No. |
Title and Author |
Area |
Country |
Page |
1 |
PRIVACY PRESERVING CLUSTERING ON HORIZONTALLY PARTITIONED DATA USING ZERO KNOWLEDGE PROOF
-Smita D Patel ; Prof. Sanjay Tiwari
Zero Knowledge Proof is one of the classical construct that acts as cryptographic primitive in basic multiparty protocols implementing identification schemes and secure computation. A few recent results that convert protocols working in semi-honest models to malicious models using interactive zero knowledge proofs and research on protocol implementing zero knowledge proofs in multiparty environments efficiently have pave the path for similar solutions. This research focuses on providing solution in malicious model by implementing zero knowledge proof system where multiple parties intend to perform privacy preserving clustering on horizontally partitioned database. Read More...
|
Computer Engineering |
India |
1-5 |
2 |
Modeling and Simulation of Doubly Fed Induction Generator Driven by Wind Turbine
-Pooja A. Patel ; Sweta Chauhan
Environmental pollution and shortage of conventional fossil fuel are the two major concerns which have led to the global emergence of wind energy as an effective means of power production. The evolution of technology related to wind systems industry leaded to the development of a generation of variable speed wind turbines that present many advantages compared to the fixed speed wind turbines. These wind energy conversion systems are connected to the grid through Voltage Source Converters (VSC) to make variable speed operation possible. The studied system here is a variable speed wind generation system based on Doubly Fed Induction Generator (DFIG). This paper deals with mathematical modelling of doubly fed induction generator driven by wind turbine. The modelling procedure is briefly explained, mathematical descriptions and Simulink models of the wind power plant basic parts are shown and the model of the whole system is presented. Read More...
|
Electrical Engineering |
India |
6-9 |
3 |
DCB Interlaminar fracture toughness of glass fiber/ modified epoxy nano composite laminates
-S.Magibalan ; Dr. P.S. Sampath; M. S. Senthil Kumar
Delamination crack growth in laminated composites is investigated using experiments and modified beam theory. Tests were performed on cross-ply E-glass/nano modified epoxy specimens under the static conditions. The load–displacement response is monitored in the tested coupons along with crack length. Crack growth and strain measurements were compared with those from the modified beam theory. The matrix of the nanocomposites were obtained by adding 2%, 4%, 6%, 8%,10% of nanoclays in weight into epoxy matrix. Read More...
|
Mechanical Engineering |
India |
10-12 |
4 |
Review paper on speed of Brushless DC Motor- a comparative study
-Monika G. Soni ; Girish V. Jadhav; Pranav Chaudhari
In this paper the detail of BLDC motor is shown. BLDC motor is used in many way. we can control the speed by different methods. but here the comparison study of different methods is shown. conventional methods like pi, pid don’t give better result for speed control. these methods don’t increase the speed of response .but fuzzy control & neuro-fuzzy system give better output then these methods .in this paper we compare the result of speed with different method. Read More...
|
Electrical Engineering |
India |
13-15 |
5 |
Review of Modern Technique for Mining Top Ranked Association Rule
-Anu Singh ; Abhishek Raghuvanshi
In this paper, we propose an efficient algorithm to mine the top-k association rules, where k is the number of association rules to be found and is set by the user. Association mining is a fundamental and well researched data mining technique. However, depending on the choice of the parameters (the minimum support and minimum confidence), current algorithms can become very slow and generate an extremely large amount of results or generate none or too few results, eliding useful information. This is a serious problem because in practice users have limited resources for analyzing the results and thus are often only interested in finding a certain amount of results, and fine tuning the parameters is time-consuming. Experimental and theoretical results indicate that the algorithm is highly effective and has excellent performance and scalability and that it is an advantageous alternative to classical association rule mining algorithms when the user want to control the number of rules generated. Read More...
|
Information Technology |
India |
16-20 |
6 |
Mathematical Modelling of Small Wind Power Plant with Asynchronous Generator in Simulink
-Nikita V.Majumdar ; Vikash Verma
This paper deals with mathematical modelling of wind power plant with induction generator. The modelling is briefly explained, mathematical description and Simulink model of wind plant basic parts shown and the model of whole system is presented. Read More...
|
Electrical Engineering |
India |
21-24 |
7 |
Auto Drilling on Metal Block by 3 Stepper Motor
-Jinal M Patel ; Riddhi H Shah; Dattukumar Patel
This project will help manufacturer to automate machine in way that it can remove the worker problem, it can work with high accuracy and it can also provide fast production. These all benefits can be obtained with low cost .A bipolar stepper motor are used to move following items with the use of drivers like first stepper motor is used to move the roller in a circular direction, second stepper motor is used to move the roller in horizontal direction and the third stepper motor is used to move up and down that is in a vertical direction. When the frequency rises the power also rises but at a certain frequency level we get is the peak point and there after the power starts decreasing. Read More...
|
Electronic Engineering |
India |
25-28 |
8 |
Study of axial flow fan components and its failure affecting the performance
-CHANDRA PRAKASH YADAV ; SATYA NARAYAN KUMAR; Dr. L.A.Kumaraswamidhas
Ventilation is a critical task in underground mining operation. Ventilation controls the air movement, its amount, and direction which provides adequate fresh air to miners for a safe and comfortable working environment. Fans, which provide air flow to different faces of a mine, have a great role of impact in ventilation systems. In this paper study has been carried out on the different components of an axial fan and their failures which is affecting its performance. For that Blade failure, Shaft failure, Bearing holding U-bolts, pitching angle, Blade chord angle, Tip clearance, Erosion and corrosion parameters have been considered. Read More...
