No. |
Title and Author |
Area |
Country |
Page |
101 |
Experimental Investigation OF GROUNDNUT OILCAKE EXTRACT BLENDED DIESEL FUEL IN CI DI ENGINE
-Dr.A.A.Arivalagar
The present work has focused on residual fatty substances available in ground nut oil cake and attempt has been made to blend the extracts of oil cake with diesel at different proportions namely 5%, 10%, 15%, 20% and 25% by weight added to known volume of diesel without any engine modification. This new fuel is investigated in the diesel engine and its performance and emission characteristics are determined. The physical and fuel properties are determined as per ASTM standards and found to be within the limits prescribed for biodiesel. The quality of all blends is evaluated using gas chromatography and found to have esters of fatty acids similar to groundnut oil. It has been observed that the presence of wax, triglycerides, free fatty acids and molecular oxygen in the fatty substances help in improving the combustion causing reduction in HC, CO and smoke density. However it is observed that there is a marginal increase in NOx emission. With regards to brake thermal efficiency, 15% oil cake extract diesel blend gives better efficiency than neat diesel and other blends. Read More...
|
Mechanical Engineering |
India |
393-397 |
102 |
Backward / Forward Sweep algorithm for Radial Distribution System
-Anjali Rana ; Joohi Darji; Mosam Pandya
This paper presents Backward / Forward (BW/FW) Sweep algorithm for load flow analysis of radial distribution network. In backward sweep, Kirchhoff’s Current Law and Kirchhoff’s Voltage Law are used to compute the bus voltage from farthest node. In forward sweep, downstream bus voltage is updated starting from source node. The procedure stops after the mismatch of the calculated and the specified voltages at the substation is less than a convergence tolerance. Line losses are calculated afterwards using updated bus voltage. Using this method, load flow solution for a distribution network can be obtained without solving any set of simultaneous equations. The proposed algorithm is tested with 15 bus and IEEE 33 bus radial distribution system. Test results are obtained by programming using MATLAB Read More...
|
Electrical Engineering |
India |
398-400 |
103 |
A Simulation of 3 levels and 5 levels Diode clamp (NPC) inverter and its comparison
-Senjaliya Jaydeepkumar Dhanjibhai ; Prof. Divyesh Mangroliya; Prof.ashish Zandawala
In recent years, industry has begun to demand higher power equipment, which now reaches the megawatt level. Controlled ac drives in the megawatt range are usually connected to the medium-voltage network. Today it is hard to connect a single power semiconductor switch directly to medium voltage grids. For these reasons a new family of multilevel inverters has emerged as the solution for working with higher voltage levels. They can generate output voltages with extremely low distortion and lower dv/dt, they draw input current with very low distortion, they generate smaller common mode voltage and they can operate with a lower switching frequency. Because of these features worldwide research and development of multilevel inverters is occurring. In this report the simulation results and its comparison of diode clamped 3 levels and 5 level inverter has been shown. Read More...
|
Electrical Engineering |
India |
401-405 |
104 |
Mining Outliers in Large Data Sets
-S.Gayathri ; P.Sasikumar
Outlier mining is one of the important processes in the data mining technique. It is the process of extracting or mining the irrelevant values in the large dataset. Due to this we will have the noise/ error free values in the dataset. The proposed method for outlier detection using the distance based method. We estimate the outlier based on the distance between the objects in the dataset. Distance has been calculated such as standard deviation and average. After top n outlier values has been calculated. Based on the distance and weight values, we estimate threshold value. The aim of outlier detection is based on the threshold value. If the threshold value is greater than the overall distance value then we denote it as normal value otherwise it is outlier value. It is estimated by using the algorithms such as Distributed solving set algorithm and Lazy distributed solving set algorithm. We can improve the communication cost and overall runtime by using these algorithms. Read More...
|
Computer Science Engineering |
India |
406-407 |
105 |
Enhancement in Cross-Layer Routing in Mobile Adhoc Networks
-Naimish R. Patel ; Sandip G Patel
As Mobile Ad hoc Networks (MANETs) gains popularity, the need for suitable ad hoc MAC and routing protocols will continue to grow. Cross-layer design is an emerging proposal to support flexible layer approaches in MANETs. Various algorithms were proposed to improve the packet delivery ratio and fairness among flows for multi-hop ad hoc networks through cross-layer interaction between MAC and the routing layer. The routing information about bandwidth, channel capacity, received power and distance to reach its destination could be exploited by the MAC layer in order to give priority to the packets that are closer and appropriate to their destination. In this work I am going to exploit bandwidth information by the MAC layer in order to find out the best route for multimedia data. Normally shortest route is computed in network layer routing, whereas my problem here is to find out adequate "bandwidth" route required by multimedia traffic instead of finding a shortest route. Then, with the help of performance metrics like packet delivery ratio, average end-to-end delay and normalized routing load, it will be shown that cross-layering between MAC and routing layer performs much better than using routing layer and MAC layer separately. I am going to use NS2 for the implementation of the said problem. Read More...
|
Computer Engineering |
India |
408-411 |
106 |
Improvement in Reverse AODV Routing Protocol in MANET
-Sandip G. Patel ; Naimish R. Patel
The Ad hoc On Demand Distance Vector (AODV) is a routing protocol designed and best suited for mobile ad hoc network. Most of the on demand routing protocol including AODV use single route reply along the reverse path. Due to rapid changes of topology the route reply may not arrive to the source node resulting in sending several route request messages and degrading the performance of the routing protocol. The extended AODV called Reverse Ad Hoc On-Demand Vector (R-AODV) protocol uses a reverse route discovery mechanism and performs well when link breakage is frequent. In this study, it is concluded that RAODV has several benefits over normal AODV and in future RAODV can be upgraded in various ways for better performance. Read More...
