No. |
Title and Author |
Area |
Country |
Page |
151 |
Methods for Forecasting, Assessing and Mitigating Avalanche Risks
-Sandeep Sushil Srivastav ; Sandeep Sushil Srivastav; Dr. ShriRam
The main aim of this study is to develop an avalanche prediction method, based on the previously available accidents data, metrological data and related location conditions. Methodology is applied to the sample weather data inputted in the avalanche utility software through Microsoft’s excel sheets. Application is given for forecasting avalanches. Avalanche forecast is based on the observation of weather conditions and follow-up snow cover or avalanche prone areas. We will present how the forecasters can select amongst the high number of views the most relevant ones according to the day situation. We will also describe the main contributions and work of the models for different typical situations. This avalanche forecasting models is based on statistical analysis. This study also deals with to generate awareness in the aspect of avalanche mitigation, protection and reduces damage in this work we have adopted various methods of avalanche control, protection, mitigation and assessment these methods are very helpful in avoidance and minimizing to avalanche threats. Read More...
|
Civil Engineering |
India |
676-684 |
152 |
EXERGY ANALYSIS OF WINDOW AIR CONDITIONING SYSTEM
-Mehul Tandel ; Mr. Mehul Tandel; Mr.Chetan Undhad; Mr.P.R.Patel; Mr.N.K.Patel
Energy consumption is the most important problem in the present day. The energy analysis gives only energy consumption and energy losses of systems. It does not provide information about internal inefficiency of equipment. The exergy analysis, when applied to process or a whole plant tells us how much is the usable work potential or exergy supplied as input to the system & consumed by process or plant..Unequal duration of the active and passive phases of the heat source, and consequently of the heat storage and discharge, is allowed.After exergy analysis of shell and tube type heat exchanger there are loses of energy of all part we can try to minimize energy loses and improvement in exergy.we are to follow standard procedure for measuring exergy which I can get from reference paper or some text book related to exergy.Secondly, when I learn the standard procedure I will learn where to measure and what to measure to analyze exergy of air conditioner. After getting all data in the of air conditioner I will able to tell what is an improvement. Read More...
|
MECHANICAL ENGINEERING |
India |
685-687 |
153 |
A Study on Compression Strength of Concrete using Treated Domestic Waste Water
-Vinut Kulkarni ; Suresh.G.Patil
In the present day there is a scarcity of fresh water and construction activities are increasing day by day consuming huge quantity of fresh water. Therefore research is going on to use treated domestic waste water in the preparation of concrete. The concrete specimens prepared with M20 and M40 grade concrete. The concrete specimens cast by using 0%, 50%, and 100% treated domestic waste water and cured in treated domestic waste water for 7days 14days and 28days. Increase in compressive strength from 7 days to 14days for all the 4 mixes is marginal for both the grades of concrete i.e. M20 and M40. At 28days curing age decrease in compressive strength was observed from mix M1 to M4 expect mix M2. This decrease in compressive strength may be due the use of treated domestic waste water for mixing and curing. Lowest strength is exhibited by Mix M4 i.e. 28.77Mpa however this strength is higher than the target mean strength of 26.4Mpa.The excess quantity of bicarbonates in treated domestic waste water as mixing water results decrease in compressive strength concrete specimens. Read More...
|
ENVIRONMENTAL ENGINEERING |
India |
688-690 |
154 |
Constrained Based Feature Subset Selection Algorithm for High Dimensional Data
-G.Geethanjali ; Mr.P.Prakash
Feature Selection is to selecting the useful features from the original dataset for improve the more accurate results. Constrained Based Feature Subset Selection(CFSS) Algorithm Removes irrelevant and redundant features. This method is to find a similarity computation based on the entropy and conditional entropy values. After computing similarity computation to applied Approximate Relevancy(AR) algorithm which will find the relevance between the attribute and class labels from that computation most relevant attributes will be selected, then using Adaptive k++ neighborhood algorithm group those relevant features and create graph according to that relevant features. After calculating relevant features to form the spanning tree using kruskal’s algorithm, removing all redundant features for which it has an edge in tree.Finally, to select best subset of the features from the original dataset. Read More...
|
Computer Science and Engineering |
India |
691-693 |
155 |
A Review - Analysis of Power System Network Like Real and Reactive Power Flows
-Jigar Tandel ; Piyush Tandel; Ami Patel
AC power sources are essential pieces of equipment for providing flexible and reliable power generation. The concepts of power generation and power loss can be dangerous for end users. This is especially true when it comes to talking about the different types of power quantities. This study presents a comparative study for four evolutionary computation methods to the optimal active–reactive power dispatch problem. Theoretically, there is a coupling relation between active–reactive power dispatches. However, because of high X/R ratio existing in the transmission line, the problem of active–reactive power dispatch can be decomposed into two individual sub-problems by the decoupling concept, that is, active–reactive power dispatch problems. On-line power system analysis enables to make power mode-related decision based on information available at real time. The quality of the studies and efficiency of power system operation are closely associated with the accuracy of the power system models. Accurate and quick decision based on analysis on real time data has been necessary for making operational plan under the deregulation of power system worldwide. Read More...
