer Engineering |
India |
87-90 |
24 |
Calculation of Available transfer capability using by AC Load Flow method
-NIRMALSINH L. SOLANKI ; Mr. U L MAKWANA
The need for calculation of Available transfer Capability (ATC) is very much important in deregulated power system environment as correct estimation of ATC yields economically efficient operation of the restructured power system. Assessment of Available Transfer Capability (ATC) and to display it on Open Access Same-time Information System (OASIS) is of great importance for the secured operation of the power network. This work describes the evaluation of ATC using AC Load flow method. The results are tested on 6-bus system using MATLAB programming. Read More...
|
Electrical Engineering |
India |
91-93 |
25 |
COMPARISON OF FLOW BASED METHODS OF TRANSMISSION EMBEDDED COST ALLOCATION UNDER DEREGULATED POWER SYSTEM CONDITION
-GEHLOT DHARMESHKUMAR MOTILAL ; JADAV TUSHAR; MITESH J SATHVARA
A common feature to all restructuring efforts is to provide non-discriminatory transmission access to producers and consumers. Transmission access rules must be neutral, economically efficient, assure optimal utilization of the transmission network, and allow for full recovery of stranded costs. So transmission pricing is a very important part in electricity market design. Accurately estimating and allocating the transmission cost in the transmission pricing scheme still remains challenging task. This paper gives an overview of different cost incurred in transmission pricing using Bialek Tracing method & Distribution factor method (GGDFs).It mainly focused on determining the embedded transmission cost through Generator side by various methods and compared the result for 12-Bus system. Read More...
|
ELECTRICAL ENGINEERING |
India |
94-100 |
26 |
Analysis of Intrusion Detection System Using Wrapper Approach through Weka, Genetic Algorithm and Neural Network
-Mr. Uttam B. Jadhav ; Prof.(Dr.) P.K. Dwivedi
the objective is to construct a lightweight Intrusion Detection System (IDS) aimed at detecting anomalies in networks. The crucial part of building lightweight IDS depends on preprocessing of network data, identifying important features and in the design of efficient learning algorithm that classify normal and anomalous patterns. The design of IDS is investigated from these three perspectives. The goals are (i) removing redundant instances that causes the learning algorithm to be unbiased (ii) identifying suitable subset of features by employing a wrapper based feature selection algorithm (iii) realizing proposed IDS with neurotree to achieve better detection accuracy. The lightweight IDS has been developed by using a wrapper based feature selection algorithm that maximizes the specificity and sensitivity of the IDS as well as by employing a neural ensemble decision tree iterative procedure to evolve optimal features. An extensive experimental evaluation of the proposed approach with a family of six decision tree classifiers namely Decision Stump, C4.5, Naive Bayes` Tree, Random Forest, Random Tree and Representative Tree model to perform the detection of anomalous network pattern has been introduced[1]. Read More...
|
Computer Engineering |
India |
101-106 |
27 |
Location Aware Health Care System
-Deepak Chempazhi ; Arbaz Khan; Shadab Khan; Farhana Siddiqui
In recent times, many advances have been made in the field of mobile positioning system along with telecommunication system. This has given an impetus for development of location-aware healthcare applications. The goal of this project is to provide immediate medical assistance to people who have met with an accident and are not able to communicate vital information or their location verbally. The application alerts emergency care-units on just a single click on the interface from the victim. The emergency services would be able to track the patient’s location through the application. The secondary features of the application include medical prescription reminders for patients, it also allows them to track medical facilities in their locality and fix appointments. On the other hand, the doctor can easily track medical history of patients through the application. Read More...
|
Computer Engineering |
India |
107-108 |
28 |
A review on Different Approaches to reduce Routing Overhead in VANET
-Rahul K. Patel ; Hiren D. Shukla; Tejas S. Patel
The modern generation VANET systems are denser and it supposed to handle high traffic rate as well as frequent interruption in connection. Power and bandwidth should be utilized efficiently. At the same time, the VANET nodes must be simple, cheap, smaller in size and efficient enough to handle traffic. In VANET environment, the quality of received signal level degrades due to path-loss and shadowing effects from various obstacles in propagation path. Flooding mechanism in VANET unconditionally floods data packets in all the directions which again harm network in terms of bandwidth wastage, collision, energy consumption. To improve reliability of communication Effect of flooding can be suppressed by eliminating or dropping certain nodes. In VANET system Vehicles need to communicate with the other node, for that node continuously sending RTS-CTS signals. As if number of signals increases, there is high probability of collision. Collision damages data packets .so it requires retransmission, this paper presents different routing protocols and approaches through which overhead can be reduced. Read More...
