No. |
Title and Author |
Area |
Country |
Page |
51 |
Sensor Networks Data Gathering Scheme for Deterministic and Probabilistic Network Models
-G.Ravichandran ; Dr.A.Viswanathan
Data Aggregation Trees (DATs) are used to gather and aggregate data values from the sensor nodes. DATs are constructed to fulfill different user requirements under the Deterministic Network Model (DNM). Probabilistic Network Model (PNM) is built with probabilistic lossy links. Load-Balanced Data Aggregation Tree (LBDAT) is constructed under the PNM. Load-Balanced Maximal Independent Set (LBMIS), Connected MIS (CMIS) and LBDAT construction problems are solved in the data gathering scheme. Approximation algorithm is used to search for an LBMIS. Load Balanced Parent Node Assignment (LBPNA) is performed using the randomized approximation algorithm. LBDAT is constructed by assigning a direction of each link in the tree from the children node to the parent node. The LBDAT construction scheme is enhanced for the distributed model. The system is improved to support DNM and PNM based WSN. The distributed LBDAT scheme is tuned to manage monitoring area environment. Coverage relationship is integrated in the LBDAT construction process. Read More...
|
Computer Science and Engineering |
India |
193-197 |
52 |
Adaptive Beamformer Algorithms For Smart Antennas
-Harshveer Singh Grewal ; Paramveer Singh Gill
Adaptation algorithms that adjust the adaptive filters coefficients in order to minimized the associated error norm. In this paper we have discussed the two main adaptation algorithms least mean square (LMS) and recursive least square (RLS) algorithms. These two common algorithms that have found widespread application are least squares .LMS algorithm is a linear adaptive filtering algorithm which involves the automatic adjustment of the Parameter of the filter in accordance with estimation error. RLS algorithm is used in adaptive filters to find the filter coefficients that relate to recursively producing the least squares of the error signal and estimate the desired output results .These algorithms to reduce the mean square between the input signal and reference signal .we have also discussed formulation of the LMS algorithm, convergence and stability of the LMS algorithm and RLS algorithm. Read More...
|
Electronics & Communication Engineering |
India |
198-200 |
53 |
A Review on Parametric Evaluation on Performance of Titanium Alloy Using Coated & Uncoated Carbide Insert on CNC Lathe
-Patel Kunjkumar Shankarbhai ; Mr. Kiran Patel
This study considers a comparison of responses obtained by PVD coated carbide insert and uncoated carbide insert during dry turning of titanium alloy of grade 5 which is also known as Ti6Al4V. Titanium alloy has many applications such as aerospace components, medical surgical parts etc. due to their properties such as high strength to weight ratio, heat treatable and better corrosion resistance. In this experiment, turning of titanium alloy was carried out using different cutting parameters like speed, feed and depth of. Experimentation was based on Taguchi’s L9 orthogonal array. Surface roughness was measured for each combination of input parameter. The analysis of variance (ANOVA) is employed to find the optimal levels and to analyze the effect of the cutting parameter. Read More...
|
Mechanical (Production) Engineering |
India |
201-203 |
54 |
Control of a Reverse-Osmosis Water Desalination System using PI Controller
-SHUBHANSHU MISHRA ; Shubhanshu Mishra; Dr. N S Beniwal; Gaurav Kishore
This work focuses on the design and simulation of a controller for a reverse-osmosis (RO) water desalination system to compensate for the set point changes in feed water supply. A PI controller is designed and its parameters are calculated to minimize the error and to produce an optimum response. This controller is then implemented on the RO system and its set-point tracking capabilities are evaluated. Read More...
|
Electrical Engineering |
India |
204-206 |
55 |
Speed Control of Three-Phase Induction Motor Using FPGA
-Rajashekar Kanti ; Manish.G.Rathi
The induction motor is without doubt the most used electrical motor because of its unique characteristics. Induction motors are the most common motors used in industrial motion control system due to its low-cost, simple and rugged design. Induction motors drives are widely used to control the speed of conveyor systems, blower speeds, pump speeds, machine tool speeds, and other applications that require variable speed. In this paper a closed loop speed control strategy is implemented of Variable-Voltage Variable-Frequency (VVVF) method based on sinusoidal pulse width modulation technique (SPWM) for a three phase induction motor using a FPGA (Xilinx Spartan-3E XC3S100E). The speed control program has been developed in Xilinx 12.1 software using VHDL language. This implementation provides wide range of speed control for the induction motors. Read More...
|
ELECTRICAL ENGINEERING |
India |
207-209 |
56 |
Review on the Use of both Fly-Ash and Pond-Ash in Concrete Mix Design
-Mihir Rathod ; Shipra Sharma
In today’s Era energy planners are aiming to increase the use of Oil, Gas, Nuclear and also Renewable Energy sources to meet the electricity demand in India. But till now coal-based thermal power plants are the major source of electricity generation and they will continue to dominate in the next few decades too. One of the major disadvantages of coal-based thermal power plants is the disposal problem of Fly Ash. It was earlier considered as a total waste and an environmental hazard, thus its use was limited, without much understanding. Fortunately, its useful properties have now begun to be known as raw material for various applications. Fly ash from the thermal plants is available in large quantities in fine and coarse form. Fine fly ash is used in construction industry in some amount and coarse fly ash is subsequently disposed over land in slurry forms. In India around 165 MT fly is produced and only around 40% of that is being utilized in different sectors. Balance fly ash is being disposed over land. It needs one acre of land for ash disposal to produce 1MW electricity from coal. Fly ash and pond ash utilization helps to reduce the consumption of natural resources. The fly ash became available in coal based thermal power station in the year 1930 in USA. For its gainful utilization, scientist started research activities and in the year 1937, R.E. Davis and his associates at university of California published research details on use of fly ash in cement concrete. This research had laid foundation for its specification, testing & usages. This study reports the potential use of pond-ash as a replacement for sand and fly-ash as cement in concrete mixes. The study investigated the effect of waste pond-ash as partial replacement of fine aggregates in various percentages, on concrete properties such as mechanical (compressive strength, splitting tensile strength and flexural strength) and durability characteristics (rapid chloride penetration and deciding salt surface scaling) of the concrete. This paper deals with the review of literature for fly-ash and pond-ash as partial replacement of cement and fine aggregates in concrete. Read More...