|
Electrical engineering |
India |
694-696 |
156 |
Power System State Estimation-A Review
-Tandel Smitkumar S. ; Sunilkumar M Sarma; Ami T Patel
The review on power system state estimation is presented in this paper. State estimation process is based on the system state variables. The two methodology used for state estimation least square & weighted least square. The treatment of bad data gives the error-free estimate of input data. Bad data detection, identification & suppression is also discussed in this paper. Read More...
|
Electrical Engineering |
India |
697-699 |
157 |
An Overview of Advance Microcontroller Bus Architecture Related on AHB Bridge
-Ayushi Shah
In this paper I introduced on chip communication standard called AMBA AHB. The AMBA AHB is for high-performance, high clock frequency system modules. AHB support the efficient connection between embedded processor, on chip memory and of chip external interface or bridge with low power peripheral Macrocell functions. AMBA AHB is basically single layer bus. It includes all AMBA AHB signal or specification which provides an infrastructure for diagnostic access and Macrocell test. Read More...
|
Electronics Engineering |
India |
700-702 |
158 |
Energy and Exergy Analysis of High Pressure Steam Boiler
-Vijay D. Shimpi ; Mandhata Yadav; Bhailal Bhuva; Somchandra Patel
This paper presents a framework of thermodynamic, energy and exergy, analyses of industrial steam boilers of 690 TPH boiler in 210 MW coal based thermal power plant. Mass, energy, and exergy analysis were used to develop a methodology for evaluating thermodynamic properties, energy and exergy input and output resources in industrial steam boilers. Determined methods make available an analytic procedure for the physical energetic analysis by exergy destruction method and calculate all the losses occurred in the boiler. Read More...
|
MECHANICAL ENGINEERING |
India |
703-704 |
159 |
IP Telephony
-K. Chandu ; G.Harshavardhini
This paper discusses about the new trends in internet protocol telephony and its structural format. Various parameters of this system were explained. It concludes with an overview of the network and its structural aspects. Read More...
|
ELECTRONICS AND COMMUNICATION ENGINEERING |
India |
705-706 |
160 |
A Robust and Dominant Local Binary Pattern and Its Application
-Keerthana A.V ; Ashwin M
Facial image analysis is a main challenge of image processing. Some techniques like Local Binary Pattern, Local ternary Pattern, modified LBP (MLBP),BRINT and extended LBP which can be used in image processing to overcome the challenge. Moreover in recent years interested area is image processing and computer vision and its has been shown in many application with seffiectively like facial image analysis, including tasks as diverse as face detection, face recognition and facial expression analysis. LBP is non-parametric descriptor for summarizes the local structure of imges. LTP classified the pain states from facial expression. CS-LBP are similar to LBP but it plays good to robustness in flat image. BRINT is used to build very fast, very compact while remaining robust to illumination variations, rotation changes and noise. So using all this technique facial analysis is better than other techniques through recent techniques. Read More...
|
Computer Science and Engineering |
India |
707-711 |
161 |
Comparison of Teaching Learning Based Optimization method and Taguchi Method by Analysing Force in Turning by single point cutting tool
-Gaurav Dixit ; Santosh Kumar Mishra
The purpose of this paper is to obtain a comparison between Teaching Learning Based Optimization Technique and Taguchi Method in order to achieve optimal setting of turning process parameters (cutting velocity, depth of cut and feed rate) resulting in an optimal value of the Resultant force when machining Aluminum 6061(Al 61S) with single point cutting tool. The effects of the selected turning process parameters on Resultant force and the subsequent optimal settings of the parameters have been analyzed by using Teaching Learning Based Optimization method and Taguchi Method. The results indicate that the selected process parameters are more optimized in Teaching Learning Based Optimization Method than Taguchi. Read More...
|
Mechanical Engineering |
India |
712-716 |
162 |
Hubness Implementation for High Dimensional Data Clustering Using Image Feature Extraction
-Ms. Sumare Sneha Prakash ; Mr. Khandagale Hridayanath P.
Many data domains such as personal data, image data have large number of attributes which is difficult to cluster using traditional data mining techniques due to high dimensionality of data. Image clustering is one of the essential problems in automatic image processing, since high dimensional data exhibit high hubness which is data points appears at high density area of data. We find that image data set under several feature can be represented and cluster using hubness. We propose a novel approach of hubness in clustering of high dimensional data like images. Each feature of image including its resolution will treat as dimension of the image and using these all dimensions we apply clustering using hub concept. Hub is the data point that frequently occurs in k- nearest neighbor of other data points. This hub point can be used effectively as centroid in cluster prototype which will considerably speed up the convergence of algorithm. Read More...
|
Computer Science And Technology |
India |
717-719 |
163 |
Softwares for Building Information Modeling (BIM) Project Management and Controlling
-Nisarg M. Mistry ; Nisarg M. Mistry; Hiren A. Rathod
This paper is about BIM Building Information Modeling and most of Softwares used for construction project management and monitoring in construction industry. It’s about BIM and Softwares used for Building Information Modeling and details of Softwares Read More...