|
Wireless Communication Systems and Networks |
India |
109-112 |
29 |
Performance and Emission test of Calcium Carbonate as Catalytic Converter on Four Stroke Single Cylinder
-Apoorva R. Mistry
Petrol engines are widely used automobile application for private and commercial transportation use because of its good fuel efficiency and durability. However, petrol engine emissions are harmful to human health and to the environment and are at targets for its reduction, especially in city & urban area because most of the petrol engines are used in human populated areas. Vehicle pollutants emission control regulations are been strictly introduced in all industrialized countries in order to reduce the emissions of vehicles powered by I.C. engines. The pollutants which are limited today are Hydrocarbons (HC), Carbon Monoxide (CO), Oxides of Nitrogen (NOx) and Particulate Matter (PM). Strict reduction in these emissions is mandatory to comply with upcoming stringent emission standards, such as EURO V, US 2010. The available methods of petrol engine pollutant reduction include engine modification or improvement, using petrol with additives to decrease pollutants and after-treatment of exhaust gas. There are many reports of oxidation catalysts in the exhaust system of petrol engines, which had proven significant reductions in HC, PM and CO with oxidation catalysts. However, its advantages depend upon engine loads / exhaust temperatures and periodical cleaning of unit of Catalytic Converter cell. Normally observed that these converters have 5-6 years of life and the performance deteriorates with impurities deposition on basic metal surface with passage of time. The light-off temperature of petrol oxidation catalyst is usually around 200 °C. Calcium carbonate is naturally available good resource for its chemical reactivity and its proven performance for exhaust gas treatment. Read More...
|
Mechanical Engineering |
India |
113-116 |
30 |
Investigation on Conjugate Matched Feed for an Offset Reflector
-K. B. Parikh ; Vishal R Kharadi
The paper presents design procedures and simulated results of rectangular and cylindrical conjugate matched feed. The rectangular conjugate matched feed contains higher order TE11 mode in addition with dominant TE10 mode. The TE11 mode is generated by inserting a single metallic post. The cylindrical conjugate matched feed contains higher order TE21 and TM11 modes in addition with dominant TE11 mode. The TE21 mode is generated by inserting a three metallic posts 120 degree apart and the TM11 mode is generated by taper discontinuity. The radiation and transmission characteristics of both the conjugate matched feeds are optimized and presented. In rectangular conjugate matched feed, around 26 dB improvement in cross-polar component has been achieved as compare to conventional rectangular feed. In cylindrical conjugate matched feed, 28 to 35. DB improvement in the cross-polar component has been achieved as compare to conventional cylindrical feed by varying post length from 4.5 to 6.5 mm. The behavior of cross-polar component over frequency range 9.7 to 10.3 GHz has been studied. Read More...
|
Wireless Communication Systems and Networks |
India |
117-119 |
31 |
Automated Video Surveillance System For Human Motion Detection
-monika domadia ; Prof.Megha Mehta
Automated video surveillance systems are most useful and important in the security field of today's world. Video is a base for higher level intelligence applications. Video surveillance is an important security asset to control theft, trespassing or traffic monitoring, banks, department stores, highways, crowded public places and borders. In this thesis, our objective is to design a complete framework able to automatically detect and recognize moving objects in video sequences acquired with a static camera. The aimed practical application for this framework is its use as an automatic intelligent video surveillance system. In video surveillance, detection of moving objects from a video is necessary for object classification, target tracking, activity recognition, as well as behavior understanding. Here so many methods are discussed for background subtraction & motion detection. Al New Proposed method also described here. Read More...
|
Electronics & communications engineering |
India |
120-123 |
32 |
BEHAVIOUR OF LEAD ON CLAYEY SOIL
-Malathy J ; Dr.M.Muttharam
A study was performed to determine the index properties, unconfined compressive strength, compressibility and permeability characteristics of the lead contaminated soil. Lead added to the natural soil in different concentrations such as 500ppm, 1000ppm and 2000ppm. Contamination is carried out by saturating the soil sample in Lead nitrate solutions for varying contamination periods such as 7, 14 and 28 days. UCS tests were conducted on these samples. The results showed pronounced changes in the index properties of the lead contaminated soil and gain in strength varies linearly till 1000ppm and after reaching the point, the strength starts to decline. Enhanced compressibility and permeability characteristics were observed for the lead contaminated soil. Correlations for unconfined strength as functions of contamination period and contamination concentration was established and discussed. Read More...
