No. |
Title and Author |
Area |
Country |
Page |
101 |
Parametric Evaluation of Ball Burnishing Process on Aluminium Alloy 6061- A Review
-sachin b patel ; sachin b patel; saumil c patel
The main purpose of this review paper is to optimization of newly design ball burnishing tool and process parameters in conventional lathe using taguchi method. Here the work piece materials used is Alluminium Alloy 6061 and tool material HSS ball with 8mm diameter. The input parameters during process are burnishing force, burnishing feed, burnishing speed and number of passes. The output parameter is surface roughness. Read More...
|
mechanical engineering |
India |
371-373 |
102 |
Stabilization of heavy metals present in municipal solid waste using hydrothermally synthesized iron oxide.
-KIRAN B.M ; Srikanthaswamy
This study is an attempt to stabilize the heavy metals present in the municipal solid waste. A hydrothermal processing system was setup with a mixture of ferric sulphate. Experimental results showed the reduction in the heavy metals concentration in the municipal solid waste ash after the treatment with iron oxides. Initial values of Cg, Cu, Pb, Cr, Hg was 0.001 mg/L , 4.322 mg/L , 0.578 mg/L , 0.769 mg/L and 0.001mg/l respectively . After the treatment with iron oxides the concentration of all heavy metals were reduced to less than 0.0001mg/L. Read More...
|
ENVIRONMENTAL ENGINEERING |
India |
374-377 |
103 |
Android Application for Vehicular Traffic and Accident Analysis
-Jose Michael ; Harsha Madagouni; Sunil P Khachane
With the population of the world growing exponentially if there's one thing that is going to remain constant then it is traffic. Traffic is a condition that exists in all major cities and causes a huge wastage of time which in turn leads to a decrease in individual and collective productivity. The simplest solution to traffic is to understand the areas that are severely affected and use that information to find an alternate route. To fully realize the power of such a technology it must be implemented in a medium that is common and already heavily used and only cell phones fit the description of such a device. Even amongst cell phones the most prevalent operating system in use currently is the Android operating system and hence this application has been designed for it. Read More...
|
Computer Engineering |
India |
378-380 |
104 |
A Review- Visual Cryptography
-Ramandeep Kaur ; Ravneet Kaur
Cryptography is a process of storing and transmitting data in a form that is intended for read and process. It is a technique of protecting information by encrypting it into an unreadable form. In this paper, we consider a new type of cryptography technique which can decode a concealed images without any cryptographic computation. This scheme is perfectly secure and very easy to implement. Visual cryptography is an emerging cryptography technology that uses the characteristics of human vision to decrypt the encrypted images. It does not need cryptography knowledge and complex computation. From security point of view it also ensures that hackers cannot perceive any clues about a secret image from individual cover images. Read More...
|
Computer Science Engineering |
India |
381-383 |
105 |
Comparative Study on Various Version of .Net Framework
-Yogesh Subhash Patil ; Abhijit P. Ingale; Rahul R. Singh; Rahul P. Chaudhari; Rammohan A. Agrawal
NET Framework is a software framework developed by Microsoft that runs primarily on Microsoft Windows. It includes a large library and provides language interoperability (each language can use code written in other languages) across several programming languages. Programs written for .NET Framework execute in a software environment, known as the Common Language Runtime (CLR), an application virtual machine that provides services such as security, memory management, and exception handling. The class library and the CLR together constitute .NET Framework. When the new versions of .Net framework are release it overcomes the problem of early version and add new features in its which provide better usability of it. Read More...
|
computer Science & Engineering |
India |
384-387 |
106 |
Security in XML and Web Services by using Blind Signature
-BOGA VINAY TEJA ; K. Govinda ; K.A. Thousief; Boga Vinay Teja
Now a day’s growing partially-pattern data in the applications, XML has become very important. Providing security to XML data is made difficult, due to XML documents may possibly hold confidential data that cannot survive by all clients. so, protecting XML records is becoming vital. Several frameworks have been presented for securing XML based-applications. These applications are used to protect data in a website. But this paper present XML and Web service security foremost benchmarks. Each benchmark represents securing XML based documents, particularly this paper presents XML blind signature as a feature with digital signature. And also describes the relations with these benchmarks with support of existing technologies. Read More...
