No. |
Title and Author |
Area |
Country |
Page |
101 |
A Review on Brain Tumor Detection and Classification system based on Image Processing Techniques
-B. Chitradevi ; R. Saranya
Brain tumor is most commonly occurring malignancy among human beings, so study of brain tumor is important. Magnetic Resonance Image (MRI) is the greatest technology for diagnosing brain tumor in now a day. Brain tumor is identified at advanced stages with the aid of the MRI. Automatic detection of brain tumor through MRI can present the valuable outlook and accuracy of earlier brain tumor detection by using image processing techniques. This paper gives a tutorial review in different advances that have been made for the image processing techniques in MRI brain tumor images. Read More...
|
Image Processing |
India |
376-379 |
102 |
A Novel Color Image Watermarking Scheme on Arnold Transform and DWT Using B Channel
-Priyal Desai ; Harshita C. Kanani
The expansion of the Internet has frequently increased the availability of digital data such as audio, images and videos to the public. In this paper we have presented a Novel technique using Arnold transform and discrete wavelet transform for color images. The binary watermark is processed by using error correcting coding. Arnold transform is applied for the best scrambling and the watermark is embedded in the B channel of the scrambled pixels. Discrete wavelet transform method is applied on the embedded image for further security. The proposed method concludes to give better results comparatively in aspects of image transformations and enhancement. Read More...
|
Computer Engineering |
India |
380-382 |
103 |
A Qualitative Classification of various Enhancement, Restoration and Filtering techniques for Dense Fog Removal from Images
-Nidhi V. Kothari ; Khushali R. Raval
Aerosol Particles such as Fog haze and smoke reduces contrast level of the image that affects the visual quality of the image and hence is a main reason for road accidents. Airlight and Attenuation phenomena are responsible for affecting visual quality and visibility level of an image in the field of computer vision. For improving the visibility level of an image and reducing fog and noise various image enhancement methods are used, followed by the subsequent restoration methods. The main aim of this paper is to review state-of-art image enhancement and restoration methods for improving the quality and visibility level of an image to provide a clear, fog-free image even in bad weather condition. The review work includes the classification of various approaches or methods that could be selected for introducing enhancement and restoration of images. It could then serve as the base to start with new research work by upcoming researchers. Read More...
|
Information Technology |
India |
383-388 |
104 |
Security Issues In Cloud Computing A Review
-Kashish Goyal
As the use of computers in our day-to-day life increases, the computing resources that we need also go up. For companies like Google and Microsoft, harnessing the resources as and when they need it is not a problem. But when it comes to smaller enterprises, affordability becomes a huge factor. With the huge infrastructure come problems like machines failure, hard drive crashes, software bugs, etc. This might be a big headache for such a community. Cloud Computing offers a solution to this situation. Google, Microsoft, Yahoo, IBM and Amazon have started providing cloud computing services. In this paper, a survey of the different security risks that pose a threat to the cloud is presented. This paper is a survey more specific to the different security issues in cloud computing system. Read More...
|
Computer Science and Engineering |
India |
389-393 |
105 |
Color Bayer CFA Image Compression Using Adaptive Lifting Scheme and SPIHT with Huffman Coding
-Shreykumar G. Bhavsar ; Viraj M. Choksi
Recent research has focused on the new proposed Bayer pattern image compression compared to other methods of structural transformation algorithm. Based on previous work, this paper proposes a new algorithm the Bayer pattern image compression by using adaptive 9/7 wavelet transform and set partitioning in hierarchical trees (SPIHT) and Huffman coding combined. Start with a color filter array (CFA) data convolution of the low pass filter followed by a down-sampling operation after the data is converted from RGB color space into separated luminance and chrominance components of the YCbCr color space. The lastly achieved more data compressed by using new proposed algorithm method for compression. Read More...
|
Electronics and Communication Engineering |
India |
394-398 |
106 |
Email Based Trust Management System
-Mali Nayan
Trust management has received a lot of attention recently as it is an important component of decision making for electronic commerce, Internet interactions. Email based trust management system prevent the email based fraud. In this paper I am going to explain the trust management approach for the e-mail based environment encryption system using digital signature. Simple Mail Transport Protocol is the most widely adopted protocol for e-mail delivery. However, it lacks security features for privacy, authentication of sending party, integrity of e-mail message, nonrepudiation and consistency of e-mail envelope. This digital signature system takes into account the device limitations and thus generates a functional digital signature. Email is encrypted with the public key of receiver and decrypted by receiver’s private key & the email is sign by digital signature so that email server can accept that email. Read More...
|
Computer Science |
India |
399-403 |
107 |
Effect of use of Mono Polypropylene Fibers on Properties of Concrete Paving Block
- Suresh Subhash Mandlik ; Sachin B. Kandekar; Manesh Badshah Satpute; Prof. N. U. Mate
Cement concrete paving blocks are precast solid products made out of cement concrete. The product is made in various sizes and shapes viz. rectangular, square, and round blocks of different dimensions with designs for interlocking of adjacent paving blocks. The raw materials require for manufactures of the product are Portland cement and aggregates which are available locally in every part of the country. In this modern age, Concrete paving blocks are ideal materials on Open spaces surrounding residential, public, commercial, & industrial buildings. They are used for the footpaths in the city and walk way in the gardens know a day’s paving blocks are also used for light and heavy traffic roads due to their easy laying, better look and finish. In this paper, a experimental study for producing paving blocks using Mono Polypropylene fibres is presented
In fibre reinforced concrete (FRC), thousands of small MonoPP fibres are dispersed and distributed randomly in the concrete during mixing, and thus improve concrete properties in all directions. FRC is being increasingly used to increase static strength, energy absorbing qualities and better fatigue strength of paving blocks.