|
Civil Engineering |
India |
210-212 |
57 |
Investigation on the Performance and Exhaust Emission of a Four Stroke CI Engine using Diesel
-Gohil Jaysukh Samatbhai ; Jaysukh S Gohil; Agrawal Surendra; Dinesh Dabhi
Energy storage system plays an important role in electric vehicles. In these energy storage systems, a large number of battery cells are usually connected in series to enhance the output voltage for motor driving. The difference in electrochemical characters will cause state-of-charge (SOC) and terminal voltage imbalance between different cells. In the existing system, a hybrid cascaded multilevel converter which involves both battery energy management and motor drives. Each battery cell can be controlled to be connected into the circuit or to be bypassed by a half-bridge converter. All half bridges are cascaded to output a staircase shape dc voltage. Then, an H-bridge converter is used to change the direction of the dc bus voltages to make up ac voltages. The outputs of the converter are multilevel voltages with less harmonics and lower dv/dt, which is helpful to improve the performance of the motor drives. The imbalance of terminal voltage and SOC can also be avoided, Sso the life of the battery stack will be extended. In the proposed system, the level of the multi-level inverter can be increased to further reduce the total harmonic distortion without change in the circuit topology. Read More...
|
Mechanical Engineering |
India |
213-218 |
58 |
Developing Computer Software for Optimization Techniques of Spur & Helical Gear Design
-R.K.Mantri ; V.B.Jadhao
This paper deals with the development of software for optimizing spur gear design using three objectives namely pinion diameter minimization, pinion volume minimization and power maximization. The power development involves Buckingham dynamic load approach in addition to the AGMA approach. The optimization is done through developed software, which avoids the tedious procedure of repetitive mathematical calculations (iterations) in the gear design procedure. Read More...
|
Mechanical Engineering |
India |
219-222 |
59 |
Survey of Anonymity Techniques for Privacy Preserving
-Neha Prajapati
The advancement of information technologies has enabled various organizations (e.g., census agencies, hospitals) to collect large volumes of sensitive personal data (e.g., census data, medical records). Data in its original form, however, typically contains sensitive information about individuals, and publishing such data will violate individual privacy. Protecting data privacy is an important problem in micro data distribution. Recently, there are various methods and techniques which have been created for providing privacy to the process of data mining. Anonymity techniques typically aim to protect individual privacy, with minimal impact on the quality of the released data. In this paper we provide an overview of anonymity techniques for privacy preserving. We discuss the anonymity models, the major implementation ways and the strategies of anonymity algorithms, and analyze their advantage and disadvantage. Then we give a simple review of the work accomplished. Finally, we conclude further research directions of anonymity techniques by analyzing the existing work. Read More...
|
Computer Engineering |
India |
223-226 |
60 |
Two Hop Based Method for Progressive Packet Arrival in Delay Tolerant Networks
-Mihir Modi
Delay-tolerant networking (DTN) is an approach to computer network architecture that seeks to address the technical issues in heterogeneous networks that may lack continuous network connectivity. Generally in networks the ability to transport, or route, data from a source to a destination is a fundamental ability all communication networks must have. Delay and disruption-tolerant networks (DTNs) are characterized by their lack of connectivity, resulting in a lack of instantaneous end-to-end paths. In this challenging environment we are able to effectively forward the packets from source to destination. When we need to transfer a large file from source to destination then here we are making all these packets available at source and then transfer as small packets. We are analyzing the performance of packets arriving at the source and then considering the linear blocks and rate less random linear coding to efficiently generate the redundancy as well as the energy constraint in the optimization. And then these small packets of large file are forward through the multiple paths to destination by using optimal user centric allocation and scheduling the packets at receiver side. We determine the conditions for optimality in terms of probability of successful delivery and mean delay and we devise optimal policies, so-called piecewise-threshold policies. Read More...
|
Computer Engineering |
India |
227-230 |
61 |
A Survey on High Utility Itemset Mining from Transactional Databases
-Monali Patil ; Ankita Shah
Data Mining can be defined as an activity that extracts some new nontrivial information contained in large databases. Traditional data mining techniques have focused largely on detecting the statistical correlations between the items that are more frequent in the transaction databases. Also termed as frequent itemset mining, these techniques were based on the rationale that itemsets which appear more frequently must be of more importance to the user from the business perspective .In this paper we throw light upon an emerging area called Utility Mining which not only considers the frequency of the itemsets but also considers the utility associated with the itemsets. The term utility refers to the importance or the usefulness of the appearance of the itemset in transactions quantified in terms like profit, sales or any other user preferences. In High Utility Itemset Mining the objective is to identify itemsets that have utility values above a given utility threshold. In this paper we present a literature review of the present state of research and the various algorithms for high utility itemset mining. Read More...
|
Computer Engineering |
India |
231-233 |
62 |
Load-balancing algorithm for distributing Session Initiation Protocol (SIP) requests to a cluster of SIP servers
-Riken Patel ; Rajvirsinh Vaghela
This paper introduces the several load balancing algorithms for distributing Session Initiation Protocol (SIP) request to a cluster of SIP servers. Our load balancer algorithm Transaction Least Work Left is used to allocate work to least values of the servers. It is combine knowledge of the SIP. Two types of state exist in SIP. The first, session state, is created by the INVITE transaction and is destroyed by the BYE transaction. The session-oriented nature of SIP has important implications for load balancing. The SIP is a protocol of growing importance, with uses for VOIP, IPTV, audio conferencing, instant messaging. We Session-aware request assignment (SARA) is the process where a system assigns requests to servers such that sessions are properly recognized by that server, and subsequent requests corresponding to that same session are assigned to the same server. We compare our algorithms to several well-known approaches and present scalability results. Our algorithm, Transaction Least-Work-Left (TLWL), achieves its performance by integrating several features: dynamic estimates of back-end server load, knowledge of the SIP protocol, recognizing variability in call length, distinguishing transactions from calls and exploiting differences in processing costs for different SIP transaction. Read More...