|
Computer Science and Engineering |
India |
388-392 |
107 |
Emulation of Virtual Surface using Image Recognition
-Ekbal Ahamad Mustaq Ahamad ; Shaikh Sufiyan Shahajahan; Khan Mohd Akbar; Shrinidhi Gindi
The touchscreen enables the user to interact directly with what is displayed, rather than using a mouse, touchpad, or any other intermediate device (other than a stylus, which is optional for most modern touchscreens).The popularity of smartphones, tablets, and many types of information appliances is driving the demand and acceptance of common touchscreens for portable and functional electronics. Touchscreens are found in the medical field and in heavy industry, as well as forautomated teller machines (ATMs), and kiosks such as museum display where keyboard and mouse systems do not allow a suitably intuitive, rapid, or accurate interaction by the user with the display's content.It’s a small effort to develop a system which provides the aabove functionality at the reasonable cost and at the same time much efficient in a real world applcation.This application will provide almost all touchscreen facilities like tablets,touch pcs i.e Users can interact with the system without the use of any conventional tool like Mouse or Keyboard. Read More...
|
object tracking |
India |
393-395 |
108 |
Parametric Analysis of Weld Characteristics for a Single Pass Tig Welding
-Dhruval S. Patel ; Vipul K. Patel; Dhaval S. Patel; Ankur J. Patel
Tungsten Inert Gas welding is one of the most widely used techniques for joining ferrous and non-ferrous metal. In which the arc is generated between a nonconsumable tungsten electrode and work-piece, and the molten metal is protected from the atmosphere by using the shielding of inert gas argon. In this study, SS304 sheet material having 3 mm thickness were welded using TIG welding. The welding process parameter namely welding current, welding voltage Gas flow rate considered for weld quality. The Full Factorial Design advocated the use of experiment. Read More...
|
Mechanical Engineering |
India |
396-399 |
109 |
A study on registration technologies and their classification in augmented reality
-Ahmad Ali ; vinay kumar singh; Prabha S. Nair; IMRAN; MANOHAR KUMAR
The registration in augmented reality is process which merges virtual objects generated by computer with real world image caught by camera. This paper describes the knowledge-based registration, computer vision-based registration and tracker-based registration technology. This paper mainly focused on tracker-based registration technology in augmented reality. Also described method in tracker- based technology, problem and solution. Read More...
|
Computer Science and engg. |
India |
400-404 |
110 |
Dynamic Web Services Using J2ME Wireless Middleware for Mobile
-Rama Krishna Raju V ; Ravi Theja Y
Mobile environment capable of accessing Web services over wireless networks is interesting work because of diverse issues mentioned and limited resources of mobile phones. In this paper, we focus on issue how to perform dynamically invoking of web services using J2ME middleware platform for mobile devices, service requestors are mobile phones and by them introducing dynamic proxy between internet service providers and mobile requestors. We provide features to access web services dynamically. Firstly, support of dynamic binding and support of UDDI description and registry. Furthermore, support of SOAP messages with encoded representing with format .It includes the specification of the dynamic proxy, framework of web services roles and theoretical results with performance of processing request from mobile devices. Read More...
|
Computer Science |
India |
405-407 |
111 |
Advance Agriculture
-Shrinivas Lakhangave ; Pratik Patare; Prof. R.R.Agarwal
Many of us didn't know that a big difference between farm management and another type of business, whereas farm size is very big, the exigent is increase the reserve capital and the new technological that coming up very fast so that' the farmer must be developed his way in management and try to find any new system that helps him to decrease the costs and increase the profits.Because our client - the farmer - is owner of fruit and vegetables farm and has 120,000sq.m. Grown trees of coconut, banana, and he grows many types of vegetables and sales his entire yield to the there is central market. In this case he found a very big problem in continuation finances, accounting and managerial works, whereas, he is using now a manual system to manage his works so, he suggested making a computerized system to help him in his works. We are living in 21st century- an era for Internet, atomization, modern technology. In India near about 65% people are actually in farming profession. Continuously efforts have been taken to improve the production efficiently. This project developed in order to share the information about the farming and experience of the farmers. When all these parameters are served then we can say that that system developed is efficient. Read More...