Read More...
|
Civil Engineering (Structures) |
India |
404-408 |
108 |
Reversible Image Watermarking: A Detailed Survey
-Sosa Nareshkumar Dayabhai ; Prof. Khushali Raval
Since last 15 years the Watermarking techniques have drawn a lot of interest of the researchers, in reversing the original cover image as well as the watermarked information or also restoring the logo. This paper explores various reversible image watermarking techniques for digital images to achieve very high data embedding capacity while keeping distortion as low as possible. Various terms related to image watermarking are explored in this paper. Read More...
|
Image Processing |
India |
409-412 |
109 |
Analysis of Thermal Stresses Acting on Piston of C.I.Engine
-Abhishek V. Vyawahare ; Ajay V. Kolhe
generally the piston, made of Al Alloy, is a crucial part of internal combustion engines. When the combustion of fuel takes place in heavy diesel engine cylinder, high temperature and pressure develops. Because of high speed and at high loads, the piston is subjected to high thermal and structural stresses. If these stresses exceed the designed values, failure of piston may take place. The software “Pro-E Wildfire†is used to establish the three-dimensional geometry model of the diesel engine piston. Then, the model is imported into ANSYS to set up a finite element model. In this work thermal stresses on piston is calculated by finite element analysis software. From results, it reveals that thermal stresses are existed on the piston and total deformation with thermal load. The conclusion of this study is that, material type of high thermal conductivity is considered better than material type of low thermal conductivity, because the maximum temperature is found in Carbon- Steel piston than Aluminum -Alloy piston. This means that the Aluminum- Alloy is considered better than the Carbon-Steel. And also due to increase in thermal Conductivity, leads to reduction in temperature at piston crown surface and increase in temperature of piston skirt. Read More...
|
Mechanical Engineering |
India |
413-416 |
110 |
ANFIS Based Control of A Grid Connected Hybrid Renewable Energies for Smart Grid Application
-Sakthikumaresan P ; C.P.Kandasamy
In this paper describes and performance an adaptive neuro-fuzzy inference system (ANFIS)-based energy management system (EMS) of a grid-connected hybrid system for smart grid application. As a part of hybrid system consists of wind turbine (WT) and photovoltaic (PV) solar panels as a primary energy sources. Then rectified wind output and solar panel output which combined given to SEPIC converters in order to connect them to a central DC grid. Additionally, it connects the hybrid system to the single-phase inverter and smart grid. This smart grid consists of new bidirectional intelligent semiconductor transformer (BIST), high frequency ac-dc rectifier and low voltage dc-dc converter hybrid switching dc-ac converter. Read More...
|
electrical engineering |
India |
417-422 |
111 |
Analyzing Of Traditional Tuning Techniques of PI Controllers for FOPTD System
-G.Hemavathy ; M.Gayathri; V.Madhubala
Conventional PI controller is the simplest well known controller used in utmost of the process. The main reason behind its popularity among engineers is its simplicity in tuning the parameters to achieve satisfactory performance in industrial applications. It fuses the properties of the P and I controller and it shows maximum overshoot. They are widely used because of their robustness, simplicity and successful practical application. In this process we are going to control the level of the tank using non-linear spherical tank. Here we are implementing using classical methods as well as T-L method. The system identification of the non-linear process is found by first order plus dead time model (FOPTD). The ability of the designed controller, in terms of tracking set point, is also compared and simulation results are produced. Read More...
|
Instrumentation Engineering |
India |
423-425 |
112 |
Performance Improvement of AFBC Boiler through Analysis of Heat Losses
-Aashish K. Pokley ; S.P. Chincholkar
Electricity is essential in the economic development of any nation. Due to rapid growth of economy and industrial development in India, the demand for use of electricity has increased rapidly. Power generation capacity in India is 70 percent thermal, with the remaining being hydro and nuclear. Thermal generation is mainly based on steam generation using a coal-fired boiler. This paper deals with the determination of efficiency of boiler and calculates the heat losses in Suryalakshmi thermal power plant, Nagardhan of 25 MW unit and try to give some suggestions to reduce heat losses. Power Plant play very important role in improving the economic condition, competitive advantage, life style, of people in any country. The understanding of the structure, i.e., system and connectivity between different systems and It is useful for estimating the contribution of different attributes of the performance of the system. Any Production system should be kept failure free under the given operative conditions to achieve the set goals of economical production and long run performance. A highly reliable system tends of increases the efficiency of production. Efficient power generation is expected to make more power available at a lower cost. Read More...
|
Mechanical Engineering |
India |
426-429 |
113 |
Effect of Sodium Silicate on the Rheological Properties of Microfine Cement Raw Grout
-Ankita C. Shah ; Prof. Mayur G. Vanza
Grouting technology is versatile accepted soil improvement technique mostly used in India either for restoration problems to increase special soil parameters and to stop leakage in earthen and rock fill dams. The use of Microfine cement grout along with sodium silicate can easily deal with the problems associated with ground improvement, toxicity & costliness of chemical grouts. The aim of the present research is to develop proper grout mix design using various water cement ratios and various percentage of sodium silicate along with Microfine cement (fineness = 6000 cm2/gm). This paper focuses the effect of sodium silicate on rheological properties of MFC grout. Read More...