|
Mining and Mechanical Engineering |
India |
29-32 |
9 |
Throughput Performance Comparison of AODV, OLSR, TORA Mobile Ad Hoc Network Protocols Under the Random Walk Mobility and Random Way Point Model
-Sitaram gupta ; R.K. Bairwa
Mobile ad hoc Network consists of mobile networks which create an underlying architecture for communication without the help of traditional fixed-position routers. MANET is group of mobile nodes which uses multi hop transmission for communication. Routing in MANET is challenging task, moreover presence of malicious nodes make the overall network very insecure furthermore dynamic nature of moving nodes adds to the complexity. Mobility of the nodes has substantial influence on the network performance. Present Paper reports the performance comparison of throughput in between Proactive routing protocol by focusing on Optimized Link State Routing (OLSR), Reactive Routing Protocol by focusing on Ad Hoc on Demand Distance Vector (AODV) and Temporally Ordered Routing Algorithm (TORA). The performance analysis of three Mobile Ad Hoc Network (MANET) routing protocols has been done under the two mobility models i.e. Random Walk Mobility Model and Random Way Point. Read More...
|
Computer engineering |
India |
33-35 |
10 |
Prediction of Runoff using Artificial Neural Networks (A Case study of Khodiyar Catchment Area)
-Srivastav Mahesh B. ; Prof. Gandhi Haresh M.; Prof. Ramanuj Pinak S.; Prof. Chudasama Milan K.; Shri Joshi Jignesh A.
The present study aims to utilize an Artificial Neural Network (ANN) for modeling the rainfall runoff relationship of Khodiyar catchment area located in Amreli district, Gujarat, India. An Artificial Neural Network (ANN) methodology was employed to predict monthly runoff as a function of precipitation, temperature, evaporation losses, infiltration losses and humidity. The paper illustrates the applications of the feed forward network for the Runoff prediction with various algorithms and accordingly, different structures of ANNs were used and their efficiencies in terms of the mean squared error ‘MSE’, training and validation determination coefficients ‘R’ to select better predicted Runoff data were examined. The monthly hydrometric and climatic data of Khodiyar Watershed in ANN were ranged from 1971 to 2010 and analyzed in order to calibrate the given models. Efficiencies of the Back-Propagation (BP), conjugate gradient (CG) and Levenberg-Marquardt (L-M) training algorithms are compared to improving the computed performances and 72 models were prepared to select a best model having mean square error ‘MSE’ nearer to zero and co-relation factor ‘R’ nearer to unity. The results revealed that the best model is composed of the feed-forward networks, trained by the Levenberg-Marquardt algorithm and considering only one hidden layer. The results extracted from the comparative study indicated that the Artificial Neural Network method is more appropriate and efficient to predict the river runoff than classical regression model. The ANN model provides a more systematic approach, reduces the length of calibration data, and shortens the time spent in calibration of the models. Read More...
|
Civil Engineering |
India |
36-39 |
11 |
A Loose Clustering based QoS Aware Routing Protocol for Power Heterogeneous MANETs
-R.Chozhaprabhu ; Karthik.R
Power heterogeneity is common in mobile ad hoc networks (MANETs).With high-power nodes; MANETs can improve network scalability, connectivity, and broadcasting robustness. However, the throughput of power heterogeneous MANETs can be severely impacted by high-power nodes. To address this issue, we present a loose-virtual-clustering-based (LVC) routing protocol for power heterogeneous (LRPH) MANETs. To explore the advantages of high-power nodes, we develop an LVC algorithm to construct a hierarchical network and to eliminate unidirectional links to reduce the interference raised by high-power nodes; we develop routing algorithms to avoid packet forwarding via high-power nodes. Also introduce Quality based service and admission control technique for routing. Quality based service decrease the delay and energy failure. Admission control used to avoid packet loss. Providing quality of service (QoS) assurances in a mobile ad hoc network (MANET) is difficult due to node mobility, contention for channel access, a lack of centralized co-ordination, and the unreliable nature of the wireless channel. A QoS-aware routing (QAR) protocol and an admission control (AC) protocol are two of the most important components of a system attempting to provide QoS guarantees in the face of the above mentioned difficulties faced. Read More...
|
computer science and engineering |
India |
40-43 |
12 |
Stress Analysis of an FRP Pressure Vessel
-Sai Prasad Annangi ; T. Seshaiah
Light weight composite pressure vessels can be used in space applications. Composite pressure vessels need number of layers to achieve required thickness and also to achieve required strength to bear the pressure of gases/liquids.The aim of this paper is to provide composite pressure vessel with sufficient strength using different layer orientations.Structural calculations will be done to find the stress and strains values theoretically.3D modeling will be done according to the allowable standards.Structural and thermal analysis will be conducted on pressure vessel using different layer orientations and the above analysis will be done on traditional material for comparison. Read More...
|
Mechanical Engineering |
India |
44-47 |
13 |
Identification of Weakest Bus with respect to Increasing Loading Effect
-Parth Harshadkumar Bhavsar ; Chintan Amrutlal Patel; Pirmahammad Jamalbhai Vasovala
Voltage instability problem increases day by day because of increase demand in power. It is important to analyses the power system with respect to voltage stability. The power system analysis and design is generally done by using power flow analysis. With the help of different stability indices which can give an accurate indication to power system voltage instability with considering the influence of the load model, the stability of the bus is identified. This can identify the efficient bus among all the buses. As an application of identifying efficient bus, approach is to identify voltage stability for buses, and to transfer loads of faulty bus or weak bus to this efficient bus. There are different methodologies can be used to transfer this kind of loads to efficient bus with which stability of the system can be achieved. Read More...