|
Computer Engineering |
India |
408-411 |
112 |
Comparative Study of Association Rule Mining Algorithms
-Gurneet Kaur ; Dr. R. K. Chauhan
Association Rule Mining(ARM) has been the area of interest for many researchers for a long time and continues to be the same. It is one of the important tasks of data mining. It aims at discovering relationships among various items in the database. There are several algorithms of which Apriori is the classical and most famous algorithm. In this paper, author considers two different datasets and tries to obtain the result using Weka a data mining tool. The author also presents a comparison between three association rule algorithms: Apriori Association Rule, PredictiveApriori Association Rule and Tertius Association Rule through experiments and presents the result. A proposal for increasing the efficiency of Apriori Algorithm is also presented. Read More...
|
Computer Science and Engineering |
India |
412-416 |
113 |
Digital Speedometer with Password and Auto Speed limit Controlling with GPS Tracking
-Patel Nishit S ; Patel Nirmal B; Prajapati Mayank L; Rami Dipen; Panchal Pratik
The main aim of this project is to design a digital speedometer with password enabled with speed limit controlling and tracking of vehicle and its speed by GPS system. This simple system shows the ability to apply speed limit controlling techniques to the vehicle. Our digital speedometer takes input from vehicle speedometer cable and executes the speed limit controlling action and send speed and vehicle location by GPS module. The system comprises of keypad, LCD display, camera and microcontroller unit. The user interface includes keypad through which the password will be accepted by the microcontroller. Microcontroller controls the over speed of vehicle. Read More...
|
electronics, automobile, navigation |
India |
417-418 |
114 |
Attendance Management System using RFID Technology.
-Pushpak S. Jain ; Priyanka B. Bhandari; Mrs. Hetal Amrutia
Radio-frequency identification (RFID) technology is used for transferring data from an electronic tag by using radio waves. The electronic tag, called RFID tag or label, is attached to an object, through a reader to identify and track the object. RFID technology has been widely deployed by various organizations as a part of their automation systems. In this project, an RFID based system has been built in order to produce an attendance management system. This automated attendance management system will make the entire process simple and will also provide a well-structured report of the pattern of student’s attendance and time management. These reports can further help in allocating and using the human resources of the college organization accordingly. This system consists of two parts which include: the hardware and the software. The hardware consists of a motor unit and RFID reader. The RFID reader is a low-frequency reader (125 kHz) which is connected to the host computer via a serial to USB converter cable. The Time-Attendance System GUI is developed using Visual Basic.Net using C# language. The Attendance Management System provides the functionalities such as displaying live ID tags transactions, registering ID, deleting ID, recording attendance and other minor functions. This interface is installed in the host computer. Read More...
|
Information Technology (Software Engineering) |
India |
419-423 |
115 |
Indian Banks: IT Support & Training
-Dr. Munish Sabharwal ; Sarika Sharma; Komal Pundir
The main objective of this research paper is to observe as to how the selected Indian Banks provide hardware maintenance and support for their branches. The study also aims to find out whether the selected Indian Banks provide IT Training to its employees and the type of training provided. This was pursued by conducting structured interview of branch heads of the selected 16 scheduled banks of Meerut (U.P.). The researcher with the help of a questionnaire inquired from the branch heads of selected banks and compared the responses with the desired state using GAP Analysis Worksheet. The study indicates that most of the Indian Banks have outsourced hardware maintenance and support. The study also clearly suggests that almost all the Indian Banks provide IT Training to its employees and the nature of the training provided differs from bank to bank. Read More...
