No. |
Title and Author |
Area |
Country |
Page |
51 |
Analytical Study and Performance Comparison of various Routing Protocols
-Nisarg A Patel ; Ashish A. Gajjar; Ankit K. Patel
A wireless ad-hoc network is a collection of mobile nodes that makes a multi hop autonomous system without any fixed infrastructure. The nodes use service of other nodes in the network to transmit packet to the destination nodes. This paper contain the study of three MANET routing protocol given by various researchers. In this paper, we have also studies the comparison of the performance of the DSR, AODV, and OLSR routing protocols. We have analyzed the performance of protocols in different traffic load including end to end delay, throughput, and video packet delay variation and routing traffic overhead. A Simulation result shows that in the case of file transfer with TCP connection, OLSR acts better in terms of end to end delay and upload response time, but with high routing overhead. In the case of the video transfer with UDP connection, AODV acts better in terms of throughput, delay variation, end to end delay and have low routing traffic. Read More...
|
Mobile Adhoc Network |
India |
198-202 |
52 |
A Review of Automobile Engine Problems & It's Monitoring System
-Rishabh M. Upadhyay ; Hardik N. Mewada
In today's fast life people don't have time and in that if u find your car having breakdown, what will u do at that time!!! How will you feel when your car priory tells u that this thing is going to happen!!! This is all what my innovative idea about "A Review of Automobile Engine Problems & its monitoring system" is going to get helpful. With the help of different sensors I am going to detect different parts of an engine. And that data from the sensors will pass on to embedded system. That data will get compared with the preloaded data. If data matched then ok and if not then will show a precautionary Signal on the screen and this is how the user get to know about the problem occurred in an engine. Read More...
|
Electronics and Communication |
India |
203-205 |
53 |
Active Power Filter as the Function of Uninterruptible Power Supply
-Utkarsh Panchal ; Jinal Prajapati
This paper presents the analysis and the simulation of a single-phase active power filter as the function of UPS. The system provides combined functions of the battery bank energy storage, power factor compensation, harmonic elimination and uninterruption of the power supply. When the utility is in normal operation, the system will not only supply DC power for battery charging, but also function as an active power filter for improving the power factor and reducing the current harmonics on the utility side. If the utility power fails, the proposed system will function as an inverter immediately to supply the battery power to the ac load. Read More...
|
Electrical Engineering |
India |
206-211 |
54 |
Hydrological Drought and its indices
-Malekwala Fatema Saifee ; Dave Riddhi Pinakinbhai ; Thakkar Sachin; Chanda Rautela
Hydrological drought is associated with the effects of periods of precipitation shortfalls on surface (stream-flow level) or subsurface water supply (ground-water level). The frequency and severity of hydrological drought is often defined on a catchment. Beginning with a discussion of drought definitions, this paper provides a review of fundamental concepts of drought, classification of drought and hydrological drought indices. It also discusses advantages and disadvantages of drought indices. Read More...
|
Water Resources Management (civil Engineering) |
India |
212-214 |
55 |
Numerical modeling of Degradation due to Sediment diminution
-Thakkar Sachinkumar Anilbhai ; Chanda Rautela; Dave Riddhi; Malekwala Fatema
Alluvial channels attain equilibrium state over many years. Changes in the flow rates or in sediment load can disturb the equilibrium. These changes can prove detrimental to the proper functioning of the engineering works located in the river. Various researchers have developed few mathematical and numerical models based on various numerical and analytical schemes. In this paper MacCormack explicit finite difference scheme is used to develop numerical model for simulation of bed level of alluvial channels. The Saint-Venant equations are used for numerical solution of degradation rates due to sediment diminution. The main objective is to develop a numerical model for prediction of degradation rates. Also validation of the developed model will be done by the observed data of experiments. Read More...
|
Water Resources Management - Civil Engineering |
India |
215-219 |
56 |
Dynamic Flood wave Routing By finite difference method
-chanda Rautela ; Dave Riddhi; Sachin Thakkar; Malekwala Fatema
Flood routing is essential to control flood flow at the flood control station such that it is within the specified limit. It is a mathematical procedure used to predict the discharge and water depth due to flooding on or more points on river segment. In this paper finite difference scheme is considered for solving the channel routing problem. The main objective is to develop a computational model for flood wave routing by use of finite difference method and to validate the developed model by the observed data of Sabarmati River. Calibration of model is done. Essentially non-oscillating scheme is used for this purpose. Read More...
|
water resources management (civil) |
India |
220-222 |
57 |
Spam Mail Filtering: A Survey of Effective Spam Mail Detection Techniques
-renuka yadav ; Jignesh Vania
With the continuous growth of email users has resulted in the increase of unsolicited emails also known as Spam. E-mail spam, known as unsolicited bulk Email (UBE), junk mail, or unsolicited commercial email (UCE), is the practice of sending unwanted e-mail messages, frequently with commercial content, which is normally in large quantities to set of recipients. There are many spam filters available that uses various approaches to identify the incoming message as spam or ham, ranging from white list / black list, Bayesian analysis, keyword matching, mail header analysis, postage, legislation, and content scanning etc. but we are still flooded with spam emails every day. This is not because the filters are not powerful enough, it is due to the swift adoption of new techniques by the spammers and the inflexibility of spam filters to adapt the changes. In our work, we employed supervised machine learning techniques to filter the email spam messages. Widely used supervised machine learning techniques namely C 4.5 Decision tree classifier, Multilayer Perceptron, Naive Bayes Classifier are used for learning the features of spam emails and the model is built by training with known spam emails and legitimate emails. The results of the models are discussed.