|
Electrical Engineering |
India |
48-50 |
14 |
All Optical Packet Switches based on Space Switch Array for the Transmission of Higher Data Rate using NRZ and RZ Modulation
-Divya T S ; Avani nath N J
The explosive growth of the Internet traffic requires the design of next generation switching systems accommodating huge data-centric traffic at the packet level. All-optical packet switching (OPS) with greater flexibility, granularity and switching capacity is able to meet the complexity of traffic. An all-optical fiber-optic switching device maintains the signal as light, from input to output. Semiconductor optical amplifiers (SOAs) are widely studied as nonlinear elements for high bit rate all-optical switching applications, such as wavelength conversion and regeneration. All optical switches incorporating SOAs have peculiarities like small size, low switching energy requirement and high non linearity. Here simulation of a 4 x 4 optical packet space switch array based on Optically Amplified Suppressed Interference Switches (OASIS) with different data rate has been performed. The OptiSystem version-12 simulator is used to model the structure, it is also used to assess the behavior and performance of this switch array. The simulation of 4x4 space switch array with different bit rate and for different modulation format is done which gives the BER within the acceptable range. Implications of cascadability of this switch array will be analysed which improves the quality and capacity of the existing networks Read More...
|
Electronics And Communication Engineering |
India |
51-54 |
15 |
Performance Evaluation of Hybrid Amplifiers
-JIPSY SUDARSANAN ; VIDYA RAJ
For several years, optical fiber communication systems are being extensively used all over the world for telecommunication, video and data transmission purposes. This is because optical fiber is capable of allowing the transmission of many signals over long distances. However, attenuation is the major limitation imposed by the transmission medium for long haul networks. So, with the growing transmission rates and demand in the field of optical communication, the electronic regeneration has become more expensive. Then, power optical amplifiers came into existence, which eliminated the costly conversions from optical to electrical signal and vice versa. Due to the need of longer unrepeated transmission distances Wavelength Division Multiplexing (WDM) optical transport networks are expected to provide capacity required to satisfy growing volume of telecommunication traffic in a cost effective way. For optimum utilization of available fiber bandwidth, various combinations of optical amplifiers in different wavelength ranges are made. The combination of two or more amplifiers are termed as Hybrid amplifiers. Hybrid amplifiers are attractive in optical communication as they expand the system bandwidth in long haul transmission. In this work, different combinations of hybrid amplifiers are simulated using software OptSim 5.3 and their performance is compared with respect to transmission distance.The observation shows that SOA-RAMAN-EDFA is the best among all hybrid amplifier combinations in terms of Q factor, output power and eye opening. Read More...
|
Electronics and communication |
India |
55-58 |
16 |
Retina Controlled Computing
-MANISH DEV POONIA ; MUKESH R. CHAURASIA; YADAV AJITKUMAR R.; MISTRY NIKULKUMAR R.; SANDIP J. DAWDA
Retina controlled computing deals with controlling our computers with human retina which basically aims at replacing the function of the mouse of PCs with our retina. Retina controlled computing deals with developing such a system in which the actions performed on the monitor will be completely governed by the movement of the retina of human eye This includes the scrolling up and down of the screen, opening up of any folder just with the help of our eyes and many such functions. This project will not only prove to be a further advancement in the computer technology but will also be a beneficial way of handling the computers for disabled persons. Read More...
|
ELECTRONICS AND COMMUNICATION ENGINEERING |
India |
59-60 |
17 |
Hands Free System Control using Face Tracking and Speech Recognition
-Shruti Tandur ; Dilip Kale; Abhiruchi Tayade
This paper presents a simple prototype system for real time tracking of human face and speech. It uses a simple and effective algorithm. This algorithm is efficient in terms of computation and has the ability to work in different environment. The objective of this paper is to demonstrate a system which uniquely utilizes real time video of the users’ face captured using the in-built web-camera and allowing speech inputs from the user to perform operations on the system. The position of the face is tracked and converted into two-dimensional coordinates on a computer screen. Additionally, speech recognition is used to operate the machine and give more functionality to it. Read More...
|
Computer Engineering |
India |
61-63 |
18 |
State of the Art in TCP Friendly Congestion Control Techniques
-Sachin Upadhyay ; Dr. Pankaj Dashore; Parag Jain
This article provides a survey of TCP friendly congestion control techniques. It summarizes the state of the art in this field of research. We also propose a classification hierarchy that sets the basis for analyzing the work which has been performed in this context. A detailed review of the work accomplished in this area is also given, along with the coordinates of each work to the classification hierarchy. A brief evaluation is performed and some initial conclusions are made. Read More...
|
Computer Networks |
India |
64-65 |
19 |
An Automatic Can or Plastic Bottle Crusher Machine - A Review
-VISHAL NAMDEO KSHIRSAGAR ; Dr.S.K.Choudhary; Prof. A.P. Ninawe
Crushers are major size reduction equipment used in mechanical and allied industries which crushes different types of soft and hard materials. The can or bottle crusher machine is widely used in beverage industries or in scrap dealers shop (Bhangarwala) to reduce the volume of the cans/bottles solely to increase the transportation volume and thus to reduce the transportation cost. Hence in this design and analysis of various parts are necessary. This paper focuses on review of a work carried out by researchers on analysis and design of various parts due to which the design quality of that parts will be improved. There are so many researchers who have done work on design and analysis, but still there are so many areas of scope regarding this design and analysis. The Electric Motor and a microcontroller make up the backbone for this project. Overall, this project involves processes like design, fabrication and assembling procedures. Even though there are many types of the can crusher machine in the market, the completion of this new model provides a more practical usage than previous one. Read More...
