No. |
Title and Author |
Area |
Country |
Page |
1 |
METHODOLOGY FOR MULTIBODY DYNAMICS OF LIGHT MOTOR VEHICLE - A REVIEW
-SAMRAT S. SHENDE ; Dr. S. K. CHOUDHARY; A. P. NINAWE
This paper presents the methodology for multibody dynamics of light motor vehicle with the related search. The study specifies factors influencing the motion of light motor vehicle. These are based on a systematic study of dynamic forces acting on the vehicle body and analysis of stresses acting on it. For which we consider literatures reviews & some of them are explained. Read More...
|
MECHANICAL ENGINEERING |
India |
1-2 |
2 |
Power and Area Efficient Full Adder Design using High Performance CMOS Technology
-Shagun Sharma ; Er. Ankita Mittal
This paper presents the realization of full adder designs using Complimentary CMOS Design, Complimentary Pass Transistor Logic Design. The main motive of this paper is to determine the comparative study of power, surface area and complexity of Full adder designs using CMOS Logic Styles. The conventional design consists of 28 transistors and proposed design consists of 10 transistors. Simulations results clearly determine that proposed Full adder Design is better compared to conventional design. Transistor Design with respect to power, delay, Power Delay Product Comparison. Read More...
|
Electronics and communication |
India |
3-6 |
3 |
Filtering of Unwanted Messages and Phishing Links on OSN Wall
-Vaishali Ashok Bhagat ; Tejashree Dhole; Neha Hivarkar; Varsha Bhosale
OSN system is a powerful tool to prevent users to avoid their walls getting overwhelmed by unwanted data. Thus, it provides a classification mechanism to sort unwanted text and images. On contrary it also supports phish link detection mechanism. The links that possess catastrophic results are detected and alerted. OSN system is mainly used to provide security environment on internet. To detect phish links an anti-phishing algorithm is used called ObURL which has six different steps to filter the links. Read More...
|
Computer Engineering |
India |
7-10 |
4 |
Study and Analysis of Wavelet Based Image Compression Algorithms: A Review
-Jyoti Kadam ; V.S.Kolkure
Image compression means reducing the image size without any effect on the quality of image. Due to this compression maximum number of images to be stored in the available memory space. In this paper we discuss about image compression, types of compression, types of redundancy, and algorithms of image compression. There are many algorithms available in the image compression, but now days wavelet transform based image compression algorithms are mostly used. In this paper we review about two wavelet based algorithms SPIHT (Set-partitioning in Hierarchical Trees), EZW (Embedded Zero-tree Wavelet). Read More...
|
Electronics engineering |
India |
11-13 |
5 |
EtherCAT Technology for Reliable Industrial Communication Networks
-Vincent Rutagangibwa
The modern developing communication industry requires increasingly faster, more throughput and reliable com-munication networks which are able to work in a hard real-time situation. This paper presents the EtherCAT communication technology that does not only meet the above requirements but also allows market to reduce implementation costs in order to have affordable and reliable services. The paper further explains the EtherCAT operation principles with the most important mechanisms such as Frame processing on-the-fly, logic ring topology and slave synchronization among other mechanisms. The comparison of EtherCAT with the traditional most pop-ular industrial based networks is also presented to show the leading position of this upcoming technology in the Industrial communication networks in terms of reliability, performance, implementation and cost. Read More...
|
Electronics and Communications Engineering |
India |
14-18 |
6 |
Efficient Combination Scheme for Arrhythmia Detection Using ECG Signals
-REVATHI ; L.Vanitha; G.Revathi
Arrhythmia is a health problem and it is a drastic cause for many kinds of heart diseases. Some arrhythmia may even cause to death. The main objective of this work is to combine the decision of each classifier in an efficient way to improve the classification accuracy of the classifiers to predict the disease. As different classifiers provide different opinion to the target system, the combined decision will provide more robust and accurate result. The HRV parameters obtained from the ECG of normal and the arrhythmia affected patients is used for classification. Combination of classifiers like k-Nearest Neighbor (k-NN), Principal Component Analysis (PCA), Probabilistic neural network, Decision tree and Adaptive boost classifier is used in this work. The choice or judgment of the efficient classifiers is selected and combined using majority voting system for detection of final classification. Read More...
|
signal processing |
India |
19-22 |
7 |
Walking Accessibility for BRTS of Ahmedabad City- A Case Study
-Jinal Patel ; Neha Chaudhary; Aftab Mansuri; Prof. Manjurali I. Balya; Prof. Yogesh S. Patel
Public transportation is one of the most important component of urban transport system, particularly in pace of rapid urbanization in Ahmedabad city. Today in the city, the utilization of Bus Rapid Transit System (BRTS) is increasingly day by day looking for cost effective transit solutions and for environmental concerns. But the problems facing by the users to use this system are poor accessibility status. For effective planning, it is quite essential to understand the degree of accessibility of BRTS. BRTS accessibility can be considered as one of the vital factor to integrate the land use and bus route network system to promote the public transit system. The present paper focuses on measurement of walking accessibility of BRTS taking one route name as RTO to Memnagar as a case study. Read More...
|
Civil Engineering |
India |
23-26 |
8 |
Methodology for Design and Analysis of High Mast Solar Light Pole-A Review
-Miss Dipali.C. Bhoyar ; Dr. A. V. Vanalkar
This paper reports on a long-term in-depth field experimental study on the behavior and dynamic response of high-mast lighting structures being conducted in response to recent static Loading failures. The initial results of the study and suggested strategies for design, inspection and maintenance of these fracture critical structures are summarized. Read More...