In current, server side and client side anti-spam filters are introduced for detecting different features of spam emails. However, recently spammers introduced some new tricks consisting of embedding spam contents into digital image, pdf and doc as attachment which can make ineffective to current techniques that is based on analysis digital text in the body and subject fields of email. Read More...
|
Computer Engineering |
India |
223-226 |
58 |
A Simple Architecture for the Safety of Road Travel
-Arindam Basak ; Madhumita; Atul Ranjan; Abhishek Banerjee; Parinita Sinha
The city road is going to be congested day by day and lot of accidents occur every day due to human errors, bad weather conditions, failure of mechanical parts or the problems in the road such as lane geometry, pavement etc. The main type of accident which causes severe damage is of head on type and it is mainly due to the negligence of the driver or the traffic system. Now the time has come to use some sensor networks to cope up with this type of situation. An IR sensor can help us to some extent in this regard. The main advantage of this is the simplicity, easy availability and low cost but as this type of sensor is of optical type so dust, humidity can cause problems to this type of sensor. This paper presents an efficient architecture to prevent head on collision on streets completely and others to some extent under some conditions. The use of this arrangement in car parking area is also described in this paper. Read More...
|
Electronics Engineering |
India |
227-228 |
59 |
Analysis and Design of TE11-to-HE11 Corrugated Cylindrical Waveguide with Variable Depth Slot Mode Converter
-VISHAL R KHARADI ; MILIND S SHAH
The paper presents the parametric study of profiled corrugated horn. Variable Depth -slot-mode converter sections are used to convert dominant mode, TE11 in to hybrid HE11 mode to achieve wider bandwidth. is shown that a mode converter consisting of only five slots achieves a return loss better than 30 dB over the band 2.7 Read More...
|
Wireless Communication Systems and Networks |
India |
229-231 |
60 |
Flood protection work by Terramesh wall
-Jayswal Ankita Ravindrakumar ; Fatema s Malekwala; Chanda Rautela
Flood events are a part of nature. Flood, caused by overflow from a river, wind induced surges, tides, or other many factors are normal events of the earth’s hydrosphere. Some of them occur regularly, like floods arising from spring melting of snow accumulated during winter, while others are occasional.
The Aim of this paper is to reduce the flood effect through flood protection work. There are different types of method for flood protection work, in these; the terramesh wall structure is flexible & suitable for steep slope and vertical wall. This method is economic and no more skilled labor is required. It absorbs large load without any damage. Read More...
|
Water Resources Management (civil ) |
India |
232-236 |
61 |
Detecting changes in SAR images based on image fusion using Curvelet Transform
-Semeena Latheef
This paper proposes the change detection of SAR images based on image fusion which is done by curvelet transform and classifying changed and unchanged regions by using fuzzy clustering algorithm. The image fusion is a type of data fusion technique is used to generate a difference image by using mean ratio image and log Ratio image. The fused image may provide increased interpretation capabilities and more reliable results since data with different characteristics. Moreover, image fusion can be performed at three different processing levels according to the stage at which the fusion takes: pixel, feature and decision level. Here image fusion done based on curvelet transform which have better shift invariance property end directional selectivity. It is a multi-scale transforms which have the elements identified by scale and location parameter and also the directional parameter. It is an extension of wavelet concept. Curvelet transform represent the edges better than the wavelet transforms. Also a fuzzy local information C-means clustering algorithm is used for classifying the changed and unchanged regions in the fused difference image. Read More...
|
Computer Science and engineering |
India |
237-241 |
62 |
Design and Implementation of Graphical User Interface for Relational Database Management System And Data Switching From Database
-Tanvi Raut ; Bhagyashri Redekar; Amruta Pimple; Mrs. Sumitra Sadhukhan(Project Guide)
This paper will explain the concept of creating a Graphical User Interface for Relational Database Management Systems and switching through different database servers. There exists many database management systems with GUI, but they are exclusive to only one database. Also they do not facilitate switching between different databases. These limitations of the existing system are conquered by our system. This Software helps a user to do all database operations through a GUI provided with minimal knowledge of the database. Here user can do all database activities like Creating Table, Inserting Data, Joining two tables etc without knowledge of queries. Moreover, the queries can be executed very easily, since the user needs not to type any queries, but can simply select the appropriate options according to their requirements. The user can access the same database through different database servers by switching. Switching between the databases reduces the work of rewriting the queries for each of the database thus saving time.
Also a Training mode is provided where user can learn a query for a particular database activity while performing it. Also user can listen to the query through a speak mode. Read More...
|
Computer Engineering |
India |
242-245 |
63 |
Analysis of Image Denoising Techniques
-Dodiya Vijay Navinbhai ; Poorvi H. Patel
Noise is added due to data transmission reception, acquisition, process. Denoising is the first and last step to be taken before the images is used. It is necessary to apply a suitable denoising method. This paper presents a brief introduction of some image denoising methods. Potential future trends in the area of denoising are also mentioned. Read More...
|
image processing |
India |
246-248 |
64 |
A Review on different methods of Designing and controlling Induction Heating Application
-Ashishkumar Bhogilal Patel ; Payal D. Kansagra ; R. B. Patel
Induction heating is a well-known technique to produce very high temperature for applications. A large number of topologies have been developed in this area such as voltage and current source inverter, modulator resonant converter, Power System Using Half-bridge Series Resonant Converter. The series-resonant inverter needs an output transformer for matching the output power to the load but it carry high current as a result additional real power loss is occur and overall efficiency also is reduced. The higher the frequency the more the switching loss, which makes hard efforts to raise the frequency. Modulator resonant converter is using soft switching techniques like Zero Voltage Switching (ZVS) and Zero Current Switching (ZCS). Advantages are designing of RF generator and Amplifier for Induction Heating as fast cycle time, accurate heat zones, Consistent and repeatable, efficient and environment friendly. Induction heating can reduce or eliminate the need for skilled operators in application such as brazing and soldering, annealing, medical waste, hardening. Designing RF Generator with the help of MAX038 and amplifier with TDA2030. Read More...
