No. |
Title and Author |
Area |
Country |
Page |
101 |
Comparative Study of Variants of Low Energy Adaptive Clusterinf Hierarchy (LEACH) Protocol in Wireless Sensor Networks
-Siddharth Sheth ; Siddharth Sheth; Asst. Prof. Haresh Rathod
Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. They are very useful for military, environmental, and scientific applications to name a few. Routing is a very important phase in any type of communication. Moreover, Routing procedure consumes more power than any other phase. Therefore, if some changes are made in this phase, then drastic changes in energy consumption may be observed. LEACH (Low Energy Adaptive Clustering Hierarchy) is designed in such a way that it consumes less energy comparatively. If still, changes are done then it can be improved. In this paper, LEACH protocol functioning is explained. In addition to this, variants of LEACH are discussed in brief. Read More...
|
Computer Engineering |
India |
427-432 |
102 |
Exergy Analyis of CI Engine Fuelled with DIesel and Biodiesel-A Review
-Komal V. Bageshwar ; Prof. M. M. Deshmukh
The present study deals with the exergy analysis of engine cylinder of CI engine. As the energy analysis (first law of thermodynamics) deals with the quantity of energy only. So to determine the quality of energy there is need of exergy analysis i.e. second law of thermodynamics. In this, an overview of detailed thermodynamic model approach will be covered. This paper deals with the review of exergy analysis by comparing experimental results with simulation software. The main objective of this study deals with the mathematical modeling of engine cylinder. The computer simulation of the process in the CI engine is the key role for reducing cost in the development of more efficient combustion engine. Read More...
|
Mechanical Engineering |
India |
433-436 |
103 |
Strengthening Of Preloaded RC Beam Containing Square Opening Located At Shear Zone by GFRP and CFRP Sheets
-Santosh Kamthane ; Santosh Kamthane; Prof.Shivraj Mangalgi
This experiment work is carried out study of “strengthening of preloaded RC beam containing small square opening located at shear zone by Glass Fiber Reinforced Polymer (GFRP) and carbon Fiber Reinforced Polymer (CFRP) sheets†in order to investigate the efficiency of external strengthening with GFRP and CFRP sheets. In this experimental work total eight beams were cast. All beams have dimensions of 150mm width, 250mm depth and 2000mm length. The first beam is solid beam and second beam is cast with opening but not strengthened referred as control beam. The loading has been carried out in two stages. In the first stage the solid beam and control beam are tested up to the ultimate load. The ultimate load of control beam is 80kN. The next three beams B1, B2, B3 are preloaded up to 30%, 45%, and 60% of ultimate load (i.e. 80kN) respectively. The last three beams B4, B5, B6 are also preloaded up to 30%, 45%, and 60% of 80 KN respectively. In the second stage the preloaded beams B1, B2, and B3 are strengthened with GFRP sheets and the preloaded beams B4, B5, and B6 are strengthened with CFRP sheets. All beams were tested in loading frame with two point loading up to failure. The test results revealed that the beams B1 to B6 strengthened with CFRP and GFRP sheets have shown percentage increase in load carrying capacity as compared to control beam. The control beam has shown a decrease in the load carrying capacity by 24% as compared to the solid beam. The increase in load carrying capacity of preloaded beams B1, B2, and B3 strengthened with GFRP sheets is 22.5%, 17.5% and 15% respectively as compared to the control beam, whereas in case of preloaded beams B4, B5, and B6 strengthened with CFRP sheets the increase in load carrying capacity observed is 32.5%, 27.5% and 22.5% respectively as compared to the control beam. The beams B1 and B4 strengthened with GFRP and CFRP sheets respectively and both preloaded to 30% have shown a higher load carrying capacity as compared to beams with higher preloading’s. In all the six beams, the percentage increase in load carrying capacity is more in case of beams strengthened with CFRP as compared to beams strengthened with GFRP. From the overall study it can be concluded that the application of CFRP and GFRP sheets reduces the excessive cracking and beam deflection and increases the ultimate load carrying capacity and stiffness of the beam. The use of CFRP and GFRP sheets wrapping with the designed strengthening configuration could significantly reduce excessive cracking, deflection and increases the ultimate capacity, stiffness of beam. Read More...
|
Structural engineering |
India |
437-441 |
104 |
3D Printing by construction and other wastes for making affordable buildings
-Finhasali H Chinwala ; Vipul J Kalyani
3D printing is an innovative technology helps us to print i.e. print the object what we make on the computer. Products made by this technology will be economical due to many reasons such as no wastage and no storage requires. By making products economical, we can finally make or design a low cost house which will finally helpful in Governmental or any other low cost housing scheme. Read More...
|
Civil Engineering |
India |
442-443 |
105 |
A SURVEY: ANALYSIS OF DIELECTRIC CIRCULAR WAVEGUIDE
-Dimple Agrawal ; Raj Hakani
Electromagnetic waves are very strong waves which are used for transmission of signals from one place to other place. The main concern for the transmission is the selection of waveguide and its physical structure, material and dimensions etc. Generally Rectangular and Circular waveguide are used for transmission of EM waves. In rectangular waveguide attenuation losses, return loss and insertion loss are present due to a small corner at the ends. Due to the presence of such losses, the transmission was not as expected and reflection may occur. Attenuation losses, Return loss and Insertion loss are less in dielectric circular waveguide compares Rectangular and Circular Waveguide. In this paper dielectric circular waveguide plays the important role in a waveguide to obtaining the desired results. Read More...
|
Electronics & Communication Engineering |
India |
444-445 |
106 |
A Detail Review Comparison Of Refrigeration System With And Without Ejector
-Aakash J Bhatt ; Fenil S Jariwala
Recently, in refrigeration industry the use of efficient ejector refrigeration systems has been paid a lot of attention. These systems sound even more interesting when they are a combination of different kinds of conventional refrigeration systems. In this report thermally consisting of different types of refrigeration systems with and without ejector are proposed and investigated thermodynamically. In this report after the detailed study of the refrigeration system, the detailed study and analysis of the refrigeration system with ejector would be done and deviation in the performance of the system with ejector and without ejector will be studied. The performances of hybrid ejector systems are analyzed and optimized, using the Engineering Equation Solver. And also analysis of parameters like mass flow rate of working fluid, network, thermal efficiency of the cycle varies with the variation in inlet temperature of evaporator, condensation temperature, compressor pressure and different working parameters of the refrigeration systems. Read More...