|
Mechanical Engineering |
India |
66-68 |
20 |
Automatic fire detection and controling sytem using GSM & alarm
-Maitri A Patel ; Hardili D Patel ; Ankita M Patel
Our goal is to develop an intelligent multi sensor based fire detection and controlling system for doordarshan HPT Vadodara.We design the fire detection system using four different sensor, and program the fire detection and Controling procedure using sensor based method. The sensor continuously monitor the temperature, smoke ,Flame and forth sensor is for outside of area like High Power Transformer in which flame is detected by image prossesing.If the temperature increases beyond the predetermined threshold value, if smoke is present ,if flame is detected buzzer sounds to intimate the occurrence of fire accident and a warning message will be sent to the respective personnel in the industry and to nearby fire station with the GSM module provided to it. This four sensor continuously monitors the whole area of Doodarshan if fire accident is true, then relay switch is automatically on and water is spred over the room. Read More...
|
Electronics and communication engineering |
India |
69-71 |
21 |
Real Time Operating System:A Review
-kanak priya ; Atul kumar srivastava
A real-time operating system is software system which is designed to ensure the time critical events are processed as efficiently as possible and must possessed characteristics like guaranteed calculation, low latency and have deterministic behavior which is not applicable for general purpose operating system or standard operating system and also general purpose operating system failed to give real time performance. This paper aims to do a survey study and explains such real time operating systems. Read More...
|
computer science |
India |
72-75 |
22 |
Analysis and Prediction of Tool Wear,Machine Surface Roughness in Hard turning
-Patel Alpesh R ; vallabh d patel
This paper is all about the possible factor that influence in hard turning process. Attempt has to made to show relationship between all input variables like speed, feed, depth of cut, tool materials, workpiece hardness and output variables like surface roughness, tool wear and three force components during hard turning. Various authors have applied statistical analysis and experimentation to validate their work. The contribution of speed, feed and depth of cut is mentioned in this paper based on surface roughness, tool wear and machining force components. Taguchi, ANOVA, response surface method and FE analysis are useful tools to develop relationships between various variables. Read More...
|
Mechanical engg |
India |
76-83 |
23 |
Power Quality Enhancement using Switched Capacitor Compensation
-PIYUSH RAMESHBHAI PATEL ; MIHIR K. PATEL; ANIL SHARMA; DHAVAL PATEL; BHADRESH PANCHAL
The electric utility industry and consumers of electrical energy are facing new challenges for cutting the electric energy cost, improving energy utilization, enhancing electric energy efficiency, improving supply waveform power quality, reducing safety hazards to personnel and protecting electronic sensitive computer and automatic data processing networks. The growing use of nonlinear type electric loads causes a real challenge to power quality for electric utilities. The deregulated electricity market where: competition, supply quality, security and reliability are now key issues for any economic survival. Electrical power network pollution is characterized by the nonlinear electric load ability to distortion modify and change the voltage and current waveform Root Mean Square (RMS) due to its inherent nonlinearity. In this paper we have implemented dual loop feedback control system to operate PWM. In this dual loop feedback control scheme minimum ripple current error (ei) and minimum ripple power error (ep) are generated which gives total error (et). Total error is reduced in SCC control scheme. Total error is given to (Proportional Integral Derivative) PID controller. PID controller output is limited by limiter block; it is used for reference of PWM waveform. I have selected PWM carrier frequency of 900Hz for simulation. Read More...
|
ELECTRICAL ENGINEERING |
India |
84-89 |
24 |
ROBOTIC ARM
-PATEL VIBHUTI DILIPBHAI ; MUNERA SHAHENAZ SULEMAN; PATEL JINAL RATILAL; BHAGAT BHAVIKA PRAKASHBHAI; GANVIT KIRTEE FULJIBHAI
The aim of the work was to develop telematics applications to be used in hospitals, chemical industries. At transmitter a glove enclosed in a hand is manually operated, the receiver catches the signal of manually operated hand and works accordingly.The components used at transmitter side are flex sensors, ADC 0808 as analog to digital converter and microcontroller IC P89V51RD2 and on receiver side 5 servo motors and LCD (16x2) connected with controller IC. Read More...
|
ELECTRONIC AND COMMUNICATION ENGINEERING |
India |
90-91 |
25 |
High-Tech ATM
-UPADHYAY CHIRAG ; Syed Mukarram; Pandya Anup; Rana Dhaval
Our project high-tech ATM is a small effort to do reduce the crime in the society. There are various prospect of security purpose like Catching a person using blocked ATM cards, Blocking a person using wrong password more than 3 times, detecting the wanted criminal and Informing the nearest police station when crime is detected. This can be achieved by designing a system consisting of password system, card detection system, camera surveillance and communication system. In our project we have decided to use a controller, image processing and GSM module to meet the requirement. Read More...