|
Computer Engineering |
India |
412-414 |
107 |
Seismic Signal Interpretation and its Application in the Oil/Gas Exploration
-Vama Chokshi
The Seismic interpretation is one of the latest techniques to extract data and getting information on the geometry and physical properties of earth surface. The most important task in reservoir characterization is porosity interpretation which defines property of reservoir. This paper presents a work flow to determine porosity with the help of intelligent Caianiello neural network. Acoustic impedance-porosity relationship is given for the learning process of intelligent Caianiello neural network Read More...
|
Signal Processing Technology |
India |
415-417 |
108 |
GSM BASED MOTOR CONTROL USING PLC
-PATEL NIRAJ VASANTABHAI ; SANTOKI MAYA VALLABHBHAI; PATEL ROSHANI RAMBHAI; BHATT KEYUR RAMESHBHAI; PROF. MEHUL JAJAL
GSM Based Motor Control using P.L.C. is used for the purpose of Start and Stop the motor by message. This project will useful in industries as well as in villages where farms are far away from farmer’s house. In this project when Person who want to start/stop his motor has to send message for particular operation to GSM which is interface with P.L.C is give signal to P.L.C. for particular operation and then P.L.C operate the motor. This message signal is in code which is decoded by P.L.C. P.L.C have inbuilt C.P.U so by effective programming we set the operation of motor in P.L.C .Now is motor start/stop after sending the message ? P.L.C. give status of motor to sender via GSM modem. If the person want to work with his motor for some time then he have to give time for it in his message and motor is working for that time and as the time is expire then motor will off automatically and sender receive message for motor is stop to work. Read More...
|
ELECTRONICS & COMMUMICATION |
India |
418-420 |
109 |
Investigation on Haptic sensor Actuation system in a joystick
-SANATH PRASAD ; DR. R. PADMANABHAN
A Joystick is an input device that can be used in a variety of applications, starting from gaming to vehicle operation. The joystick sends out electric current or voltage signal depending on the position of the plastic stick. The signal generated by the joystick actuates a system based on its intensity. However, usually, the feedback on the operation of the system will not be sent back to the joystick. Hence, the operator misses the haptic component of the system and is likely to lead to asynchrony in the operation of the system. In this study, a system will be developed to create synchronous operation between the vehicle navigation systems and the vehicle operator. The joystick will be used to maneuver a car effortlessly, however with virtual operating environment. Read More...
|
Mechatronics |
India |
421-423 |
110 |
Design & Development of a Drive-By-Wire System for an Automobile
-Dimil jose ; DR.R.PADMANABHAN
Nowadays the centre of attention in vehicular technology, we can understand that electrical vehicles are playing a crucial role in automobile field and gained a lot of importance in the previous decade. The drive by wire technology integrated to replace the traditional mechanical system by electronic controller system using joystick, battery, sensors, microcontrollers & electric motors. The purpose is to eliminate traditional machineries such as steering wheel, brake pedal, &accelerator pedal from the vehicle. In this field more than a few control methods have previously been proposed using the motor wheel drive virtues, but that controllers are very hard to estimate the slip angle, vehicle velocity and all. This has the merits of effortlessness and good performance in controlling nonlinear systems. The aim of the present research is to propose a less cost, simply designed electrical vehicle with a new simple microcontroller and electric motors. Read More...
|
mechatronics |
India |
424-428 |
111 |
classifcation using multiplicative update rules in Non negative matrix factorization
-Dipali Gamit
Basically nonnegative matrix factorization (NMF) is performing on the original data for data transformation (dimensionality reduction) which is followed by the SVM classification. Using multiplicative update rules, there is a classification using SVM on two classes data which employ two sets of class one belongs to maximum margin classification constraints imposed into NMF and second is belongs to maximum margin classification constraints imposed into discriminant NMF. This paper aims to multiclass classification using two approaches multiclass SVM classifier and combining two class classifier. The previous framework two class which have also a very high accuracy of classification on various database. But this paper leads keeping the classification accuracy high with doing multiclass classification which employ maximum margin between the multiple classes of data. Read More...
|
computer science and engineering |
India |
429-433 |
112 |
FEATURE EXTRACTION TECHNIQUE FOR AM DENTAL RADIOGRAPHS
-Harsh P. Naik ; Mrs.Krupa S. Dave
Dental image processing is most immerging field for human identification. Dental features remain more or less invariant over time compared to other identification clues like fingerprint, iris, etc. which are not available in some case of major accidents. The purpose of dental image processing is to match the post-mortem (PM) radiograph with the ante mortem (AM) radiograph based on some characteristic or feature of the radiograph for human identification. Image enhancement is necessary because of poor quality and low contrast of dental image at primary stage. Thereafter segmentation algorithms are applied to the enhanced dental x-ray image which helps to find two major regions namely gap valley and tooth isolation. The main crucial part is tooth and feature extraction of dental image. In this paper, we propose a novel approach to extract individual tooth and thereafter we extract a geometrical features of dental x-ray radiograph for human identification purpose. Read More...
|
Electronics and Communication Engineering |
India |
434-437 |
113 |
Novel Data Routing for In-network Aggregation in Wireless sensor network.
-A.v.Kalpana ; s.prashanthi; a.vidhya; A.nivetha
Wireless sensor network will be increasingly deployed in several application for accurate monitoring. In Wireless sensor network, energy conservation is one of the main problems, since wireless sensor network is used in much application such as military appliance and home monitoring etc. We need to reduce energy used by sensor node to increase the network lifetime and decrease communication cost. Due to high density of node, the nearby node will detect data while sensing an event. In order to save energy Data fusion and aggregation technique is used. In this case redundant data is aggregated at intermediate node ant it will send to the sink node. Security plays a fundamental role in Wireless sensor network. We propose a Novel Data Routing for In-network Aggregation using DRINA Algorithm and implement privacy preserving technique to achieve confidentiality and authentication. Drina algorithm is cluster-based approach compared with two existing algorithm LEACH, SPT and INFRA. Drina provides the best aggregation rate compared to existing algorithm. Read More...