|
Electronics & Communication |
India |
249-252 |
65 |
EFFECT OF BENZOTRIAZOLE CORROSION INHIBITOR IN STRENGTH AND DURABILITY PROPERTIES OF CONCRETE
-P Divyasree
Technological advances have provided new ways of combating corrosion. Corrosion inhibitors are one means of protection for reinforced concrete structures. The effectiveness of commercially available inhibitor for concrete has been investigated, this study focused on the effects of inhibitor on ordinary concrete and high performance concrete. The strength and durability property of different specimens without and with inhibitors on ordinary concrete and high performance concrete was compared. Read More...
|
Civil engineering |
India |
253-256 |
66 |
Metal to Plastic conversions in Automobile
-Nikunj B. Vaishnav ; Prof. Hardik Mehta
today we can see metal to plastic replacements in industries like automotive, aviation, medical, lighting/electrical, electronics, furniture and so on. The automobile industry has shown increased interest in the replacement of metal components with the material offering low cost and weight saving. Lightweight design with thermoplastics is a robust approach in order to reduce the CO2 emission and fuel consumption. This paper reviews the role of plastics in the automobile field. Read More...
|
Mechanical Engineering |
India |
257-261 |
67 |
A Novel Implementation of Real Time Application Based On E-Menu System - Automated Food Court Management System
-Pratik S. Modi ; Divya Jain; Yugandhara Dalvi; Vidhi Mehta; Savita Lade
the growth of wireless technology and Mobile devices has made a great impact on our lives. Some efforts have been made to combine and utilize both of these technologies in advancement of hospitality industry. This research work aims to automate the food ordering process in a food-court of a mall and improve the complete dining experience of customers. In this paper we discuss about the design & implementation of automated food ordering system in a mall in which menus of each outlet of a food-court are being digitalized & displayed to customer through an android application.
This system, implements wireless data access to servers. The android application on user’s mobile will have all the menu details. The order details from customer’s mobile are wirelessly updated in central database and subsequently sent to kitchen of respective outlet. The outlet owner can manage the menu modifications easily. The wireless application on mobile devices provide a means of convenience, improving efficiency and accuracy for restaurants by saving time, reducing human errors and real-time customer feedback. Read More...
|
Computer Engineering |
India |
262-264 |
68 |
Design of Vedic Multiplier for DSP Application
-Archan Patel ; Dipal Patel
this paper presents a delay comparison of two methods multipliers for unsigned data, one uses a simple multiplication and the second one uses a Vedic multiplication. The 64×64 Vedic multiplier module using Urdhva Tiryakbyham Sutra uses 2×2 Vedic multiplier modules. Urdhva tiryakbyham Sutra is most powerful Sutra, giving minimum delay for multiplication of all types of numbers, either small or large. Urdhva Tiryagbhyam– Vedic method for multiplication which strikes a difference in the real process of multiplication itself. It causes parallel generation of intermediate products, removes unwanted multiplication steps with zeroes and scaled to higher bit levels. The paper’s main focus is on the speed/delay of the multiplication operation on 64-bit multipliers which are modeled using VHDL, A hardware description language. The 64×64 Vedic multiplier is coded in VHDL, synthesized and simulated using Xilinx ISE 13.4 software. This multiplier is implemented on Spartan 3E FPGA device XC3S1600e-5fg484. The performance evaluation results in terms of speed and delay. The multiplier of Vedic multiplication has shown a less delay over the simple multiplier. The simple multiplier uses time = 153.441ns, while the Vedic multiplier with the uses time = 129.181ns on Spartan 3E device. Read More...
|
Electronics and communication |
India |
265-267 |
69 |
Review Paper on CFD Analysis of Automobile Radiator to Improve its Thermal Efficiency
-J. R. Patel ; A. M. Mavani
Radiators are heat exchangers used to transfer thermal energy from one medium to another for the purpose of cooling and heating. Radiators are used for cooling internal combustion engines, mainly in automobiles but also in piston-engine aircraft, railway locomotives, stationary generating plant or any similar use of such an engine. The flow behavior & temperature profile prediction in the radiator tubes are very useful information & is of great importance to the designer. For the preliminary design, the performance of the radiator can be accessed through Computational Fluid Dynamics (CFD). CFD is a science that can be helpful for studying fluid flow, heat transfer, chemical reactions etc by solving mathematical equations with the help of numerical analysis. CFD employs a very simple principle of resolving the entire system in small cells or grids and applying governing equations on these discrete elements to find numerical solutions regarding pressure distribution temperature gradients, flow parameters and the like in a shorter time at a lower cost because of reduced required experimental work. In this paper, research papers has been studied and finalized that the various coolants (Nanofluids) affects efficiency of radiator at various mass flow rate. The CFD gives the exact results to study the effect of mass flow rate, pitch of tubes and coolants (Nanofluids). The coolants properties play significant roles in the improvement of radiator performance. Read More...