|
Civil Engineering |
India |
720-724 |
164 |
Implementation of real time object detection and tracking system with rotating camera: a survey
-Ravi D. simaria
The task of real time detection and tracking of a moving object in a video stream is quite challenging if camera itself is moving. This paper presents a survey of real time detection and tracking of a known/unknown object in video stream with 360° (azimuth) rotating camera. It also presents a comparative study of various image tracking algorithms. The system described in this paper contains a camera that is connected to an embedded system which is capable of processing an input video stream data. The Embedded system is also having an image processing algorithm which detects an object first and then tracks it as long as it is in the line of sight of the camera. As the object moves, the embedded system rotates the camera which is mounted on a stepper motor according to the path of the moving object. The embedded system also sends data to an end user via a Wi-Fi server so that the end user can monitor the activity of the object of interest. The object can be known (already saved in system memory) or can be unknown (can be defined directly by the end user by selecting a portion of the frame in video stream). The embedded system also saves the video stream in a storage device for playback purpose. Read More...
|
electronics and communication engineering |
India |
725-728 |
165 |
CFD Analysis of Triple Concentric Tube Heat Exchanger
-PATEL DHARMIKKUMAR AMRUTBHAI ; Dr. V.D.Dhiman; Jignesh Patel
Triple concentric tube heat exchanger performs better than double concentric tube heat exchanger. Triple concentric tube heat exchanger consists of three tube of different diameter as connected concentrically. Most of previous study used two fluids for different arrangement. Cold fluids flow from inner tube and outer annulus and hot fluid from inner annulus. Objective of present work is give review on performance analysis of triple concentric tube heat exchanger. Different parameters which affect the performance analysis of triple concentric tube heat exchanger were determined. Read More...
|
mechanical engineering (Thermal) |
India |
729-732 |
166 |
Numerical Analysis of Shell and Tube Heat Exchanger using HTRI
-PATEL VIRALKUMAR KAILASBHAI ; Dr. V.D.Dhiman; Pankaj D. Ahir
Shell and tube heat exchanger are widely used in chemical industry power plant, petroleum refining, air-conditioning and power generation systems. The objective of this paper is to present an overview of literature dealing with the study of thermal performance of shell and tube heat exchanger. Influence of various parameters such as baffle geometry, baffle type, tube length, number of tube, shell diameter, pitch ratio on performance of shell and tube heat exchanger. Read More...
|
mechanical engineering (Thermal) |
India |
733-736 |
167 |
Path Quality Measurement in Wireless Sensor Networks using Disjoint Path Vector metric
-K.SIVAPRIYA ; Mr.R.VELUMANI,
In wireless sensor networks path quality is very important to achieve high data delivery rate during the packet forwarding among nodes. Disjoint Path Vector (DPV) algorithm a distributed fault tolerance control topology is efficiently used to select good paths between source and destination. This can be achieved by collecting the required information among the neighbor nodes and update only wanted neighbors in the network. Hence node quality is increased and the unwanted neighbors are removed. By using this number of links used in the network is reduced and the redundancy for the routing is reduced. Read More...
|
Computer Science Engineering |
India |
737-739 |
168 |
Low Power and High Speed CMOS Comparator for A/D Converter Applications - A Review
-Sweta Kumari ; Mr. Sampath Kumar V.
In high-speed high-resolution analog to digital converters, comparators have a key role in quality of performance. High power consumption is one of the drawbacks of these circuits which can be reduced by using suitable architectures. Many versions of comparator are proposed to achieve desirable output in sub-micron and deep sub-micron design technologies. The selection of particular topology is dependent upon the requirements and applications of the design. Low power and high speed circuit design has emerged as a principal theme in today’s electronics industry. In this paper, a basic SA-ADC (successive approximation) is discussed as a proper choice for low power applications and comparison with other ADC architectures. Following with the study of design parameters of comparator, their architectures and its use in various applications. Read More...
|
Electronics Engineering |
India |
740-745 |
169 |
A Survey on Image Classification using Data Mining Techniques
-Patel Vyoma ; G.J.Sahani
Image classification is one of the most useful and essential research field in computer vision domain. The growing demands for image classification in computer vision having application such as video surveillance, image and video retrieval, Web content analysis, biometrics etc. has pushed application developers to search ways to manage and classify images more efficiently. Classification includes image pre-processing, object detection, object segmentation, feature extraction and object classification. The main goal of image classification is to classifying image into different classes according to their visual characteristics. Recently there has been new trend to merge two or three field to take the advantage of each field. In this paper presents a survey on various image classifications by data mining techniques and image representation methods. Read More...
|
Computer Engineering |
India |
746-750 |
170 |
Study of Digital Jewellery
-Neelam Verma ; Rakesh Patel; Bharti Verma
The aim of this research was to explore the possible integration of digital technologies and contemporary jewellery towards the development of digital jewellery. I sought to investigate the relevance and appropriateness of such integration as extensions of contemporary jewellery through personally and emotionally significant experience. The combination of microcomputer devices and increasing computer power has allowed several companies to begin producing fashion jewelry with embedded intelligence i.e., Digital jewelry. Digital jewelry can best be defined as wireless, wearable computers that allow you to communicate by ways of e-mail, voicemail, and voice communication. I developed a practice-centred methodology rooted in craft practice that tests the appropriateness of contemporary jewellery practice as a creative strategy and research tool in the development of personal and emotionally significant digital jewellery. My process focused on the involvement of individual participants with the aim of weaving aspects of their personal histories that were emotionally meaningful to them into pieces of digital jewellery . Even the devices we use are protected by passwords. It can be frustrating trying to keep with all of the passwords and keys needed to access any door or computer program. This paper discusses about a new Java-based, computerized ring that will automatically unlock doors and log on to computers. Read More...