|
mechanical engineering |
India |
446-451 |
107 |
Designing & testing of an inset fed microstrip patch antenna operating at 2.24 GHz using CST
-Krishna Kumar Tripathi ; Sonal Sharma
This paper describes the design and fabrication technique of an inset fed rectangular microstrip patch antenna operating at 2.24GHz. All the designs have the substrate having dielectric constant (εr) 4.3, substrate thickness of 1.524 mm and loss tangent of 0.025. This paper is mostly focused on the designing of an inset fed patch antenna which has been carried out by using CST studio suite. The aim of this paper is on the measurement of return loss, VSWR and bandwidth of designed patch antenna. Read More...
|
Electronics & communication |
India |
452-456 |
108 |
Performance Evaluation of Polymer Fiber “RECRON-3S†in Pavement Quality Concrete
-Chintan N. Patel ; Harsh S. Patel; Kishan M. Patel; Prof. Manjurali I. Balya; Prof. Vikrant A. Patel
Road transportation is undoubtedly the lifeline of the nation and its development is a crucial concern. The traditional bituminous pavements and their needs for continuous maintenance and rehabilitation operations points towards the scope for cement concrete pavements. There are several advantages of cement concrete pavements over bituminous pavements. But, there are also some problems outcomes with concrete pavement like micro-shrinkage, cracking, and low water permeability. To overcome this kind of problems, the secondary construction material “Recron-3S†is preferable to add in concrete for making stronger and batter road pavement. Present paper focuses how the compressive and flexural strength of the Pavement Quality Concrete (PQC) increases using Recron-3S fiber with compression test of the concrete. The testing results of the prepared sample cube with Recron-3S has compared with other samples which is without the mixture of the Recron-3S. Read More...
|
Civil Engineering |
India |
457-461 |
109 |
A Review on Space Debris and Its Detection
-Prof. R.H.Vijaylaxmi
Space debris is non-functional man-made objects in earth’s orbit. Their number has increased tremendously and this can be attributed to the number of space launches in the last few decades. Their increasing growth has become a threat to the operational satellites and space crafts. This paper makes a survey of the threats posed by space debris and creates an urge to mitigate them. The paper also makes a review of the detection schemes employed to detect the space debris in order to build models to determine their orbits and to keep track of their population. Read More...
|
Space image processing |
India |
462-466 |
110 |
Data Dissemination Techniques and Publish/Subscribe Architecture in Vehicular Adhoc Networks
-Vruti P. Surani ; Vruti P. Surani; Asst. Prof. Hitesh A. Bheda
Vehicular Adhoc network (VANET) is a subset of Mobile Adhoc Network (MANET). It integrates mobile connectivity protocols to expedite data transfer between vehicles as well as between roadside equipment and available traffic in the network. There are main two types of communication carried out in VANET i.e. Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I). There is a large number of interesting applications for vehicular networks: traffic information dissemination, warnings, free parking spots finders, fuel prices advertising, etc. The Publish/ Subscribe (P/S) communication paradigm enables the application developers to easily design flexible notification systems. Furthermore, it enables the drivers/vehicles to indicate their interests about certain types of notifications (e.g. receive warnings concerning traffic jams only within 1km from the vehicle’s route). And finally, P/S is an asynchronous communication protocol (spatial and temporal decoupling) that is suitable for the delay-tolerant network conditions. In the section I, brief introduction to Vehicular Adhoc Network is described. In section II, VANET applications and characteristics are discussed. In section III, various Data Dissemination techniques are explained in detail. In section IV, Publish/Subscribe architecture is explained and information flow in the network is described. Read More...
|
Computer Engineering |
India |
467-470 |
111 |
Improving Thermal withstanding Capacity of Single Phase Induction Motor using NWCC Method
-Banti Khan ; Ashita Goyal
Single phase induction motors are extensively used for smaller loads in industries and domestic purposes due to their various technical as well as economical advantages. Temperature rise due to heat dissipation caused by various losses inside the motor is a critical factor which degrades the dielectric properties of insulation and shortening the lifespan of motor. This paper presents the capillary based water cooling method of single phase squirrel cage induction motor. In this method, a jacket of capillaries made of jute and cotton is used as an outer cover for the motor casing. A small air gap passage is provided in between motor casing and inner surface of jacket. Natural Water Cooling Capillaries (NWCC) method is used to lower down the surrounding temperature of motor which reduces thermal limitations of motor. For this purpose we select a 0.37 kW single phase, 50Hz squirrel cage induction motor. Heat run test is performed to determine the total loss of energy dissipated as heat on single phase squirrel cage induction motor with and without adopting capillary based water cooling method. Comparison is done on the basis of experimental result which shows that the temperature withstanding capacity of induction motor will increase by 10.67 % after adopting capillary based water cooling method. This is an economical method and no external energy is required for cooling purpose. Read More...
|
Electrical Engineering |
India |
471-475 |
112 |
Exploring Silicon and Nanomaterial Using Quantum Dot Based Solar Cell
-K.Sakthi priya ; S.Niranjana; Y.Pooja reddy; A.Deepak
This review paper reports the advantage of using nanomaterials in the solar cell. Initially silicon material is used in the working of silicon solar cell. The reason behind low conversion efficiency is due to the usage of silicon material. To overcome this problem quantum dot which is the nano material is used in the solar cell. Due to the usage of quantum dot which has multi junction band gap the conversion efficiency of the solar cell gets increased. Preparation of the quantum dot and the materials used in it is discussed. Also the comparison between classical solar cell and quantum dot solar cell is reviewed. Read More...
|
Electronics and Communication Engineering |
India |
476-478 |
113 |
Optimizing the Carpool Service Problem with Genetic Algorithm in Service-based Computing
-Aakanksha Dabhade ; Pooja Desai; Priyanka Deolankar; Prof. Sunil Sangve
In today’s world due to industrialization number of cars on roadways increased which causes traffic problems and fuel consumption increases. Carpooling System helps to reduce these problems. Carpooling System is based on artificial intelligence and cloud computing .We are going to implement this system for reducing traffic congestion problem. It is also known as BlueNet which consist of two modules Mobile Client Module and Cloud Carpool Service Module. In Mobile Client Module we are using android based phones so users can submit the carpool request through the handheld devices. In Cloud Global Carpool Service module, we are using Genetic Based Carpool Route and Matching Algorithm to match the requests. This Genetic Based Carpool Route and Matching Algorithm require less time to match large number of users as compare to other systems. It operates with less computational complexity therefore required less computing time. Read More...