|
computer science engineering |
India |
438-424 |
114 |
Performance Analysis of On-Demand Routing Protocols for Wireless Ad-hoc Network: A Survey
-Mohammad Mohsin S. Bandi ; Devang S. Patel; Prof. N. D. Mehta
This MANET (Mobile Ad-Hoc Network) is a collection of autonomous wireless nodes without any centralized entity and without infrastructure. This paper presents a survey with an objective to compare Ad-Hoc routing protocols AODV and DSR taking into consideration different network parameters performed using simulation. Various researchers over time have analyzed the performance of AODV and DSR routing protocols based on the different test parameter and environment. AODV and DSR have been mostly studied through simulation. The objective of this survey is to review the AODV and DSR protocols based on the performance metrics such as mobility pattern, packet delivery ratio, average end to end delay, throughput, packet drop rate, routing overhead, node density and in different test environments. Read More...
|
Wireless Communication Systems and Networks |
India |
443-447 |
115 |
privacy preserving back propagation neural network learning using signature scheme
-C.NIKITHA ; B.NITHILA
To improve the accuracy of learning result, in practice multiple parties may collaborate through conducting joint Back propagation neural network learning on the union of their respective data sets. During this process no party wants to disclose her/his private data to others. Existing schemes supporting this kind of collaborative learning are either limited in the way of data partition or just consider two parties. There lacks a solution that allows two or more parties, each with an arbitrarily partitioned data set, to collaboratively conduct the learning. This paper solves this open problem by utilizing the power of cloud computing. In our proposed scheme, each party encrypts his/her private data locally and uploads the cipher texts into the cloud. The cloud then executes most of the operations pertaining to the learning algorithms over cipher texts without knowing the original private data. By securely offloading the expensive operations to the cloud, we keep the computation and communication costs on each party minimal and independent to the number of participants. To support flexible operations over cipher texts, we adopt and tailor the BGN doubly holomorphic encryption algorithm for the multi-party setting. Numerical analysis and experiments on commodity cloud show that our scheme is secure, efficient and accurate. Read More...
|
COMPUTER SCIENCE AND ENGINEERING |
India |
448-451 |
116 |
Mobility Aware Routing in VANET
-Mehul Kapadiya ; Asst. Prof. Dhaval Varia
VANET, Vehicular Ad-hoc Network is very emerging area of research. There are lots of applications like; Message Transmission, for example – Infotainment (Information + Entertainment), Emergency Safety Messages, convenience messages, Commercial Messages etc. can be transmitted using VANET. There are many researches done on VANET bus still it has many issues. Because of high mobility of nodes in VANET, node to node data delivery is also a crucial issue as its achieved 100% due to intermittent connectivity. So our motivation is to design a protocol in which chances of data delivery increases. In our proposed work, data delivery should be Mobility Aware. That means no blind data delivery from any node to any node. Sender will estimate the speed of neighboring node and it will set a priority of message sending to the node which is having highest speed. Read More...
|
Computer engineering |
India |
452-455 |
117 |
implementing user clustering using web log data
-Saranya.S.V ; saranya.s.v; sudhashree.A.; DR.J.Frank Vijay
The sophistication of the web browsing depends on the likelihood of user reaching the intended web page at the earliest. Patterns of usage have to be tracked in order to conclude the user’s intent. These usage patterns are analyzed with respect to URL’s identified from user segmentation which is obtained from finding similar behavioral patterns. The technique employed here to achieve this phenomenon is the formation of user communities using pattern mining technique. Agglomerative clustering methods are used to typically discover the strongly linked communities. But these methods prove to be inefficient when implementing in large networks with several thousand nodes. Hence the method of triad formation, with graph mining can be applied to resolve new combination of edges which are not connected and establish links between them thereby increasing the identification of active users. The methodology is to form links between URL’s that are most frequently used. The prerequisite for this is to detect communities based on the user’s interests and increasing connectivity. The ultimate aim is to help the network providers serve their customers based on the user interest. The genetic programming method of churn prediction is applied to identify the possible customers who may leave the network with the help of which steps to retain the existing customers in a network can be made Read More...
|
data mining |
India |
456-459 |
118 |
Efficient deployment of cloud computing in an aircraft data network
-Periyar Dasan ; Ajish; Justin Raj; Agan Prabhu; Anandan
the introduction of data networks within an aircraft has created several service opportunities for the air carriers. Using the available Internet connectivity, the carriers could offer services like Video-on-Demand (VoD), Voice-over-IP (VoIP), and gaming-on-demand within the aircraft. One of the major road blocks in implementing any of these services is the additional hardware and software requirements. Each service requires dedicated hardware resources to run appropriate software components. It is not possible to accommodate every hardware component within the aircraft due to space, power, and ventilation restrictions. Also, it is economically not viable to install and maintain hardware components for every aircraft. One solution is to use cloud computing. C loud computing is a recent innovation that is helping the computing industry in distributed computing. Cloud computing allows the organizations to consolidate several hardware resources into one physical device. The Cloud computing concept helps organizations in reducing the overall power consumption and maintenance costs. The cloud computing concept could be extended to the Aircraft Data Network environment with every aircraft subscribing to the cloud resources to run their non-miss ion- critical applications. In this paper, the authors explore the possibility of using cloud services for Aircraft Data Networks. The authors evaluate the performance issues involved with the aircraft mobility and dynamic resource transfer between servers when the aircraft’s point-of-attachment changes. The authors predict that using cloud computing concepts would encourage many carriers to offer new services within the aircraft. Read More...
|
Cloud computing |
India |
460-464 |
119 |
Using Priority Based Annotation Technique To Search Educational Video Resources.