|
IT Management |
India |
424-428 |
116 |
A Hybrid Feature selection for Email Phishing Detection
-manohar kumar kushwaha ; imran alam; vinay kumar singh
Phishing is the action of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. In other words Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking email in an attempt together personal and financial information from recipients. Typically, the messages appear to come from well known and trustworthy Web sites. Various methods, step that are solved and avoid the email phishing. In This paper we focused on hybrid feature selection approach that based on the combination of content-based and behavior–based. Read More...
|
computer science |
India |
429-431 |
117 |
A Behavioral Study of Properties of Mortar utilizing Class-F Fly Ash as SCM
-zalak p shah ; sarika g javiya; Rushabh. A. shah
Mortar is most commonly used building material in Construction Industries. Mortar has to with stand lot of stresses during its life so it has to be good in its mechanical properties. In this paper efforts have been made to check mortar’s Mechanical properties by utilizing fly ash in to Cement Mortar (1:3). The replacement level is fixed at 0%, 10%, 30% and 50% by weight of Cement. The mix design was carried out for 1:3 proportion cement mortar on the basis of IS 269:2013. Read More...
|
Civil Engineering |
India |
432-435 |
118 |
Comparative Analysis of Object-Oriented and Cleanroom Software Engineering Techniques
-V Raghuveer Rao ; Prof. Sharnil Pandya; Harish Bhutra; Bhavik Bansal
While Traditional Software Engineering cycle consists of analysis, design, code, test, and debug, Cleanroom software engineering emphasizes the need to build quality and reliable software as it is being developed. Life cycle fallowed by these methods also differ, Cleanroom follows the incremental development while the object -oriented approach follows the iterative development of the project. In Cleanroom Software Engineering Model, Software Quality is achieved by design and verification itself, not through testing as is case in Object Oriented Software Engineering Model. This built in quality can lower the overall cost of the product, and the designs also tends to be more concise and compact than average, In this paper both these models have been Juxtaposed, Analyzed and Reviewed. Read More...
|
Computer Software Engineering |
India |
436-438 |
119 |
Application Processing for Smart phone Devices in Mobile Cloud Computing
-DEEPALI KOUL ; PINAL VITHLANI; Asst. Prof. RAM LAL YADAV
Mobile Cloud Computing (MCC) is a combination of Cloud computing and mobile networks. It is a technique or model in which mobile applications are built, powered and hosted using cloud computing technology. Users expect to run computational intensive applications on Smart Mobile Devices (SMDs) in the same way as powerful primary or mainframe computers. However, SMDs are still low potential computing devices, which are constrained by CPU potentials, memory capacity and battery life time. MCC provides practical solution to reduce this incapacitation by extending the services and resources of computational clouds to SMDs on demand basis. The current offloading algorithms offload computational intensive applications to remote servers by employing different cloud models. A challenging aspect of such algorithms is the establishment of distributed application processing platform at runtime which requires additional computing resources on SMDs. This paper describes Distributed Application Processing Approach for SMDs in MCC Environment. The purpose of this paper is to highlight issues and challenges to the existing algorithms in developing, implementing and executing computational intensive mobile applications within MCC environment. It proposes taxonomy of current Application Processing Approaches, reviews current offloading frameworks by using thematic taxonomy and analyzes the implications and critical aspects of current offloading frameworks. Read More...
|
CLOUD COMPUTING |
India |
439-446 |
120 |
Intelligent Propagation Display
-LIONEL SATISH CHRISTIE ; ROHITSINGH K KANAUJIA; NILESH P MISHRA; RINKESH S PATEL
This paper is based on our project named as Propeller clock Display. It can be called as 7 LEDs innovation. Here 7 LEDs are used which are displaying digital and analog time programmed by the microcontroller. Decoder IC is used to decode IR waves from the remote and insert the time we desire. This feature creates wireless communication between the display and the input applied. The motor used rotates at a very fast speed and this display is achieved. The basic idea is based on Propeller mechanism. Entire display is done by using 7 LEDs only which are rotated at fixed speeds by DC motor. This kind of display can be useful anywhere where size, speed and cost matters. Read More...