|
Computer Engineering |
India |
479-480 |
114 |
Traffic Characteristics and Control at Savala Junction-Visnagar City
-Vikas V. Oza ; Harsh D. Patel; Ramji K. Thakor; Prof. Manjurali I. Balya; Prof. Vikrant A. Patel
Now a day, the traffic congestion is the major problems of our country India. The urbanization of Indian cities increasing and also the vehicle registration of that cities are increasing which is results in increase of the traffic congestion, For the present study, Savala Junction of Visnagar city is selected as a case study which is facing major problems viz. traffic due to uneven vehicle flow, uneven parking, no traffic signals, encroachments etc. and due to this problems time consumption of road users and accidental rate is high. The analysis of the present study junction is carried out from the collected data of videography. The aim of the study is to control the traffic congestion at the Savala junction and to provide the safety to the peoples. Read More...
|
Civil Engineering |
India |
481-484 |
115 |
Survey on different Image Inpainting Method
-Swati Bopaliya ; G. J. Sahani
Inpainting is the technique of filling the missing regions of an image using information from the surrounding area in a visually indistinguishable way. Image In-painting is very important and emerging field of research in image processing. Inpainting algorithm have numerous applications such as rebuilding of damaged photographs & films, heritage preservation, removal of superimposed text, removal/replacement of unwanted objects, red eye correction, image coding etc. There are numbers of method used for image inpainting. All methods have their own advantage and disadvantage. In this paper, we provide a detailed review on different techniques such as PDE based image inpainting, Exemplar based image inpainting, Texture synthesis based image inpainting, Hybrid inpainting ,Semi-automatic and Fast inpainting. Read More...
|
Computer Engineering |
India |
485-488 |
116 |
Experimental Study on Tee Shaped footing under Eccentric Vertical loading.
-Sunil Kumawat ; Dr H.K. Mahiyar
For designing foundations subjected to earthquake forces, adopting values of horizontal and vertical seismic coefficients, equivalent seismic forces can be conveniently evaluated. These forces in combination with static forces make the foundations subjected to eccentric vertical and inclined loads. In addition to vertical axial loads, the footings of structures are often subjected to eccentric loads caused by the force of earth pressure, earthquakes, water, wind etc. Due to eccentric loading, the two edges settle by different amounts, causing the footing to tilt. The Tee shaped is proposed as a footing shape for improving the bearing capacity of shallow footings against the action of eccentric loads. The vertical insertion of the rigid Tee shaped footing, into the bearing soil, provides considerable resistance, against both of sliding and overturning, enough to regain the reduction in bearing capacity and increase in settlement. In the study, a series of experimental results by loading footing eccentrically along and perpendicular axes in horizontal plane for reporting ultimate loads and settlement of Tee shaped footing has been considered out. Total 144 models tests were conducted for investigating the effects of different parameters, such as problem geometry .The problem geometry was represented by two parameters, the load eccentricity (e) and the projection depth (D) of Tee shaped footing into dense sand soil. The experimental results proved that the ultimate bearing capacity of a footing under loads could be improved by projection. Read More...
|
structure engineering and geo-technical investigation |
India |
489-494 |
117 |
Survey on Security Issues in Mobile AdHoc Networks
-Shashikala S R ; B P Savukar
A wireless mobile ad hoc network (MANETs) consists of number of nodes. During the communication they need to cooperate with each other. The main problem with the wireless networks is the security because of the open medium and no centralized base station. There are many security issues related to wireless network. The most of the wireless networks faces the problem of black-hole attacks and gray-hole attacks by the malicious nodes. Here a solution is provided to come out of these problems. Read More...
|
Electronics and communication engineering |
India |
495-497 |
118 |
Risk Analysis for Web Applications
-Hitakshi Kotkar ; Hitakshi Kotkar; Karishma Kankariya; Vinita Attarde; Nisha Malvani
Android’s important protective action against malware applications is creating a risk technique which prior to downloading an application that informs the user about the contents that application requires. Believing that user will make correct action. Such approach was inappropriate as it required much technical information. The proposed method helps the user to evaluated the risk involved while installation of application in a standard numerical and graphical format. This approach will help the user to identify the application having low risk from the same set of category and to ensure the higher security for the mobile device. Read More...
|
Computer Engineering |
India |
498-500 |
119 |
Design and Analysis of Large Rolling Shutter - A Review
-Zahid Pathan ; Vipin Khangar
In this paper we are going to discuss about the construction and analysis of large rolling shutter. The shutter is made up of plurality of slats inter-connected with each other. The shutter provides safety against weather conditions and burglary. The configuration of slat must be such that the rain water must not accumulate between two consecutive slats. The shutter curtain travels in the guide channels to open and close, provided at the either side of the shutter. The pulley system or direct mechanical mechanism can be installed for the opening and closing of shutter. If the size of the shutter is big then a motor can also be installed for the opening and closing of shutter. The wind load is to be considered for the designing of the shutter curtain since the load is mainly due to wind velocity. The curtain must with stand the high velocity wind. The nonlinear analysis of the shutter curtain is carried out because of the thin structure. Read More...
|
Mechanical Engineering |
India |
501-502 |
120 |
Survey of Double Tail Comaparator for High Speed low Voltage Analog to Digital Converter(Review Paper)
-Neha Sharma ; Mrs. Rachna Manchanda
Comparator is one of the main building blocks in most analog-to-digital converters. The double tail comparator is a newly proposed that operates with reduced delay and high speed. The study of various architecture of comparator and analog to digital converters is very important. In This paper, dynamic and double tail comparator are discussed .moreover comparison has been made between architecture of ADCs. Read More...
|
VLSI DESIGN |
India |
503-505 |
121 |
Empower Data Purity Protection Using FMSR
-Suriya.R ; C.Thirumalai Selvan; V.Venkatachalam
Security of data in cloud storage against data loss is important, so adding algorithm for detection and correction for cloud storage, so in the cloud computing data integrity checking and recovery procedures, is critical. Regenerating codes splitting and verify the data in multiple servers using cryptographic algorithms and MAC verification. To implement the data integrity protection (DIP) scheme for some specific regenerating code to solve the problem of data loss, DIP scheme used some property that enables a client to verify the data in cloud storage system. Read More...