|
MECHANICAL ENGINEERING |
India |
27-29 |
9 |
Computer Forensics: A Forensic Approach to Recover Encrypted Data from Digital Evidences
-VIBHUTI NARAYAN SINGH ; SHALINI
Nowadays use of computers, mobile phones and external storage devices gain popularity among the population for storing their private data. To ensure privacy of these files user uses encryption software’s such as bit locker, true crypt etc. These software encrypt data, storage devices etc. and once the data is encrypted it is impossible to read these files without decryption key. In this research we demonstrate a methodology for decryption and extractions of bit by bit information stored in these types of files by using appropriate tools under forensically sound condition and also discussed a method for recovery of password from these files using hibernating files. Read More...
|
Cyber Forensics |
India |
30-35 |
10 |
SECURE DATA TRANSMISSION WITH HYBRID CRYPTOGRAPHIC TECHNIQUE IN WIRELESS SENSOR NETWORKS
-B.PRADEEPA ; C.ANAND; R.K. GNANAMURTHY
Denial of service (DoS) attack cause severe crash on computing system. To shield our system from dos attack is a crucial task. In the existing system, Multivariate Correlation Analysis (MCA) procedure is used to sense the attacks by anomaly detection method. This gives contribution capable of detecting recognized and unidentified dos attacks successfully by knowledge the prototype of genuine network traffic only. But this method cannot recognize some unfamiliar dos attack. To conquer this dilemma, the proposed method employs two cryptographic system which gives security to both the data and users. Polynomial bi-variate key endow with security to the users by detecting the authorized users to admittance the data in the network. One way hash chain algorithm endow with security to the data. In this system, hash data and wrapped key is an additional security added by every intermediate node. In conclusion the destination user decrypt all the hash data and keys gets the unique message. These methods will exactly sense the attackers. Read More...
|
COMPUTER SCIENCE AND ENGINEERING |
India |
36-39 |
11 |
Analysis of Attack in Infrastructure as a Service Cloud
-Harish Gujiri ; Amol Chavhan; Prashant Shenavi; Prof. Sulakshana Mane
Cloud computing this name is one of the latest and emerging technology in today’s IT world, which has great effect on different users. Cloud computing is expected to become common solution to a great extent for deploying applications, providing storage and virtual OS. It has a capacity such that it can be used maximum by IT developers for infrastructure management tasks, thus it is reducing the overall estimated costs and services time to market. Using cloud an organization can focus on business idea and get with new milestone instead of IT infrastructure which is cheaper today. Read More...
|
Compuer Engineering |
India |
40-41 |
12 |
MECHANICAL PROPERTIES OF CONCRETE USING BOTTOM ASH AS PARTIAL REPLACEMENT FOR FINE AGGREGATE
-PRASANNA.V ; Mr.A.Anna Durai
This investigation in concrete is about the feasibility and usage of washed bottom ash (WBA). It can be used as a replacement for fine aggregate. In order to study the mechanical properties of concrete, M25 grade was fixed .Cubes, cylinders and prisms were casted and cured for 28 days. Cubes are tested for compressive strength, cylinders for splitting tensile strength and prisms for flexural strength. The usage of WBA is definitely better than control concrete and hence it is highly advisable. All tests and discussions are explained better. Read More...
|
CIVIL ENGINEERING |
India |
42-43 |
13 |
Balanced-LEACH-C:An Algorithm for Efficient Energy Consumption In WSN
-Richa Budhiraja ; Er. Saranjeet Singh
This paper considered a balanced LEACH-C algorithm in the selection of Cluster Head (CH) that achieves equidistribution of energy and node balancing among clusters that results in delayed network disintegration. LEACH-C algorithm is replaced by Balanced LEACH-C where the size of cluster plays an important role in creating a cluster structure. The Balanced LEACH-C protocol has been compared random LEACH LEACH-C algorithm for energy equi-distribution and load balancing among clusters. Wireless sensor network (WSN) is simulated using a MATLAB programming and power consumption algorithms take into consideration all aspects of power consumption in the operation of the node. The Balanced LEACH-C routing protocol shows improvements in respect of overall disintegration of network as well as lifetime. Read More...
|
Electronics and communication engineering |
India |
44-47 |
14 |
Optimizing Performance of Slotted IEEE 802.15.4 Mac For Cap And GTS Allocation Using Stochastic Petri Nets
-Shyo Prakash Jakhar ; Mahendra Kumar Beniwal
Wireless Sensor Networks (WSNs) have been attracting increasing interest for supporting a new generation of ubiquitous computing systems with great potential for many applications such as surveillance, environmental monitoring, health care monitoring or home automation. The IEEE 802.15.4 protocol proposes a flexible communication solution for Low-Rate Wireless Local Area Networks including sensor networks. It presents the advantage to fit different requirements of potential applications by adequately setting its parameters. When enabling its beacon mode, the protocol makes possible real-time guarantees by using its Guaranteed Time Slot (GTS) mechanism. In this work, the performance of both the modes of data transfer- the CAP and the GTS allocation mechanism in IEEE 802.15.4 is analyzed using stochastic model. The analysis gives a full understanding of the behavior of the CAP and GTS mechanism with regards to delay and throughput metrics. Accurate modeling of the delay constraints using GTS, considering acknowledgement signal by physical and network layer is provided. When addressing applications with soft or hard real timing requirements some inherent paradoxes emerge, such as power-efficiency versus timeliness. Consequently, there is the need of engineering solutions for an efficient deployment of IEEE 802.15.4 in such scenarios. This work also provides the optimum energy consumptions as a function of duty cycle is evaluated using various system parameters considering the number of nodes in the system and the probability distribution of number of GTS requests. Analytical modeling is done using Stochastic Petri Nets (SPN) and simulation is carried out in MATLAB and results are compared with those analytically computed. Read More...