|
Mechanical Engineering |
India |
268-271 |
70 |
Size Reduction of Log Periodic Microstrip Patch Antenna using Artificial Magnetic Conductor-A Review
-Kaushik R. Naik ; A. B. Upadhyay
This paper describes the technique of size reduction of log periodic microstrip antenna with the help of AMC (Artificial Magnetic Conductor).Log periodic antenna presented in this paper operating over ISM band, but it suffers from large antenna size. To reduce the size of this antenna AMC technique is used as ground plane. Read More...
|
Electronics & Communication Engineering |
India |
272-275 |
71 |
Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud Environment
-M. Diviyarani ; S. Rasiya; A. Gowsalya; S. John Justin Thangaraj
With the character of low maintenance, cloud computing provides an economical and efficient solution for sharing group resource among cloud users. Unfortunately, sharing data in a multi-owner manner while preserving data and identity privacy from an untrusted cloud is still a challenging issue, due to the frequent change of the membership. We propose a secure multiowner data sharing scheme, named Mona, for dynamic groups in the cloud. By leveraging group signature and dynamic broadcast encryption techniques, any cloud user can anonymously share data with others. Meanwhile, the storage overhead and encryption computation cost of our scheme are independent with the number of revoked users. In addition, we analyze the security of our scheme with rigorous proofs, and demonstrate the efficiency of our scheme in experiments. Read More...
|
Computer Science & Engineering |
India |
276-278 |
72 |
Privacy Preserving Billing for E-Shopping in Online Marketing System
-Iswarya.M ; Gayathri.R; Karthika.D; Selvakanmani.S
several daily life applications such as payment, access control, ticketing, and e-passport, which requires strong security and privacy mechanisms. Hence there is a demanding urge to address these issues in the light of some mechanism which can make the technology excel. . In recent years, various mobile terminals equipped with NFC (Near Field Communication) have been released. The combination of NFC with smart devices has led to widening the utilization range of NFC. It is expected to replace credit cards in electronic payment, especially. In this regard, security issues need to be addressed to vitalize NFC electronic payment. The NFC security standards currently being applied require the use of user's public key at a fixed value in the process of key agreement. For key agreement NFC algorithm is used. This paper proposes a method provide a conditional anonymity using dynamic public key to solve this problem. Also it defines PDU for the conditional anonymity, so that the user can use the dynamic public key selectively. Through this, the user can protect privacy and can verify identity through a trusted authority if necessary. Read More...
|
Computer Science and Engineering |
India |
279-283 |
73 |
FINGERPRINT BASED ACCESS CONTROL SYSTEM UPDATED COPY
-PATEL TANESH FULJIBHAI ; DIVYESH RANJITRAI PATEL; ELISON I MACHWAN
the goal of our project is to design and assemble a fingerprint based access control system that uses fingerprint scanning and recognition to authenticate the user. Upon successful authentication, the user will be allowed to access the safe. On the other hand, if the access is denied, it will be reported to the center administrative console for audit purposes. The fingerprint scanning device utilizes serial communication. This device will be connected to our microprocessor. The system will consist of an Atmel 89C51 microprocessor, LCD display, fingerprint sensor, electronic door strike. Software will be written for the PC that allows the owner to register and delete fingerprints and monitor door entry. LCD’s and LED’s will be used to display whether or not access was granted or denied. The biggest challenge that will be faced is figuring out how to interface the Atmel 89c51 with interface which allows the owner to manage fingerprint access. If time permits a cell module will be used to alert the owner of a possible break-in attempt. Read More...
|
ELECTRONICS AND COMMUNICATION ENGINEERING |
India |
284-289 |
74 |
LAND USE/LAND COVER MAPPING USING DIGITAL IMAGE PROCESSING SYSTEM IN M.R.B.C COMMAND AREA NADIAD
-APARNATHI MAHEK GIRI ; Dr.M.B.Dholakia
Spatial information technologies (Remote sensing, GIS and GPS) are helpful effectively managing the resources for sustainable development. The present papers deals with land use /land cover mapping in MRBC irrigation command area with the help of IRS P6/1D LISS-III data. The main objective of this study is that identification of crops wise area as per number of pixels of particular images Read More...
|
CIVIL(WATER RESOURCE MANAGEMENT) ENGINEERING |
India |
290-292 |
75 |
Cloud Operating System Using Node.js
-Praful Arun Surve ; Vatsal Shah; Surbhi Shah; S.P. Khachane
the idea behind Cloud Operating System is that the whole system lives in the web browser. The client must have only a web browser to work with Cloud Operating System and all its applications. This applies to for both modern and obsolete PC's An Open Source Platform designed to hold a wide variety of Web Applications. Cloud Operating System would be a new definition of an Operating System, where everything inside it can be accessed from everywhere inside a Network. All you need to do is login into your Cloud Operating System server with a normal Internet Browser, and you have access to your personal desktop, with your applications, documents, music, movies... just like you left it. Cloud Operating System would let you to upload your files and work with them no matter where you are. Read More...
|
Computer Engineering |
India |
293-295 |
76 |
Priority Based Scheduling by Achieve Better Service Ratio in VANET
-Parixit Patel ; Asst. Prof. Dhaval Varia
Vehicular ad-hoc network (VANET) is a part of Mobile ad-hoc network (MANET). VANET used to communicate between mobile vehicles as well as, between vehicles and Roadside Unit (RSU). They communicate using wireless medium on roads and it sake interest when vehicles increasing more and more. They communicate with each other, and communication may be emergency messages, normal messages, and/or lower priority messages. Now, VANET have issue that it has frequent disconnection issue because of high mobility. Because of that some requests could not be served on time. It affects achieving higher service ratio. There are some researches available to provide better service ratio by some scheduling policy, but they are not full proof as there is starvation problem because higher emergency request rate affect normal requests to be served. We propose a priority based scheduling algorithm to avoid starvation using aging technique along with better service ratio. Our scheduling algorithm will be capable of higher service ratio and better quality of service. Read More...