|
COMPUTER SCIENCE AND ENGINEERING |
India |
506-508 |
122 |
Ranking Model For Domain Specific Search
-Priyanka Jadhav ; Vaishali Pawar; Chaitali Jadhav; Nidhi Sharma
Learning to rank is an important area at the interface of machine learning, information retrieval and Web search. The technology has been successfully applied to web search, and is becoming one of the key machines for building search engines. The central challenge in optimizing various measures of ranking loss is that the objectives tend to be non-convex and discontinuous. In recent years, boosting, neural networks, support vector machines, and other techniques have been applied. To build a unique ranking model for each domain it time-consuming for training models. In this paper, we address these difficulties by proposing algorithm called ranking adaptation SVM (RA-SVM).Our algorithm only requires the prediction from the existing ranking models, rather than their internal representations or the data from auxiliary domains. Read More...
|
Computer Engineering |
India |
509-513 |
123 |
A Cluster Based Weighted Rendezvous Planning for Efficient Mobile-Sink Path Selection in WSN
-V.Sowmitha ; V.Senthilkumar
Data collection and Aggregation is most important task in the large –density applications of wireless sensor network. In the existing system, a mobile-sink node visits Rendezvous Points (RPs), as opposed to all nodes for data collection. Due to processing overhead of Rendezvous point is not appropriate for large scale applications. To overcome this problem, the proposed method is a Clustering Based Weighted Rendezvous Planning (CBWRP) algorithm. The sensor nodes are organized into clusters and each Cluster Head (CH) has a responsibility for collecting data from each sensor node and transmits data to nearest Rendezvous Point. High Energy First (HEF) clustering algorithm is used for selecting node as CH which has more residual energy. The travelling path of Mobile Sink (MS) to visit all Rendezvous point which can be obtained by Weighted Rendezvous Planning (WRP) which can be calculating weight for each sensor node which can be computed by hop distance and number of packets forwarded. An NS2 simulation demonstrates CBWRP reduces energy consumption and increases network lifetime as compared with existing algorithms. Read More...
|
Computer Science and Engineering |
India |
514-517 |
124 |
Design, Modeling And Analysis Of VSA Bracket
-Er. N. BALASUBRAMANYAM ; Er. N. Balasubramanyam ; Prof. Smt. G. Prasanthi ; Er. P.Gnana Prakash
VSA modulator bracket is used to hold the modulator, which gives stability for the vehicle. The aim of the project is to design a low cost sheet metal and weight optimized bracket from the existing casting bracket. The functionality of this bracket is to withstand the external loads and to reduce the transfer stiffness for frontal crash. Design and optimize a low cost stamped steel VSA bracket meeting all the criteria for assembly, packaging, manufacturing, Structural behavior / functional performance being optimized for weight and cost. This project work involves the modeling of using CATIA; the preprocessing is done in HYPERMESH and analysis of using different materials in ANSYS software’s. Read More...
|
Mechanical Engineering |
India |
518-521 |
125 |
Structural Properties of Antimony Substituted Lithium Ferrites Sintered at High Temperature
-Dr.M.V.K.Mehar ; P.S.Bramhachary; D.RamaRao; Prof. K.Samatha
Antimony substituted lithium ferrites with compositional formula [Li0.5+x Sbx Fe2.5-2x] O4 (where x = 0.0 to 0.5 insteps of 0.1) were prepared under standard ceramic method. The bulk and theoretical densities were determined. Bulk density is decreasing up to x=0.3 then increases with gradual increasing the concentration. Similarly theoretical density (dx) decreasing up to x=0.3 and then increases. From X-ray studies the spinel structure and belonging Fd3 m spce group is confirmed. The lattice parameter was found to be decreases up to =0.3 then it increases with increase in antimony substituent concentration. The other parameters like Oxygen positional parameters, tetrahedral and Octahedral bond lengths, tetrahedral edge, shared and unshared octahedral edge lengths were calculated and found to be increase with substituent concentration except for x=0.3 samples. Read More...
|
Solid state Physics |
India |
522-525 |
126 |
Cooling load Estimation of Air Conditioning in Lecture Halls of Engineering Institute
-Dhananjay Kumar Yadav ; Preeti Rao; Dr. J. K. Tiwari
In this paper the main concern on cooling load calculation and human comfort in Parthivi Engineering College and management, the central air-conditioning system is a process of controlling the air temperature, relative humidity, ventilation, air movement and air cleanliness of a given space in order to provide the occupants with a comfortable indoor temperature in class room of the engineering college. The objective of this project is to cooling load estimation of the engineering college class rooms and air conditionings used in class rooms for efficiently remove from the air micro-organisms, dust, and soot. So properly maintained air-conditioning system does not cause or promote illness, despite superstitions that air-conditioning is unconditionally dangerous to one’s health. Read More...
|
Mechanical Engineering |
India |
526-529 |
127 |
A Review on Optimization of Combustion
-Ritesh Rana ; Vishal Jain
Optimization of Combustion in pulverized coal fired boiler is more important to improve the performance of power plant. The objective of the work is to optimize the combustion in pulverized coal fired boiler in order to improve the boiler efficiency and reducing coal consumption and net heat rate heat of the plant. The study involves boiler performance testing by controlling secondary air supply using dampers & Air fuel ratio and improvement in boiler efficiency and reduction in consumption rate will be calculated. Read More...
|
Mechanical Engineering |
India |
530-534 |
128 |
SmartStudent: A Curriculum Management System based on Android OS
-Abhisar Bharti ; Pratik Bhagwat; Swapnil Jadhav; D. R Ingle
Today mobile computing is being found everywhere across many areas including education. Many of the education-based application are focused towards student as the end-user. We as a student also wanted an application focusing on overall curriculum management of college with contribution of teachers as well. In this regard, we have developed and are testing a mobile application SmartStudent for use by both the student and the instructor in the classroom. SmartStudent application will allows student to have better interaction with the teachers and vice versa. It will allow teachers to take attendance, share file with students, and respond to student’s doubt. Student functionality includes the ability to interact with the instructor, check attendance, ask doubt and provide feedback on lectures. SmartStudent is designed with a cloud computing architecture. This paper will describe SmartStudent’s functionality and design, its use in the classroom, instructor experience and feedback on the tool, and future plans. Read More...