|
IT |
India |
751-754 |
171 |
Conceptual Information of Cloud Computing & Migration with Its Security Approaches
-Renuka Bareth ; Rakesh Patel; Meenu Rani Dey
Cloud computing is a new paradigm that combines several computing concepts and technologies of the Internet creating a platform for more agile and cost-effective business applications and IT infrastructure. The adoption of Cloud computing has been increasing for some time and the maturity of the market is steadily growing. Security is the question most consistently raised as consumers look to move their data and applications to the cloud. In these paper we will see the basic concept of cloud computing, simple form of cloud computing, cloud service modle, architecture cloud characteristics, cloud migration and some security points by which the data migration will become more secure. Read More...
|
IT |
India |
755-760 |
172 |
Deodorised Liners of Husk Fiber with Natural Finishes
-E.Devaki ; Dr.K.Sangeetha
Nonwoven fabrics are sheet or web structures bonded together by entangling fiber or filaments. They are flat or tufted porous sheets that are made directly from separate fibres like arecanut and organic cotton. In this technique the fibres are directly processed into a fabric instead of yarn stage. Nonwoven provide properties which are often combined to create fabrics suited for specific jobs, while achieving a good balance between product use-life and cost. Since these properties are available in chosen fibre, and so had gone for underarm pad. Under arm pad are an alternative to antiperspirants and can eliminate armpit stains sometimes caused by antiperspirants. It has been finished with fragrance to make the users a fresh appeal to eliminate the usage of perfumes. Read More...
|
Textiles |
India |
761-762 |
173 |
Compresive Strength of Steel Fibre Reinforced Concrete and its Application in Deep Underground Engineering
-Prajit Kumar Datta ; Abhishek Raj Sachan; Vineeth Singhi
The Steel Fiber Reinforced Concrete (SFRC) is mainly being used to improve the structural strength and reduce the steel reinforcement that is required. Steel fibers of length 60mm and 35mm were used for the test. The specimens were prepared with steel fibers in ratio of 4% to volume of mortar to study the supporting effect of SFRC in a soft rock tunnel. The experiment was done to find the compressive strength of the specimens. The experimental results showed that SFRC can be used instead of plain concrete in a soft rock tunnel because SFRC can withstand large deformations as compared to plain concrete. In the concrete, Blast furnace slag (GGBS), HRWR plasticizer are being used to increase the strength, durability and produce high performance concrete. The specimens casted were subjected to 3 different curing methods namely: Normal Curing, Hot Air Oven Curing and Steam Curing. The results showed that M13 mix showed having 60% steel fiber of 60mm and 40% steel fiber of 35mm gave the best results. Read More...
|
Civil Engineering |
India |
763-766 |
174 |
Development of Al-Sic MMC and Experimental investigation by Electro discharge machining - A Review
-Kaushal R. Patel ; C.P.Patel
In recent years, aluminum alloy based metal matrix composites (MMC) are gaining importance in several aerospace and automobile applications. The researchers have adopted several processing techniques like ultrasonic assisted casting, powder metallurgy, high energy ball milling, and liquid stir casting for the production of Aluminum matrix composites. Different Aluminium alloys and reinforcements (SiC, B4C, Si3N4, AlN, TiC, TiB2) with varying % weight fraction have been used for development of AMC. The high abrasiveness of the SiC particles limits the conventional machining process. Rapid tool wear with poor performance even with advanced expensive tools categories it as a difficult-to-cut material. The use of nonconventional machining techniques in shaping aluminum metal matrix composites has generated considerable interest due to ease of machining. Electrical discharge machining (EDM) appears to be a promising technique for machining MMC by varying process parameters. In this paper, review on liquid stir casting followed by centrifugal casting and machining by EDM has been focused. Read More...
|
Mechanical Engineering |
India |
767-769 |
175 |
An Efficient Implementation of Floating Point Multiplier
-P.Suneel Kumar ; P.Swapna
In this paper we describe an efficient implementation of an IEEE 754 single precision floating point multiplier targeted for Xilinx Virtex-5 FPGA. VHDL is used to implement a technology-independent pipelined design. The multiplier implementation handles the overflow and underflow cases. Rounding is not implemented to give more precision when using the multiplier in a Multiply and Accumulate (MAC) unit. With latency of three clock cycles the design achieves 301 MFLOPs. The multiplier was verified against Xilinx floating point multiplier core Read More...
|
vlsi and mobile communication |
India |
770-773 |
176 |
Self-Organizing Trust Model for Distributed System
-Baradkar Shubhangi ; Khamkar Dhanashri; Ithape Pranita
Distributed networking technologies have gained popularity as a mechanism for users to share files without the need for centralized servers. A Distributed network provides a scalable and fault-tolerant mechanism to locate nodes anywhere on a network without maintaining a large amount of routing state. This allows for a variety of applications beyond simple file sharing. Examples include multicast systems, anonymous communications systems, and web caches. We survey security issues that occur in the underlying Distributed routing protocols, as well as fairness and trust issues that occur in file sharing and other Distributed applications.We discuss how techniques, ranging from cryptography, to random network probing, to economic incentives, can be used to address these problems. Open nature of Distributed systems exposes them to malicious activity. Building trust relationships among peers can mitigate attacks of malicious peers. This paper presents distributed algorithms that enable a peer to reason about trustworthiness of other peers based on past interactions and recommendations. Peers create their own trust network in their proximity by using local information available and do not try to learn global trust information. Two contexts of trust, service, and recommendation contexts, are defined to measure trustworthiness in providing services and giving recommendations. Interactions and recommendations are evaluated based on importance, recentness, and peer satisfaction parameters. Additionally, recommender’s trustworthiness and confidence about a recommendation are considered while evaluating recommendations. Simulation experiments on a file sharing application show that the proposed model can mitigate attacks on 16 different malicious behavior models. In the experiments, good peers were able to form trust relationships in their proximity and isolate malicious peers. Read More...