|
Wireless Sensor Networks |
India |
48-56 |
15 |
Solid Waste Management of Bidar City
-Kamaladevi ; Saraswati Reddy
Due to rapid industrialization, education, business activities, software development population of Bidar city of Karnataka state of India is increasing day by day, present population of Bidar city as per 2011 census is 257644 hence increasing solid waste generation. Around 0.35kg/person/day solid waste is generated and around 90 ton wastes are dumped in dumping site daily. Collection and transportation is one of the important functional components of solid waste management. Thus to keep city clean and environmentally healthy, the management of solid waste has now becoming an important issue, therefore undertaken to generate information on physical and chemical parameters and route optimization of Bidar municipal solid waste. The average results showed that municipal solid waste in the city i,e moisture content is 30.02% by weight of fresh waste. And the average density of waste is being 304.2kg/m3. The other parameters in the physical analysis like paper, plastic, metal, glass, rubber & leather, stone & brick, ash & earth and total compostable matter are 6.13%, 6.27%, 4.34%, 3.77%, 4.54%, 10.99%, 18.71%, 31.98% having their average percentage values respectively. In the chemical analysis the pH of the waste is slightly acidic having an average value is 6.8, the high calorific average value is13.64k.j/kg carbon, nitrogen, phosphate are 25.50%, 13.11%, 0.44% having their average values respectively. And volatile matter 73.75% and non-volatile matter 26% having their average percentage values. Read More...
|
Environmental Engineering |
India |
57-62 |
16 |
A Survey on Detection Tools and Prevention Techniques for Session Hijacking Attack
-D.Madhavi
Session Hijacking is the process of accessing the session by stealing session ID or Cookies. In session hijacking attack, unauthorized person can impersonate one of the sessions of a victim and takes control over it like a legitimate user. It is a one of the most dangerous attack performed on transactions done over a network like E-commerce, which handles the confidential or sensitive information over a web. There is no other way to avoid this attack, unless until first need to detect and then prevent it. This paper examines the closer look at the detection tools and prevention techniques that are used to prevent the session hijacking attack. Read More...
|
Information Technology |
India |
63-66 |
17 |
Web Application Attack and Countermeasure
-Pawar Puja Uday ; Soni Varun; Lakshane Pooja; Prof. Sulakshana Mane
Adoption of internet for business operations has changed the face of business interactions in business 2 business (B2B), business 2 consumer (B2C) or now popular consumer 2 consumer (C2C) models. Applications are built to adapt this changing business perspective and thereby giving more and more control to the end user/consumer to define the way they want to make the business happen. But as we say, each coin has two sides, with flexibility there comes a great responsibility of maintaining the sanity of the information, which these applications access and publish on the internet. The thought of increase of cyber terrorism and espionage incidents has triggered a worldwide uncertainty of ever increasing dependency of internet as a business medium. This paper hereby attempts to address these problems by taking references from the well-known attack vectors and thereby providing counter measures to identify, analyze and mitigate the problem. This paper primarily takes the reference from Open Web Application Security Project (OWASP) guidelines. Read More...
|
Computer Science |
India |
67-68 |
18 |
Vehicle diagnostic and tracking using Smartphone and GPS
-Vinayak Thorat ; Bhanudas Shivekar; Abhishek Randhave; Sachin Gude
The system proposed a real low cost design of vehicle diagnostic and tracking unit using Smartphone and GPS. System monitors a vehicle’s performance and traces the location by communicating the obtained data to a mobile device using Bluetooth. Then the results can be viewed by the user to check fuel consumption and other essential vehicle electromechanical parameters. Data can also be sent to the vehicle’s maintenance department which is useful to detect and guess faults in the vehicle. This is done by collecting live readings from the engine control unit (ECU) uses the vehicle’s built in on-board diagnostics system (OBD). An electronic hardware unit is built to perform the interface between the vehicle’s OBD system and a Bluetooth module, which in part communicates with Smartphone. The Smartphone is able to transmit data to a server using cellular internet connection. Read More...
|
Computer Engineering |
India |
69-72 |
19 |
Automated Student Informatic System for College
-Nikita Pradeep Ghodke ; Nikita Pradeep Ghodke; Akshay Deepak Nakti; Rahul Bhagwat Waghmare; Prof. B.W.Balkhande
Today, with the advent of internet, Technology has gone far beyond. A single click and you have everything at your doorstep. All the industries have adapted to follow computer-based systems. The Mission of Student Information System is to provide Integrated Information Technology Environment for Students, HOD, faculty, staff, and administration. Student Information System is web-based self-service environment for students, departments and administrative process too. This easy to use college administration web-based service will prove to reduce time spent on administrative tasks and also reduces effort of students by eliminating the manual work of filling forms. Student Information System tracks all the details of a student from the day one to the end of his course which can be used for all reporting purpose, tracking enrollment, progress in the course, completed semesters years, final exam results and all these will be available for future references too. Read More...
|
Computer Engineering |
India |
73-76 |
20 |
Literature Review on Video Streaming in Social Networks
-R.Dhanya ; Anantharaman.G.R
Video Streaming is transferring video from one location into another. Video streaming has become more and more popular business video streaming applications such as YouTube accounting for a large quantity of Internet traffic. Using the cloud, user can stream any video from any video provider service to social network services. User, whereas streaming some kind of video in wireless network over the web, traffic can occur in this streaming. Because of this traffic, we tend to get a poor service quality of video streaming like long buffering time and intermittent disruptions. In this paper, I surveyed some completely different video streaming concept and technique to enhance the quality of videos. Read More...