|
Computer Engineering |
India |
535-537 |
129 |
Security Enforcement And Query Routing On Privacy Preserving Information Brokering System
-Swanuja Mandhare ; Ketaki Thakar; Kiran Yesugade
Nowadays in organizations information sharing has been increased via on-demand access. Information brokering systems (IBSs) have been proposed to connect large-scale loosely federated data sources via a brokering overlay, in which the brokers make routing decisions to direct client queries to the requested data servers. Some of existing IBSs assume that brokers are trusted and thus only adopt server-side access control for data confidentiality. However, privacy of data location and data consumer can still be inferred from metadata (such as query and access control rules) exchanged within the IBS, but little attention has been put on its protection. With this the privacy concerns arise, as brokers are no longer assumed fully trustable – they may be abused by insiders or compromised by outsiders. For overcoming this, a novel IBS, named Privacy Preserving Information Brokering (PPIB) has been proposed. In this paper, we propose a novel approach to preserve privacy of multiple stakeholders involved in the information brokering process. PPIB has three components: brokers, coordinators and central authority. We are among the first to formally define two privacy attacks, namely attribute-correlation attack and inference attack, and propose two countermeasure schemes automaton segmentation and query segment encryption to securely share the routing decision-making responsibility among a selected set of brokering servers. The PPIB scheme is improved by supporting site distribution and load balancing mechanism. Workloads of peers and each peer’s trust levels are integrated with the site distribution process. With the comprehensive analysis on scalable privacy and load balancing we show that the propose system can integrate security enforcement and query routing while preserving system wide privacy. Read More...
|
Computer Engineering |
India |
538-541 |
130 |
EXPERIMENTAL INVESTIGATION OF CENTRIFUGAL PUMP REGULAR AND REVERSE MODE
-prof.Jayendra B Patel ; prof.Ajaypalsinh G Barad; prof.Rajesh V Chaudhari; prof. Manish D Patel; prof.Harshad C Patel
Pumps as turbines have been successfully applied in a wide range of small hydro sites in the world. Since the overall efficiency of these machines is lower than the overall efficiency of conventional turbines, their application in larger hydro sites is not economical. Therefore, the efficiency improvement of reverse pumps is essential. In this study, by focusing on a pump impeller, the shape of blades was redesigned to reach a higher efficiency in turbine mode. After each modification, a new impeller was tested in the test rig. The efficiency was improved in all measured points by the optimal design of the blade and additional modification as the rounding of the blade’s profile in the impeller inlet and hub/shroud inlet edges in turbine mode. Experimental results confirmed the numerical efficiency improvement in all measured points. This study illustrated that the efficiency of the pump in reverse operation can be improved just by impeller modification the effects of impeller rounding on a combination of radial flow and mixed flow pumps as turbines using experimental data. The impeller rounding is seen to have positive impact on the overall efficiency in different operating regions with an improvement in the range of 1–3%. The behavior of the two control variables have been elaborately studied in which it is found that the system loss coefficient has reduced drastically due to rounding effects, while the extent of changes to the exit relative flow direction seems to be limited in comparison. The larger picture of impeller rounding has been discussed in comparison with performance prediction models in pumps as turbines. The impeller rounding technique is very important for performance optimization and recommends its application on all pump as turbine projects. Read More...
|
Mechanical Engineering |
India |
542-545 |
131 |
Advanced Algorithm for Decision Support System using Sentiment Classification
-Shweta Thorat ; Vishakha Warke; Priyanka Mahale; Kanchan Pawar; Prof. C. R. Barde
Today we find that there are number of shopping web applications available on the internet like jbong.com, flipkart.com etc. More and more products are sold on the web also more and more people are buying products online. People from all over the globe use these websites and order using these websites. In order to improve the sales of a product and to enhance customer satisfaction, Most of the online sites give opportunity to customer to provide reviews on the products that they purchased and about service. As many users becoming comfortable with the Web, an increasing number of people are writing reviews. Hence, now a day the number of reviews that a product receives grows rapidly. Many popular products can get hundreds/thousands of reviews. Manual classification of such large number of reviews is practically impossible. Aim of Sentiment classification is to automatically predict sentiment polarity (positive or negative) of reviews provided by users. Traditional classification algorithms are also used to train sentiment classifiers from manually labeled text data, but the labeling work is time-consuming and expensive. Users often use some different words when they express opinion on the products that they have purchased. Different sentiments are expressed differently in different domains, and adding corpora for every possible domain of interest is costly. Applying a sentiment classifier trained for a particular domain to classify sentiment of user reviews on a different domain shows poor performance because words that occur in the train domain might not appear in the test domain. To overcome this problem we propose a method in cross-domain sentiment classification. We analyze the customer reviews according to polarity. Polarity can be given in 3 ways that is positive, negative and neutral. First of all our system checked, on which product or group of products, the customer give the reviews, then we find out a keyword and their attributes. As get the pair, we assign a polarity using sentiment classification. We will take the reviews from the customer in the form of checkboxes, textbox etc. Then, we will help the owner to determine a polarity of each product in a particular region. Read More...
|
Computer Engineering |
India |
546-549 |
132 |
Dynamic Consolidation of Virtual Machines in Cloud
-Padma Priya.V ; Ranjana.r
Cloud computing has revolutionized the information technology industry by enabling elastic on demand provisioning of computing resources. Cloud data centers consume enormous amounts of electrical energy resulting in high operating costs and carbon dioxide emissions. The goal is to improve the utilization of computing resources and reduce energy consumption under workload independent quality of service constraints. One method to improve the utilization of data center resources, which has been shown to be efficient, is dynamic consolidation of Virtual Machines (VMs). Energy consumption is reduced by dynamically deactivating and reactivating physical nodes to meet the current resource demand. We propose an optimal offline algorithm for the host overload detection problem, as well as a Markov chain model that allows a derivation of an optimal randomized Control policy under an explicitly specified QoS goal for any known stationary Workload.. Here going to implement by using CloudSim Tool Kit by creating Data Center, hosts, Broker, Virtual Machine etc. Read More...