|
GEOTECHNICAL ENGINEERING |
India |
430-434 |
114 |
Extended Pretty Good Privacy
-Kalpesh Vishwas Khetade ; Vikas Dinkar Sable; Meghana Jairam Sail; Prof. Sandeep Chavan
Pretty Good Privacy (PGP) is a system which is used for the purpose of secure e-mails and messages communication over open network. PGP is important to implement secure and efï¬ciency of e-mail messages, it is a security tool which enables the users to secure their damaging information, ands sensitive data by making their stored documents and e-mails safe and secured. Cryptography is used in relation of protecting the information and keep it safe and secret. The cryptography is the practice and study of hiding speciï¬c information; it is used to keep the information secret and safe. When a message is sent using cryptography, it is changed (or encrypted) before it is sent. The change makes the message hard to read. If someone wants to read it, they need to change it back (or decrypt it). How to change it back is a secret. Both the person that sends the message and the one that gets it should know the secret way to change it, but other people should not be able to. There are steps to do that when the message is decoded and sent by the sender choosing appropriate method and after that when it is received decoded by the recipient. Cryptography in digital world offers three core areas that protect data from attempt to be taken, taking or an unauthorized use of data. Cryptography covers these essential areas: Authentication, Conï¬dentiality, integrity. Read More...
|
Computer Engineering |
India |
435-439 |
115 |
Reliability Analysis and Life Cycle Cost Optimization of Centering & Plunge Facing Machine (500)
-Shahane Shirish .M. ; Y.R.Patil
It is important to analyze the reliability of a centering and plunge facing machine because its low reliability can hamper the production rate. Also life cycle cost optimization of the machine can help producer to meet customer demand and increase profitability of firm. This paper provides a review on Reliability Analysis and Life Cycle Cost Optimization of Centering & Plunge Facing Machine (500) in order to improve reliability and profitability of producer. Read More...
|
mechanical engg |
India |
440-442 |
116 |
Preserving Privacy and Data Quality in Database by Hiding Sensitive Association Rules
-Dhara.D.Mane ; Amruta.D.Jamdade; Swapnali.B.Banne; Rinku.B.Chauhan
Some expertise are required for making the decision of data mining. But some organizations get help from some external adviser for the process of data mining because they don’t have their own adviser. At the time of getting advice from the external advisor risk is occurred. The loss of business intelligence and customer data privacy and security related problems arises. It is the challenging issue in the data mining. The data owner has some private data or property like association rules contained in outsourced database. However the integrity of mining results can affect badly if the service provider is not trustworthy. To overcome this problem a heuristic based algorithm called as MDSRRC (Modified Decrease Support of R.H.S item of Rule Clusters) is projected. With the multiple items in antecedent that is L.H.S and consequent that is R.H.S, this algorithm hides the sensitive association rules. The existing rule hiding algorithm DSRRC limitations are overcome by our algorithm. Transactions and items are selected by the projected algorithm based on certain criteria which modify the transactions to hide the sensitive information. This algorithm maintains the database quality and it will be highly efficient. Read More...
|
Information Technology |
India |
443-446 |
117 |
Forensic Investigation of Email Artefacts by Using Various Tools
-Vibhuti Narayan Singh ; Shalini
Email stands for Electronic mail used for sharing and communicating the digital data from a sender to one or more recipient. Communication through Email is currently gain popularity over the internet. Email store many information such as message and attachments which was communicated between author and recipient, IP address of author’s internet provider, Message ID etc. Analysis of these email artefacts under forensically sound environment provides valuable evidence such as who is the real sender of the email, which type of data is shared between the author and recipient, from where email was sent, date and time of email was sent etc. to forensic investigator. In present study a forensic system is proposed for analysis and retrieval of these email artefacts present in digital medium. Read More...
|
Dept. of Forensic Sci. & Criminology |
India |
447-452 |
118 |
Modified SafeQ Protocol Based Technique for Maintaining Privacy & Integrity in Wireless Sensor Network
-Hardik Patel
the architecture of two-tiered sensor networks, where storage nodes serve as an intermediate tier between sensors and a sink for storing data and processing queries, has been widely adopted because of the benefits of power and storage saving for sensors as well as the efficiency of query processing. However, the importance of storage nodes also makes them attractive to attackers. SafeQ, a protocol that prevents attackers from gaining information from both sensor collected data and sink issued queries. SafeQ also allows a sink to detect compromised storage nodes when they misbehave. To preserve privacy, SafeQ uses a novel technique to encode both data and queries such that a storage node can correctly process encoded queries over encoded data without knowing their values. To preserve integrity, two schemes—one using Merkle hash trees and another using a new data structure called neighbourhood chains—to generate integrity verification information so that a sink can use this information to verify whether the result of a query contains exactly the data items that satisfy the query. To improve performance, we propose an optimization technique using Bloom filters to reduce the communication cost between sensors and storage nodes. Read More...
|
Computer Science and Engineering |
India |
453-457 |
119 |
A Hierarchical Third Party Based Model for Security & Integrity in Multi Cloud Computing Environment - A Survey
-Ankit Prajapati
It has been observed that the concept of cloud computing is increasing day by day in the world of IT industry in recent years. Data Owners are progressively counting on the cloud services for storing their data, backing up their data and use it in real time when ever needed. Since the data stored is online it requires data owners to entrust their valuable data to cloud service providers, so there ought to be increased security and privacy concerns on data. In this paper, various attribute based encryption schemes are explained such as key - policy attribute base encryption scheme , cipher - policy attribute based encryption scheme , cipher - policy attribute set based encryption scheme, Hierarchical identity based encryption scheme , Hierarchical attribute based encryption scheme and hierarchical attribute set based encryption scheme for providing security , integrity and fined grained access control of the outsourced data along with their strength and weaknesses. Also a new mechanism is presented, a hybrid model for providing security in cloud computing environment. This model combines the advantages of two most popular existing cloud security models. Read More...
|
Computer Science and Engineering |
India |
458-462 |
120 |
An Encryption and Decryption Time Efficient Elgamal Cryptosystem
-Jaydeep Thakkar
Encryption and Decryption are two fundamental approaches in network security and cryptography. Both of these tools or we can say techniques are most commonly used nowadays. If we want to perform secure communication between sender and receiver than encryption and decryption are very useful. For this purpose, public key cryptography and private key cryptography is used. Here we present, we present an overview of the existing cryptographic system and will see some of the problems that arise in the existing cryptosystem. Then after we present the brief introduction of the proposed system and provide advantages of our proposed system. Read More...