|
computer (networking) |
India |
774-776 |
177 |
Identifying and Locating Multiple Spoofing Attackers using Cluster in Wireless Network
-Bhujbal Pallavi M. ; Hilal Sadhana Dilip; Galande Rupali Balasaheb; Thorat Priyanka Nandaram
Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. In this paper, we propose to use spatial information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as the basis for (1) detecting spoofing attacks; (2) determining the number of attackers when multiple adversaries masquerading as a same node identity; and (3) localizing multiple adversaries. We propose to use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks. We then formulate the problem of determining the number of attackers as multi-class detection problem.Cluster-based mechanisms are developed to determine the number of attackers. When the training data is available, we explore using Support Vector Machines (SVM) method to further improve the accuracy of determining the number of attackers. In addition, we developed an integrated detection and localization system that can localize the positions of multiple attackers. We evaluated our techniques through two testbeds using both an 802.11 (Wi-Fi) network and an 802.15.4 (ZigBee) network in two real office buildings. Our experimental results show that our proposed methods can achieve over 90% Hit Rate and Precision when determining the number of attackers. Our localization results using a representative set of algorithms provide strong evidence of high accuracy of localizing multiple adversaries. Read More...
|
computer Engineering |
India |
777-780 |
178 |
A Review of Laser Welding Process for Dissimilar Materials
-Brijesh Patel ; Assi. Prof. D.H.Patel; Assi. Prof. D.K.Soni
This paper describes a variety of fundamental research of laser welding of dissimilar material which the authors have recently performed. Laser welding will be a vital joining technique for dissimilar material with their increasing applications in aerospace, aircraft, automotive, electronics and other industries. In this review the research and progress in laser welding of dissimilar material are critically reviewed from different perspectives. Basically two types of industrial lasers, carbon dioxide (CO2) and neodymium-doped yttrium aluminum garnet (Nd: YAG). Some important laser processing parameters and their effects on weld quality are discussed. This paper deals with the review of papers by authors. Read More...
|
Mechanical Engineering |
India |
781-784 |
179 |
Experimental Study on Blending of Ethanol & Diesel with EGR System in IC Engine
-Sagar R Tailor ; Jignesh Patel ; Anil J. Patel
Internal combustion engines are established as the main power source for the automobile vehicles. At present emission norms becomes strict for any I.C. Engine. The main pollutant are CO, HC, NOx,PM, soot, etc from which NOx are one of the most harmful component. It is possible to limit the negative effect of NOx on the environment by various methods like exhaust gas recirculation (EGR), catalyst and water injection. The aim of this work is to review the effect of exhaust gas recirculation (EGR) to reduce the NOx emission from tailpipe of homogeneous charged C.I.engines. Cooled exhaust gas recirculation (EGR) is a common way to control the NOx generation in engine cylinder .It was found that the thermal resistance and thickness of the fouling layer as well as the fouling rate decrease with increasing gas velocity in EGR coolers It was found that adding EGR to the fresh air charge to homogeneous charged engines will beneficial to reduce the NOx emission substantially. Substantial reductions in NOx emission are achieved by previous investigators with 10% to 30% EGR. ethanol is suitable In diesel engine as a substitute fuel. up to 15% (v/v) ethanol/85% (v/v) diesel fuel blends can be recommended as fuel for diesel engines once flash point and blend stability are improved by the use of additives. Read More...
|
Mechanical Engineering |
India |
785-791 |
180 |
Path Selection Optimization using Genetic Algorithm in IP Network
-Sourabh Kumar ; Er. Meenakshi Sharma
A novel approach of optimized routing which is based on Genetic Algorithm has been introduced. It finds out the optimum and the most suitable path which qualifies Objective Function criteria. Optimization Approaches have been applied to various real life issues in communication and networking. The path which is best fitted in the population is considered as the optimal path. It is obtained after qualifying the fitness function measuring criteria. The fitness function measures the best fitted path based on constraints; bandwidth, delay, link utilization and hop count. Population is composition of valid and invalid paths. In this research work we proposed a new genetic algorithm for network path optimization. Network path selection is based upon the fitness function measuring average packet delay for a network path. The population comprises of all chromosomes of variable length, so that the algorithm can perform efficiently in all scenarios. Rank-based selection is used for cross-over operation. Mutation operation is used for maintaining the population diversity. The results prove our assertion that our proposed algorithm finds the optimized shortest path between source nodes to destination node more efficiently than existing algorithms. Read More...