-Afreen Rasheed ; Swetha.A; K.Ezhilarasi
Multimedia educational resources play a vital role for distance e-learning experiences. It is necessary to explore, share, reuse and link these educational resources. With the help of linked data technology, video annotation and browser platform with two online tools namely Annomation and Sugar tube are used. These mentioned tools will generate further videos and educational resources from the Linked Open Data cloud and the web. The Annomation technique is limited to search of related videos which are listed based on a general or random keyword weightage. In order to enhance the methodology, the application is extended to provide a more accurate search results by listing the links based purely on the keyword value which is maintained in the database by an expert using the Prioritized Context Aware Technique. Thereby, when a search is made based on the keyword, the highest prioritized link as per the expert’s knowledge will be provided. This approach improves the functionality of the e-learning since the search is more optimized and specific. Read More...
|
Information Technology |
India |
465-468 |
120 |
An Association Ruled Based Method for Mining Useful Information from Web Log
-Vishal Gupta ; Mahesh Malviya
In data mining association rule is one of the most important and popular researched method for discovering interest between various large databases. The extract interest is correlation, frequent patterns and association rule among the different set of items in the transition database. In previous algorithm requires large amount of disk space for placing input/output subsystem. In order to reduce the multiple past over the disk space a new method is proposed in this paper which is top down approach instead of bottom down approach .The improved version of this algorithm will reduce the data base scan and avoid the generation of wanted patterns which will definitely reduce the data base scan, time and its space consumption Read More...
|
Computer Science & Engineering |
India |
469-471 |
121 |
ANALYSIS OF MRR OF TOOL STEEL MATERIAL ON EDM FOR DIFFERENT ELECTRODE MATERIALS
-Ramprakash Inani ; Satendre parmar
Electrical Discharge Machining is a technological process with a large industrial implementation. Its use is particularly intense when very complex shapes on hard and brittle material with high geometrical and dimensional accuracy are required. Material Removal Rate, Tool Wear Rate and Surface Finish are most important parameters, which decide machining performance. Present study attempts to find out electrodes performance in electric discharge machine (EDM). In this work, the effect of different electrodes performance with different input with their different levels in EDM on machining characteristics of cold work tool steel has been studied. Three parameters are electrode Materials, Peak current and pulse on time. The process performance is measured in terms of Material Removal Rate (MRR). The result outcome will identify the important parameters and their effect on MRR in the presence of dielectric fluid in EDM Read More...
|
Production Engineering |
India |
472-474 |
122 |
IMAGE TRANSLATOR ON ANDROID USING IMAGE PROCESSING FOR TOURISM
-Kumar Arun Bhogle ; Deeptisagar Kusuma; Fariha Khan; Sanif Kadiwal; Er. Nazneen Pendhari
Today, Android powers trillions of mobile devices across 180 countries all over the world. Android is known as one of the fast growing and largest platform present for mobile devices [1]. Android is capturing fancy of infinite users every day. It is very simple, user friendly and inexpensive. Thus we have chosen Android as the platform for our application. Our project goes by the name “Image Translator on Android using Image Processing (ITAIP).†Our application can be used while people are on the go. Users are allowed to click pictures of pages, banners, signboards, menus, etc. Using the inbuilt Optical Character Recognition (OCR) tool user can convert the text from the image captured into Unicode text format [2]. There is no networking delay since there is inbuilt OCR tool. Read More...
|
Computer Engineering |
India |
475-477 |
123 |
A Literature Review on Jet Ejector System
-BHATT PRATIKKUMAR PRAKASHCHANDRA ; PROF. DR. GAJENDRA ASTHANA
Jet ejectors are the simplest devices among all compressors and vacuum pumps. They do not contain any moving parts, lubricants or seals; therefore, they are highly reliable devices with low capital and maintenance costs and also energy saving device. Furthermore, most jet ejectors use steam or compressed air as the motive fluid, which are easily found in chemical plants. Due to their simplicity and high reliability, they are widely used in chemical industrial processes; however, jet ejectors have a low efficiency. The major consideration of this study is to optimize jet ejector efficiency at each operating condition. Consequently, the motive stream consumption and operating cost is minimized. Many factors affect jet ejector performance, including the fluid molecular weight, feed temperature, mixing tube length, nozzle position, throat dimension, motive velocity, Reynolds number, pressure ratio, and specific heat ratio. This paper reviews the various research on jet ejector with different application. Read More...
|
Mechanical Engineering |
India |
478-480 |
124 |
A Survey Paper on Design of STUMPS based Logic BIST Architecture
-Meha M. Panchal ; Prof. Kirit V. Patel
Built-in self-test for logic circuits or logic BIST, is an effective solution for the test cost, test quality, and test reuse problems. The scheme is based on STUMPS (Self Test Using MISR and Parallel Shift register) architecture which uses an on-chip circuitry to generate the test patterns and analyze the responses with no or little help from an ATE. External operations are required only to initialize the Built-in tests and to check the test results. Expected output includes the designed STUMP based architecture, Which is test per scan using verilog HDL and simulation result having information of design is defect free or not. Read More...
|
Electronics & communication engineering |
India |
481-485 |
125 |
READING THE CAPTURED IMAGE FOR VISUALLY IMPAIRED PERSON
-Malle Sajeda Mahmed ; Lokhandwala Tasneem ; Shah Mittal Jogeshbhai; Raju Rojmina Usmangani
The paper covers a reading device for blind or visually impaired persons for recognizing and reading text passages. It comprises an image capturing unit being configured to capture an image of an environment of a blind or visually impaired person and an image processing unit being configured to process the image data such that text is recognized and extracted from the image. The text is then converted into an audio message which can thus guide the blind in their daily lives. Read More...
|
Electronics & Communication |
India |
486-487 |
126 |
A Survey Paper on Digital Watermarking Techniques
-Ketul K Patel
Watermarking, which belong to the information/data hiding field, has seen a lot of research interest recently. There is a lot of work begin conducted in different branches in this field. Watermarking is a technology being developed to ensure and facilitate data authentication, security and copyright protection of digital media. In this paper we present a detailed survey of existing and newly proposed watermarking techniques. We classify the techniques based on different domains in which data is embedded. Read More...