|
Computer engineering |
India |
296-298 |
77 |
Parametric Study of Cryogenics Storage Vessel for Different Materials
-Patel Maulik P ; Prof. M.I.Vyas
Cryogenic Vessels are designed for storage and transportation of liquid gases at sub-zero temperatures. Manufacturing of such cryogenic tanks requires special technical knowledge and sophisticated fabrication techniques. Universal has developed the necessary technology. The design and construction of storage Dewars for biological specimens. Biological requirements of Dewar design are of prime importance and these have to be considered alongside the normal cryogenic requirements such as insulation, suitable materials etc. The liquid nitrogen storage systems are widely used for long term preservation of a range of microorganisms. Strains are stored in ampoules immersed in nitrogen or held in its evolving vapor. In this paper I had worked on the comparative design of storage tank made up of two different materials i.e. stainless steel and aluminium used as inner shell of cryogenic vessels. This paper includes design procedure of cryogenic storage vessel as per ASME code. This also contain results of different properties i.e. heat in-leak, boil off rate of vessel by taking aluminium and stain less steel as inner shell of vessel. Read More...
|
Mechanical Engineering |
India |
299-302 |
78 |
Key Frames Extraction And Video Summarization Based On Histogram
-Rakesh V Gohil ; Kapil S. Raviya; Dr. Ashish M. Kothari
with the advent of digital multimedia, a lot of digital content such as conference, movies, and video lecturers, news, shows and sports events is widely available. Also, due to the advances in digital content distribution (direct-to-home satellite reception) and digital video recorders, this digital content can be easily recorded. However, the user may NOT have sufficient time to watch the entire video (Ex. User may want to watch just the highlights of an occurrence) or the whole of video content may not be of interest to the user(Ex. Soccer or cricket match video). In such cases, the user may just want to view the summary of the video instead of watching the whole video.
In this paper video summarization is based frame extraction in which whole video is convert into the shots (segmentation) and then select frames which is part of video summary and this will be done by taking different parameters like entropy change, histogram level, audio level etc. and then select frames for make summary which is call key frames. This key frames is dives the main information of the whole video. After select key frames filtering is used for over duplication and make good video summary. Read More...
|
Image Processing |
India |
303-306 |
79 |
Performance Analysis of Linear Antenna Array Using Multiple Optimization Techniques for WLAN
-MAYANK VISHWAKARMA ; Prof. Kanchan Cecil
this paper uses multiple optimization algorithms for the synthesis of broadside and end fire linear antenna array. In this paper optimum value of current of each antenna element is determined which produces radiation pattern with minimum side lobe level. Optimization is done using MATLAB. Multiple algorithms i.e.PSO,RCGA,SGA,Taguchi's and chaos methods are used in which PSO gave better results among them cause of search in broader space along randomly generated directions to produce new generations. This improves the performance greatly to achieve the directivity and maximum reduction in side lobe level with minimum function calls and efficiently applicable for WLAN. Read More...
|
MICROWAVE ENGINEERING |
India |
307-310 |
80 |
Image Registration Using Log Polar Transform
-Divyang Patel ; Vaibhav Gndhi
Image registration is the fundamental task used to match two or more partially overlapping images taken, for example, at different times, from different sensors, or from different viewpoints and stitch these images into one panoramic image comprising the whole scene. It is a fundamental image processing technique and is very useful in integrating information from different sensors, finding changes in images taken at different times, inferring three-dimensional information from stereo images, and recognizing model-based objects. Some techniques are proposed to find a geometrical transformation that relates the points of an image to their corresponding points of another image. To register two images, the coordinate transformation between a pair of images must be found. In this thesis comparison of various image registration algorithms is done by performance evolution among them. Read More...
|
Computer Engineering, Electronics and Comunnication Engineering |
India |
311-313 |
81 |
Prototype Development of a Mobile Phone Skin
-Ajith Gopinath ; K Janardhan Reddy
Rapid prototyping being one of the most novel manufacturing techniques is chosen as the field of study due to its wide range of applications such as in the consumer products, automotive, aerospace and medical industries. To increase the processing efficiency of the prototype fabrication, optimization of the orientation, is required. The surface roughness, production time, and support area are taken as the parameters for the optimization. Particle swarm optimization algorithm was carried out and the results were verified by the fabrication of the part. Thus the prototype development is attained by the increase in processing efficiency and decrease in the cost. The prototype development increases visualization capability during the early phases of design and useful in detecting errors in previous design to rectify. In the present highly competitive market, project cost and risk is reduced drastically. Read More...
|
Mechanical Engineering |
India |
314-317 |
82 |
Review of Low Power Testing Techniques
-Dhara Desai ; Dhara Desai ; Prof. Rakesh Gajre
the circuit consumes more power during test mode compared to functional mode. So test power has been major big concern in large System-on-Chip designs from last decade. In this review paper, the state-of-the-art in low power testing is presented. The paper contains the detailed survey on various power reduction techniques proposed for both the aspects of testing i.e. external testing as well as Built-In-Self-Test. The advances in DFT techniques emphasizing low power are also included in this survey paper. Read More...