|
Civil Engineering |
India |
124-127 |
33 |
WORK-LIFE BALANCE:-A COMPARATIVE ANALYSIS WITH WORKING CLASS WOMEN IN A MANAGEMENT INSTITUTES
-Prof. Ansumalini Panda
Sometimes the boundary between work life and personal life isn't really clear. This is especially true in this age of technology and 24/7 connectivity. In today's economy, it's tempting for employees to turn into workaholics. To keep up with the rapidly changing competitive scenario, every individual is not only trying hard to retain his position but also looking forward to growth. Consequently, work related stress rides over the personal life of individual. An attempt has been made in this paper on how to maintain a balance between work pressure and personal life. The paper highlights the reasons and also suggests how to create a work-life balance for a healthy life.
The findings of the study will benefit organization as they will be able to design practices which focus on employee work-life issues and thus reap dividends. The secret to work-life balance will vary depending on field of work, family structure and financial position.
Read More...
|
Human Resource Management |
India |
128-134 |
34 |
Embedding data in an audio signal, using power controlled acoustic OFDM
-Tejas V. Sagathia ; Prof.Dharmesh N. Khandhar
The OFDM technology has been extensively
used in many radio communication technologies. For
example, OFDM is the core technology applied in Wi-Fi,
WiMAX and LTE. Its main advantages include high
bandwidth utilization, strong noise immunity and the
capability to resist frequency selective fading. However,
OFDM technology is not only applied in the field of radio
communication, but has also been developed greatly in
acoustic communication, namely the so called acoustic
OFDM. Thanks to the acoustic OFDM technology, the
information can be embedded in audio and then transmitted
so that the receiver can obtain the required information
through certain demodulation mechanisms without severely
affecting the audio quality.
This paper mainly discusses how to embed and
transmit information in audio by making use of acoustic
OFDM. Based on the theoretical systematic structure, it also
designs a simulation system and a measurement system
respectively. In these two systems, channel coding, manners
of modulation and demodulation, timing synchronization
and parameters of the functional components are configured
in the most reasonable way in order to achieve relatively
strong stability and robustness of the system. Moreover,
power control and the compatibility between audio and
OFDM signals are also explained and analyzed in this paper.
Based on the experimental results, the author
analyzes the performance of the system and the factors that
affect the performance of the system, such as the type of
audio, audio output level and so on. According to this
analysis, it is proved that the simulation system can work
steadily in any audio of wav format and transmit
information correctly. However, due to the limitations of the
receiver and sender devices, the measurement system is
unstable to a certain degree. Finally, this paper draws
conclusions of the research results and points out unsolved
problems in the experiments. Eventually, some expectations
for this research orientation are stated and relevant
suggestions are proposed. Read More...
|
Electronics & Communication Engineering |
India |
135-139 |
35 |
Migration Algorithm for Data Security in Cloud Computing
-Parikh Dhrumil Pareshkumar ; M S Deora
Today's IT infrastructure is converted their all infrastructure in to the cloud based means use on infrastructure through internet resources. And cloud computing is the paradigm which is used in to major to transform infrastructure of company in to use as internet recourse. Still internet is comes then in that cloud data migration or to say transferring the data in to the cloud and also between the two cloud is major reason to apply for the security in data migration and also in data transferring in or off cloud is challengeable in this world. This paper proposed the various cloud computing algorithm which is implemented in to the cloud and also include their issues. Paper also proposed the data migration and also their security approach. Paper proposed the randomized key based approach for data security in cloud computing. Read More...
|
Cloud Computing And Security |
India |
140-143 |
36 |
All rights reserved by www.ijsrd.com 144 Block Encryption using Skew tent map and Logistic map
-Sangeeta Yadav ; Abhishek Didel; Nisha Khushwah
Number of cryptosystems has been proposed in recent years that are based on chaotic maps. Nisha Khushwah in 2013 proposed an improved symmetric encryption scheme using one dimensional chaotic map in order to obtain chaotic sequences with better cryptographic features. In this proposed system for encryption/decryption the two different chaotic maps are used with a 128 bit external key. Based on the simulation result, more secure cryptosystem is proposed. As two chaotic maps, one skew tent and one logistic map are used in order to obtain chaotic sequences with better cryptographic features. Read More...