|
Electronics and Communication Engineering |
India |
488-492 |
127 |
D-Pattern Algorithm For Text Mining
-A.D.Khade ; A.B.Karche; D.S.Jadhav; M.V.Vaghpatil; A.S.Zore
We know that multiple data mining methods have been developed for finding useful patterns in contents like PDF files, text files. Current paper addresses the problem of making text mining results more effective to humanities scholars, journalists, intelligence analysts, and other researchers. To use effective and bring to up to date discovered patterns is still an open research task, especially in the domain of text mining. Text mining is the finding of very interesting knowledge (or features) in the text documents. It is a very difficult to find exact knowledge (or features) in text documents to help users what they actually want. This paper represent efficient mining algorithm to find particular patterns. Read More...
|
Computer Engineering |
India |
498-500 |
128 |
ANALYSIS OF VARIOUS ROUTING PROTOCOLS IN MOBILE AD HOC NETWORK
-Ankur G.Kachhad ; Prof.H.J.Baldaniya
The mobile ad hoc networks have become increasingly popular in the computing industry. This is particularly true within the past decade, which has seen wireless networks being adapted to enable mobility. This article examines routing protocols designed for these ad hoc networks by first describing the operation of each of the protocols and then comparing their various characteristics. The remainder of the article is organized as follows. The next section presents a discussion of two subdivisions of ad hoc routing protocols. Another section discusses current table-driven protocols, while a later section describes those protocols which are classified as on-demand. The article then presents qualitative comparisons of table-driven protocols, followed by demand-driven protocols, and finally a general comparison of table-driven and on-demand protocols. Read More...
|
Computer Engineering |
India |
501-505 |
129 |
FRAMEWORK FOR EFFICIENT JOB SCHEDULING IN CLOUD ENVIRONMENT
-VENKADA LAKSHMI S ; Dr. K.Ruba Soundar
Cloud computing is known as digital service delivery over the Internet by several applica¬tions which are carried out by computer systems in distributed datacenters. It supplies a high performance computing based on protocols which allow shared computation and storage over long distances. Managing the allocation of cloud virtual machines at physical resources is a key requirement for the success of clouds. It aims at spreading the workloads among the processing resources in an optimal fashion to reduce the total execution time of jobs and then, to improve the effectiveness of the whole cloud computing services. A new Bee Swarm optimization algorithm called Bees Life Algorithm (BLA) is applied to efficiently schedule computation jobs among processing resources onto the cloud datacenters. The algorithm mimics the food foraging behavior of swarms of honey bees. The algorithm performs a kind of neighborhood search combined with random search and optimization problems. Read More...
|
COMPUTER SCIENCE AND ENGINEERING |
India |
506-509 |
130 |
Design and Implementation of sense amplifier based flip Flop for high performance in CMOS 45nm technology parameter
-Bhumi Jayendrasinh Vasandia ; Prof. Rakesh Gajre
This paper will demonstrate the sense amplifier based flip flop design using static or conventional CMOS and NIKOLIC latch based topologies. Implementation is done using BPTM 45nm deep submicron technology parameter in LT spice IV. Sense amplifier plays important role in memory read and write operation which will reduce the power consumption and propagation delay. I have designed D flip flop with both logic topologies and results found a lesser power consumption and propagation delay in NIKOLIC architecture compared to conventional sense amplifier based flip flop. Read More...
|
Electronics & Communication Engineering |
India |
510-512 |
131 |
A Survey on Wormhole Attack Detection in Wireless Sensor
-mayur parmar ; Manish Sharma; Rajesh Ishwar
Wireless sensor networks have a wide range of potential applications, including security and surveillance, control, actuation and maintenance of complex systems and fine-grain monitoring of indoor and outdoor environments. Sensor nodes have limited transmission power and limited resources. Once they are deployed, they are remotely managed. There are many security attacks possible on sensor network like Jamming. Sinkhole, Selective Forwarding, Wormhole, Sybil attack etc. Among all the attacks, wormhole is very dangerous attack because the attacker does not require any cryptographic break to launch the attack. The attacker tunnels the packet from one area to another area, and disturbs the whole routing process. Traditional security algorithm cannot work on sensor network because of their limited resources. So new cryptographic measures are needed to protect the sensor nodes. Our proposed method can easily identify real and fake neighbours. Read More...
|
Computer Engineering |
India |
513-515 |
132 |
Simulation Model For Availability Estimation Of Water Supply Pumping System
-Dr.PRATHEEBA PAUL ; Dr.T.PAUL ROBERT
Availability of drinking water supply system is an important measure to be considered as desired quantities of water should be delivered from a water supply pumping system to all consumers at their tapping points throughout its design life. The uncertainty in the performance characteristics of mechanical components in the water pumping system such as motor, pump, and control valves affect the system availability. The reliability and maintainability of the components in the pumping system have an impact on the availability of this critical infrastructure. A Fault Tree analysis integrated with a simulation model to determine the availability of the water supply pumping system is presented in this paper. Several failure modes of various components in the water supply system are studied. The simulation results help to identify the critical pumping system elements that need more maintenance effort. Read More...
|
Mechanical Engineering/ Civil Engineering |
India |
516-518 |
133 |
Streaming Media From Flash With Less Power Consumption
-Ankit Sanghvi ; Devang R Shah
Reducing energy consumption has been an important design issue for large-scale streaming media storage systems. Existing energy conservation techniques are inadequate to achieve high energy efficiency for streaming media computing environments due to media is streamed from the hard disk drive. To address this problem, we propose in this paper a new energy-efficient method stream media from flash memory. Streaming media from flash memory significantly reduces power utilization because of two reasons. First, a set of hard disks in media server side consumes more power compared to flash memory. Second, heat dissipation on the media server side. Therefore Streaming media from the flash memory is conducive to saving more energy for the long media data. This approach is achieved using the kernel and device driver concepts on the Linux operating system. Our experimental results show that it can save up to 28.13%-29.33% energy consumption. Energy efficiency of streaming media storage systems can be improved by 3.3~6.0 times. Read More...