|
COMPUTER SCIENCE ENGINEERING |
India |
550-552 |
133 |
Minimization of Gas Porosity Through Casting Simulation Tool for Sand Casting
-Sachin L. Nimbulkar ; Dr. Rajendra. S. Dalu
Porosity is the one of the defects most frequently encountered in ductile iron casting. Porosity formation cause costly scrap loss and limits the use of cast parts in critical high strength applications. The amount of porosity is closely related to sand casting processes parameters. A considerable reduction in porosity formation can be obtained using optimization technique in the sand casting process. Casting is a manufacturing process to make complex shapes of metal materials in mass production may experience many different defects such as gas porosity, pin holes, blow holes, shrinkages and incomplete filling. The Gating/riser system design play very important role for improving casting quality. Due to the lack of scientific procedures the design process is normally carried on a trial-and-error basis. The main objective of this paper is to redesign the components using Auto-CAST X1 simulation software and increases the product life. Many researchers reported that 90% of the defects in casting are obtained only because of wrong design of gating and feeding system and only 10% due to manufacturing problems. In this paper to study the solidification behavior of material, detection of hot spots, blow holes and removed such defects in the casting with the help of mentioned casting simulation software. The simulated results also compared with experimental results. Read More...
|
Mechanical Engineering |
India |
553-557 |
134 |
An approach to enhancement in security using elliptic curve cryptography over RSA
-Dileep Kumar Agarwal
Due to the huge amount of data transmitted along with securing data content is becoming more important concern. Data encryption is widely used to ensure security in open networks such as the Internet. Development of cryptography research and enhancement of computer technology, the capabilities of cryptosystems such as RSA and Diffie-Hellman are inadequate due to the requirement of large number of data. The cryptosystem based on Elliptic Curve Cryptography is recently gained a popularity in industry. ECC Encryption and decryption methods can only encrypt and decrypt a point on the curve and not messages. The Encoding (converting message to a point) and Decoding (converting a point to a message) are important functions in encryption and decryption in ECC. This paper investigates the improvement of performance in security of text, images, audio based application using Elliptic Curve Cryptography (ECC) algorithm and evaluate the effectiveness of ECC over RSA algorithm. For the similar level of security for currently known attacks, elliptic curve based systems can be implemented with smaller parameters, leading to significant performance advantages. In the present study the performance advantages of elliptic curve systems are highlighted by comparing their performance with RSA based systems. The elliptic curves considered in the study are defined over Zp, called the prime curves and all the mathematical operations of ECC is defined over the elliptic curve y2 = x3 + Ax + B, where 4A3 + 27B2 ≠0. ‘A’ and ‘B’ are called curve parameters and different values of these parameters define different elliptic curve. The public key is a point (x, y) lying on the curve and the private key is a random number. The public key is obtained by multiplying the private key with the generator point G in the curve. The generator point G, the curve parameters ‘A’ and ‘B’, together with few more constants constitutes the domain parameter of ECC. One main advantage of ECC is its small key size. A 160-bit key used in ECC is considered to be as secured as 1024-bit key in RSA. Read More...
|
computer engineering |
India |
558-561 |
135 |
Image Denoising Using Cloud Model Filter
-D Sai Kumar ; R Arun Kumar; D Dedeepya
Image processing is the way of making the digital image to resemble the original image. It can be achieved by identifying the pixels that are different from the original image and then correcting the pixels to the required intensity. It is observed that techniques which follow the two stage process of detection of noise and filtering of noisy pixels achieve better performance than others. Classification is used to separate uncorrupted pixels from corrupted pixels. Reconstruction involves replacing the corrupted pixels by certain approximation technique. The performance of the proposed Cloud Model Filter is measured using the Peak Signal to Noise Ratio (PSNR) values. The PSNR values obtained for the restored image using the proposed filter is compared with the median filter. The performance of the filter is tested by taking various combinations of noisy images and varying the noise levels from 1percent to 100 percent. With any combination of noises, the proposed filter’s performance proved better than the median filter. Read More...
|
Image Processing |
India |
562-566 |
136 |
FER Performance of LDPC Based MIMO-OFDM System in Shallow Water Communication using 4-QAM
-Shailee Soni ; Prof. Kirtivardhan Jha; Prof. Soni Changlani
Various researches has been carried out to explore the effective ways of communication inside the water between the submarines or to collect information from sensors inside the water. To make it more reliable this paper proposed a methodology which utilizes the LDPC codes with the multiple input multiple output (MIMO) orthogonal frequency division multiplexing(OFDM) with BPSK and QAM modulation schemes. The wireless communication inside water is quite similar to outside of the water of this a little effect of rarer versus denser factor affects the communication, density of water is high and the transmission speed is generally 1500 m/sec. The FER performance is better compared to previous work and having optimum FER is 10-4.6. Read More...
|
Electronics & Communication Engineering |
India |
567-570 |
137 |
A Mobile Web Server
-Pradnya Gaikwad ; Priyanka Kumbhar; Rupali Mahakal; Pratibha Dekate; Sandeep Nagpure
In general the mobile device act as a client, because the conversion of IT and Mobile Computing domain the mobile device are also be viewed as a service hosting platform. Previously there is no any reason except the storage area for the mobile device to act as server because of less memory or less processing power, but due to the Smartphone’s are introduce in market the problem is no more. Now a day the mobile devices have that much storage space. We are proposing a mobile web server which is software that provides a mobile device such as a smart phone or tablet, the capability, to host web sites, web application, and web services. In this paper we are proposing a web server which can run on a mobile device such as a Smartphone. We are proposing an Android Application (App) through which it is very easy and convenient to host the web site. As a mobile phone contains quite a lot of personal data it is easy to semi- automatically generate a personal web site. The primary goal is to bring a full-fledged web server to Android and to make a web server running on a mobile phone accessible from the internet using any web browser. Read More...
|
computer Engineering |
India |
571-574 |
138 |
Comprehensive Survey on Image Feature Extraction Techniques
-Prashant Aglave ; V.S. Kolkure
Recent industrial applications require object recognition and tracking capabilities. These applications require real-time performance. Feature extraction is one of the most important steps for image processing. This feature extraction method is method to detect a particular object in image. So in this paper, we focus our review on the latest development in image feature extraction and provide a comprehensive survey on image feature extraction methods. Different algorithms are used for image processing like Scale-invariant feature transform (SIFT), Speeded Up Robust Features (SURF). This paper gives an overall idea of general methods of Feature extraction and gives significance of ORB over SIFT and SURF algorithm. Use of ORB provides rotation invariance of both train image and query image. Read More...