|
Computer Science & Engineering |
India |
144-148 |
37 |
Software Effort Estimation Using Analogy
-Jayashree K.M ; Sathya Bama. B; Dr J. Frank Vijay
Software Effort Estimation is the process of anticipating the most practical use of effort needed to develop or maintain software. Effort estimation can be done in different ways. Some of them are expert judgment, estimation by analogy, estimation using algorithmic models, etc. In this paper we propose a simple approach for estimating the effort required to develop software by using analogy. Read More...
|
Information Technology |
India |
149-151 |
38 |
EFFECT OF SUPERPLASTICIZERS ON THE BEHAVIOUR OF FLY ASH CONCRETE BEAMS IN FLEXURE
-Abins Aziz ; Jessy Rooby; P. S. Joanna
Fly ash is an expensive replacement of Ordinary Portland cement (OPC) used in concrete, while it improves fresh and hardened properties of the concrete. Fly ash, a byproduct from coal burning in thermal power stations is currently disposed of in landfills. It is essential that the utilization of fly ash in useful applications should increase dramatically to reduce the use of land for waste disposal. This paper presents the experimental investigation on the mechanical properties of high volume fly ash concrete. Portland cement was replaced with 50% fly ash. Compressive strength and flexural strength of fly ash concrete were experimentally found out and compared with ordinary concrete. Two different superplasticisers were used to cast the specimens. The investigation revealed that the compressive strength and flexural strength of fly ash concrete specimens are comparable to that of ordinary concrete specimens. Read More...
|
Civil Engineering |
India |
152-155 |
39 |
VHDL Implementation Of 8-Bit Vedic Multiplier Using Barrel Shifter
-Bhavin D Maru ; Prof.Altaf Darvadiya
This paper describe that the propagation delay of 8-bit Vedic multiplier is reduced when compared with conventional multiplier like array multiplier, booth multiplier, wallance multiplier.in our design we use barrel shifter which requires only one clock cycle for 'n' number of shifts. The design is implemented in Xilinx simulator and verified using ISE simulator. The design will implement on Xilinx Spartan-6 family. The propagation delay will take from synthesis report and static timing report. The design may achieve propagation delay approximately 6ns to 9ns using barrel shifter in base selection module and multiplier. Read More...
|
VLSI |
India |
156-158 |
40 |
An Enhanced Energy Efficient Multipath DSR Protocol for MANET
-deepika thakral ; neha dureja
Routing in Wireless Ad-hoc networks is one of the main technical challenges due to the dynamic behavior of these networks [1]. A routing protocol is needed whenever a packet needs to be transmitted to a destination via number of nodes and numerous routing protocols have been proposed for such kind of ad hoc networks. Our Main objective in this paper is to develop Energy Efficient Power Aware Multipath Dynamic Source Routing based on DSR [2]. We analyze Minimum Battery Cost Routing (MBCR) to minimize the path battery cost so as to maximize the total remaining battery capacity. The cost function f in MBCR is defined such that the lower the remaining battery capacity c of a node i, the more reluctant the node is to receive and forward a packet. In this paper we proposed a new route discovery algorithm that considers the remaining energy for each node and uses a cost function to choose the best power saving route. And a new route maintenance algorithm that deals with the broken routes due to the nodal energy depletion and node mobility. Read More...
|
computer science engineering |
India |
159-162 |
41 |
PERFORMANCE COMPARISION OF TWO ON DEMAND ROUTING PROTOCOL AODV AND DSR in MANET
-ANAND G. CHAVDA ; Prof .DHARMESH N. KHANDHAR
A mobile Ad hoc Network (MANET) is a collection of wireless mobile nodes forming a temporary network without using any existing infrastructure i.e. nodes are connected through a wireless medium forming rapidly changing topologies and nodes are free to move about and organize themselves in to a network. These nodes change positions frequently. The main classes of routing protocols are Proactive, Reactive and Hybrid. A Reactive (On Demand) routing strategy is a popular routing category for wireless Ad hoc routing. It is a relatively new routing philosophy that provides a scalable solution to relative large network topologies. Routing protocols are analyzed against several performance matrices: Average throughput, Normalized routing load (NRL), Packet delivery fraction (PDF), Average end to end delay by varying Pause time, Number of nodes. The simulation result shows that throughput of AODV protocol is better than DSR protocol as the nodes are increasing/adding to network. Packet drop rate and end to end delay of AODV protocol is less than DSR protocol as the nodes are increasing. Efficiency achieved by the AODV protocol in mobile Ad hoc networks. The simulation is done in network simulator (NS) 2.