|
ELECTRONICS AND COMMUNICATION |
India |
92-93 |
26 |
An Effective Approach for Detecting Human Torso from Static Images
-Merin Mariam Mathew ; Sajin Salim
Torso detection in static images is a challenging and important problem. Locating the torso region of a human body is difficult due to its cluttering background and various poses. Previous works on torso detection usually demand a time-consuming training phase for complex shape-matching processes. In this paper, a new methodology for detecting the torso portion of the human body is introduced. In this approach, a face detection algorithm is used to locate the face region as a priori and then the torso region is extracted by effectively combined the input image segments and the boundary detection algorithm along with the detected face. Read More...
|
Electronics And Communication Engineering |
India |
94-96 |
27 |
Smart Belt using Microcontroller
-Chirag Chudasama ; Jitendra Purohit; Mayur Agarwal; Ravindra Patil
Smart Belt is the type of wrist band which incorporates wireless communication. The device can send signals to a Wi-Fi router when registered on that network. The main aim is to monitor whether the Smart-belt is in the wireless range or not. This kind of setting is preferably for offices where such devices can be used to keep the log of the employees that is their arrival time, departure time and the time when they were out of wireless range. An android application may be used to monitor all the functions of the Smart-belt. Read More...
|
Computer Engineering |
India |
97-100 |
28 |
16 to 112 Channel Data Logger used for Industrial Applications: An Approach
-Patel Nirav Narendrabhai
With the advancement of technology, the processes are becoming more and more complex. Due to this increase in complexity, for efficient analysis of process the number of parameters required for data acquisition also increases. Data Acquisition is simply the gathering of information about a system or process. It is the process of collecting data in an automated fashion from analog and digital measurement sources such as sensors and devices. Before the computer age, most data was recorded manually or on strip chart recorders. Many new generation data acquisition products have been developed due to emergence of microcontroller that enables real time gathering, analysis, logging and controlling of data. To meet these requirements the demand of an improved, efficient and up to date data logger is increasing. A data logger is an electronic instrument that can record digital or analog measurements over a period of time. It consists of a sensor, microcontroller, a data storage device and communication for controlling system. Data loggers have an on board memory that is large enough to hold data. That is recorded over a longer period of time. Data loggers are provided with real time clocks to record the date and time of acquisition. Read More...
|
Embedded And VLSI Systems |
India |
101-104 |
29 |
Intelligent Attendance Management System
-Ketan vadodariya ; sagar Vaghasiya ; Heemali Chouhan ; Sandip Dawda
This project is to design and develops a reliable tracking and recording systems based on biometric fingerprint identification used to monitor attendance. Biometric Access Control System also provides the highest level of security available today by eliminative the stolen, transferred and duplicating. It also will eliminate the problems related with manual work associated with paper based and punch card. The systems will be developed with extended GUI by using Microsoft Visual Studio 2010 integrated with Microsoft Fingerprint Reader which stores the login names and passwords in an internal database located in the user's computer. When needed, the device interactively sends the login names and passwords to compatible applications and websites which can be used to perform the login operation automatically. The device could be useful in an office or campus environment. Read More...
|
electronics and communication |
India |
105-106 |
30 |
Seepage losses in Kakrapar right bank main canal
-Kavita A. Koradiya ; Dr. J.N. Patel; B.J.Batliwala; Dr. R.B.Khasiya
The conveyance efficiency in irrigation projects is poor due to seepage, percolation, cracking, and damaging of the earth channel. Seepage loss in irrigation water conveyance system is very significant, as it forms the major portion of the water loss in the irrigation system. One of the main problem that meet the Ministry if Irrigation and Water Resources is that about 80% from its total length passing through silty clay soil. The quantity of seepage to surrounding area varies from section to other. The seepage losses affect the water surface profiles, slops, discharge, and water level. . Various methods are used to estimate the canal seepage rate. The main objective of this research are evaluating seepage losses at different critical sections and comparing between different emphirical, analytical and field mesure result. Read More...
|
Civil Engineering |
India |
107-110 |
31 |
PLC based Automatic Oil Filling Machine
-RIDDHI S. PATEL ; Patel Bhumika I.; Patel krutika T.; PROF. K.G. BHUVA
The main aim of this project is to provide a low cost automated oil filling system. The present system will provides a great deal of applications in the field of low cost automation, especially in mass production industries where there are large number of components to be processed and handled in a short period of time and there’s need for increased production. Read More...
|
EIECTRONICS & COMMUNICATION |
India |
111-115 |
32 |
a new approach of sentence clustering
-daksha chaudhari
In comparison with hard clustering methods, in which a pattern belongs to a single cluster, fuzzy clustering algorithms allow patterns to belong to all clusters with differing degrees of membership. This is important in domains such as sentence clustering, since a sentence is likely to be related to more than one theme or topic present within a document or set of documents. However, because most sentence similarity measures do not represent sentences in a common metric space, conventional fuzzy clustering approaches based on prototypes or mixtures of Gaussians are generally not applicable to sentence clustering. This paper presents a novel fuzzy clustering algorithm that operates on relational input data; i.e., data in the form of a square matrix of pairwise similarities between data objects. The algorithm uses a graph representation of the data, and operates in an Expectation-Maximization framework in which the graph centrality of an object in the graph is interpreted as a likelihood. Results of applying the algorithm to sentence clustering tasks demonstrate that the algorithm is capable of identifying overlapping clusters of semantically related sentences, and that it is therefore of potential use in a variety of text mining tasks. We also include results of applying the algorithm to benchmark data sets in several other domains. Read More...