|
Computer Science Engineering |
India |
77-79 |
21 |
A Survey on MR-MNBC:MAX-REL based Feature Selection for the Multi-Relational Bayesian Belief Network
-Disha Sheth ; Premal Patel
High dimensional data often contains irrelevant features that reduce the accuracy of data mining techniques and slow down the process and it is hard to interpret so the Feature selection has become an active area in the data mining. Feature selection selects the relevant subset of attributes, provides the better accuracy and improves the comprehensibility of the models. Feature selection also defying the curse of dimensionality to improve prediction performance. We will propose the method which is based on Feature selection as a preprocessing task of MRDM on probabilistic model. We analyzed our algorithm over large pkdd dataset and get the better accuracy compare to the existing methods. Read More...
|
COMPUTER ENGINEERING |
India |
80-84 |
22 |
Make in India: Issues and Challenges - A Paradigm Shift
-Prof. J.K.Nathani ; Prof. V.A.Parikh
‘Make in India’ is an international campaign slogan coined by Hon’ble Prime Minister to promote India as a destination for foreign investment. The authors have made an attempt to identify major issues and challenges that may be tackled swiftly and smartly to feature India as a global manufacturing hub for addressing its multi-socio economic issues. At the end authors also hope to provide big thrust to this campaign in the Union budget 2015-16 for boosting manufacturing sector, reviving economy and making the Prime Minister’s vision of helping the ‘poor reach to middle class faster’, a reality. Read More...
|
Engineering Management |
India |
85-87 |
23 |
Location Based Services-Android App
-Ashwini Uttam Koli ; Sushma Jaganaath More; Priyanka Krishna Sawant; Prof.B.W.Balkhande
Initially mobile phones were developed only for voice communication but now days the scenario has changed, voice communication is just one aspect of a mobile phone. There are other aspects which are major focus of interest. Two such major factors are web browser and GPS services. After the release of android based open source mobile phone a user can access the hardware directly and design customized native applications to develop Web and GPS enabled services and can program the other hardware components like camera etc. In our project we are developing android application that give the information about user location and provide additional features to make it more useful and user friendly. Read More...
|
Computer Engineering |
India |
88-91 |
24 |
Level of Service Analysis on Volume Capacity Ratio at the Intersections of OMR Stretch (Chennai)
-Sivaprakash G
The challenges of the urban transportation in India are growing rapidly, and government agencies at various levels are taking steps to address the performance gaps in service delivery. The study deals with the analysis of service levels at the intersections of Old Mahabalipuram Road stretch (OMR) in Chennai. The traffic volume is counted with the photographic method by taking video graphic survey and the classified count of vehicle is done. The volume to capacity ratio is found for the major intersections and is ranked with the level of service. Based on the level of service, the transportation engineers will be able to suggest a sustainable solution for the traffic congestion. The travel time in the major arterial roads can be effectively improved and forecasted for the future travel demand. Read More...
|
Transportation Engineering |
India |
92-94 |
25 |
Collusive challenging Piracy structure anticipation in P2P Network
-Sampada Sawant ; Shilpa Sawant; Dhanashree Yelmar; Prof. Torana Kamble
The idea behind collusive piracy is to detect pirates timely depends on timestamp token. The candid or legitimate clients are having that obey with the copyright law to share contents unreservedly. There are some pirates which has peers that are attempting to download the some content without paying or endorsement. We propose a scheme to stop colluders and pirates from copyright data in P2P file sharing. The colluders should not share copyrighted content files with pirates. Our aim is to stop collusive piracy within the frontier of P2P content liberation network. Our main focus is to stop colluders from releasing content files freely and disrupt pirate efforts from accumulating clean chunks. The content poisoning is implemented by discussing fraudulent of file requested by pirates. A copyright protected P2P network should beneficial to both the media industry and interact users. Read More...
|
Computer engineering |
India |
95-98 |
26 |
The Governance Tracking System: Proposed Online Forum for Interaction between Citizens and Representatives
-Kshitij Desai ; Aniket Salunkhe; Torana Kamble
Online discussion forums have become a popular web technology to build and support online communities for several engineering interest areas and practice. However, this technology is not been used for interaction between citizen and their representatives. In India we still rely on RTI Application to review what work has been done by MLA or MP and what kind of questions they have raised in assembly. Thus our portal will bridge this gap and serve as an online interaction forum for Citizens and Representatives. Instead of analyzing the data through manual means, we will utilize the Natural Language Toolkit (NLTK) to capture textual patterns and pull a Topic Modeling approach using Latent Dirichlet Allocation (LDA), to identify similar group of words. Read More...
|
Computer Engineering |
India |
99-101 |
27 |
40 Years of Surface Air Temperature Trend of Madurai City, Tamil Nadu, India
-Suhatharahima Siraj ; Gurugnanam.B
Surface air temperature data of Madurai city, Tamil Nadu state, India were analyzed using statistical techniques to demark the signs of climate change. Seasonal and annual trends were analyzed for the 1961-2000 period surface air temperature data of Madurai city and the distinct temporal distribution of the temperature was found from the study. The trends of Tmax (maximum temperature), Tmin (minimum temperature) and TM (Mean Temperature) were plotted and compared. The average annual temperatures of Tmax, Tmin and TM have raised 0.080C, 0.60C and 10C respectively. Summer average temperature raised 20C and other seasons have also got 10C temperature rise in 40years. The confidences were computed for to identify the temperature trend of Madurai city. The confidence values are positive and imply the warming of surface air temperature. The trends of annual and seasonal temperatures and confidence were compared for two periods: 1961-1980 & 1981-2000 to identify the pattern of temperature trend in Less Urbanized Period (LUP) and More Urbanized Period (MUP). The positive correlation with urbanization of temperature was noticed from the study. The Diurnal Temperature Range (DTR) also evaluated and the results support the warming effects of the surface air temperature in Madurai city in recent years. Read More...