|
Electronics Engineering |
India |
575-577 |
139 |
Automation using Robot Programming by Demonstration Technique
-Tushar K Patil ; Dr. Shantanu K Dixit
Presently Programming the robot is a becoming daunting task. Inaccurate, inconsistent and unexpected results may be occurred because of Direct Programming of the robots & also it may take lots of time for programming. Also due to the costs involved in the development and maintenance of robot programming technique, automatic programming techniques and Robot Programming by (Human) Demonstration (RPD) techniques are currently attracting a lot of interest. Paper aims to build a robotic arm, which is provided with the sensors to sense and record parameters and the motors to repeat an action that is demonstrated by the human, so that accurate and efficient program is being generated. RPD is an intuitive method to program a robot. A human demonstrator with his/her hand, teaches an action to the robot, by physically interacting with it to perform an action. This allows the measurement and recording of the human’s positional and other parameters that are relevant to perform the demonstrated action. Read More...
|
Electronics Engineering |
India |
578-581 |
140 |
Intranet Based Virtual Classroom Using Content Management System
-Vipulkumar Mahadik ; Gitanjali Mhaskar; Saket Misal; Prof. D. R. Ingle
In colleges, many times the faculty has to display student’s attendance, lecture notes, and assignments. A faculty typically keeps records of data about each and every student. Even for conducting a normal test or an aptitude test usually paper based test is taken into consideration. The sharing of knowledge is limited to books and not widespread up to the current existing technology. The goal of this project is to create a web based portal that will eventually depict a Physical classroom on a Virtual portal. This portal will be able to give a detailed report of attendance, a grade wise download section for the students to have their own copy of notes, pdf’s and presentations. In addition to these features we are also going to provide a separate section for carrying out tests. Those tests would be dynamic and objective based test for the students. It would help to decrease the time taken by human evaluation and fasten up the process.. A full detailed report of students would be generated. Finally there will also be a feedback section where the students would grade the lecture or the professor in the portal itself. For achieving this task we are going to make use of a “Content Management Systemâ€. The CMS which we are going to use is Drupal CMS. And this application would be deployed as on “Windows†framework and also an application for “Android†based devices. Read More...
|
Computer Engineering |
India |
582-584 |
141 |
Pc Prevention From Unauthorised Users
-Vaishali Sonawale ; Pradnya Pingat; Sachin Varade; Prof.Aruna Jadhav
This paper describes a method of implementing two factor authentication using mobile phones. The proposed method guarantees that authenticating to services, such as online banking or ATM machines, is done in a very secure manner. The proposed system involves using a mobile phone as a software token for One Time Password generation. The generated One Time Password is valid for only a short userdefined period of time and is generated by factors that are unique to both, the user and the mobile device itself. Additionally, an SMS-based mechanism is implemented as both a backup mechanism for retrieving the password and as a possible mean of synchronization. The proposed method has been implemented and tested. Initial results show the success of the proposed method. Read More...
|
Computer Engineering |
India |
585-589 |
142 |
Analysis of Induction Furnace Slag of Ferrous Foundry
-Mrunal V. Deshmukh ; Nilesh R. Vidhate
In process of cast iron and ductile iron production, secondary raw material and industrial wastes are formed. The most abundant waste originating in the process is induction furnace slag. Slags are compounds of oxides of metal & nonmetallic elements which form chemical compounds and solutions with each other and also contain small volume of metals, sulfides of metal and gases. This slag is disposed off the factory floor due to which land contamination takes place which decrease fertility of soil. Induction furnace slag contain about 10-15% metal. Most of industries prefer to ignore this precious metal. The paper presents analysis of induction furnace slag of ferrous foundry at Jadhao Steel Alloys. Read More...
|
Mechanical engineering |
India |
590-593 |
143 |
Application of Full Factorial Design to Optim0ize Solvent Free Microwave Extraction of Eucalyptus Citriodora Essential Oil
-Deepak Gupta ; Satyendra Singh Tomar; Meenakshi Kushwah; Shalini Gupta
The solvent free microwave extraction (SFME) of essential oil from eucalyptus was optimized using a full factorial design in terms of oil yield to determine the optimum extraction conditions. Several experiments were carried out with varying parameters like, extraction time, microwave power and type of sample for two level of each. The mathematical model applied form a first order regression equation. The predicted values calculated by the regression model were in good agreement values. The results showed that the extraction time is most prominent factor followed by microwave power level and sample type for extraction process. An average of 0.97 % of eucalyptus oil can be extracted using existing setup. The optimum condition for the eucalyptus oil extraction using SFME, were the extraction time 30 minutes, microwave power level 640 watt and sample type cuts sample. SFME proves a green and promising technique for essential oil extraction. Read More...
|
CHEMICAL ENGINEERING |
India |
594-596 |
144 |
Failure Analysis of Hydraulic Torque Wrench (Drive Shaft) - A Review
-Sumit N. Karanjekar ; V. N. Bhaiswar
In this paper the essential factors required for failure analysis of square drive shaft of hydraulic torque wrench are taken into consideration and discussed in brief. This failure of square drive shaft is taken place due to twisting force acting on the area of square drive shaft during testing of this tool. Hydraulic torque wrenches are designed to handle the toughest bolting jobs accurately and quickly. All models provide a torque accuracy of +/- 3%. All models incorporate an easily reversible high grade alloy steel (DMR 1700) square drive enabling the operator to quickly switch from tightening to loosening applications. DMR-1700 steel is a material used in hydraulic torque wrench for structural applications that has been recently developed at Defence Metallurgical Research Laboratory by changing the chemistry of alloying elements. On the basis of studies by different techniques, DMR-1700 steel is recommended for the manufacture of components used in various systems in conjunction with the application of various defence service and power tool manufacturing. So in this paper the essential factors for failure analysis of square drive shaft of hydraulic torque wrench are discussed in brief. Read More...
|
Mechanical Engineering |
India |
597-601 |
145 |
Effect of Baffle Geometry on Shell and Tube Heat Exchanger- A Review
-Hardikkumar Natvarlal Tandel ; P.D. Ahir; Y.D. Vora
Shell and tube type heat exchanger is used as universal equipment in many industrial departments, such as chemical industry, oil refining process, power plant, food industry, and so on. Heat exchanger is playing an important role in product quality, energy utilization and system economic and reliable performance. In recent years, there have been significant researches on the performance of shell and tube heat exchanger especially on the effect of baffle inclination angle, space, types upon heat transfer and pressure drop. The objective of this paper is to present the different effect of baffle on the pressure drop, overall heat transfer coefficient and other parameter. Read More...