|
Electronics & Communication Engineering |
India |
318-322 |
83 |
Facial expression detection using Artificial neural network
-Bhavesh V. vaghasiya
Automatic recognition of people is a challenging problem which has received much attention during recent years due to its many applications in different fields. Human Sate Recognition as a facial expression recognition is one of those challenging problems and up to date, there is no technique that provides a robust solution to all situations. In this paper all five universally recognized basic emotions namely angry, disgust, happy, sad and neutral. This paper presents a new technique for facial expression recognition. This technique uses an image-based approach towards artificial intelligence by removing redundant data from face images through image compression using the two-dimensional discrete cosine transform (2D-DCT). The DCT extracts features from face images based on skin color. Feature vectors are constructed by computing DCT coefficients. A self-organizing map (SOM) using an unsupervised learning technique is used to classify DCT-based feature vectors into groups to identify if the subject in the input image is "present" or "not present" in the image database. Facial expression recognition with SOM is carried out by classifying intensity values of grayscale pixels into different groups. Evaluation was performed in MATLAB using an image database of 25 face images, containing five subjects and each subject having 5 images with different basic facial expressions Read More...
|
Electronics & communication |
India |
323-325 |
84 |
A Review of Wireless Power Transfer System via Magnetic Resonant Coupling
-Parth Harshadkumar Bhavsar ; Pirmahmmad Jamalbhai Vasovala; Chintan Amrutlal Patel
recently, an efficient mid-range wireless power transfer that uses magnetic resonant coupling, WiTricity, was proposed, and has received much attention due to its practical range and efficiency. By referring studies the resonance frequency of the antennas changes as the gap between the antennas change. To achieve maximum power transmission efficiency, the resonance frequency has to be fixed within the particular band. In this paper, the possibility of using impedance matching (IM) networks to adjust the resonance frequency of a pair of antennas at 13.56MHz is studied. Experiments also show that IM can be achieved just by observing and minimizing the reflected wave. Read More...
|
Electrical Engineering |
India |
326-327 |
85 |
Chromatic and Polarization Mode Dispersion Compensation using Delay in-Line Filter
-Rakesh V ; Arun Jose
In order to operate high speed optical networks efficiently with a sufficiently low BER and minimize the performance degradation caused by optical pulse distortion and broadening, dispersion compensation is needed. Dispersion compensation fiber (DCF) and Fiber Braggs Grating (FBG) are the most widely used element to compensate various types of dispersion effects links, however its performance slows down with the increase in distance and speed of transmission when different nonlinear ties are considered in system design, also when many external factors in the field of installation like temperature, stress, external load etc during installation and operation will affect the fiber optic transmission. Then it is the residual dispersion plays the leading role in signal distortion on field which is not predictable. Here, in this paper new method named delay line filter (DLF) for dispersion compensation, which offers much better performance than other most common methods of compensation, which corrects residual dispersion along with chromatic dispersion, is employed. This method offers almost negligible dispersion and very high value of synchronization by reducing jitter portion in the Eye diagram keeping non-linearity at its limit. This method also offers very high value of Q-factor in long haul optical communication networks. Read More...
|
Optoelectronics and communication engineering |
India |
329-333 |
86 |
Modeling adoption of innovations in agriculture using successful model
- A. D. Chendake ; P. M. Chauhan
this paper is concerned with the development of successful model for the greenhouse growers in the Sabarkantha district of the Gujarat. The main objective of the paper is to develop the suitable model for the greenhouse growers in the district. Model illustrates that how can the grower and the supplier in the greenhouse horticulture chain gain competitive advantage through radical product and process innovation. The challenge lies in time to-market, in customer relationship, in developing new product/market combinations and in innovative entrepreneurship. In this model an innovation, potential entrepreneurial and research program is introduced. The model aims at strengthening multidisciplinary collaboration between growers, technology and research. Read More...
|
Agricultural Engineering |
India |
334-335 |
87 |
Side Lobe Levels Reduction in Broadside Linear Antenna Array Using Chaotic Optimization Algorithm
-APOORV SINGH ; PROF. KANCHAN CECIL
in this paper chaotic optimization [14] algorithm method is used for the synthesis of broadside linear antenna array. In this paper optimum value of current in each antenna element is determined which produces radiation pattern with minimum side lobe level. Optimization is done using MATLAB. Chaotic Optimization [14] algorithm which enables search in broader space along randomly generated directions to produce new generations. This approach includes two searches, first is a global search and another is local search. This improves the performance greatly to achieve the maximum reduction in side lobe level with minimum function calls. Read More...
|
Electronics Engineering |
India |
336-338 |
88 |
PERFORMANCE ENHANCEMENT OF BROADSIDE LINEAR ANTENNA ARRAY USING BIG BANG CRUNCH ALGORITHM
-AMIT SHARMA ; PROF. KANCHAN CECIL
the big bang crunch algorithm optimization [15] method is used in the reduction in side lobe levels of broadside linear antenna array. In this paper optimum value of current of each antenna element is determined which produces radiation pattern with minimum side lobe level. Big bang crunch algorithm is used, which enables search in broader space along randomly generated directions to produce new generations. This improves the performance significantly to attain the maximum reduction in side lobe level with minimum function calls. By using this approach, the reduction in side lobe level occurred in the range between -30 dB to -35dB. Read More...
|
Electronics Engineering |
India |
339-341 |
89 |
Performance & Comparison of Surf and SIFT using RSOC in Image Registration
-Vivek Kumar Gupta ; Prof. Kanchan Cecil
This paper present performance analysis comparison of Speeded-Up Robust Features (SURF) and scale invariant feature transform (SIFT) using Restricted Spatial Order Constrains (RSOC) in image registration. The SURF differ from SIFT for using integral images i.e. some of all pixel for image convolution. RSOC is proposed to remove outliers for registering image with simple patterns, low overlapping areas, and large affine transform. In order to eliminate dubious matches, a filtering strategy is designed. The strategy contains two ways spatial order constraints i.e. distance sequence and angle sequence and two decision criteria restrictions, i.e. the stability and accuracy of transformation error. Generally SIFT outperforms previously proposed schemes with respect to robustness but it takes more time whereas SURF take lesser time than SIFT and slightly degrade in robustness. SURF and SIFT is widely used with RSOC in remote sensing, medical imaging, computer vision. Read More...