|
Computer Science and Engineering |
India |
463-465 |
121 |
Fast and secure HMAC function Message Authentication Protocol for Vehicular Ad Hoc Networks
-Vataliya Tushar
Vehicular ad hoc networks (VANETs) adopt the Public Key Infrastructure (PKI) and Certificate Revocation Lists (CRLs) for their security. In any PKI system, the authentication of a received message is performed by checking if the certificate of the sender is included in the current CRL, and verifying the authenticity of the certificate and signature of the sender. In this paper, we propose an Expedite Message Authentication Protocol (EMAP) for VANETs, which replaces the time-consuming CRL checking process by an efficient revocation checking process. The revocation check process in EMAP uses a keyed Hash Message Authentication Code (HMAC), where the key used in calculating the HMAC is shared only between non revoked On-Board Units (OBUs). In addition, EMAP uses a novel probabilistic key distribution, which enables non revoked OBUs to securely share and update a secret key. EMAP can significantly decrease the message loss ratio due to the message verification delay compared with the conventional authentication methods employing CRL. By conducting security analysis and performance evaluation, EMAP is demonstrated to be secure and efficient. Read More...
|
Computer Science and Engineering |
India |
466-469 |
122 |
Challenges of Antenna in Radio-Astronomy
-Junaid Nabi Bhat ; Shaheen Mushtaq Farooqi
A major challenge for all high resolution low frequency radio astronomy is measuring and removing the effects of the ionosphere. The isoplanatic patch size for frequencies below a few hundred MHz is generally much smaller than the field of view. In addition, aperture arrays have beams on the sky which vary dramatically with observing geometry. These beams require careful calibration to be stable and known in order to allow imaging. It is noted that large radio telescope arrays such as the Very Large Array and Very Long Baseline Array at the National Radio Astronomy Observatory challenge the state of the art of microwave technology in many areas. Examples include the design of optimized sparse arrays and the design and the economic construction of high-performance, frequency-flexible antennas, reliable low-noise receivers, and highly phase stable local oscillator systems. Three-decade frequency range, greatly improved sensitivity and angular resolution that matches the capabilities of planned instruments in other frequency domains, are challenges that are now being investigated. Instruments for radio astronomical observations have come a long way. While the first telescopes were based on very large dishes and two-antenna interferometers, current Instruments consist of dozens of steerable dishes, whereas future instruments will be even larger distributed sensor arrays with a hierarchy of phased array elements. For such arrays to provide meaningful output (images), accurate calibration is of critical importance. Calibration must solve for the unknown antenna gains and phases as well as the unknown atmospheric and ionospheric disturbances. Future telescopes will have a large number of elements and a large field of view (FOV). In this case, the parameters are strongly direction-dependent, resulting in a large number of unknown parameters, even if appropriately constrained physical or phenomenological descriptions are used. This makes calibration a daunting parameter-estimation task. Read More...
|
Communication Engineering |
India |
470-475 |
123 |
New Approach for Re-Ranking of Images
-Sara Maulavi ; Mrunal K. Pathak; Soumya Iyengar; Pankaj Jadhav
In today's world there is an increasing demand of image search so there is a need for an efficient image search engine. So image retrieval is an important task and moreover images retrieved should map with the query the user has typed. Efficient retrieval of images matching with query must be given prime importance. Most of the search engines use text based search for retrieval of images and few use visual search. If text search and visual image content features are combined together for the retrieval of images it will fetch accurate images and enhances user satisfaction. To map user's intention to the image, a re-ranking framework is used that learns different visual semantic spaces for different query keywords through keyword expansions. The images are retrieved based on query keywords, the visual features of the retrieved images are then extracted. Images are then re-ranked by comparing their semantic signatures obtained from the visual semantic space specified by the query keyword. Thereby, improving the efficiency of image search. Read More...
|
INFORMATION TECHNOLOGY |
India |
476-477 |
124 |
Stepper Motor Control Using LabVIEW AND NI-myRIO
-Ganesan A ; Nhizanth R; Kamban S; Gopalakrishnan R
In the current scenario, stepper motors are being used for diverse applications due to its flexibility and ease of control. This paper deals with the control of stepper motor using NI myRIO, because it is less complex to work with LabVIEW programming, which is pretty simple. The pulse required to run the stepper motor is generated using NI myRIO and interfaced with LabVIEW with the help of code generated in the system. The supply voltage is given to the motor through a voltage driver circuit and the motor’s speed is controlled by varying the time delay in the LabVIEW program simulation specifications. Here, unipolar stepper motor is taken into consideration and wave drive or full step drive method is used, since this type of method is easy to implement. Position sensors may get affected by EMI and temperature so we are going in for sensor less control. This mechanical motion obtained using the stepper motor can be used in various industrial and real time applications as well. Read More...
|
Control Engineering |
India |
478-480 |
125 |
Hi-tech Wireless Notice Board Using Google Cloud Messaging (GCM) and Push Notification
-Milan Girish Shah ; Professor Wasudev Rahane; Jeevan P. Agre; Kanta Chaudhary; Surabhi Mutha
The purpose of this paper is to invent new technology to transfer information from teachers to students and vice versa. Notice board is primary thing in any institution/organization or public utility places like bus stations, railway stations and parks. Notice boards are very much important in educational institutions. But sticking various notices day to day is difficult process. A separate person is needed to take care of these notices displayed. This paper deals about an advanced hi-tech wireless notice board. The project includes two models i.e. android application and web application. Web application is totally handled by administrator of that institution. Android application is use by students as well as teachers. The notices send by administrator through web application is received to student’s smartphones. Read More...