|
Embedded Systems |
India |
519-522 |
134 |
Optimization of Cutting Parameter of (SS302) on EDM using Taguchi Method
-Chintan A. Prajapati ; Prof. Dr. Prashant Sharma; Prof. Manish Pokharna
In this work, Optimization of operating parameters that are an important step in machining process, particularly for operating unconventional machine like EDM. The objective of this work is to investigate the optimum cutting parameters for a work piece (SS-302) & tool material (Copper, Aluminum, Brass) combination on Electrical Discharge Machine. To produce any product with desired quality by machining process, proper selection of process parameters is must essential for better product . This best parameters combinations can be accomplished by Taguchi optimization approach. The aim of the present work is to investigate the effect of process parameters on Material remove rate (MRR), Tool wear ratio (TWR), Surface roughness (SR) to obtain the optimal setting of this cutting parameter. Read More...
|
Mechanical Engineering |
India |
523-527 |
135 |
A Survey of Mapreduce based Optimized Semantic Search in Hadoop Environment
-Sejal Dave ; Dr. Chirag S. Thaker
Now-a-days the data has become bigger because of E-commerce and Social Networking sites. So, there is a need to handle such big data and it has to be analyzed in such a way that it can produce some useful information which can be used in some kind of decision making. MapReduce framework has emerged as one of the most widely used parallel computing platforms for processing data on terabyte and petabyte scales. Users specify a map function that processes a key/value pair to generate a set of intermediate key/value pairs, and a reduce function that merges all intermediate values associated with the same intermediate key. Today Map Reduce has been used daily at companies such as Yahoo!, Google, Amazon, and Facebook, and adopted more recently by several universities, it allows for easy parallelization of data intensive computations over many machines. There are many algorithms for retrieving the information using MapReduce like Sorting, Searching, TF-IDF, BFS, and Page-Rank etc Hadoop is a distributed file system where files can be saved with replication. It provides high fault tolerance and reliability. Moreover, it provides an implementation of MapReduce programming model. Hadoop can work directly with any distributed file system which can be mounted by the underlying OS. Hadoop-MapReduce can handle huge amount of data. Scalability is a matter of concern for a long time. Same is true for semantic web data. We can store huge amount of semantic web data in Hadoop clusters built mostly by cheap commodity class hardware and still can answer queries fast enough. The aim of this survey is improving the performance of parallel query processing using MapReduce. Read More...
|
Computer Engineering |
India |
528-531 |
136 |
Harmonic Compensation using different Passive Filter Configurations
-Ankit H. Patel ; B. A. Shah
Harmonics are a menace to electric power
systems with disastrous consequences. Line current
harmonics cause increase in losses, instability, and also
voltage distortion. Both passive and active filters have been
used near harmonic producing loads or at the point of
common coupling to block current harmonics. Shunt filters
still dominate the harmonic compensation at medium/high
voltage level, whereas active filters have been proclaimed
for low/medium voltage ratings. With diverse applications
involving reactive power together with harmonic
compensation passive filtering has been preferred for
harmonic compensation in distribution systems due to low
cost, simplicity, reliability, and control less operation. The
main emphasis of this investigation has been on a
compactness of configurations, simplicity in control,
reduction in rating of components, thus finally leading to
saving in overall cost. Based on thesis considerations, a
wide range of configurations of power quality mitigators are
developed, which is expected to provide detailed exposure
to design engineers to choose a particular configuration for a
specific application under the given constraints of economy
and desired performance. For bidirectional power flow
applications, the current source converter is designed and
simulated with R-L load. The necessary modeling and
simulations are carried out in MATLAB environment using
SIMULINK and power system block set toolboxes. The
behavior of different configurations of passive tuned filters
on power quality is studied. Read More...
|
Electrical Engineering |
India |
532-535 |
137 |
Damping Power System Oscillation with STATCOM
-Dhaval. L. Gvalani ; Mahipalshinh. C. Chudasma
In their early years electric power systems did not reach far from the generating station. Since then power systems have been inter-connected to cover first regions and later nations. Today they extend over entire continents and contain a huge number of components that together serve to supply electric energy to the customers. The aim is to maintain the voltage and the frequency at their nominal values. To improve reliability both design and operation of power systems involve safety margins to the cost of some profit. Much effort today is spent on control and supervision that can reduce these margins, which also has environmental aspects. "Environmental and economic aspects make it difficult to build new power lines and to reinforce existing ones. The continued growth in demand for electric power must therefore to a great extent be met by increased loading of available lines. A consequence is that power system damping is reduced, leading to a risk of poorly damped power oscillations between the generators. This thesis proposes the use of controlled active loads to increase damping of such electro-mechanical oscillations. The focus is on structural aspects of controller power system damping by fact device Statcom ." Read More...
|
Electrical Engineering |
India |
536-540 |
138 |
A Novel Single-Phase Z-source Buck-Boost Matrix Converter
-Prof. Jiten Chavda ; Hardik Mehta; Sharma Yogendra
This paper presents a novel type of Z-source buck-boost matrix converter which has unique features that cannot be obtained in traditional matrix converter. The proposed converter employs Z-source network to buck or boost the input voltage. The converter employs safe commutation strategy which eliminates voltage spikes on the switches without need of a protection circuit. Read More...
|
Electrical Engineering |
India |
541-544 |
139 |
Control of DFIG using Back-To-Back PWM Converters
-Semel R Tank ; V.G.Bhuva
The studied system here is a variable speed wind generation system based on Doubly Fed Induction Generator (DFIG). The stator of the generator is directly connected to the grid while the rotor is connected through a back-to-back converter which is dimensioned to stand only a fraction of the generator rated power. In order to improve the operation capacity of wind turbine under critical situation, the intensive study of both machine side converter control and grid side converter control is necessary. The system uses two back-to-back converters in the rotor circuit. The basic concept behind the total system (DFIG with back to- back converters) is that the machine-side converter controls the active and reactive power by controlling the d-q components of rotor current (i.e. idr and iqr), while the grid-side converter controls the dc-link voltage and ensures the operation at unity power factor by making the reactive power drawn by the system from the utility grid to zero. Read More...