|
computer science and engineering |
India |
116-118 |
33 |
Low Power Transmitter Control Card For 100W Pallet Amplifier
-DIVYA D. PATEL ; MITALI S. PATEL; JINAL N. RATHOD; PROF. SANDIP J. DAWDA
Nowadays safety is most important, which is widely implemented in industries for protection. Likewise low power transmitters (LPTs) at Doordarshan also require control card for security of LPT’s parameters like Forward power, VSWR, Temperature, i/p overdrive, over voltage protection etc. Looking to this we have defined this as one of the Industrial problems. Based on this, the analysis of control and monitoring is carried out and control card is to be implemented using microcontroller and LCD module at low power transmitters, after design of control circuit. Read More...
|
Electronic And Communication Engineering |
India |
119-120 |
34 |
Performance Analysis of SAC OCDMA Systems based on New Coding Scheme
-DHANYASREE S.L. ; SUJITH KUMAR V.
Optical code-division multiple-access (OCDMA) has been recently proposed as an alternative to frequency and time based multiple, and multiplexing methods for next generation high speed optical ï¬ber networks. This is because OCDMA allows many users to access the same optical ï¬ber channel asynchronously through the assignment of unique code words sequences. Furthermore, OCDMA offers strong security in the physical layer. Due to these reasons, OCDMA has been recognized as one of the most important technologies for supporting many users in shared media at the same time. In conventional multiple access techniques such as time division multiple access (TDMA) and wavelength division multiple access (WDMA), the maximum transmission capacity is determined by the total number of the slots while for optical CDMA the transmission capacity depends on the number of active users. Spectral amplitude coding optical code division multiple access (SAC-OCDMA) systems attract more attentions since the multi user interference (MUI) can be completely eliminated by spectral coding existing in conventional systems. MUI can be reduced by using subtraction technique. EDW (Enhanced Double Weight) code based OCDMA is analyzed here. Four detection techniques, such as direct detection, complimentary detection, AND detection and NAND detection are compared. The simulations are carried out using Optisystem version12. The analysis has revealed that NAND subtraction detection technique exhibits better results. Read More...
|
OPTO ELECTRONICS AND COMMUNICATION SYSTEMS |
India |
121-126 |
35 |
Displaying Characters using Water
-PROF.SANDIP J. DAWDA ; PATEL YOGITA K.; PUROHIT ISHANI N.; TRIVEDI MITALI H.
Our project “waterfall graphic print†can be described in one word as water speaks. In our project, we are using water as display element and develop a structure using AVR microcontroller, Solenoid valves, Triac-BT316 and MOC-3041.waterfall graphic print can be described in one word as water speaks. Characters which we display are the combination of water droplets and each character size is very large. We cannot display any word file or book using this technology. When water falls in air it creates the characters, so characters are very large and it takes time to read the whole word with proper attention Our project is used at many places like malls, colleges, company to display numbers and logos and different designs in air by using the water and to increase the value of the place. It is also used in chemical industries and dairy industries to mix the liquids in proper percentage by proper controlling of valves. So this project has many applications in general as well as in industries. It can be used at public places for enjoyment and also for publicity of any product. The most important part of this project is programming and we use AVR controller for programming and the software we used is BASCOM. Programming is very easy in this controller, so we spend more time in developing different logics instead of use that time in syntax. In this project, the microcontroller atmega16 is connected to PC or laptop through keyboard interfacing connection. So that the character can be displayed as soon as corresponding button is pressed on the keyboard. Keyboard interfacing will makes this project more user friendly. Read More...
|
ELECTRONICS ENGINEERING |
India |
127-130 |
36 |
Quad Copter with Wireless Camera
-ravikiran panchal ; rasiwala habib k.; madhani jigar k.; patel ravikumar m.
The military use of unmanned aerial vehicles (UAVs) has grown because of their ability to operate in dangerous locations while keeping their human operators at a safe distance. The larger UAVs also provide a reliable long duration, cost effective, platform for reconnaissance as well as weapons. They have grown to become an indispensable tool for the military. The question we posed for our project was whether small UAVs also had utility in military and commercial/industrial applications. We postulated that smaller UAVs can serve more tactical operations such as searching a village or a building for enemy positions. Smaller UAVs, on the order of a couple feet to a meter in size, should be able to handle military tactical operations as well as the emerging commercial and industrial applications and our project is attempting to validate this assumption. To validate this assumption, my team considered many different UAV designs before we settled on creating a Quad copter. The payload of our Quad copter design includes a camera and telemetry that will allow us to watch live video from the Quad copter on a laptop that is located up to 2 miles away. We are presently in the final stages of building the Quad copter but we still improving our design to allow us to have longer flight times and better maneuverability. We are currently experimenting with new software so that we will not have to control the Quad copter with an RC controller but will instead operate by sending commands from a remote laptop. Our project has verified that it is possible to build a small-scale Quad copter that could be used for both military and commercial use. Our most significant problems to date have been an ambitious development schedule coupled with very limited funds. These constraints have forced compromise in components selected and methods used for prototype development. Read More...
|
ELECTRONICS AND COMMUNICATION |
India |
131-133 |
37 |
Software Dependencies.
-Rushiraj Nenuji ; Harshit Shihora; Lay Shah
Software developers many a times use different tools, so that we could find and come to know about dependencies of any particular module/system on the repository before we make changes to it. This is done in order to avoid adverse effects because of changes and hence to avoid failures related to it. Read More...
|
Computer Science and Engineering. |
India |
134-135 |
38 |
Impact of Marble Powder on Engineering Properties of Black Cotton Soil
-Bhavsar Sachin N. ; Joshi Hiral B.; Shrof Priyanka K.; Patel Ankit j.