|
Computer Engineering |
India |
234-237 |
63 |
A Robust Technique for verifying the neighbor positions in MANET
-Sejal Rana
Mobile ad-hoc network is a collection of independent mobile nodes that can communicate to each other via radio wavesâ€. After nodes are deployed, they do not have knowledge about the neighbors so, they need to discover their neighbors in order to communicate with them. Knowledge of the neighbor nodes is essential for almost all routing protocols, medium-access control protocols and other topology control algorithms. Now, neighbor node may be trustable node or adversarial node so verification of node is require. For neighbor position verification NPV protocol is used. NPV protocol deals with verifying the neighbor node location. Nowadays, location awareness has become very important in MANET because wide range of protocol and application require knowledge of the position of participating nodes. So it is require improving NPV protocol. Examples of services that build on the availability of neighbor position information are Geographic routing in spontaneous networks, data gathering in sensor networks, movement coordination among robotics nodes, location specific services for handheld devices. Existing NPV protocol has some limitation like Lower Performance and False Positive Rate and False Negative Rate are high. So the objective of our proposed system is improve the FPR and FNR means minimize the FPR and FNR. Read More...
|
Computer Engineering |
India |
238-242 |
64 |
A Reinforcement Learning Network based Novel Adaptive Routing Algorithm for Wireless Ad-Hoc Network
-Jagrut Solanki
Mobile communication has enjoyed an incredible rise in quality throughout the last decade. Network dependability is most important concern in wireless Ad-hoc network. a serious challenge that lies in MANET (Mobile Ad-hoc network) is that the unlimited mobility and lots of frequent failure because of link breakage. Standard routing algorithms are insufficient for Ad-hoc networks. as a results of major drawback in MANET is limited power provide, dynamic networking. In MANET each node works as a router and autonomously performs mobile practicality. The link connectivity changes ceaselessly because of mobility to reflect this routing information additionally needs to get changed ceaselessly. AODV protocol is projected for this extraordinarily mobile network. In ancient AODV if any node fails in middle of transmission the method starts from the source node but in our propose scheme the transmission starts from the closest neighbor node therefore shows very important reduction in delay and improvement in packet delivery ratio are achieved. It also reduces the routing overhead by reducing the frequency of route discovery process. Read More...
|
Computer Engineering |
India |
243-247 |
65 |
A Survey : A Comparative study on Partitioning and Hierarchical Algorithms for Document Clustering using MATLAB
-Sejal Patel ; Ankita Shah
Clustering is a useful technique that organizes a large quantity of unordered text documents into a small number of meaningful and coherent clusters. This paper presents the comparative study on clustering algorithms i.e. K-means and Hierarchical Clustering using MATLAB. MATLAB is a multi-paradigm numerical computing environment and fourth-generation programming language, developed by MathWorks. Read More...
|
Computer Engineering |
India |
248-251 |
66 |
An Efficient Acknowledgement based Intrusion-Detection System for MANETs
-Avnika Patel ; Sujata Panda
The migration of wired network into wireless network form has been a worldwide trend among the past few decades. A very attractive and promising category of wireless networks that has emerged is based on an Ad Hoc topology; these networks are called Wireless Ad Hoc Networks. The term wireless network implies a computer network in which the communication links are wireless. The term Ad Hoc comes from the fact that there is no fixed infrastructure for forwarding/ routing the packets. MANET does not need a set of network infrastructure; every single node works as each a transmitter and a receiver and they trust their neighbors to relay messages. Nodes communication directly with each other once they are in range intervals constant communication varies. The self-configuring ability of nodes in MANET created it modern among very important mission applications like military use or emergency recovery. In recent years, the security problems on MANET have become one of the primary concerns. MANET is more vulnerable to be attacked than a wired network. These vulnerabilities are nature of the MANET structure that can’t be retrieved. As a result, attacks with malicious intent have been and can be devised to exploit these vulnerabilities and to cripple the MANET operation. Attack prevention measures, such as authentication and encryption, are often used as the first line of defense for reducing the possibilities of attacks. But, these techniques have a limitation on the effects of prevention techniques in generally and that they are designed for a set of known attacks. They are unable to prevent newer attacks that are designed for circumventing the existing security measures. For this reason, there is a requirement of second mechanism to detect these newer attacks and which is none aside from intrusion detection system. Read More...
|
Computer Engineering |
India |
252-256 |
67 |
Cryptography Based Method for Preventing Jamming Attacks In Wireless Network
-Bhoomi Patel
Nowadays, wireless networks became more affordable. As a consequence of this, they're being deployed virtually all over in numerous forms, starting from cellular networks to sensor and wireless local area networks. As these networks are gaining popularity, providing security and trustiness is additionally changing into a key issue. We address the problem of selective jamming attacks in wireless networks. In these attacks, the attacker selectively targets specific packets of “high†importance by exploiting his knowledge on the implementation details of network protocols at varied layers of the protocol stack. We have a tendency to illustrate the impact of selective jamming on the network performance by illustrating varied selective attacks against the TCP protocol. We have a tendency to show that such attacks may be launched by performing real-time packet classification at the physical layer. We examine combination of cryptographic primitives with physical layer attributes for preventing real-time packet classification and neutralizing inside knowledge of the attacker. Read More...