|
Electrical Engineering |
India |
545-549 |
140 |
Transient Stability Enhancement of SMIB (Single Machine Infinite Bus) System using UPFC
-Hiren G. Patel ; B. A. Shah; Brijesh Mistry
The focus of this paper is to improve transient
stability of Single Machine Infinite Bus (SMIB) system with
the help of Unified Power Flow Controller (UPFC). UPFC
has a capability to control simultaneously real and reactive
power flows in a transmission line and also to regulate
voltage at the bus where it is connected. A proportional
integral (PI) controller has been used for the Unified Power
Flow Controller (UPFC). In this paper, two simulation
models of Single Machine Infinite Bus (SMIB) system with
and without Unified Power Flow Controller (UPFC) have
been developed. The Flexible Alternating Current
Transmission (FACTS) devices such as UPFC are the most
important in suppressing power system oscillations and
improving damping. We can study the transient stability
using the waveform of fault current, real power, reactive
power at receiving end, shunt injected voltage and its angle,
series injected voltage and its angle and excitation voltage.
Therefore we can conclude that transient stability of Single
Machine Infinite Bus (SMIB) system is improved with the
use of Unified Power Flow Controller (UPFC). Read More...
|
Electrical Engineering |
India |
550-553 |
141 |
GSM BASED ROBOT
-Mungara Dhaval ; Gautam Davera; Parmar Bharat; Vijay Patel
Conventionally Wireless-controlled Robots use RF circuits, which have limited working range, limited frequency range and limited control. Use of a mobile phone for robotic control can overcome these limitations. It provides the advantage of robust control, working range as large as the area of the service provider, no interference with other controllers. Although the appearance and capabilities of robot vary vastly, all robots share feature of a mechanical, movable structure under some form of control. The control of Robot involves three distinct phases: perception, processing and action. Generally, the preceptors are sensors mounted on the robot, processing is done by the on-board microcontroller or processor, and the task is performed using motors or with some other actuators. In this project the robot is connected to gsm modem which is controlled by user mobile phone. With the help of AT commands we can move our robot in desired direction as per our requirement. Read More...
|
Electronics and Communication |
India |
554-555 |
142 |
Effects of different parameters of PVD coated turning on Aluminium Bronze Casting
-Jasvarinder Chalotra ; Rohit Kumar; Rajpal
This paper represents the experimental work where Aluminium Bronze, of high strength, excellent abrasion and corrosion resistance, is turned by other four edges of turning inserts which is not often used. The CNMG Turning inserts have eight edges, mostly four of them are used and then disposed off as scrap, but we can use other four edges of these scrap inserts as they have all the characteristics as that of four edges that are used generally. The process of turning work carried out at three different cutting speeds under dry cutting conditions. Three levels of spindle speed (Vc=260 rpm, 400 rpm, 600 rpm). Three levels of feed rate (0.1, 0.2, 0.4 mm/min) and three levels of cutting depth(1, 2, 3 mm). In this thin walled hollow cylindrical bush (48x40x60mm) casting of Aluminium Bronze is used, which is hard to machine due to its mechanical properties and wall thickness. Welded tools and brazing tools are used for turning in industries. But these tools lead to time consumption and high requirement of lubricant that further lead to energy loss, stress and load problems. These factors affect the re-melting process of Aluminium bronze scrap. Therefore, we use PVD coating technique with other four edges of insert that generally disposed off as scrap. PVD coating properties are favorable under dry conditions and scrap inserts lead to reduce the use of welded tools and tooling cost. In this, we analyses the effect of micro Hardness, Surface Roughness and Material Removal Rate (MRR) due to cutting parameters by using Taguchi method. The optimization is done using twenty seven experimental runs based on L'27 orthogonal array of the Taguchi method, and are performed to derive objective functions to be optimized within the experimental domain. Read More...
|
Production Engineering |
India |
556-560 |
143 |
WIRELESS ENERGY THEFT METER USING GSM
-DHAMELIYA JINAL ASHOKBHAI ; PRAJAPATI POORVEE AMBALAL; PATEL DIPAL ASHWINBHAI; MODI BIJAL KANAIYALAL
This paper deals with Energy meters are replacing conventional energy meters (electro Postpaid mechanical energy meters) throughout the world power systems. They have outperformed the electromechanical meters in terms of functionality and performance. The manufacturing investment, the measurement accuracy and quality, and fault tolerant billing are each unquestionably superior to the traditional electromechanical meter design. The electronic energy meter have built in microcontroller based technology that makes it accurate, more reliable, tamperproof and with future enhancing prospect the most preferable over electromechanical meter. Electromechanical meters have been the standard for metering electricity since billing began. Today’s electricity companies are demanding more information from meters in the residential sector, where metering has typically been limited to kilowatt-hours. New features such as multi-tariff billing, reactive energy measurement and power quality monitoring are desirable to improve generation, distribution, customer service and billing. Postpaid energy meters are mainly uses to restrict the energy theft, especially in urban & rural areas. 8051 microcontroller & Energy Metering IC ADE7751 along with other circuit are used in this project. Read More...
|
ELECTRICAL ENGINEERING |
India |
561-562 |
144 |
Performance analysis of Wave Length Division and Sub Carrier Multiplexing using OSSB modulation
-Ashutosh Jha ; Vinay Paul; Shubham Agarwal
In fiber-optics, transmission mechanism, capacity and the distance plays an important role in deciding the performance of the system. Optical fiber avails the user an enormous bandwidth using systems like multichannel optical communication. This, in todays’ world too has left an enormous potential literally untapped. Today, a very few applications involve the use of high bandwidth, giving way to the method of imposing low speed signals over the high speed carrier signals. This makes the higher speed signal, the carrier of various low speed signals. This low speed channels are multiplexed together in time to form a higher-speed channel. Various systems viz. Wavelength Division Multiplexing (WDM), Subcarrier Multiplexing (SCM) have been developed to increase the performance of existing optical communication system. In this project we will be trying to analyze the performance of Wavelength Division Multiplexing (WDM), Subcarrier Multiplexing (SCM). We will use an 8 channel MUX to analyze the performance while in SCM, we use 4 channel SCM system.