In this paper the performance differentials are analyzed using varying simulation time, Pause time and Number of nodes. These simulations are carried out using the ns-2 network simulator. The results presented in this work illustrate the importance in carefully evaluating and implementing routing protocols in an ad hoc environment. Read More...
|
COMPUTER ENGINEERING |
India |
163-166 |
42 |
Substation Grounding Grid Design
-Vikram Patel ; A.L.Vaghamshi; K.A. Sonagra
Substation grounding is a critical part of the overall electric power system. It is designed to not only provide a path to dissipate electric currents into the earth without exceeding the operating limits of the equipment, but also provide a safe environment for any people that are in the vicinity. Design of a proper grounding system will be discussed as well as performing of calculations necessary to ensure a safe design. Aspects of soil resistivity measurements, area of the ground grid, calculation of tolerable limits of current to the body, typical shock situations, tolerable touch and step voltages, maximum fault current grid resistance, grid current, ground potential rise, and benefits of surface materials will be discussed. Simulation software will also be discussed and its functionality in a step-by-step manner. An adequate grounding grid has been designed using concepts outlined in IEEE Std.80-2000 and applied into programming and simulating results in MATLAB. Read More...
|
Electrical Engineering |
India |
167-170 |
43 |
Existing Techniques for Image Inpainting: survey
-Patel Bhartiben Shivabhai ; Patel Bhartiben Shivabhai; Vaibhav Gandhi
Image In painting is the art of filling in missing data in an image. The purpose of in painting is to reconstruct missing regions in a visually plausible manner so that it seems reasonable to the human eye. There have been several approaches proposed for the same. In this paper, we present an algorithm that improves and extends a previously proposed algorithm and provides faster in painting. Using our approach, one can in paint large regions (e.g. remove an object etc.) as well as recover small portions (e.g. restore a photograph by removing cracks etc.). The in painting is based on the exemplar based approach. The basic idea behind this approach is to find examples (i.e. patches) from the image and replace the lost data with it. This technique can be used in restoring old photographs or damaged film. Read More...
|
Computer Engineering |
India |
171-175 |
44 |
Vital Sign Analysis in ASIC Domain
-Kushan B. Vadwala ; Rajesh K.Navandar
Blood pressure (BP), sometimes referred to as arterial blood pressure, is the pressure exerted by circulating blood upon the walls of blood vessels, and is one of the principal vital signs. During each heartbeat, blood pressure varies between a maximum (systolic) and a minimum (diastolic) pressure. The blood pressure in the circulation is principally due to the pumping action of the heart.
Blood pressure varies in healthy people and animals, but its variation is under control by the nervous and endocrine systems. Both have many causes and can range from mild to severe. So that we are using Universal Asynchronous Receiver And Transmitter Protocol (UART Protocol) & Serial Peripheral Interface (SPI Protocol) with Master ADC in the Blood Pressure Meter. Read More...
|
Electronics and Communication Engineering |
India |
176-177 |
45 |
Fixed Series Capacitors for Increased Power Transmission Loadability of 400 KV Raipur - Wardha Corridor
-Piyush M. Khadke ; Aditya S. Tohare; Dr. N. R. Patne; Sh. G. A. Shinde
This paper highlights a practical case study of Fixed Series Compensation (FSC) at 1200/765/400/220 KV Wardha Substation, POWERGRID, WR-I (Western Region – I), India for increasing the power load ability and meeting the rising power demands, implemented on 400 KV D/C (Double Circuit) Raipur – Wardha Line. This FACTS device was commissioned at Wardha Substation in January 2013. This paper will give an overview of FSC and its components with effects of FSC on the specified line and also on one of the adjacent line based on simulated data and real time data. Read More...