|
ELECTRONICS AND COMMUNICATION ENGINEERING |
India |
447-450 |
121 |
Association Rule Mining using Apriori Algorithm: A Survey
-Chaitali Patel ; Vijay Kumar
Association rule mining is the most important technique in the field of data mining. Association rule mining finding frequent patterns, associations, correlations, or causal structures among sets of items or objects in transaction databases, relational databases, and other information repositories. In this paper we present a survey of recent research work carried by different researchers. Of course, a single article cannot be a complete review of all the research work, yet we hope that it will provide a guideline for the researcher in interesting research directions that have yet to be explored. Read More...
|
computer engineering |
India |
451-454 |
122 |
AUTOMATIC MULTILEVEL VEHICLES PARKING SYSTEM USING RFID
-SHRIPAL DARSHIL BIPINKUMAR ; PRAJAPATI BHARAT D.; KACHHADIA NIKUL; MACHHI RAHUL D.
Parking is a major problem in densely populated and market areas. Usually a ground or basement parking system will be provided in these areas which will be fully occupied in prime hours of the day. The major cause of this is incorrect parking of cars or vehicles by the people which will at least reduce 1-2 vehicle parking spaces for every 10-20 places. Our system facilitates parking of cars and similar vehicles in a multistoried automated system which will accommodate more cars or vehicles in less space and also provide security to the vehicle as it can only be accessed by the user and also automate the parking process so the user’s need not worry about incorrect parking and can avoid penalties. Some main features of the system are as detailed below. Read More...
|
ELECTRONICS AND COMMUNICATION Engineering |
India |
455-456 |
123 |
Virtualization: A Novice Approach
-Poola Mahesh ; Amithchand Sheety; Pradeep Bhat; Dhiraj Mishra
Virtualization provides many benefits – greater efficiency in CPU utilization, greener IT with less power consumption, better management through central environment control, more availability, reduced project timelines by eliminating hardware procurement, improved disaster recovery capability, more central control of the desktop, and improved outsourcing services. With these benefits, it is no wondered that virtualization has had a meteoric rise to the 2008 Top 10 IT Projects! This white paper presents a brief look at virtualization, its benefits and weaknesses, and today’s “best practices†regarding virtualization. Read More...
|
Computer Engineering |
India |
457-462 |
124 |
Sound Signature in Graphical Password
-VIDHYESH PATIL ; ASIM AZMI; WASEEM AHMED KHAN; SHRINIDHI GINDI
Here, a graphical password system with a supportive sound signature to increase the remembrance of the password is discussed. In proposed work a click-based graphical password scheme called Cued Click Points (CCP) is presented. In this system a password consists of sequence of some images in which user can select one click-point per image. In addition user is asked to select a sound signature corresponding to click point this sound signature will be used to help the user to login. System showed very good Performance in terms of speed, accuracy, and ease of use. Users preferred CCP to Pass Points, saying that selecting and remembering only one point per image was easier and sound signature helps considerably in recalling the click points. Read More...
|
INFORMATION TECHNOLOGY |
India |
463-465 |
125 |
Design and fabrication of Low cost Minto wheel for Low duty industrial applications
-R.Gowtham Raj ; Naresh M; k.Dinesh; V.Prithivirajan; U.Gaspar
In recent years usage of fuels and energy are being increased, this results in crisis for decades. Hence necessity for the invention of new alternative has been increased. The different ways proposed the ways to reduce the existing energy and to reuse the waste energy. This paper proposes a cheap and effective way of designing and fabricating of Minto wheel that may be effective to run low duty applications such as motors, compressors. Since Minto wheel has high torque it can be used in nuclear power plants for driving pumps. The design process starts by considering its top level objective and passing these criteria to its sub assembled designs. Finally the paper proposes outline of theoretical background of Minto wheel, working principle, various design parameters, innovative use of fabrication works and industrial implementation ways. The design process involves the design of chambers, selection of liquid, amount of heat addition, heat rejection, efficiency and many more. These sub design parameters helps in finding out head in which the cycle can be operated. The fabricated work involves usage of available materials in and around effectively. As a result final assembly of the engine meets the objective. Read More...