|
Electronics & Telecommunication |
India |
342-350 |
90 |
Performance & Analysis of Four Switch Three Phase Inverter Control for BLDC Motor using MATLAB A Review
-Prashant R. Chahande ; Dr. (Mrs.) S. P. Muley; Prof. S. C. Suke
The main objective of this paper is to describe a low cost four-switch brushless dc (BLDC) motor drive for commercial applications. Speed control of three phase BLDC motor using four switch inverter is proposed to simplify the structure of the conventional six switch inverter. For effective utilization of the developed system, a novel direct current controlled PWM Scheme is designed and implemented to produce the desired dynamic and static speed–torque characteristics. PI controller is used by the outer loop to develop the performance of speed control. This paper gives a brief review of operational principle of the four-switch BLDC motor drive and the developed control scheme is theoretically analyzed and the performance is demonstrated by both simulation and experimental results in MATLAB. Read More...
|
Industrial Drives and Control |
India |
351-354 |
91 |
Performance Enhancement of Ad-hoc On-demand Distance Vector Routing Protocol in MANETs using Multipath Approach
-Ms. Nikita Prajapati ; Mr. Divyesh Patel
The Wireless technology is dominating current world of communications as it is found in most of the domains. Mobility is a key concept for wireless networking and to let the traffic pass across the network smoothly, the routing has to be quiet efficient. Mobile Ad hoc Network, as its name suggests are designed on fly for fulfilling a specific task within a specific boundary. In the domain of wireless ad hoc network, there must be an efficient routing mechanism to provide the correct and optimal route establishment and maintenance between a pair of nodes, so that messages may be delivered reliably and in a timely manner. There are many protocols available for doing the Ad hoc routing and selecting a proper candidate is totally based on the applications. We have analysed different routing protocols against several metrics through the simulations in Network Simulator – 2 (NS-2). Perfor mance parameters include Average end-to-end delay, Routing Overhead, Jitter Packet drops etc. In this work, we propose a Performance enhancement of Ad-hoc On-demand Distance Vector routing protocol in MANETs using multipath approach this mechanism setups multiple paths based on less hop count. It allows to store multiple paths based on threshold. At time of link failure, it will switch to next available path. To set up multiple path, we have used the information that we get in the RREQ packet and also send RREP packet to more than one paths. It reduces overhead of local route discovery at the time of link failure. And because of this End to End Delay and Drop Ratio decreases. routing protocol including our scheme and we compare it with the basic AODV and multipath extension of AODV-AOMDV routing Read More...
|
Electronics & Communication Engineering |
India |
355-357 |
92 |
Performance Analysis of Microstrip Antenna with Two Shape of Patch and Two Feeding Technique
-Mahesh V. Darji ; M. C. Sahoo
This paper describes comparison of performance analysis of two shape of patches with two different feeding techniques for microstrip patch antenna. In this paper two types of feeding techniques(Microstrip line feed and coaxial probe feed) are used. Microstrip line feed and coaxial probe feeds are contacting scheme, in which RF power is fed directly to the radiating patch using connecting element such as microstrip line. Paper describing Rectangular and Square patch with this two feeding techniques and gives better understanding design parameters of antenna and their effect on return losses, bandwidth and VSWR. Simulation is done using design software HFSS. Read More...
|
Electronics & Communication Engineering |
India |
358-362 |
93 |
SIMULATIVE ANALYSIS FOR THE INTEGRATION OF STARGATE NETWORK TO PASSIVE OPTICAL NETWORKS
-RAFEEK I ; GOKUL P.G
The emergence of new bandwidth hungry applications and services impose the network upgrades of current time-division multiplexing passive optical network (TDM PONs) to their upgraded successor wavelength division multiplexing (WDM) PONs. Access network has to overcome the first/last mile bandwidth bottleneck between the high bandwidth demand at user end and high speed backbone network. Single hop WDM network based on central passive star coupler (PSC) have received a great deal of attention as promising solutions for metropolitan and local area networks which face increasing amount of traffic. This work explores the performance of a stargate network, a relatively new class of single hop network based on an Arrayed Waveguide Grating (AWG), which provide all-optical integration of Ethernet based wavelength division multiplexing passive optical networks (WDM EPONs) with metropolitan area networks. The simulation analysis revealed that the STARGATE network architecture is cost effective with minimum hop count between transmitting and receiving ends and wavelength reuses by exploiting multiple free spectral ranges (FSRs) of arrayed waveguide grating (AWG).The simulation has been performed using Optisystem V.12 software and results have been shown as eye diagrams and BER plots obtained at the receiver end. Read More...
|
OPTO ELECTRONICS |
India |
363-367 |
94 |
IMPLEMENTATION OF IMPROVED BLACK AND WHITE METHOD TO PREVENT SHOULDER SURFING
-C.Bharathi Priya ; S.Chetnaa; R.Pavithra
When a password is being entered in a computer system, shoulder surfing attacks are of great concern. To solve this problem, existing system used limited cognitive capabilities of a human adversary, but there was a disadvantage with the assumption. In this paper, we show that human adversaries can be more effective at eavesdropping than expected, in particular by employing cognitive strategies and by training themselves. Our novel approach called improved Black and White method indeed can break the well-known PIN entry method previously evaluated to be secure against shoulder surfing. Another contribution in this paper for information security is the authentication service which uses local database and hash. Read More...