|
Environmnet, Climate change |
India |
102-107 |
28 |
Review Paper On Efficiency Improvement Of Photovoltaic Panel By Using Thermoelectric Effect
-Anchali U. Patankar ; Sandeep S. Mahajan
In this paper, the photovoltaic panel were used to integrate the extraction of light energy and thermal energy. The need of this setup is to study the effect of thermoelectric cooling effect to remove the heat in photovoltaic. The experimental result were subsequently analyzed and compared with power generation efficiency of the examined photovoltaic. The use of thermoelectric cooling system improves the power capacity of the photovoltaic by 2% - 20% and enhance the power generation efficiency of photovoltaic by 2.29% -3.37% through the combined application of photovoltaic and thermal technologies, the total energy of the overall system can be improved by 37% -60%. Read More...
|
Electrical Engineering |
India |
108-111 |
29 |
Energy Efficient Reliable Routing Considering Drain Rate and Residual Battery Energy in Ad Hoc Networks
-Dr.Sangheethaa S ; Dr.Arun Korath
Ad-hoc networks has become a hot topic in the research world. Routing in ad-hoc networks has faced so many problems due to the peculiar nature of ad hoc environments. In this paper a new energy efficient routing protocol based on residual battery energy and drain rate is proposed. This paper considers the protocol proposed in [1] as the base protocol and overcomes the problems in that protocol by effectively including drain rate in the calculation of link cost. The simulation results show that the proposed protocol reduces the energy consumption, provides reliable routing as well as increases the network lifetime. Read More...
|
Computer science and Enginering |
India |
112-114 |
30 |
An Efficient Tracking of Global Solar Radiation Using Tarang Modules
-V.Rajesh ; T.Asborn; A.Karthick
Everything in nature emits EM energy, sun emits solar radiation. Solar radiation is distributed over a wide continuous spectrum ranging from ultraviolet to infrared rays. In this paper, fuzzy based MPPT is used in PV module to make the efficient use of power. Solar panel embedded with LDR is used to estimate the position of the sun. The panel with LDR acts as a master to inform other panel about the sun’s angle to attain a maximum utility in a desired direction. High power generation is achieved by mesh network created between the nodes. The realization of the proposed method has been stimulated using simulation at different temperature. Read More...
|
solar radiation |
India |
115-117 |
31 |
Low Area and High Speed Vedic Mathematics Multiplier using Compressor
-S.Udaya Kumar ; D.Sasirekha; D.L Jayanthi
There is a growing demand for high speed processing and low area design for VLSI and Communication applications in recent days. The integral part of the processor is the multiplier. The multiplier is designed using compressors. The compressors used are 4:2, 5:2, 7:2 compressors. The compressors are designed using full adder and half adder. The multiplier design is based on Urdhwa Tiryakbhayam sutra. The developed model is designed using microwind and DSCH software. The proposed multiplier has reduces the area and power consumption. Read More...
|
vlsi design |
India |
118-121 |
32 |
A Novel low Power and High Performance 6T Full Adder Design and its Application using Deep Submicron Technology
-J.Ganesh ; G.Premlatha; S.Subulakshmi
Full adder is one of the major components in the design of many sophisticated hardware design. In this paper the 6T full adder has been designed using a new efficient design with less number of transistors. A 2 transistor EX-NOR has been proposed with the help of two NMOS (negative Metal Oxide Semiconductor) transistors. By using this 2T (EX-NOR and 2:1 MUX) A gate the size of the full adder has been reduced to a large extent which can be implemented with only 6 transistors and applied this design in 4:2 compressor. The proposed full adder has a significant improvement in silicon area and power delay product when compared to the previous 8T full adder design. Further the proposed full adder requires a less area to perform a required logic operation. Further, the proposed full adder and 4:2 compressor has less power dissipation which makes it suitable for many of the low power applications and because of less area requirement the proposed design can be used in more of the portable applications also. It uses 45nm and 90nm in deep submicron technology. Read More...
|
vlsi design |
India |
122-124 |
33 |
Effect of pulsed current on the mechanical property of weldment of Pure (AA1900) Aluminium
-Shah Prassan Maheshbhai ; Mrs.Vaishali Patel; Mr.Shabbir Memon; Mr.Vijay Chauhan
Pulsed Gas Tungusten Arc Welding (GTAW-P) combines the low spatter level of spray transfer with the low heat input of globuler and short circuit transfer. The main drawback of GTAW-P is the large number of paraxmeter s that must be adjusted to produce a stable arc. Synergic control with programmed ability has made the application of complicated pulse wave-forms simple and easier. These all characteristics are very suitable for the welding of pure aluminium (99.95% purity) because the refractory oxide film which is difficult to avoid insoluble in the metal and infers with the wetting action of molten filler metals. GTAW-P power source can remove these difficulties by selecting suitable high peak current and low background current. Here high peak current timing indicates the melting time of the electrode and background current time indicates the heat dissipation and solidification time. So, this concentrated heat input can burn the oxide layer and remove the difficulties produced by it. This also indicates the easiness of welding in upward position, with uneven root gap and also for low thickness we don’t have the problem like burn through. The effect of the pulsed parameters on the weldment shall be evaluated by taking peak current, background current, frequency and pulse ratio as variable parameters and rest are taken as constant. Total 26 readings will be taken and on the basis of this the mechanical properties will be found out .Now on the basis of this results optimized parameter will be concluded by Taghuchi method that will be incorporated by MINITAB software and will be proven experimentally Finally the superiority of pulsed welding will be proven by taking the readings for the same welding condition but under the continuous welding. Read More...