|
Information Technology |
India |
481-484 |
126 |
Reliable Opportunistic Adaptive Routing In Wireless Sensor Networks in Contradict To Denial of Service
-Shagufta Shaikh ; Pritesh Patil; Prachi Bhagwat; Neha Kumari
Wireless Sensor Networks sends data from sender to base station using number of sensors. However, the multi hop routing of WSNs often becomes the target of malicious attacks. Traditional cryptographic-based security mechanism have proved to be ineffective against several hard-to-detect insider attacks such as wormhole attack, sinkhole attack, sybil attack, selective forwarding attack, etc. These attacks further produce severe impacts on replaying of routing information and also aggravate identity deception. Present routing algorithms and protocols could not solve these severe problems. For such circumstances, TARF can be used to provide a trustworthiness and energy efficient route without any known geographic information or tight time synchronization. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments on large-scale WSNs under various scenarios including mobile and networks. Other WSNs related problem is Denial of Service which is caused by many popular attacks. DoS attacks are complex and serious problem affecting not only a victim but the victim’s legitimate clients as well. TARF provides protection against above mentioned attacks but fails to ensure protection against DoS. In our proposed system, we make an endeavour to introduce a mechanism to tackle DoS attacks on the wireless sensor network which would further strengthen its security in all aspects. Read More...
|
INFORMATION TECHNOLOGY |
India |
485-489 |
127 |
An Elaborated View on Biometric Template Protection
-Anjana R.S ; Ms P Betty
Biometric is a biological traits and being a bodily elements used in various sectors and application because of its identity. Biometric is a biological element used to uniquely identify the individual. It is an alternative to a traditional approach because of its uniqueness. Biometric authentication has been used in various sectors like surveillance, authentication. One of the most important characteristics of biometric authentication is Irrevocability. It is one of the important characteristics of biometrics since unlike other data, biometric can’t be faked. Biometrics are very sensitive data and it is more sensitive to vulnerability because biometric once compromised it is compromised forever. Because of its sensitivity many models adopted multi modal biometric rather than uni-modal biometric to provide better security. Thus biometric system needs higher security to preserve the biometric hacking. Biometrics has been adopted in much application now-a –days. To secure such a sensitive data many security models have been introduced like multilevel encryption, hybrid encryption etc., a detailed survey on these template protections has been discussed with the advantages and disadvantages. Read More...
|
COMPUTER SCIENCE AND ENGINEERING |
India |
490-495 |
128 |
Smart License Patrolling By Introducing Enhanced Driving License Using Near Field Communication Technology
-Prof.Rashmi Chawla ; Pratik Ghogale; Abhijit Bobhate; Nikhil P. Barot; Umesh Rane
The project is about developing an Enhanced Driving License (EDL) which provides a proof of identity and a way to access details about license holders past record. The project consists of three modules NFC tag, handheld mobile device to scan the NFC tag and MVD’s database. The first module consists of a NEAR FIELD COMMUNICATION chip that will signal a secure system to pull up your biographic and biometric data for the officer. The second module consists of a handheld device carried by the officer which scans the NFC tag. The third module consists of a MVD database related to licensee's past record which will be accessed by the officer by scanning the NFC tag. Read More...
|
INFORMATION TECHNOLOGY |
India |
496-497 |
129 |
Literature Review on Energy Efficient Reliable Routing for Wireless Ad Hoc Networks
-Agilan S ; Gopinathan B
In wireless ad hoc network, the foremost drawback is to supply reliable energy efficient routes that maximize the network lifespan, i.e., the amount of winning transmissions. Energy management is an optimization technique, used to maximize the operational lifespan of networks through energy efficient routing. Numerous energy efficient routing algorithms are planned for ad hoc network to enhance the life time of network by considering numerous parameters like remaining battery energy, link quality, etc. this paper surveys numerous planned energy efficient routing algorithms. Read More...
|
Computer Science and Engineering |
India |
498-501 |
130 |
Literature Review on Neighbor Position Verification in Mobile Ad hoc Networks
-Balaji P ; Gopinathan B
In mobile Ad hoc networks, the adversarial nodes can easily attack the networks. These adversarial nodes affect the performance in networks. So it is more important to identify the neighbors in MANET. Neighbor discovery and position verification is an important part of mobile Ad hoc networks. The mobile nodes required to identify and verify the neighbor’s position which minimizes the adversary attacks. In this survey paper, various approaches are discussed for the neighbor discovery and position verification. Read More...
|
Computer Science and Engineering |
India |
502-505 |
131 |
DTMF Based Controlled Robot Vehicle
-Hakani Raj
In this paper, we can control the Robot using Dual Tone Multi Frequency (DTMF) technology. DTMF technology is most useful technique at present days. It is worked on to methods digital signal processing (DSP). Wireless-control of robots uses RF circuit that has the drawbacks of limited working range and limited control. This DTMF is gives advantage over the RF; it increases the range of working and also gives good results in case of motion and direction of robot using mobile phone through micro controller. This type of wireless communication gives the remote handling operation of Robot using DTMF. Read More...
|
Electronics and Communication, Robotics |
India |
506-510 |
132 |
Emission Analysis of using Four Spark Plug in Two Stroke Single Cylinder Petrol Engine.