|
computer science |
India |
792-795 |
181 |
ECG Signal Processing and Detection using FIR Filtering: A Review
-Renu ; Er. Rishi Pal
Heart is an important part of the human body. Heart diseases are the important factor which cause of death in the world. An electrocardiogram is a device which graphically records the electrical activity of the heart. It is used to identify normal and abnormal heartbeats. Noise filtering is the next step of the QRS detection. In filtering of signal, we have used one band stop filter and a low pass filter. These filters are used to remove 60 Hz power line and 0.5 Hz baseline wander noises. QRS detection is the final step of the ECG processing. A new method is used to detect the QRS wave which includes the heart rate calculation and R-R time interval. Several analyses performed for the detection of ECG signal verify that Co-simulation is a suitable method to check the HDL module for real time systems. Read More...
|
Electronics & Communication |
India |
796-798 |
182 |
ECG Signal Processing and Detection using FIR filtering
-Renu ; Er. Rishi Pal
The main focus of this paper is to design an advanced Electrocardiogram (ECG) signal monitoring and analysis design. Heart is an important part of the human body. Heart diseases are the important factor which cause of death in the world. An electrocardiogram is a device which graphically records the electrical activity of the heart. It is used to identify normal and abnormal heartbeats. Noise filtering is the next step of the QRS detection. In filtering of signal, we have used one band stop filter and a low pass filter. These filters are used to remove 60 Hz power line and 0.5 Hz baseline wander noises. QRS detection is the final step of the ECG processing. A new method is used to detect the QRS wave which includes the heart rate calculation and R-R time interval. Several analyses performed for the detection of ECG signal verify that Co-simulation is a suitable method to check the HDL module for real time systems. Read More...
|
Electronics & Communication |
India |
799-802 |
183 |
Detailed Geomorphic Mapping using Remote Sensing & GIS in Kolli Hill, South India
-B. Gurugnanam ; K. Kalaivanan; S. Bairavi
In the present study, geomorphological mapping using remote sensing techniques has been carried out in kolli hill. Uses of remote sensing and GIS methods has been proved indispensable in geomorphological study. Landforms are interpreted on the basis of interpretation element keys namely tone, texture, size, shape, color etc. and extract the specific information from the false color composites in the digital satellite images of LISS IV IRS P6 data. Geomorphological units are classified on the basis differential erosion processes. In the present investigation an attempt is being made to use the NRIS (Natural Resource Information System) standard for geomorphic mapping. The geomorphic units mapped from satellite image of Structural hills (276.84 Km2) occupying major portions of the area, and residual hills covers 0.48 Km2 covered in northeastern part, pediment 23 Km2 northern, southern and northeast portions of the area. Hilltop western (176.75 Km2) and central portions of the area. The above said information reveals that the digital satellite technology proves an efficient tool in mapping the landforms. Read More...
|
Geological Engineering |
India |
803-805 |
184 |
Analysis of Transpire 5G Wireless Technology Worldwide Wireless Web (wwww)
-S.Chandrakanth ; J.Uma mahesh; S.Chandrakanth; K.Vinil Reddy; SK.Islam Babu
5G will be the fifth generation of wireless networks, which is expected to dominate the current generations in the next decades. In today’s technology of mobile networks and wireless systems, the most users are using 4G, which is the 4th generation of mobile networks and almost every single user is enjoying this wonderful wireless technology, but a true confess is that the most users are already waiting for the next generation of mobile networks, which is called for 5G. This paper gathers and reviews the emerging 5G wireless technology which is coined as Worldwide Wireless Web (wwww) Read More...
|
computer science engineering |
India |
806-809 |
185 |
A Cost Effective Communication Device Using Morse Code for Disabled People
-Snehanshu Shekhar ; Anchal Sharma; Shreyans Jain; Sahil Tangri
Morse Code is an efficient tool for communicating with the disabled people especially those with speech impairments and a variety of neuromuscular diseases like multiple sclerosis and muscular dystrophy. It is quite difficult to implement morse code with people having severe physical restriction as in the severe cases of Cerebral Palsy. This paper aims at designing of a device which can help such patients with their basic day to day communication. The proposed device can recognize even a slight movement of finger as the dots and dashes of Morse code, alerting patient’s caretaker about anything that needs his attention. Read More...
|
Electronics and Communication Engineering |
India |
810-812 |
186 |
Design & Implementation of Motion Detection & Reconstruction of Image Using Modified Pixel Motion Approach
-Er. Navneet Kaur ; Amit Doegar
The human perception has the capability to acquire, integrate, arid interpret all this abundant visual information around us. It is challenging to impart such capabilities to a machine in order to interpret the visual information embedded in still images, graphics, and video or moving images in our sensory world. Disparate as they may seem, these many applications share one common thread in all such applications, the demand is high for accurate estimates of motion requiring minimal computational cost. In this, a new technique called estimating the difference between two frames of image using Pixel motion estimation technique is proposed. The proposed technique attempts to decreasethe computation time between the current frame and the next frame.The displacement of each picture element in each frame forms the displacement vector field (DVF) and its estimation can be done using at least two successive frames. The pixel based approaches depend upon intensity of image and its performance is affected by presence of noise. In this, it also proposes real time motion estimation and enhancement based difference of frames. The PSNR and MSE are also calculated. All simulations are done in MATLAB 8.1. Read More...