|
Computer Engineering |
India |
257-261 |
68 |
A Novel Approach to Hardware Implementation of LDPC Codes Applicable in Image Processing
-Neelam Chaudhary ; Er. Rishi Pal
Low density parity check (LDPC) codes are linear block codes used for error detection and correction mostly in high speed digital communication systems like digital broadcasting, optical fiber communications and wireless local area networks. LDPC codes have been subject to extensive research because of their significant performance in error correction. LDPC Code is a type of Block Error Correction code discovered and performance very close to Shannon’s limit .Good error correcting performance enables reliable communication. In this paper we have used a bit flipping algorithm to encode and decode the communication data. The input is a grayscale image and the output is verified using co-simulation between the MATLAB Simulink and QuestaSim. The FPGA implementation has done on the Xilinx 4 and the power consumption has calculated using Xilinx Power Analyzer. Read More...
|
Electronics&Communication |
India |
262-265 |
69 |
FPGA Implementation of LDPC Codes: A Review
-Neelam Choudhary ; Er. Rishi Pal
In this paper we have taken a review of the LDPC codes and their performance evaluation that has been implemented on FPGA. This paper constitutes an attempt to highlight some of the main aspects of the theory of low-density parity check (LDPC) codes. It is intended for a mathematically mature audience with some background in coding theory, but without much knowledge about LDPC codes. Read More...
|
Electronics&Communication |
India |
266-267 |
70 |
Gap Filling of Solar Radiation Data Using Polynomial Fitting and Wavelet Transform Comparison
-vidhyawathy.v ; Dr.P.M.Beulah Devamalar; Dr.V.Thulasi Bai; D.Jahnavi
The amount of solar energy received is highly transient in nature, due to many meteorological conditions and needs to be analyzed for different applications like weather forecasting, resource assessment etc. The data captured using electronic data acquisition system is large, and thus there is a need to filter the data, to modify the data to be compact. Thus the data was filtered by using polynomial fitting method. This paper aims to fill the gaps of missing solar radiation data and to compare various wavelet transforms such as Haar wavelet, daubechies wavelet (D10) in compressing received solar radiation data. Read More...
|
electronics and communication engineering |
India |
268-270 |
71 |
Survey : Secure Live VM Migration In Public Cloud
-Nisha Rathod ; Prof. Sandip Chauhan
Virtualization technology is at the heart of cloud computing technology. One particular physical host may contain more than one virtual machine. In cloud computing, Virtual machine may require to migrate on other physical host to perform maintenance of physical host, to run server consolidation process, load balancing and fault tolerance. When one has decided to perform live VM migration, one has to consider the security threats occurred during migration process and provide counter measures for the same to securely complete the process. In this paper we described live migration procedure, security threats occurred during live migration and available solution to secure live VM migration. Read More...
|
Computer Engineering |
India |
271-274 |
72 |
Vertical Axis Wind Turbine with Maglev Technology
-Amit Dasharath Patil ; Amit Dasharath Patil; Amit Wasudeo Chake; Manoj I. Helonde; Pro. Pravin M. Gupta
The paper proposes a method to implementing non-conventional source of energy for the generation of electricity. A vertical axis wind turbine is introduced by magnetic levitation technology to optimize the performance. The system utilize nature of permanent magnet as a replacement for ball bearings to levitate the turbine component and thus minimize energy losses while rotating, which is the major problem that faced by conventional wind turbine. Furthermore, the system can be suited in use for rural and urban areas of low wind speed regions. The selection of magnet materials in the design of wind turbine system will be discussed. A model of wind turbine is built to perform several tests such as starting wind speed, rotational speed at constant wind speed, and time taken to stop rotation completely. The results obtained will be compared with the model of conventional wind turbine. Power will then be generated with an axial flux generator, which incorporates the use of permanent magnets and a set of coils. Read More...
|
Mechanical Engineering |
India |
275-276 |
73 |
Strider Honey Monkey Exploit Detection System
-Prajakta Jaybharat Jadhav ; Arati Gaikwad; Ritu Jadhav; Prof.Sandeep Chavan
Malicious web pages that use drive-by download attacks or social engineering techniques to install unwanted software on a user’s computer have become the main avenue for the propagation of malicious code. To search for malicious web pages, the first step is typically to use a crawler to collect URLs that are live on the Internet. Fast pre-filtering techniques are used to reduce the amount of pages that need to be examined are more precise, but slower, analysis tools. While effective, these techniques require a substantial amount of resources. The main key reason is that the crawler encounters many pages on the web that are beign, that is, the “toxicity†of the stream of URLs being analyzed is low. Read More...
|
Computer Engineering |
India |
277-279 |
74 |
Document Clustering using Enhanced Similarity Measurement for Text Processing
-M.Krishnamoorthy ; V.Sharmila; P.Balamurugan
Clustering is one of the most important techniques in machine learning and data mining tasks. Similar data grouping is performed using clustering techniques. In document vector each component indicates the value of the corresponding feature in the document. The feature value can be term frequency, relative term frequency. Similarity Measurement for Text Process (SMTP) is used to compute the similarity between two documents with respect to a feature. Presents and options of the features in both documents are used to estimate the similarity values. The SMTP is extended to estimate similarity between two set of documents. The SMTP scheme is used with text clustering and classification task.The system is designed to perform document clustering using Similarity Measurement for Text Process (SMTP). Spherical K means algorithm is used for the clustering process. Concept relationships are identified with the support of ontology. Dimensionality reduction functions are applied to minimize the features. Read More...
|
computer science and engineering |
India |
280-285 |
75 |
COMPARISON OF INTERPOLATION FILTER STRUCTURES
-Harsimranjeet Singh ; Paramveer Singh Gill
The design and implementation of interpolation filters has been a subject of intense research for the last few years. Different interpolation filter designs have been proposed using different design algorithms and implementation structures. In this paper, a review of different designs of interpolation filters and the implementation structures has been presented. Read More...