The performance analysis of SCM employing OSSB modulation scheme using different modulation schemes like PSK, ASK and FSK have been analyzed and performance comparison between these schemes has been done taking several parameters into consideration using optisystem software.
Read More...
|
Optical communication |
India |
563-565 |
145 |
Comparison of carrier based PWM methods for cascaded H-Bridge Multilevel Inverter
-Hardik Jayeshkumar Padariya ; Chandni Yogeshkumar Joshi
Multilevel inverters are mainly devised for high power applications, due to higher voltage operating capability, lower dv/dts and more sinusoidal outputs. The Diode Clamped, Flying Capacitor and the Cascaded H-bridge inverter, are the most suitable topologies. The Cascaded H-Bridge, also known as multi-module converter, has been particularly used in very high power applications, due to its modularity and attractive input current harmonics cancellation. Multilevel converters are mainly controlled with sinusoidal PWM technique and it includes two types of multiple carrier arrangements: Level Shifted (LSCPWM) and Phase Shifted (PSCPWM). In this paper comparison between these two modulation techniques is carried out. Read More...
|
Electrical Engineering (Power Electronics) |
India |
566-570 |
146 |
A review paper on palm oil biodiesel under long-term storage conditions
-Krutika V. Prajapati ; Krunal Khiraiya; Nityam Oza
Palm-oil bio-diesel is widely used as alternative to diesel, the influences of long-term oxidative degradation on its burning characteristics are a matter of some concern. To further our understanding of this issue, this study investigated the heat release, carbon residue, flash point, and cetane index, oxidative stability, Density, Viscosity, Total acid no. of palm-oil bio-diesel in a constant-temperature water bath after long-term storage. Read More...
|
Mechanical Engineering |
India |
571-575 |
147 |
Optical Character Recognition Using Modified back propagation algorithm
-Vinit Mandloi ; Mr. Arif Khan; Mr. Deepak Kulhare; Mr. Lokendra Songare
In this Paper, we present a new neural network based method for optical character recognition as well as handwritten character recognition. Experimental results show that our proposed method achieves 98 percent accuracy in optical character recognition. In this thesis, we present an overview of existing handwritten character recognition techniques. All these algorithms are described more or less on their own. Handwritten character recognition is a very popular and computationally expensive task. We also explain the fundamentals of handwritten character recognition . We describe today's approaches for handwritten character recognition. From the broad variety of efficient techniques that have been developed we will compare the most important ones. We will systematize the techniques and analyze their performance based on both their run time performance and theoretical considerations. Their strengths and weaknesses are also investigated. It turns out that the behavior of the algorithms is much more similar as to be expected. Read More...
|
Computer Science and Engineering |
India |
576-579 |
148 |
Load Voltage Regulation and Line Loss Minimization of Loop Distribution Systems using UPFC
-JOOHI BHARATBHAI DARJI ; Anjali Rana; Prof. Jyoti Swamy
This paper presents a new method for achieving load voltage regulation and line loss minimization in the loop distribution systems, simultaneously. First, the line loss minimum conditions in the loop distribution systems are presented. Then, load voltage regulation is achieved by using shunt compensation. To achieve these two objectives simultaneously, the Unified Power Flow Controller (UPFC) is used. The UPFC shunt converter is used as a shunt compensator to regulate the load voltage, and the UPFC series converter is used to control the power flow to achieve line loss minimization. The proposed control schemes of UPFC shunt and series converter are also investigated. The effectiveness of the proposed control schemes has been verified experimentally using laboratory prototype in a 200V, 6kVA system. Read More...
|
Electrical Engineering |
India |
580-585 |
149 |
Automation of Education by integrating it on Social Network Platform
-Raj S. Shahpatel ; Sheshang D. Degadwala; Kishori S. Shekokar; Namita V. Bhagchandani; Arpita D. Agrawal
In order to search education related information/resources there is only one traditional method, that is exploring things through search engine and navigating the resultant URL’s even though this method actually leads to waste of time and energy, still this method is used widely. Now-a-days people all over the world show keen interest in using social network sites; the term “social networking†does not exclusively belong to digital technology on the Web. On the contrary, social networks had been studied from the beginning of 20th century with the aim to comprehend how the members of a certain community interact and which mechanism can determine the interaction itself but today every social networking service platform helps to build social networks or social relationship among people who share common interests, activities, backgrounds, or real-life connections. There are many social networks like Facebook, Twitter, LinkedIn etc., but they have limited service scope in terms of educational resources and information as there is no such existing system like Educational Social Network so far which can provide a single platform to Colleges/Universities to have its own hub for regular educational updates and intercommunication also to have exclusive classrooms with online lectures. Read More...
|
Computer Science and Engineering |
India |
586-589 |
150 |
A Survey On Least Cost Any path Routing in Wireless Network
-Mayank V Parekh ; Prof Jaimin Dave; Zishan Noorani
Wireless Networks has undergone tremendous technological advancement in last few decades. Major industrial applications and research work is focus to enhance various critical aspects like packet delivery, optimum path routing and packet level security enhancement. Current technological challenges address the issue of multicast routing in wireless networks for the packet transmission from source to destination with the use of created network topologies for long distance scenarios. Various method are adopted to address the issue of packet delivery probability and the use of nearest neighbour opportunity of the node in various wireless Networks. Read More...
|
Computer Engineering |
India |
590-593 |