|
Computer Science and Engineering |
India |
813-818 |
187 |
THD ANALYSIS FOR DIFFERENT LEVELS OF CASCADED MULTILEVEL INVERTER INCLUDING LOW MODULATION AND OVERMODULATION INDICES
-bhanupriya sharma ; N.K Singh
Cascade Multilevel Inverters are very popular and have many applications in electric utility and for industrial drives. When these inverters are used for industrial drive directly, the THD contents in output voltage of inverters is very significant index as the performance of drive depends very much on the quality of voltage applied to drive. In this article, the THD contents of 11 and 13 level cascade multilevel inverters have been analyzed. Read More...
|
Electrical Engineering |
India |
819-821 |
188 |
A Survey of Current Image Segmentation Techniques for Detection of Lung Cancer
-Ekta Solanki ; Mr.Amit Agrawal; Mr. Chandresh Parmar
Lung cancer is the most acute type of cancer among all the cancers with less survival rate. It is very difficult to analyze the cancer at its early stage. itsIn the past few years, many Computer aided systems have been designed to detect the lung cancer at its early stage. The most of work is implemented on the Computer Tomography (CT) scan images because of better clarity, low noise and distortion. In this paper, various techniques have been discussed for the detection of lung cancer and to classify whether it is benign or malignant. Read More...
|
Electronics and Communication |
India |
822-824 |
189 |
Design and Analysis of Double Walled Vacuum Vessel
-JIGAR SONI
Present study is aimed towards design and study of cryogenic double wall vacuum vessels. A liquid nitrogen storage vessel has been considered for present study. Thermal loading due to temperature difference between low temperature liquid nitrogen and atmospheric temperature is considered as a major factor for designing the vessel in addition to this, fatigue due to thermal cycling of vessel is considered. Moreover vessel will be subjected to structural loads, e.g. dead weight of the vessel, transportation accelerations and seismic actions. All these structural boundary conditions are applied for present study and accordingly design and optimization of vessel is carried out. Read More...
|
MECHANICAL ENGINEERING |
India |
825-826 |
190 |
Prospect of Micro Hydro Power in Hilly Area
-Amarjeet Yadav ; DR.Shriram
The purpose of this thesis is to first conduct a literature review regarding the technical specifications and design parametres required to design a working Micro Hydro Power System MHS (Micro Hydropower System). After review of the theory and principles of Micro Hydro System design; these principles are applied to the real case of Lamaya Khola Micro Hydro Project in Pangrang Village Development Committee (VDC) of Hilly Area. The field data required to design the civil components of the micro hydro project were derived from secondary data sources such as the study conducted by the village development committe as well as other independent project surveys. The micro hydro designed in this thesis was of "run-of-the river" type. Similarly, system components designed in this thesis are intake structure, headrace canal to divert the water from the source, forebay tank, sedimentation basin and the penstock assembly. Owing to the complexity and lengthy process of designing all of the system components; only these specific civil structures are designed in this study. Read More...
|
civil engineering |
India |
827-835 |
191 |
Survey on Approaches for Sequential Pattern Mining and High Utility Sequential Pattern Mining
-Uma Dave ; Jayna Shah
Sequential pattern mining plays an important role in many applications, such as bioinformatics and consumer behaviour analysis. However, the classic frequency-based framework often leads to many patterns being identiï¬ed, most of which are not informative enough for business decision-making. So a recent effort has been to incorporate utility into the sequential pattern selection framework, so that high utility (frequent or infrequent) sequential patterns are mined which address typical business concerns such as dollar value associated with each pattern. So this paper presents detailed different approaches adopted for Sequential pattern mining algorithms as well as high utility sequential pattern mining techniques. Read More...
|
Computer Engineering |
India |
836-841 |
192 |
Landslides and its Remedial Measures in Mussoorie Hilly Sections
-Rajneesh Yadav ; Dr. ShriRam
Mussoorie Landslides constitute one of the major natural disasters. The fragile terrain often faces significant problems of geo-environmental imbalance due to landslides. The term landslide includes all varieties of mass movements of hill slopes and can be defined as the downward and outward movement of slope forming materials composed of rocks, soils, artificial fills or combination of all these materials along surfaces of separation by falling, sliding and flowing, either slowly or quickly from one place to another. Mussoorie steep terrains also face problem of Landslides. After the terrain evaluation and Landslide hazard assessment, the mitigation measures have to be taken up. These are to stabilize the various soil and rock slope, which are prone to Landslides. The method or model is used are: stability of natural slope which depends upon the terrain and material parameters. Remedial Measures are apply after the proper analysis of soil parameters, slope stability and Geomorphologic condition of study area and select the cost effective remedial measures. Read More...
|
CIVIL ENGINEERING |
India |
842-851 |
193 |
Water Harvesting in Hilly Area
-Amarjeet Yadav ; DR.Shriram
The Rainwater harvesting is the simple collection or storing of water through scientific techniques from the areas where the rain falls. It involves utilization of rain water for the domestic or the agricultural purpose. The method of rain water harvesting has been into practice since ancient times. It is as far the best possible way to conserve water and awaken the society towards the importance of water. The method is simple and cost effective too. It is especially beneficial in the areas, which faces the scarcity of water. People usually make complaints about the lack of water. During the monsoons lots of water goes waste into the gutters. And this is when Rain water Harvesting proves to be the most effective way to conserve water. We can collect the rain water into the tanks and prevent it from flowing into drains and being wasted. It is practiced on the large scale in the metropolitan cities. Rain water harvesting comprises of storage of water and water recharging through the technical process. Read More...