-Durgeshchandrasinh I Rathod ; Chirag D Singal; Bharat C Dabhi; Ronak V Patel; Mayur J jalnapurkar
In conventional two stroke engine, power is delivered by igniting the charge (Air+Fuel) by the spark plug. when the compression of charge is near about to finish with help of piston approaching to Top dead center(TDC) at that time spark jumps between the electrode of spark plug which ignite the charge. Due to the design of combustion chamber and other factors like, rich mixture, lean mixture, turbulence, complete combustion of fuel is not achieved and result in power losses, increasing in temperature of cylinder, piston etc and produces the exhaust emission. In two-stroke single cylinder petrol engine if four spark plugs is used to ignite the fuel than we can achieved the complete combustion of fuel which is not achieved by using single spark plug as mono spark plug provide less spark. The complete combustion of fuel leads to reduction in exhaust emission like hydrocarbons (HC) carbon monoxide (co)and oxides of nitrogen (NOx). Read More...
|
Automobile engineering |
India |
511-512 |
133 |
Flexural Fatigue Strength of Reactive Powder Concrete under Repeated Cyclic Loading
-Uma Shankaryaligar ; Uma Shankaryaligar; Prof. S. M. Muranal; Dr. R. B. Khadrinaikar
RPC is an ultra-high strength and high ductility composite material with advanced mechanical properties. The high strength concrete fail under fatigue loads at load level below its static capacity. In the present study reactive Powder concrete with compressive strength of 165 MPa was produced. The hardened concrete is tested for compressive strength, flexural strength and flexural fatigue strength. An experimental investigation performed in which total 54 flexural fatigue tests and 15 static flexural tests are conducted on RPC specimens 100 x 100 x 500 mm in size containing steel fibre and polypropylene fibres separately. The results obtained from flexural fatigue tests are presented as S-N curve, with maximum fatigue stress expressed as a percentage of the strength under static loading and S-N relation is developed by carrying out regression analysis to determine fatigue life. Read More...
|
CIVIL ENGINEERING |
India |
513-517 |
134 |
Comparative Analysis of Demultiplexer using Different Logic Styles
-Abdhesh Kumar Jha ; Anshul Jain
Low power and high speed digital circuits are basic needs for any of digital circuit; De-multiplexer is a basic circuit for any digital circuit. In this paper de-multiplexer has been designed using CMOS, transmission gate pseudo nmos logic. The performance of designs has been compared in terms of power consumption, delay and transistor counts. The proposed design demonstrates the superiority in terms of power dissipation, delay and transistor counts, compared with existing 1:4 de-multiplexer and comparative analysis on 90nm and 45nm technology. The schematic of developed de-multiplexer has been designed and simulated using Tanner EDA tool. Read More...
|
VLSI DESIGN |
India |
518-521 |
135 |
Low Power Design of Counter Using DDFF and Dual Mode Logic
-M.R.Sangameswari ; V.Vishnuprasath
Reducing power consumption in very large scale integrated circuits (VLSI) design has become an interesting research area. To reduce the power a new dual dynamic node hybrid flip-flop (DDFF) and an embedded logic module (DDFF-ELM) based on DDFF are used here. Both of them eliminate the drawbacks of existing high performance flip-flop designs. The proposed design mainly reduces the power consumption by eliminating the large capacitance present in the pre-charge node of several existing flip-flop designs by separately driving the output pull-up and pull-down transistors by following split dynamic node structure. This reduces the power consumption up to 40% compared to conventional architectures of flip-flops. The DDFF and DDFF-ELM are compared with other flip-flop designs by implementing in a Johnson up-down counter. The DML is introduced in Johnson counter to improve the speed performance by allowing the system to switch between static and dynamic modes of operation according to its requirements. Read More...
|
Applied Electronics |
India |
522-528 |
136 |
Intelligent Vehicular Tracking System For Smooth Public Trasnport
-Akshaya Tonde ; Kalashree Borgaonkar; Apoorva Behere
Many approaches had been proposed for travel time prediction in recent years. Travel time prediction for urban network in real time is challenging, because we have to overcome several factors: complexity and path routing problem in urban network, nonexistence of real-time sensor data and lacking real-time events consideration. In this paper, we propose a heuristic approach based on real-time travel time prediction model which contains real-time and historical travel time predictors to forecast travel time for public transport system. The proposed framework uses three GPS-Data fields (Date-Time, Latitude, and Longitude) to estimate Travel Time, Distance and Speed. As a case study, we have maintained a database for day-to-day traffic behavior of Pune, India. The implementation of this framework will show that using only three GPS data fields, travel time prediction can be achieved. Read More...
|
Computer Engineering |
India |
529-532 |
137 |
Overview on the Bionic Eye
-Kalyan Vasantrao Bisen ; Prof. A. N. Shire; Pof. U. S. Jawarkar; Vedprakash A. Yede; Vidysager Patel
The artificial electronic eye is a bionic eye. The bionic eye provide vision to the visually challenged people by using the modern day electronic devices such as CCD camera and bionic eye implant. The implant consist a small chip which is implanted surgically behind the retina in the eye ball. The bionic eye consist two methods i.e. multiple unit artificial retina chip (MARC) and artificial silicon retina (ASR). This paper tries to give a new approach of bionic eye using nanogenerator. The nanogenerator is used to provide compactness, better power and high efficiency to the bionic eye as compared to the external batteries. Read More...
|
Electronics Engineering |
India |
533-534 |
138 |
Privacy Preservation Data Publishing Using Slicing
-Vishakha Kamble ; Sheetal Jadhav; Nilesh Dolse
In earlier days we have techniques like Bucketization and Generalization for Privacy preservation. Since these two techniques have some disadvantages like, for high dimensional data we can’t use Generalization as it loses considerable amount of information. Also Bucketization on the other hand, does not prevent membership disclosure and does not apply for data that do not have a clear separation between quasi-identifying attributes and sensitive attributes. Hence, to overcome above disadvantages, we are introducing new technique called as Slicing, which partitions the data both horizontally and vertically. Slicing preserves better data utility than generalization and can be used for membership disclosure protection. Another important advantage of slicing is that it can handle high-dimensional data. We show how slicing can be used for attribute disclosure protection. Our experiments confirm that slicing preserves better utility than generalization and is more effective than Bucketization involving the sensitive attribute. Our experiments also demonstrate that slicing can be used to prevent membership disclosure. Read More...