|
Electronics & Communication Engineering |
India |
286-289 |
76 |
Digital Fuel Indicator in Two Wheelers
-Awadhesh Kumar ; Sandip Kumar Singh
Digital fuel indicator gives the exact quantity of fuel / gasoline in the fuel tank. In recent time, petrol bunk was very common. A number of petrol bunk in now a days manipulated in this way that it displays the fuel amount as filled, but in real sense the fuel filled quantity in the tank of the customer is very less than the value of displayed amount. This petrol bunks results in great profit for the petrol pump owner, but at same time customers are being cheated. In India about to all two wheelers vehicles are consists of ‘analog meters’. This analog meter does not help in precise quantity of fuel currently in the fuel tank of the vehicles, and in this way it does not help in cross- checking the amount of fuel filled at the petrol pump. But in this time in the world product are going to digitized for the purpose of benefits and friendliness of the customers. Therefore, we are going to discuss a project named as “Digital Fuel Indicator in Two Wheelersâ€. The digital fuel indicator displays the exact volume of the remaining fuel in the fuel tank. Read More...
|
Mechanical Engineering |
India |
290-293 |
77 |
Experimental Investigation of Performance on Diesel Engine with Different Blends of Castor Oil at 100% EGR
-Bharat M. Jibhakate ; S. D. Butley
Biodiesel has been used as a renewable and potential fuel in diesel engines. Biodiesel and its blends with diesel is a better substitute on the basis of single fuel concept for diesel engine. Many researchers have tried different proportions of the blends with diesel. Difficulty with biodiesel run engine is that it emits higher NOx emission. In order to overcome this limitation researchers have adopted various techniques. The present work is to study the effect of Exhaust Gas Recirculation (EGR) on the performance and emissions of a single cylinder diesel engine. Exhaust Gas Recirculation (EGR) System means to use the Exhaust Gas coming from Exhaust Manifold to inlet manifold in order to reduce the emission of NOX, which is particularly very harmful. This paper reports the experimental investigation carried out on the direct injection diesel engine when pure diesel, B25% castor oil, B75% castor oil at 100 % EGR. This research paper illustrates the thermal performance on diesel engine including brake power, total fuel consumption, brake mean effective pressure, brake specific fuel consumption, brake thermal efficiency. Using Exhaust Gas Recirculation (EGR) Technique in engines, the emissions are very much controlled. This method is very reliable in terms of fuel consumption. Read More...
|
Mechanical Engineering |
India |
294-297 |
78 |
Analysis of Wind Energy Integrated with Battery
-Nabam Tader ; Pradeep Kumar; M.Lavanya
The peak generation of wind farms and peak load demands typically do not occurs at the same time due to the variations in speed of wind and gives a stochastic output. The main aim of this paper is to study a wind farm integrated with an energy storage device at turbine level in order to shift the wind power generation to peak demand period. In order to measure the effect of integration, actual profiles of load ,wind energy and other power source is studied and the effective load carrying capability for wind energy. The effective load carrying capability (ELCC) is calculated after and before adding the storage device (Battery). It results that the battery can make significant improvement in the ELCC of wind energy and also it gives a higher efficiency. Read More...
|
ELECTRICAL AND ELECTRONICS ENGINEERING |
India |
298-301 |
79 |
Design And Development Of Sport Utility A Football Launching Machine.
-Lakhbeer. Singh. Marhas ; Lakhbeer Singh Marhas ; Ketankumar Kanojiya; Vicky Dhapodkar ; Mohan G Trivedi
The Football (Soccer) is one of the popular game in the world. Nowadays most of the players are trained with the help of practice machine. In this paper the concept for Football launching is fabricated to develop the skills of the goal keeper and striker, to defend the strikers at the time of penalty shoot outs and mean while in the complete matches. It is completely involves with aerodynamic and mechanics principles. This concept was designed and developed to simulate the different varieties of motions, speeds, and trajectories, accurately and repeatedly. Two counter rotating wheel mechanism imparts both translational and rotational motions with spin. It was portable, flexible, battery powered, operable at various horizontal and vertical planes and desired combinations of both planes. This machine is simple and user friendly, for assisting in acquiring the required skills for a player independently and to enhance their skills. Read More...
|
Mechanical Engineering |
India |
302-304 |
80 |
Type Of Conveyor System
-Vijay M. Patil ; Vijay M. Patil; Niteshkumar A. Vaidya; Roshan L. Katkar; Prof. Piyush S. Pande
Conveyor equipment selection is a complex, and sometimes, tedious task since there are literally hundreds of equipment types and manufacturers to choose from. The expert system approach to conveyor selection provides advantages of unbiased decision making, greater availability, faster response, and reduced cost as compared to human experts. Conveyor types are selected on the basis of a suitability score, which is a measure of the fulfillment of the material handling requirements by the characteristics of the conveyor. The computation of the score is performed through the Weighted Evaluation Method, and the Expected Value Criterion for decision making under risk. This paper discusses the work done by the different researchers for the development of conveyor system for industrial purpose. Read More...
|
Mechanical Engineering |
India |
305-307 |
81 |
Evaluation of Tools & Techniques Used For Frontal Crash Analysis
-Shailesh Sambhaji Patane ; K. M. Narkar; Dhananjay Panchagade
Frontal and side crashes causes the severe injury to the occupants and damage to the components. The objective of this study is to evaluate various tools and techniques used for analysis of dynamic response of vehicle occupants and automobile components during frontal and side impact. Crash simulation is a virtual recreation of a destructive crash test of a vehicle and its components using a computer aided analysis software in order to examine the level of safety of the vehicle and its occupants. CAD software are generally used for modeling of the vehicle components, this CAD data is transferred to an FEM software for pre-processing, solving and post-processing followed by interpretation of results related to energies, acceleration and displacements with different loads & boundary conditions possible in various accidental situations. Simulation software like LSDYNA, Pamcrash, Abaqus-Explicit and others are used to perform crash simulations. Multibody analyses have been applied extensively in biodynamic modeling and in investigations of the dynamic behavior of bio systems. In this study multibody dynamics method is used to explore frontal collision phenomena. Specifically, it study examines the dynamic response of the human body in a crash event and assesses the injuries sustained to the occupant’s head and chest. The multibody dynamics results are found to be in good agreement with the numerical results found using crash simulation tools. Read More...