|
civil engineering |
India |
852-859 |
194 |
Study of Flash Memory its Implementation Application and limitation
-Suman Bala Nande ; Rakesh Patel
Flash memory is used at high speed as storage of personal information utilities, ubiquitous computing environments, mobile phones, electronic goods, etc. This is because flash memory has the characteristics of low electronic power, non-volatile storage, high performance, physical stability, portability, & so on. To improve the overall performance & service life of the flash memory, a new type of file management algorithm for flash memory has been designed. A new linear ordering function is added to the traditional file management system. Its function is to balance the used frequency of every port in the flash memory. The new file should be stored in the space whose writing times are smaller, thus improving the overall efficiency, extending the service life of flash memory. The capability of the management system designed is better than the traditional one, especially in the case of being operated more times. Phase_ change nonvolatile semiconductor memory technology is based on an electrically initiated, reversible rapid amorphous-to-crystalline phase-change process in multicomponent chalcagenide alloy materials similar to those used in rewriteable optical disks. Flash memory controller is interfaced with flash memory. It handles all signals required by the flash memory. With the required signals different types of commands are also sent through flash memory controller to the flash memory. Flash memory- based solid- state disks are fast becoming the dominant, form of end- user storage devices, partty even replacing the traditional hard- disks. Read More...
|
IT |
India |
860-863 |
195 |
Agenda of the cloud computing
-Krishna Kumar Rathore ; Rakesh Patel; Girdhari Patel
The term "cloud computing" is a recent buzzword in the IT world. Though the term "Cloud Computing" is recent but the idea of centralizing computation and storage in distributed data centers maintained by third party companies is not new. Cloud computing is aimed at providing IT as a service to the cloud users on-demand basis with greater flexibility, availability, reliability and scalability with utility computing model. This new paradigm of computing has an immense potential in it to be used in the field of e-governance and in rural development perspective in developing countries like India. Read More...
|
IT |
India |
864-866 |
196 |
A Survey : Sensor Node Localization in Underwater Sensor Network Using Vector Based Forwarding
-Atul Singh ; Janak Tank
Underwater sensor networks (UWSN) resemble terrestrial sensor networks in many aspects. However, the high propagation delay and limited bandwidth make terrestrial sensor network’s protocols unsuitable for UWSN. Underwater sensor nodes are powered by batteries which are even difficult to recharge. So, energy efficiency is major concern for underwater routing. In this paper, based on VBF, we provide a new routing protocol, efficient VBF. In this paper we discuss the some fundamental about underwater sensor network, issue relating to routing, related work, our proposed protocol and result analysis and conclusion. Read More...
|
Computer Engineering |
India |
867-869 |
197 |
Intensity Based Registration for Needle Placement
-Jasdeep Kaur ; Amanpreet Kaur
Image registration is a vital problem in medical imaging. It has many potential applications in clinical diagnosis. Registration algorithms compute transformations to set correspondence between the two images. In medical image registration, vibrations and movements are the main problems that are observed in camera based diagnostics various registration techniques are there but most commonly used method are either a feature-based or intensity-based image registration. But no such automated methods are available that may helpful to perform camera based surgery, by Analysing the wound from different directions to find out the location of needle where it is need to be placed, also to calculate the depth and number of stitches to be required. This can be done by using intensity based image registration, where two images of same wound taken from two different angles are registered. Read More...
|
Information Technology |
India |
870-874 |
198 |
Experimental and Theoretical Investigation of Torrefaction Process
-Harshul Brahmbhatt ; Mr. R. S. Khanna
Biomass typically contains approx. 70 % volatile matter and 30 % fixed carbon on dry mass basis. During the torrefaction process, solid biomass is heated in the absence of oxygen at a temperature of approx. 200-350 °C, leading to a loss of moisture and partial loss of the volatile matter in the biomass. With the partial removal of the volatile matter (about 25%), the characteristics of the original biomass are drastically changed. Torrefaction is different from steam explosion, and results in different product characteristics. Read More...
|
Thermal Engineering |
India |
875-877 |
199 |
Experimental Study and Analysis of Heat transfer Enhancement of Tube in tube Heat exchanger using Delta winglet and Conductive fluid
-Jignesh Chhatbar ; Dr. Akshay A. Pujara; Jaiwick P. Soni
The heat transfer characteristics of water based conductive fluid in a Tube in tube heat exchanger with the aid of delta winglet will being study. Investigations will be on the effects of Reynolds’s number and Nusselt number with the effect of the water based conductive fluid concentration on the heat transfer. An increase in the volume concentration of the nanoparticles in the base fluid caused a significant enhancement in the overall heat transfer characteristics compared to that of water. When a delta winglet will be used, further increment in overall heat transfer coefficient will find for a particular Reynolds’s number and Nusselt number. This study is a comparison for Laminar flow and Turbulent flow of water based conductive fluid for heat transfer enhancement depending on Reynolds’s Number and Nusselt Number. Study also involves analysis of heat transfer enhancement of tube and tube heat exchanger using delta winglet by water based conductive fluid. Read More...
|
Thermal Engineering |
India |
878-881 |