|
INFORMATION TECHNOLOGY |
India |
535-537 |
139 |
Analysis and Comparison of Different Peer to Peer Lookup Protocols
-Pragya singh ; Prof. Trupti Manik
This paper revolves around Peer-to-Peer (P2P) lookup systems which implements large scale lookup directory service that operate in dynamic peer-to-peer networks. P2P lookup provide many different Features i.e. Selection of nearby Peer, efficient search/location of data items, redundant storage ,data permanence or guarantees hierarchical naming, authentication and trust and anonymity. P2P also offer an efficient routing architecture i.e massively scalable, self-organizing, and robust in wide-area, combining fault tolerance, load balancing and explicit notion of locality. The main aim of this paper is to Analyze and compare various P2P lookup protocol. The review work includes the classification of various approaches or methods that could be selected for working with P2P look up protocol. It could then serve as the base to start with new research work by upcoming researchers. Read More...
|
Information Technology(cloud computing) |
India |
538-542 |
140 |
A Comparison of Data Mining Classification Algorithms Using Breast Cancer Microarray Dataset: A study
-N.Poomani ; Dr. R.Porkodi
Classification is one of the most familiar data mining Technique and model finding process that is used for transmission the data into different classes according to particular condition. Further the classification is used to forecast group relationship for precise data instance. It is generally construct models that are used to predict potential statistics trends. Medical science industry has huge amount of data, but unfortunately most of this data is not mined to find out hidden information in data, advanced data mining techniques can be used to discover hidden pattern in data. This Present study and analysis of various classification algorithms in data mining. This paper also presents the comparative study on four classification algorithms such as naïve bayes, CART, J48Graft, JRip algorithms using breast cancer dataset. The comparative results show that the J48Graft algorithm gives best classification accuracy than the rest of the algorithms. The algorithms also compared based on the execution time and error rate. Read More...
|
Computer Science |
India |
543-547 |
141 |
Navigatr- Dual screen application
-Ajay Kumar ; Pritesh A. Patil; Anuj More; Ramesh R. Nair
Dual Screen applications provide a new user experience taking advantage of two displays. This all happens using Android for external devices (Android 4.2.2 and above) and MHL technology. MHL stands for Mobile High-Definition Link and is a technology found in many devices, displays and accessories today. MHL enabled smartphones and tablets connect to HD displays, delivering crystal-clear HD content and immersive surround sound, while simultaneously charging the phone. It's the Magic in the Middle. The MHL ecosystem has continued to grow with an installed base of hundreds of millions of products from many of the world’s leading consumer and mobile device companies. One of the most important applications of this technology is in MHL supported presentations. When the presentation is started, it goes live on one of the display screens like projector which is connected via a MHL cable while on the other display screen the options like time limit for an individual slide, total time limit for the entire presentation. In addition to this the background color will change according to time. It will become orange for 20sec, red for 10sec and so on. Additional features like sound system like a single buzzer for 20 seconds, double buzzer for last 10 seconds and so on can be kept. Since this is all based on industry standards; the number of compatible devices is growing very rapidly. Read More...
|
Information Technology |
India |
548-551 |
142 |
Vehicle Automation Management in Urban Area
-Sanket Kulkarni ; Shivprasad Patil ; Raj Avhale; Avinash Chikane
The aim of this paper is to help the Auto-Rickshaw drivers and the passenger to interact with each other and also to server each other in an efficient way. This application will be used by customer to get the Auto-Rickshaw by one click on android phones, to find nearest to his cellular zone with the help of GPS tracking system and by clicking on customer can call them. Driver side application provides location tracking system to start location tracking and to stop tracking location is done socket listener services. The socket listener will keep on updating the information of Auto-Rickshaw driver in the database also it will continuously put the location based information of the Auto-Rickshaw driver in the database. To find nearest Auto-Rickshaw driver, we are using Haversine Formula that provides us distance in KM. this application will be useful for the Auto-Rickshaw Drivers to get the customer , to save the unnecessary wastage of fuel and also to increase their daily profit margin. Read More...
|
Information Technology |
India |
552-555 |
143 |
Stress And Strain Analysis of Robot Arm
-R.Ashok Kumar ; S.Arunkumar; K.Vinothkumar
The aim of the paper is to design and analysis of inspection robot which used to inspect the weld joints, cracks, and tiny holes in hazardous waste storage tank. The wastes extract from nuclear reactor is collected and stored in storage tank and at certain period it will dispose. So, the tank is monitoring by human beings at regular intervals. The waste is very hazardous to human health. It may affect human beings, so my project is to place robot instead of human beings. Robot is going to design by modeling software and various analyses to be done. Finally the idea is to be given for their future project. Read More...
|
MECHANICAL ENGINEERING |
India |
556-558 |
144 |
Third Party Auditing (TPA) for Data Storage and Maintaining Integrity of Data in Cloud
-Madhuri R. Rokade ; Siddaling B. Natikar
Cloud storage enables users to remotely store their data. Many users place their data in the cloud and so data integrity is very important issue in cloud storage. After moving the data to the cloud, owner hopes that their data and applications are in secured manner. But that hope may fail sometimes that is the owner’s data may be altered or deleted. Numerous present remote integrity inspection methods can only serve for static collection data and not to the audit service as the data in the cloud can be dynamically updated. Thus, an efficient and secure dynamic auditing protocol is desired to convince data owners that the data are correctly stored in the cloud. Thus, design an auditing framework for cloud storage systems can be built and put forwards an efficient and privacy-preserving auditing protocol. Then, here extend auditing protocol to support the data dynamic operations, which is efficient and provably secure. Again, further extending to provide the data integrity to the data present in cloud by using algorithms. Again to preserve integrity of file stored in cloud and provide better privacy for user slicing technique is added. Read More...