|
Mechanical Engineering |
India |
602-607 |
146 |
Emergency Management System (EMS): Android Based Rescue Application Using Vertical Partitioning For Data Security
-Bhapkar Manisha Tulashiram ; Manisha Bhapkar; Arti Walunj; Dadasaheb Didwagh; Amol Navale
This application is useful for communicating during any emergency or disaster, when any emergency occurs this is very important for both victim and rescue team. To get fast response in any critical condition infrastructure, wired and other medium are often lost. In this paper we present Emergency Management System a self-learning System based on ad-hoc System. This application enables smart phone which based on ad-hoc system to communicate during disaster time over Wi-Fi. EMS smart phone establish communication using sophisticated mechanism which performs a transparent classification and match the request to peers in ad-hoc network. Matching the request to reach the best matching use. These systems enable or allow best peers matching across the ad-hoc network. As per hop-by-hop basis. In timely and power conservative manner. We tested the system using android mobile phone with GPS on the phone. Location updates are sent with each request. The EMS client is fully implemented as smart phone application or Android application on top of Haggle middleware. The EMS system consist of EMS server, which is only when communication available before and after disaster. Server is used for maintaining records of user, creating user’s profiles. Storing and updating user profile whenever communication occurs it will restored. Read More...
|
computer engineering |
India |
608-609 |
147 |
Privacy Preserving Authenticated Key Exchange over Cloud
-Rachna Pandita ; Ashvini S. Deshmukh; Trupti B. Bhong; Juhee A. Sonarkhan; Rachna Pandita
Key exchange for providing network security in particular Data encryption standard (DES) is the core cryptographic mechanism. For key exchange over the cloud security and privacy both are required. In this paper we have developed a family of privacy preserving authenticated DES algorithm both in traditional PKI setting and in the identity based setting. The newly developed DES are of conceptual level and practical based efficiency. It provides very useful privacy protection to protocol participants and add a new value to the IKE standard. As per our information, the protocols are the secure DES protocols which provide the following privacy protection advantages: 1) concurrent non-malleable statistical, forward deniability. 2) The session key and session transcript can be generated that cannot be traced to the pair of protocol participants. 3) Exchanged messages do not reveal the users identity and do not explicitly reveal the plays role information. Read More...
|
Computer Engineering |
India |
610-611 |
148 |
Fast and Enhanced Image Inpainting with a Single- image Super-resolution Algorithm
-Kavita W. Kimmatkar ; Sonali M. Bapat; Kamini G. Gangurde; Anuradha V. Khare; Yogini B. Kindre
The image processing has wide applications to deal with manipulation of digital images. There are various methods and procedures for interpreting digital images for image enhancement and restoration and performing operations on images such as blurring, zooming, sharpening, edge detection. The image restoration can also be referred as image inpainting. The image inpainting is the process which used to fill-in missing areas of the input images. This process can also be used to remove an object from the image, to restore an image. As compared to existing methods, several improvements have been done. These improvements are filling order computation and the combination of K nearest neighbours. The inpainted low -resolution image from the high-resolution input image allows to reduce computational complexity, less sensitive to noise and to work with the dominant orientations of image structures. From this inpainted low-resolution image, a single-image super-resolution is applied to reconstruct the high resolution image. The image inpainting has wide applications in digital camera and the digitalization of old photos. More than scratch removing, the image inpainting methods are also used for a text removal, an object removal and other automatic modifications of images, such as cracks in photographs or scratches and dust spots in film. It is also used to remove red eye, the stamped date from photographs. Read More...
|
computer engineering |
India |
612-615 |
149 |
Estimating the Shoot Dry Matter Production of Tea [Camelia sinensis (L.) O. Kuntze] of Cultivar TRI 2025
-H.A.S.L jayasinghe ; L.D.B Suriyagoda; A.S. Karunaratne; A. N. R. Weerawansha; M.A. Wijerathne
Three field experiments were conducted to study growth and dry matter production of shoots of tea cultivar TRI 2025. The study site was a smallholder tea farmer’s field at Hali Ela (South), 1178 m amsl. First experiment was carried out to study the changes in number of shoots in different growth stages (i.e. buds, bud with fish leaf, bud with one normal leaf, bud with two normal leaves, bud with three normal leaves and banjies) with time. Observations were taken for one year. In the second experiment, degree-days (thermal time) accumulated for producing different tea shoots in a plucking table of cultivar TRI 2025 were estimated. In the third experiment a mathematical model to predict the production of harvestable tea shoots was developed. There was a significant difference among the mean number of total shoots in the plucking table with time (i.e. month of a year) representing different growth stages (i.e. buds, bud with fish leaf, bud with one normal leaf, bud with two normal leaves, bud with three normal leaves). The highest number of total shoots was recorded in April 2014 (128.25±9.137) and lowest during the month of September 2013 (79.2±9.137) (P<0.05).The average leaf area (LA) (cm2) of shoots at different growth stages could be estimated as a function of cumulative thermal time (R2~1). Fresh weight of harvestable TRI 2025 tea shoots could be predicted with a high precision (R2=0.9). Read More...
|
Engineering Science and Technology |
Sri Lanka |
616-620 |
150 |
Data Partitioning and Recovery Using Cloud
-Sonali Bhimrao Kamble ; Sonali Bhimrao Kamble; Kavita Suresh Bhor; Renuka Dattatray Khatal; Varsha Manik Gore
Cloud storage able to remotely store and recover their data and use data when we want in efficient manner and client can work with the data without any difficulties of resources. In existing system, using dynamic data operation the data can be stored in cloud which makes user to make copy for verification and updation of data loss. In proposed system, partitioning method is used for avoid loss of data during the storing data in cloud. For the data recovery we use seed-block algorithm in proposed system due to this we can avoid the loss of data during the storage. Goal of this work is storing data in cloud with confidentiality, integrity, availability, privacy issues and avoiding attacks also. Hence during the storage of data the space, cost is reduced and also it takes less time. Read More...
|
Computer Engineering |
India |
621-623 |