|
Automobile Engineering |
India |
308-312 |
82 |
Gesture Recognition of Patient Using Accelerometer
-Shashikant Rathod ; Shashikant Rathod; Vijay Bansod; Bhimrao Jadhao
To develop an accelerometer based system to interpret the need of patient using gesture recognition .These accelerometers are being attached to the fingers of both the palms for capturing the movements. The prime focus was on the accelerometer which will start sending the analog value of the patient movement into the voltage form and the same analog voltage value will be converted into digital voltage value information of the necessity of the patient with the aid microcontroller and it will be displayed on the LCD display screen attached at the receiver side for respective voltage value information. It uses the microcontroller, RF module and accelerometer as its main components. This is to facilitate the doctors with the necessity of the patient while the patient is in non-communicative state, and has a very good range of application in Intensive Care Unit (ICU), CCU, and ICCU. Read More...
|
Bio-medical Engineering |
India |
313-315 |
83 |
Enhancement of Weather Monitoring and Near Places using GPS
-Ishwar Ethape ; Girish Dawkhar; Ishwar Ethape; Pratiksha Jadhav; Gauri Kate
Global positioning system find nearby location Street Address, City, Country and Zip code. Also Show you’re way to reach the place with speed of traveling. This application is used for emergency case we able to find location of nearby places and contact detail. It’s providing automatically emergence call to the particular location. Google map find distance of the two places. Also know driving direction of the two cities and Traveling time and distance of the place. Application is finding nearby places. Weather is exceptionally easy to use app for staying always updated with the weather conditions. The Weather app is specifically designed to be as simple and intuitive as possible. With just one click you receive the weather condition in your status bar at your current location. The climate state is gorgeously animated so that you can almost experience it, seeing how the weather comes alive. The project is using world weather online API as a data channel and the live updates are really tiny so that you would not use up your data cap .Thus we are trying to develop a App as Weather Monitoring GPS which will recognize the near places and the weather. Read More...
|
Computer Engineering |
India |
316-317 |
84 |
Methanol Fueled Marine Diesel Engine
-Aswad Sagdeo ; Mukesh Yadav; Jitendra C. Singh; Rohit L. Tiwari; Ankit Pratap Singh
Now a day’s concerns about methanol have increased from the viewpoints of environmental protection and versatility of fuels at a global scale. Energetic research on methanol-fueled automobile engines has been forwarded from the viewpoints of low environmental pollution and the use of alternate fuel since the oil crisis, and they are now being tested on vehicles in various countries in the world. Desire for saving of maintenance cost and labour prevails as well as the environmental problems in the field of marine engines. From these motives scientists have carried out research and development of a methanol fueled marine diesel engine which is quite different from automobile engines in the size, main particulars, working condition and durability. Although scientists have made a great use of invaluable knowledge from automotive technology, some special studies were necessary due to these differences. Ignition method is a typical one. Dual fuel injection system was tried for trouble-free ignition of methanol fuel. This system is thought to be the most favorable ignition method for marine diesel engines which have to withstand quick load change and accept no misfiring. Read More...
|
Mechanical Engineering |
India |
318-320 |
85 |
Compressed Air Vehicle
-Aswad Sagdeo ; Shubham Barat; Mohit Waswani; Rishikesh Kumar Singh; Abhay Kumar Jha
As the world is hard pressed with the energy and fuel crises, compounded by pollution of all kinds, any technologies that bring out the solutions to this problem is considered as a bounty. In one of such new technologies, is the development of a new engine called as compressed air engine which does not require any of the known fuels like diesel, petrol, CNG, LPG, hydrogen etc. this works using only compressed air. This replaces all types of to-date known fuels and also permanently solves the problems of pollution as its exhaust is clean and cool measured practically as low as 5ºC. A proto type, a horizontal, single cylinder low speed engine was modified to run on compressed air. Since this engine runs only on high pressure compressed air, the exhaust of which is undoubtedly only air, making it a zero pollution engine. No heat is generated because there is no combustion of fuel, hence this engine needs no cooling system and it result in reduced cost, weight, volume and vibration. Early cost analysis shows that it's very cost effective and the operational cost is ten times less than that of petrol or diesel. Read More...
|
Mechanical Engineering |
India |
321-324 |
86 |
Effect of Bandwidth Variation of a Low Pass Filter of CDOB for Time-Delay Compensation
-Gaurav Kishore ; Dr. N S Beniwal; Shubhanshu Mishra
This paper presents effectiveness of cut off frequency of a low pass filter of communication disturbance observer (CDOB). This compensation technique requires system model only and not time model. So we can apply this compensation technique to both constant and variable time delay. In this paper, the validity of compensation technique with simulated result has been shown. Read More...
|
Electronics & communication engineering |
India |
325-327 |
87 |
A Single Layer High Gain Y-Slot Rectangular Microstrip Patch Antenna Array for S Band Applications
-Ashraf Husain ; Surendra Kumar Sriwas
The performance and advantages of microstrip patch antennas such as low weight, low profile, and low cost made them the perfect choice for communication systems engineers. The design and simulation of different microstip line fed antenna array is presented. This paper describes the design and performance of a corporate feed antenna array. The operating frequency of 2.45GHz is used. The aim of this paper is to improve the gain of a corporate feed antenna array. Line feed is used for designing single antenna, 1x2 & 1x4 microstrip antenna array. These corporate feed microstrip antenna arrays are useful for S band application. The proposed antenna is simulated by IE3D version 9.0 Zealand simulation software based on method of moments. Read More...
|
Electronics & communication engineering |
India |
328-330 |
88 |
A Review on use of magnetic effect in refrigeration and air conditioning
-Nikhil S mane ; H M Dange
Energy saving, Efficiency and Environment friendliness of the refrigeration system is the main focus of the Refrigeration and Air conditioning industry. It is seen that there are different methods to use magnetic effect to produce lower temperatures. These different methods have different devices, different features as well as different working principles. At present day almost all these methods have potential to enter into the market. This review paper gives a list of methods of use of magnets in refrigeration. The aim of this paper is to provide a review on the methods used to produce lower temperatures using magnetic effect. Read More...