|
Mechanical engineering |
India |
466-468 |
126 |
Study and Analysis of Duckworth Lewis Method
-Vivek Mandir ; Nikunj Dalsaniya; Anuj Chaudhary; Sapan Mankad
Designed for one-day cricket, this paper considers the use of the Duckworth-Lewis method as an approach to resetting targets in interrupted cricket matches. The Duckworth-Lewis table is reviewed and an alternative resource table is presented. A desideratum of a resource table is monotonicity in both the rows and columns corresponding to wickets and overs respectively. Consequently, a Gibbs sampling scheme related to isotonic regression is applied to the observed scoring rates to provide a nonparametric resource table. A discussion is provided concerning the use of the Duckworth-Lewis method applied to International Cricket matches. It is designed so that neither team benefits or suffers from the shortening of the game and so is totally fair to both. It is easy to apply, requiring nothing more than a single table of numbers and a pocket calculator, and is capable of dealing with any number of interruptions at any stage of either or both innings. The method is based on a simple model involving a two-factor relationship giving the number of runs which can be scored on average in the remainder of an innings as a function of the number of overs is remaining and the number of wickets fallen. It is shown how the relationship enables the target score in an interrupted match to be recalculated to reflect the relative run scoring resources available to the two teams, that is overs and wickets in combination. Read More...
|
Computer Engineering |
India |
469-473 |
127 |
Implementation of PLC for Power factor Improvement in a 3-phase Induction motor
-vikash rajak ; Dr. V.S.Kale
This paper presents an application of Programmable Logic Controller (PLC) for power factor improvement of a 3-phase induction motor. The implementation incorporates development of the hardware and software for power factor improvement of a 3-phase squirrel-cage induction motor. The hardware comprises of power-circuit and control-circuit equipped with protective devices whereas software includes PLC program developed under the IEC-61131-3 standards. The process includes switching of capacitor-banks through digital output of the PLC in a proper logic. The addition of capacitors to the motor circuit introduces capacitive reactance into the system circuit. This capacitive reactance offered to the motor equivalent circuit compensates the inductive reactance of the motor and thereby, improves the power factor of the system. Read More...
|
Electrical Engineering |
India |
474-478 |
128 |
Power flow analysis of power system network using PowerWorld Simulator
-PATEL NIRAVKUMAR JAYANTIBHAI ; PATEL NIRAVKUMAR JAYANTIBHAI; MANISH N. SINHA
This paper describes the power flow analysis of power system network using Power World Simulator. For power flow analysis this paper considered the 220 KV Navsari Sub-Station grid network with a view of estimating the real and reactive power flows, power losses in the entire network and phase angle using Power World Simulator. The simulation result of 220 KV Navsari Sub-Station grid network is done using Newton Raphson Method. Read More...
|
Electrical Engineering |
India |
479-482 |
129 |
Numerical Prediction of Magnetizing Inrush Current in Power Transformers on the basis of Design Parameters
-Atulkumar Chandrakant Talati ; Ajay M. Patel
This paper presents an analytical method to predict the maximum inrush current for three phase power transformer. The calculation of transformer design parameters and the method for calculation of peak inrush current is proposed. The magnitude of maximum inrush current by analytical method and the results obtained from simulation in PSCAD/EMTDC are in agreement with one another. This method is very useful to estimate the maximum inrush current before manufacturing of the power transformer. Read More...
|
Electrical Engineering |
India |
483-485 |
130 |
A Control Scheme for Dynamic Voltage Restorer using PSCAD
-ANKUR KUMAR GUPTA ; Mrs. R.J.SATPUTALEY
The Dynamic Voltage Restorer (DVR) is a custom power electronic device to compensate the problems of voltage sags and voltage swells in the distribution lines. The main function is to inject the voltage difference (which can be determined as difference between the pre-sag and sag voltage) to the power line and helps to maintain the pre-sag voltage condition in the load side. Different type of control ideas are implemented depending on the techniques for compensation purpose. A new control scheme for the single phase voltage sags based on in-phase compensation technique. In this scheme, the Dynamic voltage restorer tracks the phase angle of the supply voltage and produces a reference voltage signal with the rated load voltage magnitude. If there is any phase jump generated at the supply voltage, then phase angle of the reference voltage signal is adjusted slowly leads to track the phase angle of the supply voltage. Then the injected voltage which is the difference between the reference and measured voltage is injected by the DVR. The simulation was simulated out using EMTDC/PSCAD (Electromagnetic transients including DC/Power system computer aided design Professional software version 4.1.0) and their results show various levels of compensation for voltage sags. Read More...