|
Mechanical Engineering |
India |
125-128 |
34 |
Survey on Enhancing Security using Android Permission Model
-Mayura Devani ; Tejas Bhatt
More and more people rely on smart phones to manage their personal data. Smartphone's are today the repositories of our secrets (photos, email), of our money (online e-commerce) and of our identities (social networks accounts). Therefore mobile applications have the responsibility of handling such sensitive and personal information in a proper, secure way. For the protection of user data from third party applications, it is common for smartphone's Operating Systems to use permission model control the Permissions granted to third party applications. The user receives a dialog with the list of permissions requested by the application before installation. Once the application is installed, the user gives chance to third Party application developer to attack. Nowadays attackers are developing such a malicious application. Devices to various attacks. To protect against such attacks, different solutions are being given. We studied and detection of attacks focused on behavior-based approach. It is difficult for general users to permissions which are potentially harmful and those which are not. We are proposing a scheme to the user, so that he/she can give access to the requested permissions, or can deny and finish the installation. Read More...
|
Android Securit |
India |
129-131 |
35 |
Effectiveness of Online Training and Selection Process
-Bharti Arun Andhare ; Ms.Krutika Bang
Online Training System automates activities of training and provides opportunities to the student community to use collective intelligence to increase selection ratio and eases out process of creation of management information automatically. Online training system focuses on the automation of the placement cell. Authorizing the resumes, communicating about the various job openings to the student community, managing the corporate relationship for inviting them for the placements as well other activities, creating the placement metrics, monitoring the progress of the selection process and communicating with different users .Online training system provides the module like Student , Administrator, Company and Forum. It has the features like Integrated Toolkit for Reach-out to Companies Track. It manages Placement process of each Job posting individually. Manage Company Profiles, Manage Job Postings, Authenticate and activate the employee profiles, Send Notifications to students, Create list of employee as per company HR Manager Job Request, provides the list of shortlisted student with resume to company HR Manager, Export data of shortlisted employee to excel file based on Search Criteria, Manage employee profile, Set preferences for employee eligibility criteria for placement, Time & Role Based Secured Access to users. Read More...
|
computer science and engineering |
India |
132-134 |
36 |
Efficient and Protected CIA Framework for Data Sharing in the Cloud
-Prasad Kharade ; S.B.Natikar
Cloud computing is the technique that offers us various kinds of services to be used via internet. There are two types of computing sources such as software and hardware. For a client it enables more accessibility of services that can accessed by demand via internet .Cloud computing offers a major feature like unknown service location and that is becoming the challenging task in cloud computing. To overcome this problem CIA (cloud information accountability) framework can be used that records programmed logging and auditing to every access to the data and by introducing the steganography concept the user details get tracked so in this way increasing the security of data. Read More...
|
Computer science |
India |
135-137 |
37 |
To Map and Characterized the Sub-Pixel Classification of Soil Properties using Remote Sensing And GIS
-R.Shalom Sarath ; B.M. Purushothaman; Dr. S.Suresh Babu
A Subpixel spectral analytical process was used to classify the soil in LISS -IV data using thematic mapper imagery in India. The sub-pixel process enabled the detection of soil and geology in mixed pixels. two hundred pixels were field verified for each soil species to independently measure errors of omission and commission. The cypress total accuracy was 89 percent and the geology total accuracy was 91 percent field investigations revealed that both soil and geology were successfully classified when they occurred both as pure stands and when mixed with other soil species and water. In a comparison with traditional classification technique (iso-data maximum likelihood and minimum distance) the Subpixel classification of soil and geology yielded improved results. Large area of wetland where cypress was heavily mixed with other tree species were correctly classified by the Subpixel process and not classified by traditional classifiers. Read More...
|
Civil Engineering |
India |
138-142 |
38 |
JDHC Technique by Using SMVQ Scheme for Enhancing the Quality of Digital Image
-B.Kavi Priya ; Dr.S.Sumathi
In this paper, we propose joint data-hiding and compression scheme base on SMVQ and Image Inpainting. Supported these two techniques the data-hiding scheme has been projected for up the compression rate of data-hiding supported VQ. Data-hiding is that the most vital technique to cover data in media career. Inpainting technique is employed to modifying a picture in associate degree undetectable type. The goal of data-hiding and image inpainting is to secure data. It embeds the key information before compression to consume memory. On the sender side except the leftmost and uppermost of the image each of the other residual blocks square measure used for embedding with secret information and compression simultaneously by using SMVQ and image Inpainting. The SMVQ and Imaged Inpainting techniques are integrated into single module. That compressed image with divided bits, the receiver can do the decompressed image per the index value and extraction of secret bit with none loss mistreatment these SMVQ and Imaged Inpainting. Read More...