|
Computer Science |
India |
368-371 |
95 |
EFFICIENT MOTION DETECTION TO BACKGROUND SUBTRACTION ? SUPPORT SECURITY
-S. Mohan Kumar ; K. Arul Mozhi Selvan; B. Kishore
Detection of moving objects in video streams is the first significant step of information extraction in many computer vision applications. Even there is usefulness to segment video streams into moving and background components, moving objects detection concentrates on recognition, classification, and activity analysis by making the latter steps efficient. We propose a technique through artificial neural networks which is applied in image processing of human and more commonly in cognitive science. The technique which is proposed can handle scenes containing moving backgrounds, steady illumination variations, has no bootstrapping restrictions, can include into the background model shadows cast by moving objects, and achieves strong detection for different types of videos taken with stationary cameras. We compare our method with other modelling techniques and report results, in terms of processing speed and accuracy for the color video sequences that represent typical situations critical for video surveillance systems. Facial features are segregated at different resolutions to provide noise information, edge, smoothness, and blurriness present in a face. WLD descriptor represents an image as a histogram of differential excitations and gradient orientations and also it has various interesting properties like robustness to noise and smart detection of edges, illumination changes and powerful image representation in feature extraction stage. The Gabor filter bank is used to extract the features from face regions to discriminate the illumination changes. These collective features are useful to distinguish the maximum number of samples accurately and it is matched with already stored original face samples for identification. The simulated results will be shown that used granulation and hybrid spatial features descriptors has better discriminatory power and recognition accuracy in the process of recognizing different facial appearance. Read More...
|
Computer Science & Engineering |
India |
372-375 |
96 |
M2M communication for smart home: services & Enabling Technologies
-seema
We present recent progress in m2m communication followed by the application of m2m communication in smart home. M2m Communication plays an important role in smart home network. We analyze smart home services and some enabling technologies with m2m and their application in smart home. We also discussed challenge and research keys for m2m communication. Read More...
|
Computer science & Engineering |
India |
376-377 |
97 |
Street power Monitoring by PC & GSM
-Samani Ravi Shaileshbhai ; Modi Payal Ramanbhai; Shah Pooja Narendrabhai; Mahida Priyank Kirtisinh; Tailor Kewal Kishorbhai
This paper intends to solve the problems when generally we can see a person waiting for complain for any kind of street power failure. In that case responsible person is attended complain immediate or not time is not accountable at all. Because of this manual system just consume the time. Aim to design this Street Power Monitoring and Analysis by PC & GSM help the government and it will save the time of the employees working in these boards. Also this system monitoring of mis-management of boards. Read More...
|
Electronics & Communication |
India |
378-379 |
98 |
Classification Method Based on Association Rule Mining
-Divya Ramani ; Chirag Pandya; Harshita Kanani
In the field of data mining very large amount of data is processed in order to get small amount of useful data. There are two important data mining techniques to optimize efficiency, namely association rule mining and classification rule mining. In Data Mining, Classification is the process of finding and applying a model to describe and distinguish data classes, concepts and values. This work is a survey of major classification methods based on association rule mining. After this study better comparison of various classification methods can be done. After studying this all classification methods now, we develop a new method that name, BCAR in which we first apply fp-growth algorithm for rule generation and then calculate chi square value of each rule for subset selection after selecting this subset does classification based on chi square analysis. Main purpose is to build association rule classifier without loss of performance & accuracy of the resultant classifier. Read More...
|
Computer Engineering |
India |
380-384 |
99 |
Association Rule Optimize By Multi Objective Genetic Algorithm
-Deep Hakani ; Harshita Kanani
Association analysis is the task of bringing out
relationship among data. Association analysis is most popular analysis technique in data mining for classifying biological data. When dealing with Biological data large search spaces may arise. Genetic algorithms deal with large search space very effectively. Combining association rule mining and Genetic algorithms to classify biological data is a novel and extensive research area. The purpose of this thesis is to classify biological data with association rule and genetic algorithm. A Genetic Algorithm (GA) is an iterative search, optimization and adaptive machine learning technique premised on the principles of Natural Selection. A GA is a search method that functions analogously to an evolutionary process in a biological system as it mimics evolution and competition between individuals in natural selection. It generates a better solution from existing solutions. Neither programmer nor genetic algorithm has to know how to solve a given problem; solution is just bred.
Gas is one of the most robust problem solving techniques. They can find solutions of NP-hard problems easily. For problems with a larger parameter space and where the problem itself can be easily specified, GA can be an appropriate solution. In this paper described all the method
of association rule mining with genetic algorithm. “Genetic Algorithms are software procedures modeled after genetics and evolution†Index Terms Ensemble System, Association, Classification. Read More...
|
Computer Engineering |
India |
385-389 |
100 |
A SURVEY: MAC PROTOCOLS FOR WIRELESS SENSOR NETWORKS
-RAHUL VARASADA ; PARVEZ ABDULRAHIM DEKAVADIA; PARUL V. PITHADIA
Wireless sensor networks have gained increasing attention from both the research community and actual users. Sensor nodes are generally deployed in hazardous, remote, hostile area. So it is impossible or inconvenient to recharge the battery. Energy efficiency is main design criteria for WSNs. This paper presented various energy efficient MAC protocol with different objective for wireless sensor networks. Read More...
|
Wireless Communication Systems and Networks |
India |
390-392 |