The black cotton soil is expansive type of soil which expand suddenly and start swelling when it comes in contact with moisture. Due to this property the strength and other properties of soil are very poor. Expansive type of soil shows unpredictable behavior with different kind of stabilizers. Soil stabilization is a process to treat a soil to maintain, alter or improve the performance of soil. In this study, the potential of marble dust (by-product of marble industry) as stabilizing additive to expansive soil is evaluated. The evaluation involves the determination of the swelling potential of expansive soil in its natural state as well as when mixed with varying proportion of marble dust (from 30 to 50%). Read More...
|
civil engineering |
India |
136-139 |
39 |
ANFIS classifier based Lung Tumor and Lymph node differentiation using Computer Tomography
-M. KAVITHA ; T.RAJA
Analysis of primary lung tumors and disease is important for lung cancer staging and an automated system that can detect both types of abnormalities will be helpful for clinical routine. In this project, we present a new method to automatically detect both tumors and abnormal nodes simultaneously using Computerized Tomography (CT) thoracic images. We perform the detection of abnormalities, and then differentiate between tumors and lymph nodes using ANFIS classifier. Then lung tumors are classified as benign and malignant using this classifier. Moreover compared to several state-of-the-art methods (LapRLS, mcSVM, ESRC, mSRC, CBIR), the proposed ANFIS classifier can achieve significant improvement (mean accuracy of 93%, precision of 88%, recall of 94%, etc). Read More...
|
IMAGE PROCESSING |
India |
140-143 |
40 |
Economics of Canal Lining for Trapezoidal Section
-Komal B. Gujarati ; Dr. R.B.Khasiya; Dr. J.N.patel; Proff. B.J.Bataliwala
In today’s world, water scarcity is a prime issue as the whole world is facing the problem for availability of water canal lining is one of the method to improve the efficiency of canal. By canal lining we can control the wastage of water. In this report, I have tried to explain the advantages and disadvantages of the various canal lining system.The factors affecting the decision for selection of the canal lining material is also discussed in this report. The Kakrapar Right Bank Main Canal (K.R.B.M.C) is choosen as the study area.The main objective is to find out the most economical method of canal lining based on the cost criteria in relation to the wastages etc. Read More...
|
CIVIL Engineering |
India |
144-146 |
41 |
A Survey on Web Log Mining (A case study)
-Vishal Gupta ; Mahesh Malviya
In today scenario where the data mining techniques and web technologies has decreases the cost of storing and collection of the various types of data. Web mining is a type of data mining techniques to fetch data and its related information from World Wide Web. Huge amount of data that has being collected from the different web sites which has becomes a new challenge for these techniques to organize this data in a way to make use of this stored data or Knowledge to gain an edge over their competitors. With the rapid increase in the growth of the Web data, the study of data discovery in web mining and its modeling and predicting the user’s access on a web has become very important. This paper deals with the preliminary discussion of various web log mining activities, classification, tasks and its application. Read More...
|
Computer Science & Engineering |
India |
147-149 |
42 |
Design and Implementation of a Packet Switched Dynamic Buffer Resize Router on FPGA
-VIVEK RAJ K ; PRASAD KUMAR; SHASHI RAJ K
NoC designs are based on a compromise of latency, power dissipation or energy, usually defined at design time. However, setting all parameters at design time can cause either excessive power dissipation (originated by router underutilization), or a higher latency. The situation worsens whenever the application changes its communication pattern. In this paper we propose an FPGA based, single cycle, low latency router design that can be reconfigured to 1-D and 2-D network on chip architectures with dynamic buffer resize technique. The results show that the technique improves the area and the performance of the architecture by greatly reducing power consumption and latency between the routers. Read More...
|
Electronics and communication engineering |
India |
150-154 |
43 |
Touch Screen Menu And Table Status Indication In Hotels/Reastaurants
-JANKI PANKAJBHAI SEVAK ; SUSHMA HARIHARRAO LOKNADAM
In this paper ,a new and innovative kind of Hotel system is shown . Which works on wireless communication. In this system the problem of misallocation of ordered food items is solved by using touch screen menu at table. Not only this but table status can be seen from waiting longue. Read More...
|
ELECTRONICS AND COMMUNICATION ENGINEERING |
India |
155-156 |
44 |
Identifying Disease Treatment Relations Using F.P Tree
-Pratik Kashinath Bobade ; Vikram Sudhir Choudhari; Vikrant Ganesh Rekulwad
The Machine Learning (ML) field has been one of the most important tool in the health care field. Automated learning is used in tasks such as medical decision support, medical picturing, protein-protein interaction, extraction of medical knowledge, and for overall patient management care. ML is envisioned as a tool by which computer-based systems can be integrated in the healthcare field in order to get a better, more efficient medical care. This paper reports a ML-based methodology for creating a program that is capable of finding and extracting healthcare information. It allows researcher to add medical papers that mention diseases and treatments, and identifies relations that exist between diseases and treatments. Our proposed methods obtains satisfactory outcomes that could be integrated in an application to be used in the medical care domain. The potential value of this paper is in the settings that we propose. Read More...