|
Mechanical Engineering |
India |
331-332 |
89 |
Text Classification for Spam Filtering Using Naive Bayes
-Deepali S.Mane ; Deepali D.Thakur; Pranita L. Shinde; Sheetal Thakare
An efficient anti-spam filter that would block all spam, without blocking any legitimate messages is a growing need. To address this problem, we examine the effectiveness of statistically-based approaches Naïve Bayesian anti-spam filters, as it is content-based and self-learning (adaptive) in nature. Additionally, we designed a derivative filter based on relative numbers of tokens. We train the filters using a large corpus of legitimate messages and spam and we test the filter using new incoming personal messages. More specifically, four filtering techniques available for a Naïve Bayesian filter are evaluated. We look at the effectiveness of the technique, and we evaluate different threshold values in order to find an optimal anti-spam filter configuration. Based on cost-sensitive measures, we conclude that additional safety precautions are needed for a Bayesian anti-spam filter to be put into practice. However, our technique can make a positive contribution as a first pass filter. Read More...
|
Computer Engineering |
India |
333-336 |
90 |
Comparison of Controllers for a Flow Process in a Conical Tank
-A.Nazreen Banu ; M.Shehenaz Fathima; A.Nisha; S.Ramachandran
Flow control in a conical tank is a highly nonlinear process due to variation of cross sectional area of tank with height. This is due to relationship between controlled variable, flow and manipulated variable, flow rate, which has a square root relationship. Conical tanks find wide applications in process industries. Their shape contributes to better dispersal of solids, when mixing and provide more complete drainage, especially for viscous liquids. This paper proposes different tuning methods of PID controller for a flow process. Four different controller tuning methods are taken. They are closed ZN method, modified ZN method [without overshoot], Internal Model Control Method and Model Predictive Control method. These four methods are compared and listed out in a table. Among these MPC method is the best tuning method of PID for a Flow process. Read More...
|
Instrumentation and Control Engineering |
India |
337-339 |
91 |
A Survey of Automatic Feature Based Image Registration Techniques
-Pooja Chawla ; Darshana Mistry; Bimal Kumar
Image registration is a process of aligning two or more images of the same scene taken from different viewpoints, at different times, and/or by the different sensors. Image registration is a key process in various fields like remote sensing, medical imaging, computer vision and cartography. Image registration procedure consists of four basic steps: feature detection, feature matching, transformation model estimation and image transformation and resampling. Automatic image registration is still a challenging task, particularly for remote sensing images. This paper aims to provide a comprehensive review of existing image registration techniques along with their advantages and limitations. Read More...
|
Computer Engineering |
India |
340-343 |
92 |
Low Power Minimization Technique and Strategies
-Arthi R ; Mythili R
Low power has emerged as a principal theme in today’s world of natural philosophy industries. Power dissipation has become a vital thought in terms of performance and space for VLSI Chip style. With shrinking technology, reducing power consumption and over all power management on chip area unit the key challenges below 100nm attributable to redoubled complexness. For several styles, improvement of power is vital as temporal arrangement attributable to the necessity to cut back package value and extended battery life. For power management leak current conjointly plays a vital role in low power VLSI styles. Leakage current is turning into an progressively vital fraction of the full power dissipation of integrated circuits. This paper describes regarding the assorted ways, methodologies and power management techniques for low power circuits and systems. A future challenge that has got to be met to style an occasional power high performance circuits are mentioned. Read More...
|
Low Power |
India |
344-346 |
93 |
An Efficient CSLA Design by Using Modified Logic Formulation Method
-Gopi D ; Kamalkumar V
Adders are widely used in most VLSI applications such as microprocessors and DSP applications to perform arithmetic functions. Carry select adder (CSLA) provides a good compromise between cost, area and performance among other high speed adders. In the existing method, fixed Cin bits are used for logic optimization of carry select (CS) and carry generation (CG) units. The CG unit which consists of separate CG units (CG0 & CG1) after that CS unit is used to design a CSLA structure. The proposed CSLA is designed by using modified logic formulation method which consists of CG0 & CG1 units are combined to form a single carry generate unit and the CS unit used only in every first bit for selecting the CG operations. The proposed CSLA is designed by using ripple carry adder (RCA), half sum generation (HSG), CG, CS and full sum generation (FSG). The synthesis results of the proposed methods show that it significantly reduces the area and delay than the existing CSLA. The simulation and synthesis results are obtained by using modelsim 6.4a and Xilinx 8.1i. Read More...
|
LOW POWER VLSI DESIGN-ELECTRONICS ENGINEERING |
India |
347-349 |
94 |
Opinion Mining Techniques for Social Network Analysis: A Survey
-Poornima Singh ; Gayatri S Pandi (Jain)
Opinion Mining is a process of automatic extraction of knowledge from the opinion of others about some particular topic or problem. With the growing popularity of the Web 2.0, people are more and more provided with documents expressing opinions on different topics. In recent times, new research approaches were defined in order to automatically extract such opinions on the Internet. This review article focuses on the basics of Opinion Mining, analysis of data sources required for Opinion Mining. Further, machine learning techniques on the basis of their usage and importance for the analysis, tools, evaluation of Sentiment classifications and its various applications have also been overviewed. Read More...
|
Computer Engineering |
India |
350-354 |
95 |
Analysis of Carbon Fiber Epoxy Composite Leaf Springs
-Prof. P.P. Awate ; Prof. N.D.Patil ; Prof. P.P. Awate ; Prof. N.V. Hargude
Composite materials are ideal for structural application where high strength to weight, stiffness to weight ratio and force to weight are required. Aircraft and spacecraft are typical weight sensitive structures in which composite materials are cost effective. The study of composite materials involves many topics for example manufacturing processes, anisotropic, elasticity strength of anisotropic materials and micromechanics. Here we are dealing with automobile component i.e. composite leaf spring. Leaf springs are mainly used in suspension systems to absorb shock loads in automobiles like light motor vehicles, heavy duty trucks and in rail systems. It carries lateral loads, brake torque, driving torque in addition to shock absorbing. The weight reduction of the leaf spring can have a certain role in the general weight reduction of the vehicle and is a highly desirable goal, if it can be achieved without increase in cost and decrease in quality and reliability. Weight reduction can be achieved primarily by the introduction of better material, design optimization and better manufacturing processes. The suspension leaf spring is one of the potential items for weight reduction in automobiles un-sprung weight. This achieves the vehicle with more fuel efficiency and improved riding qualities. Read More...