|
Digital Image Processing |
India |
143-147 |
39 |
Ensure And Energy Efficient Data Forwarding in Cluster Based Wireless Sensor Network
-S.Priyanka ; P.Sivakumar; K.Thamaraiselvi; M.Prakash
Secure data transmission is a critical issue in wireless sensor networks where clustering is an effective and practical way to enhance the system performance. Two secure and efficient data transmission for cluster based wireless sensor networks called SET-IBS and SET-IBOOS are used. In SET-IBS (Identity Based Digital Signature), the security relies on the hardness of Diffie-Hellman problem in the paring domain. In SET-IBOOS (Identity Based Online/Offline Digital Signature), it reduces the computational overhead for protocol security. To overcome this problem, two protocols MD5 and EARP scheme is used. MD5 algorithm provides the security for data sending between cluster members to cluster head. Energy Aware Routing Protocol is used to choose the effective cluster head as high receiving capabilities in cluster group to improve the life time of the network. Read More...
|
Computer Science and Engineering |
India |
148-151 |
40 |
Analytical Study Of Coordinate Rotation Digital Computer (CORDIC) Algorithm
-Samandeep Singh Dhillon ; Sarabdeep Singh
Due to rapid advances made in Very Large Scale Integration (VLSI) technologies have led the way to an entirely different approach to computer design for real time application, using special-purpose architectures with custom chips. Special purpose architectures efficiently map the algorithmic needs of the problem to hardware. Use of special arithmetic techniques for special applications and introduction of pipelining and parallelism lead to design very different from basic computers. As intended by Jack E. Volder, 1959, the CORDIC algorithm only performs shift and add operations and is therefore easy to implement and resource-friendly. In this paper analytical investigations on CORDIC algorithm have been presented. Read More...
|
Electronics & Communication Engineering |
India |
152-155 |
41 |
Review on Triangular Perforated Fins in Staggered Arrangement
-Abhijit Govindrao Dhere ; Prof. Hemant S. Farkade
The performance of many engineering devices from power electronics to gas turbines is limited by thermal management. Heat transfer between a surface and the fluid surroundings commonly augmented by attaching extended surface called fins Since the use of extended surfaces has been often more economical ,convenient and trouble free ,most proposed applications are adding fins to the surfaces in order to achieve the required rate of heat transfer through increased surface area and turbulence. this review paper investigate how the fin arrangement (staggered or in-line), orientation, perforation and geometry affect heat transfer and friction characteristics of convective heat transfer in a force convection. Read More...
|
Mechanical Engineering |
India |
156-157 |
42 |
Analyzing Delay with LOS at the Major Intersections of OMR Stretch (Chennai)
-Sivaprakash G
The challenges of the urban transportation in India are growing rapidly, and government agencies at various levels are taking steps to address the performance gaps in service delivery. The study deals with the analysis of service levels at the intersections of Old Mahabalipuram Road stretch (OMR) in Chennai. The delay is analyzed at each major intersection for every phase and is ranked with the level of service. Based on the level of service, the transportation engineers will be able to suggest a sustainable solution for the traffic congestion. The travel time in the major arterial roads can be effectively improved and forecasted for the future travel demand. Read More...
|
Transportation Engineering |
India |
158-160 |
43 |
MFCD:An Optimized Technique for Mining Frequent Closed Item Sets
-Sanjay Bohara ; Prof.Abhishek Raghuwanshi
The amount of data being collected is increasing rapidly. The main reason is the use of computerized applications. Because of that reason the valuable information is hidden in large amount of data. It is attracting researchers of multiple disciplines to study effective approaches to derive useful knowledge from vast data .Frequent closed item set mining has been a heart favorite theme for data mining researchers for over a decade. A large amount of literature has been dedicated to this research and tremendous progress has been made, ranging from efficient and scalable algorithms for frequent closed item set mining in transaction databases to numerous research frontiers, such as sequential pattern mining, structured pattern mining, correlation mining, associative classification, and frequent pattern-based clustering, as well as their broad applications. In this thesis, we propose a new technique for more efficient frequent closed item set mining. Our proposed algorithm will reduce the complexity of frequent closed item set mining. We present efficient techniques to implement the new approach. Read More...
|
Information Technology |
India |
161-164 |
44 |
Devloping Competency and Enhancing Interactive Learning tool for Students and Professionals
-Miss. Pallavi Chandrakant Londhe ; Miss. Sneha Badhe; Miss. Vaishali Dhole; Prof. Nidhi Sharma
As E-Learning becomes more predominant in fulfilling the educational needs of today’s population, and traditional learning takes a sometimes slow but ultimately unstoppable turn for the blended “flavorâ€, it is often easy to forget the merits of synchronous teaching. In particular, showing live actions on the teacher’s desktop to a remote student has great instructional value that must not be overlooked. Similarly, a student can demonstrate skills that would otherwise need a physical presence in a classroom, rather than a virtual one. This Project can accomplish all of this and more. This paper aims to present some of the tools available and a few specific scenarios where they are most effectively used. Read More...
|
Computer Engineering |
India |
165-167 |
45 |
Survey on Wavelet based ECG Stegnography for Protecting Patients Confidential Information
-Muhusina Ismail ; Shiney Thomas
In this modern era, the use of e-health application is widely increased. Majority of the aging people are suffering from cardiac dis-eases, so it is very crucial important to save the patient’s life by diagnosing cardiac diseases on time, by make use of these e-health applications. The best example of this is of Remote Cardiac Patient Monitoring application. Thus Point of Care systems make use of this application. With the growth of human rights, people are more and more concerned about the privacy of their information and other important data. The objective of this paper is to makes use of electrocardiography (ECG) data as host signal in order to protect individual information. An ECG signal can not only be used to analyze dis-ease, but also to provide crucial biometric in-formation for identification and authentication. Thus we are integrating patients physiological readings like blood pressure, temperature, glucose level, etc into patients ECG, and this host signal will watermarked and transmitting to re-mote patient monitoring system via public net-work. This paper introduces a wavelet-based steganography technique which combines encryption and scrambling technique to protect patient confidential data. After several experiments and evaluation this study proves that host signal will not affect any distortion and is less than 1%. Read More...