|
Computer Engineering |
India |
157-161 |
45 |
Identification of Wetland Vegetation by Supervised Classification of Nal sarovar area using LISS-III data
-Bhavsar Ronit Nalinkumar ; N.P. Singh; Indra Prakash
This paper classifies wetland of Nal Sarovar by using LISS-III remote sensing data. Taking the Nal Sarovar as study area, LISS-III data of 2013 is used as data source and various classification processes like 1) Parallelepiped Classification, 2) Maximum Likelihood Classification are carried out in this study. The paper describes the utilization of accuracy assessment using kappa coefficients. This paper describes that maximum likelihood classification is more efficient than parallelepiped classification. Read More...
|
Civil Engineering |
India |
162-164 |
46 |
STRUCTURAL AND OPTICAL STUDIES OF PURE AND IODINE DOPED POLYSTYRENE FILMS
-N.Manikandan ; K.maragatham; S.muruganand
Polystyrene thin films are prepared by solution growth technique using glass substrates. Polystyrene solution is prepared by dissolving 3g of polystyrene in the 100cc of benzene. 1% and 2% iodine doped polystyrene films have been prepared. Pure and iodine thin films are subjected to XRD, FTIR. XRD shows the amorphous nature of thin films. The FTIR spectrum gives about the presence of functional groups in the PS thin films. Also the optical properties polystyrene and iodine doped polystyrene films have been studied.. The optical properties of above thin films have been analyzed using their transmission spectra and the results were discussed. . Read More...
|
material science |
India |
165-168 |
47 |
Defend Mechanism for Service-Oriented VANETS
-S.Chandrapandian ; R.Adaline Suji
There are different types of security and privacy attacks that exist in service-oriented vehicular ad hoc networks s. The unique features of Inter Vehicular Communication (shortly IVC) are a double-edged sword: A powerful collection of tools will be available, but a set of dangerous attacks becomes possible. Recently, there have been different proposals for securing vehicular ad hoc networks s and lessening the potential risks of attacks. Several projects were launched, with the security of vehicular ad hoc networks being their main concern. That is proposed in the literature and has this same aim. However, they use asymmetric encryption systems, mainly the elliptic curve cryptography (Shortly ECC) standard. The security of such applications is different from the security of service-oriented applications because of their different security requirements. The data exchanged in safety messages need not be encrypted. However, messages that contain data from infotainment applications must be tightly encrypted. In the proposed system symmetric scheme (Advanced Encryption Standard (shortly AES)) and the hash chain is used to increase its security to a high extent by using a hierarchical-based encryption function. The hash chain is generated by vehicle and converted as an AC by central authority for security of the data and then the ACs is used as signatures for messages, and RSUs are used for relaying messages between vehicles and CAs. Read More...
|
Computer Science Engineering |
India |
169-172 |
48 |
A Recognized Usability Limitations Model for Watermarking of Outsourced Datasets
-G.Bhuvanendran ; G.Karpagakannan
The large datasets are being mined to extract hidden knowledge and patterns that assist decision makers in making effective, efficient, and timely decisions in an ever increasing competitive world. This type of “knowledge discovery driven†data mining activity is not possible without sharing the “datasets†between their owners and data mining experts as a consequence, protecting. Usually, an owner needs to manually define “Usability limitations†for each type of dataset to preserve the contained knowledge. The major contribution of this paper is a novel formal model that facilitates a data owner to define usability limitations to preserve the knowledge contained in the dataset in an automated fashion. The model aims at preserving “classification potential†of each feature and other major characteristics of datasets that play an important role during the mining process of data; as a result, learning statistics and decision-making rules also remain intact. We have implemented our model and integrated it with a new watermark embedding algorithm to prove that the inserted watermark not only preserves the knowledge contained in a dataset but also significantly enhances watermark security compared with existing techniques. We have tested our model on more than twenty five different data mining datasets to show its efficacy, effectiveness, and the ability to adapt and simplify. Read More...
|
Computer Science Engineering |
India |
173-176 |
49 |
Analysis of Multiscale Transform Based Digital Image Watermarking for Multimedia files
-Abhishek Tiwari ; Neelesh Kumar Jain; Devraj Tomar
Watermarking technique used in areas of text, image, audio and video for the purpose of copyright protection, broadcast monitoring, data authentication and identification of owner of multimedia documents in network environments. This paper informs about multiple transforms of watermarking technique DFT(Discrete Fourier Transform), DCT (Discrete Cosine Transform), DWT (Discrete Wavelet Transform), SVD (Singular value decomposition) and compare to each other based on its application. This paper also explain, false position problem in SVD and Rounding error problem which presently exists in the frequency domain with their solutions. Read More...
|
Computer Science & Engineering |
India |
177-182 |
50 |
Localization of BTS using Genetic Algorithm
-Ankita Awasthi ; Neha Arora
Wireless Communication, since the beginning of this century has observed enormous advancement The need for the optimal use of available resources has pushed researchers towards investigation of swarm intelligence based optimization algorithms to support designs and planning decisions. Radio coverage generally is affected by variables such as antenna arrangements, base station performance, and the locations of base stations and users. Bio-inspired evolutionary algorithms are probabilistic search methods that simulate the natural biological evolution or the behavior of biological entities. Such algorithms can be used to obtain near optimal solutions in optimization problems, for which traditional mathematical techniques may fail. Genetic algorithm (GA) has found its usage in telecommunications field because of the challenging factors and parameters involve in radio coverage optimization. This work actually considered how to optimally determine locations of Base Transceiver Station (BTS), such that minimum number of BTS can be installed to cover larger number of subscriber at lesser infrastructural cost. Read More...
|
Telecommunication |
India |
183-186 |