|
Mechanical Engineering |
India |
355-357 |
96 |
Study of Dry Sliding Wear Behavior of Brass with EN31 Steel on Wear and Friction Monitor Machine
-Suthar Nehalkumar Shankarlal ; Prof. Dhruv Y. Dave; Mr. Sachin P. Patel
This paper presents a study of the behaviour of the brass/steel pair in the presence of friction and wear. A plan of experiments, based on the techniques of Taguchi, was performed on a pin-on-disc machine. The objective was to establish a correlation between load, sliding velocity and temperature in contact with the wear and coefficient of friction. In this study we investigated the wear behaviour of brass and gun metal-based bearing materials in dry sliding conditions. The parameters such as load, sliding speed and sliding distance were identified will affecting wear rate. The design of experiments (DOE) approach using taguchi method was employed to analyze the wear behaviour of hybrid composites. Signal-to-noise ratio and analysis of variance (ANOVA) were used to investigate the influence of parameters on the wear rate. Read More...
|
MECHANICAL ENGINEERING (PRODUCTION ENGINEERING) |
India |
358-360 |
97 |
Optimizing SPARQL Queries Using Graph Traversal A lgorithm
-Mr. Jaykishan B. Likhiya ; Asst. Prof. Daxa V Vekariya
Large amounts of interlinked semantic data are available for the semantic web. Linked open data are increasing exponentially on the web. This enables users to retrieve quality and complex information from the web, which include searching and querying linked data. World Wide Web Consortium has standardized SPARQL as a query language for the semantic linked open data. Current SPARQL query processing is still on its early stages for both scalability and efficiency. There are several approaches have been proposed but only few are implemented. This approach proposes the use of graph traversal algorithms for the optimization of SPARQL query. SPARQL query can be optimized using this approach in two phases. In first phase, we proposed to generate a query execution plan using graph traversal algorithm. Second phase focuses on to reduce the search space and optimize. To optimize the query execution, individuals which are not connected to any other individual are removed with acceptable loss of knowledge base. It represents a generic representation of graph for any ontology. The query is executed again on the revised graph which will have reduced query execution time with acceptable loss of knowledge base. Read More...
|
Computer Engineering |
India |
361-364 |
98 |
Maglev Power Generation - A Review
-Ajay Lakshman Parate ; Pawan Madhukar Kumbhare; Rahul Chandrabhan Patekar; Prof. Pravin Gupta
The paper project purpose dwells on the implementation of an alternate configuration of a wind turbine for power generation purposes.. A vertical axis wind turbine (VAWT) is introduced by magnetic levitation technology to optimize the performance. The system utilize nature of permanent magnet as a replacement for ball bearings to levitate the turbine component and thus minimize energy losses while rotating, which is the major problem that faced by conventional wind turbine. The Maglev Wind Turbine is expected to bring wind power technology to the next level. Furthermore, the system can be suited in use for rural and urban areas of low wind speed regions. The selection of magnet materials in the design of wind turbine system will be discussed. A model of wind turbine is built to perform several tests such as starting wind speed, rotational speed at constant wind speed, and time taken to stop rotation completely. The results obtained will be compared with the model of conventional wind turbine. Power will then be generated with an axial flux generator, which incorporates the use of permanent magnets and a set of coils. Read More...
|
MECHANICAL ENGINEERING |
India |
365-367 |
99 |
Study of Different Forces And Aerodynamics On Soccer Ball: A Review
-Mohan G. Trivedi ; Roshan N. Patel; Rohit P.Sadana; Rakesh Rana
The Football (Soccer) is one of the popular games in the world. Nowadays most of the players are trained with the help of practice machine. In this paper the forces occurred on the soccer ball and the complete kinematics generated on the soccer ball is observed. This paper completely involves with aerodynamic and mechanics principles. The basic fundamental study for Force analysis will help for designing the ball launching machine for the football players, which simulates the practice sessions, varieties of motions, trajectory and variable speed imparted on the goal keeper and shooters while playing. Read More...
|
Mechanical Engineering |
India |
368-370 |
100 |
Edge Preservation with Noise Reduction in Arthritis Image
-Devkant Sen ; Neha Tiwari
In last decade medical image quality improvement most popular topic for research. There are many methods are present for improving medical images. In the field of medical image processing, digital images very often get corrupted by several kinds of noise during the process of image acquisition. In this paper, we will present a new method for removal of impulse noise with edge preservation and enhancing quality. The method is based on eliminating impulse noise from MR, X- Ray images. A mean median-based method to remove impulse noise from digital MRI images has been developed. The method is adjusted in order to decide whether the median operation can be applied on a pixel. In this research, to suppress this deficiency, noisy pixels are initially detected, and then the filtering operation is applied on them. The proposed decision based un-symmetric mean median method (DBUMM) is simple and leads to fast filtering. The results are more accurate than other conventional filters. DBUMM detection stage a more powerful here we have use an alpha trimmed median filter for removal of noisy pixels. As a considerable advantage, some unnecessary median operations are eliminated and the number of median operations reduces drastically by using DBUMM. Decision based un-symmetric mean median filtering method leads to more acceptable results in scenarios with high noise density gives better peak signal noise ratio (PSNR) and better image quality. Furthermore, the proposed method reduces the probability of detecting noise-free pixels as noisy pixels and vice versa. Read More...
|
Medical Image Processing |
India |
371-375 |