|
Computer Engineering |
India |
559-561 |
145 |
Study & Analysis of Structural Behavior of Front Suspension Rear Shackle Bracket
-Mr. Dattatray Gavade ; Prof. Satej Kelkar
This paper reviews work done in the area of Design & optimization of Suspension Shackle Bracket by FEM. Shackle Bracket is part of leaf spring mechanism/ assembly, which accommodate leaf deformation, when subjected to operational load. Simple, to allow for length changes of a leaf spring. A leaf spring suspension is a pretty simple thing, leafs position the axle under the vehicle, and supports the weight of the vehicle. As a leaf spring flexes up or down, its length from eye to eye changes. Since one end is mounted solidly, and can’t move, all the length change happens at one end, which has a shackle between the spring and frame to allow for movement. Provides support for front spring and Transfers forces to frame. Shackle bracket is made from casting and forming process. In this paper shackle bracket structure is used for study the structural behavior of main whole structure under different working load conditions. Pro-E software is used for 3D modeling of structure & Nastran software is used to carry out Nonlinear & linear Static analysis of structure to find out the maximum stresses & deformation. Read More...
|
Mechanical Engineering |
India |
562-564 |
146 |
State of the Art Review on Road Traffic Noise Mapping using GIS
-Jigna Patel ; Mitali J. Shah
Noise pollution generated from vehicles with its influence on life quality and the environment may be considered as a hot topic in scientific research and one of the main concerns of the world, especially in urban areas, regarded as growing problem of communities. Due to explosion of population, industrialization the transportation in urban has been increased to unimaginary heights. Hence, vehicular traffic has been increased and road traffic noise levels are increased simultaneously. In order to implement effective measures against traffic noise, the information about its distribution in the form of Noise maps is imperative. In this study, Noise mapping using Geographical information system (GIS) has been reviewed. Read More...
|
Environmental Engineering |
India |
565-568 |
147 |
Application of Discrete Wavelet Transform in Medical Image Fusion
-T.S. Udhaya Suriya ; R. Kavya; S. Sivaranjani
In radiology different scanning techniques such as X-rays, CT (computed Tomography), MRI (Magnetic Resonance Imaging) are used to evaluate the physical disorders of human organs. The goal of this paper is to improve the quality of the image by Medical Image Fusion which is more useful for image processing such as segmentation, feature extraction and object recognition. This paper mainly presents image fusion using Discrete Wavelet Transform (DWT) for high resolution and high accuracy using MATLAB which provides an effective image fusion with wavelet transform for preserving the future information of test images. Read More...
|
Biomedical Engineering |
India |
569-571 |
148 |
Multi User Data Sharing with Aggregated Keys in Clouds
-M.sasidharan ; N.S Nithya
Data sharing is an important functionality in cloud storage. Data owner maintains the shared data under cloud data centers. Semi-trusted third party servers are used to manage medical records. Personal Health Record (PHR) is used to create, manage and control their personal health data in one place through the web. Patient data can be shared with healthcare providers, family members and friends. Sensitive details are managed in medical records. Data owner decides the access privileges for the medical records. The Existing Public-key cryptosystems produce constant-size ciphertexts with efficient delegation of decryption rights for any set of ciphertexts. One can aggregate any set of secret keys and make them as compact as a single key. The secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage. This compact aggregate key can be conveniently sent to others or be stored in a smart card with very limited secure storage. The key aggregation system is divided into five major steps. They are Setup, KeyGen, Encrypt, Extract and Decrypt. The setup process is designed to creating an account on an untrusted server by the data owner. The keygen process is executed by the data owner to randomly generate a public/master-secret key pair. Encrypt process is executed by anyone using public key and index value. Extract is carried out by the data owner for delegating the decrypting power for a certain set of ciphertext classes to a delegate. Decrypt is executed by a delegate who received an aggregate key KS generated by Extract. Patient controlled encryption scheme is designed using Key Aggregate cryptosystem (KAC).The proposed key aggregate cryptosystem is enhanced with boundary less ciphertext classes. The system is improved with device independent key distribution mechanism. The key distribution process is enhanced with security features to protect key leakage. The key parameter transmission process is integrated with the ciphertext download process. Read More...
|
Computer Science and Engineering |
India |
572-576 |
149 |
Implementation of Order Processing System Based on Platform as a Service Provided by Salesforce1
-Sujata Patel ; Priyanka Shinde; Saylee Naik; Gayatri Chavan
Cloud computing refers to manipulating, configuring and accessing the applications online. It offers online data storage, infrastructure and application. In existing system waiter takes order manually and order details is explained to the chef. This process takes more time and it affects on customer satisfaction. The customer needs such a system which will process this task automatically. This system is developed on Salesforce1 platform. Salesforce1 is a cloud computing platform which provides the cloud computing services such software as a service and platform as a service. Read More...
|
Information Technology |
India |
577-578 |
150 |
Closed loop INsulin delivery system based on non-invasive glucose measurement
-P. Ganesh Babu ; A. Abdul Salam Rasmi; Aleena Prakash; B. Israth Nazneen; R. Pranith Jain
Diabetes has become a serious health issue of this century. To overcome this situation Continuous Monitoring of glucose is necessary which is quite challenging task. The use of Non-invasive technique for measuring Blood Glucose level is a better way for Continuous Monitoring. Automation in Insulin Delivery to the patient has also become a boon to Diabetes therapy. This paper aims to combine the concepts of continuous monitoring and automated insulin delivery. The proposed work is to design a completely automated diabetic therapy system which can be used by the patient himself/herself without assistance. The measurement of glucose level is achieved with a Near Infra-red (NIR) Light Source and the required amount of insulin is delivered to the patient with the help of Micro-Actuator controlled by a Stepper Motor. Read More...
|
Biomedical Engineering |
India |
579-580 |