|
Electrical Engineering - Power Systems |
India |
178-182 |
46 |
Importance of Geosynthetics Materials for Lining in Hydraulic Structures
-Riddhi P. Dave ; F.S. Malekwala; Chanda Rautela; Sachin A. Thakkar
Lining of any water structure is prepared to reduce seepage losses from the structure. Geosynthetics are provided to prevent losses as a lining material in various forms. Geosynthetics are manmade woven materials like textile material. This paper gives an introduction of geosynthetics as a lining material, where some common types of lining material is not much effective. This paper reviews various types of geosynthetics materials and their properties and applications at various fields. Here, three basic types of Geomembranes are compared HDPE, LDPE AND Polyolefin. Read More...
|
Water Resources Engineering ( Civil Engineering ) |
India |
183-185 |
47 |
GPS & GSM based any vehicle tracking and security system
-Shweta Patil ; Mansi Lad; Nikita Patel; Pooja Agarwal; Dhrumil Patel
In this Project it is proposed to design an
embedded system which is used for tracking and positioning
of any vehicle by using Global Positioning System (GPS)
and Global system for mobile communication (GSM).This
system is very useful for car theft situations (alarm alert,
engine starting, localizing), for adolescent drivers being
watched and monitored by parents. (Speed limit exceeding,
leaving a specific area), as well as for human and pet
tracking. It also used for safe transportation in industries.
A good number of tracking systems had so far been
developed with a wide range of tracking facilities. But the
operation cost of most of these systems is higher which
prevents from widespread use. On the other hand, the rate of
car theft, asset theft, child kidnapping in many countries are
increasing at a higher rate. The objective of this research is
to reduce the cost of the tracking system using the latest
technologies and making it available to the common people. Read More...
|
Electronics & Communication Engineering |
India |
186-187 |
48 |
Implementation Of Blind Adaptive Beamforming Algorithms
-Kirtan.R.Patel ; Manish.P.Patel ; Anil C. Suthar
Beam forming is an array signal processing which increases signal to interference-noise ratio (SINR) by mitigating co-channel interferences present in wireless mobile cellular system. In this paper presents importance of beam forming technique for next generation broadband wireless mobile systems. Beam forming is a powerful means of increasing capacity, data rates and coverage of the cellular system. In beam forming technique, Delay of sum, Minimum variance distortion less response (MVDR) and Generalized Side lobe Canceller are presented. In this paper LMS algorithm can be applied to MVDR application. This is called LMS-MVDR has the capability of interference nulling. The amplitude response of LMS-MVDR will suppress the interfered signal and have the target amplitude held at 0db.Moreover, the amplitude response can be improved by increasing the number of Iterations(snapshot),Increasing the interference to target signal ratio, The spatial power spectrum MVDR shows the power incoming signals but it tries to maximize the interference signal instead of suppressing .The drawback is the target signal can be overpowered by the interference in the MVDR power spectrum. Read More...
|
Wireless Communication Systems and Networks |
India |
188-190 |
49 |
Cooperative Communication and Its Techniques
-Krunal K Vataliya ; Narendrasinh B Gohil; Balvant J Makwana
Nowadays in deployment and flexibility in radio resources configuration are the main features of future wireless communication system. A cooperative wireless communication system is proposed to follow the same principle aiming at improving the all over performance of wireless system. In this paper we will analyze the recent developments and trends in the area of wireless Ad hoc network. This article will also discuss various main cooperative signal methods. Read More...
|
Wireless Communication |
India |
191-193 |
50 |
ECG Signal De-noising using Discrete Wavelet Transform for Removal of AWGN Noise by Daubenchies Technique
-Gopi S. Bhanushali ; Narendrasinh B Gohil; Anjali Potnis
An Electrocardiogram (ECG) describes the electrical activity of the heart recorded by electrodes placed on the body surface. ECG is a non-linear, non-stationary signal. Electrocardiogram is an important electrical activity as it is used for the primary diagnosis of heart abnormalities like the myocardial infarction, conduction defects, and arrhythmia. But real ECG signal is often contaminated by different noises. For the purpose of quality diagnosis, the ECG signal must be clearly de-noised to remove all noises. This paper presents a method for De-noising the noisy real ECG signal using wavelet transform. Different ECG signals from MIT/BIH arrhythmia database are used with added Additive White Gaussian Noise (AWGN) which is common in ECG signal and effect on all frequency signals. The results were evaluated using MATLAB software. De-noised ECG signal is compared with original signal using Mean Square Error (MSE) and Signal to Noise ratio (SNR). MSE and SNR improvements for different noise coverage were calculated and compared for different filtering method from db4-db10 wavelet transform method. Read More...
|
Electronics & Comminication Engineering |
India |
194-197 |