|
Computer Science and Engineering |
India |
168-170 |
46 |
An Effective Energy Management in Electric Traction Using Cascaded Multilevel Converter
-S.Ayyappan ; Ms.G.R.Thyla
Energy storage system plays an important role in electric vehicles. In these energy storage systems, a large number of battery cells are usually connected in series to enhance the output voltage for motor driving. The difference in electrochemical characters will cause state-of-charge (SOC) and terminal voltage imbalance between different cells. In the existing system, a hybrid cascaded multilevel converter which involves both battery energy management and motor drives. Each battery cell can be controlled to be connected into the circuit or to be bypassed by a half-bridge converter. All half bridges are cascaded to output a staircase shape dc voltage. Then, an H-bridge converter is used to change the direction of the dc bus voltages to make up ac voltages. The outputs of the converter are multilevel voltages with less harmonics and lower dv/dt, which is helpful to improve the performance of the motor drives. The imbalance of terminal voltage and SOC can also be avoided, Sso the life of the battery stack will be extended. In the proposed system, the level of the multi-level inverter can be increased to further reduce the total harmonic distortion without change in the circuit topology. Read More...
|
ELECTRICAL AND ELECTRONICS ENGINEERING |
India |
171-178 |
47 |
A Review Paper on Bull Drawn Multipurpose Fertilizer Drill Device
-Nikhil Bhende ; Dr. Achal Shahare
A Bull Drawn Multipurpose Fertilizer Drill Device will be design and developed by selecting the best parameters from previous model studies. This device is related to agricultural domain. The purpose of this device is to apply the fertilizer effectively, uniformly and cheaply in the growth stages of crop. The equipment will consist of a main rectangular frame, three sets of tines of different depths, and two hoppers for carrying seed in one and fertilizer in another, supporting wheels with depth control provision, fertilizer metering device and a lugged (drive) wheel with chain and sprockets for transmitting power to the metering mechanism. The equipment has the provision to place the fertilizer up to a depth of 320mm, 280mm and 210mm using the three sets of tines, thereby helping to place the fertilizer at different depths in vertical soil profile in a single pass. Read More...
|
Mechanical Engineering |
India |
179-181 |
48 |
Matrix Converter Based Four Quadrant Operation of Three Phase BLDC Motor Using Digital Control Strategy
-Snehal Hulke ; M.J.Katira
Brushless DC (BLDC) motor drives are becoming more popular in industrial applications. Four quadrants method is use to control the BLDC motor in all the four quadrants. This paper deals with the novel matrix converter based drive techniques for digital control of three phase BLDC motor. Hall Effect sensor sense the signals obtained from rotating position of BLDC motor and send it to the microcontroller. Microcontroller provides the signals to the appropriate switching devices, which have to be turn on and off in accordance with switching algorithm table. If the proposed method is implemented in low power motors, like motors used in sewing/embroidery machines, arcing will be very less which is not even visible. The need of the proposed work is to make simple hardware circuit which is more reliable, more efficient, less noisy, excellent speed control and smooth transition between the quadrants. Read More...
|
Electrical Engineering |
India |
182-184 |
49 |
An Overview of Disarray in Plant Layout Optimization using Simulation
-Mr.Niral C. Patel ; Pranav N Abhyankar; Amit A Hingane
In these paper overviews of various works are done. This paper tries to give an idea about the previous researches & their finding about study of simulation and optimization of plant layout and study related to time study and process study. Read More...
|
Mechanical Engineering |
India |
185-187 |
50 |
Optimal Barrier Coverage Scheduling and Attack Detection under Mobile Sensors
-T.Arunkumar ; G.Nagarajan
Surveillance monitoring is performed using the sensor devices. Capture, store and transmission are the main operations of sensor devices. Temperature, humidity, density of carbon dioxide and pressure details are captured by sensor devices. Battery power is the main limitation of sensor devices. The intrusion detection system identifies the legitimate and attackers in the network area. The intrusion detection system is designed in two categories. In the first model a system component is used for monitoring the security of a WSN and diagnosing compromised/vulnerable. Second model is the monitoring or surveillance system for detecting a malicious intruder that invades the network domain. Sensor mobility schemes are applied with barrier coverage details. Dynamic Sensor Patrolling (DSP) mechanism is used to manage sensor mobility with availability levels. Periodic monitoring scheduling (PMS) algorithm is used to monitor each point along the barrier line periodically by mobile sensors. Coordinated sensor patrolling (CSP) algorithm is used to improve the barrier coverage. Sensor mobility and intruder arrival information are used to enhance the barrier coverage in CSP. In CSP each sensor’s current movement strategy is derived from the information of intruder arrivals in the past. Simple Distributed Coordinated sensor patrolling (S-DCSP) and General Distributed Coordinated sensor patrolling (G-DCSP) schemes are used in the scheduling process. Clustering process is used in the G-DCSP scheme. Optimal coverage scheme is introduced to manage scheduling of K barrier coverage environment. Distributed scheduling and intrusion detection is performed with predefined sensor count values. The system is enhanced to handle different intruder arrival models. Sensor movement is rescheduled with intruder arrival information. Read More...
|
Computer Science and Engineering |
India |
188-192 |