|
Electrical Engineering |
India |
486-490 |
131 |
feed forward neural network based palm pattern classification
-R.RAJESWARI ; S.JEEVITHA
Palmprint is one of the most unique and stable biometric characteristics. Although 2D palmprint recognition can achieve high accuracy, the 2D palmprint images can be easily counterfeited and much 3D depth information is lost in the imaging process. Previous works on 3D palmprints has focused on local and global features and also it requires some more training process during the palm print recognition. In this paper, we propose feed forward neural network basedpalm prints which describe shape information and to improve the efficiency ofpalm-print recognition. The feed forward neural network is trained using back propagation algorithm which is being employed to classify the palm images based on its features. Thus our experiment demonstrates that the proposed model leads to higher accuracies and also provides quick results, compared against the pattern recognition technique that uses SVM classifier for quantification. Read More...
|
Electronics and communication engineering |
India |
491-494 |
132 |
Design and Analysis of Wideband LNA using CMOS Technology
-Patel Sunilkumar Babulal ; Patel Jignesh V.; Charel Sunil S.
In this paper wideband CMOS low noise amplifier (LNA) is proposed by using the concept of mutual coupling technique through a symmetric-tap inductor. In this design of LNA intrinsic capacitance within a transistor are considered as a part of circuit. The total power consumption using T-coil network wideband low noise amplifier from 1.8V power supply is 4.5mW with 0.18µm CMOS technology. Read More...
|
Electronics and Communication Engineering |
India |
495-497 |
133 |
Privacy Preserving Data Mining using Cluster based Randomized Perturbation
-Paul Sudeep G ; Kiran P
Privacy is an important issue when one wants to make use of data that involves individual’s sensitive information. Research on protecting the privacy of individuals and the confidentiality of data has received contributions from many fields, including computer science, statistics, economics and social science. This is an area that attempts to answer the problem of how an organization, such as a hospital, government agency or insurance company, can release data to the public without violating the confidentiality of personal information. The technique used in this paper mainly focuses on Randomization for perturbation of values. The Randomization method is a technique for privacy preserving data mining in which noise is added to the data in order to mask the attribute values of records. The noise added is sufficiently large so that individual record values cannot be recovered. Therefore, techniques are designed to derive aggregate distributions from the perturbed records. Subsequently, data mining techniques can be developed in order to work with these aggregate distributions. Read More...
|
Computer Science Engineering |
India |
498-502 |
134 |
Designing Typographic Logo for Men's Branded Apparel
-R. ANIL KUMAR ; Dr. R.I. Sathya
Typography is a Text based designing process, wherein any written mode is visually adopted to convey a story. It is an application created systematically, especially for text based mediums as banners, newspaper, catalogues, invitation, rubber stamp, letter head, posters and millions of other forms. This work is concerned with the designing of Typographic Logo for Men’s Branded Casual shirt using Computer Aided Designing software. The designing task involved two important processes. The first part is concerned with the Digital Modulation, wherein a manually designed Art work is created digitally enabling all such modulation process like application of color, texture and appearance. The second stage is the Legibility, Scaling and formatting of the Typographic Logo. The study proves that the Typography is an important technique which could be designed using text formatting options in CAD applications and found suitable or textile and apparel based applications like Screen printing, Block printing, Stencil printing, Logo designs, Label designs, Product design and hundreds and thousands of several other applications. Read More...
|
Textile and clothing |
India |
503-507 |
135 |
Web Services Discovery Approach: A Comparison Study
-Shahid Khan ; Nimble John; Govinda K
Web services are playing an important role in organization to improve their business. As web service applications are platform independent so large scale distributed systems can be developed easily using web services. As per organization requirements it is very difficult task to finding most suitable web service from large collection of web services for successful execution of applications. Keyword based web service discovery approach using UDDI is used in past. Apart from that many other approaches for discovering web services are also available i.e. syntax based and semantic based. To develop a system for service discovery which can work automatically is also the concern of service discovery approaches; it is also a complex task. In this paper, we give the comparison of different approaches for web service discovery. We present a survey of how these approaches differ from each other and find its pros and cons. Read More...
|
Computer Science and Engineering |
India |
508-510 |
136 |
State estimation with and without FACTS controller SVC using WLS algorithm
-Nikita Abraham ; Dr. R.Jegatheesan
Flexible AC Transmission System (FACTS) technology, which aims at increasing system operation flexibility, appears as an attractive alternative. FACTS controllers are included in an electrical power system to overcome operational problems. Static VAR compensator (SVC) is a shunt connected static VAR generator (or absorber) whose output is designed to draw capacitive or inductive current so as to maintain normal voltage at the bus with which the SVC is connected. SVC can be incorporated to an electrical power system using WLS state estimation algorithm. In this paper various changes made in Jacobean matrix when SVC is added. Comparison with and without SVC done with IEEE 3bus and IEEE 14bus at different locations then voltage magnitude and phase angle variations at each node determined. Read More...
|
Electrical Engineering |
India |
511-514 |
137 |
Secure and Trustable Biometric system using Visual Cryptography
-Kalpesh S. Chaudhari ; Kishor H. Bamniya
Biometric identification systems can be attacked at many vulnerable points. One of the vulnerable point is biometric database. Biometric authentication system can be easily spoofed by applying stolen protected template at matcher sub-system of biometric identification systems . This type of malicious manipulation is termed as replay attack. We propose a visual cryptography based technique which provide security against replay attack and also generate trustable biometric authentication system. In proposed work two shares are created based on protected template. One share (Share1) will be stored in database and another (Share2) is in secondary memory (RF ID card). So, stolen share1 is not useful for replay attack. Also without use of share2 one cannot generate original protected template. Therefore, system provides security against replay attack and it is trustable. Read More...
|
Electronics and Communication engineering |
India |
515-518 |
138 |
Performance Evaluation and Comparison of Web Application Testing Tools: WAPT Pro and Apache JMeter
-S.Sharmila ; Dr. E. Ramadevi
Web Applications are widely known as the building blocks of typical service oriented applications. Performance of such an application system is mainly dependent upon the components of web applications. Testing web application is nothing but to find out errors in its content, function, usability, navigability, performance, capacity, and security. Performance testing is used to determine the responsiveness, throughput, reliability and scalability of a system under a given workload. In recent years, various tools and techniques are developed for measurement and evaluation of quality of service of web applications. In this paper, two testing tools WAPT Pro and Apache JMeter are compared and implemented on a same website. The two tools WAPT Pro and Apache JMeter are compared in terms of their different performance metrics (parameters) results. Performance metrics results generated by these performance testing tools have been evaluated and analyzed. The same website has been tested for performance under these performance testing tools then differences in results of various performance metrics like average response time, bandwidth, error rate, throughput, memory and CPU utilization, median, standard deviation etc. are obtained. Read More...
|
Software Testing and Quality Assurance |
India |
519-522 |
139 |
An Overview on Influence of Shot Peening Parameters on Peening Intensity
-P V Sartanpara ; P M Agrawal; J R Koisha
Shot peening is a cold working process used to produce compressive residual stress layer and modify mechanical properties of metals. The change in mechanical properties are measured in terms of shot peening intensity. The influence of shot peening parameters like air pressure, standoff distance, shot media, exposure time and nozzle diameter on shot peening intensity have been analyzed by Analysis of Variance method. This study highlights application of Taguchi technique to optimize effect of the shot peening parameters. Read More...
|
Mechanical Engineering |
India |
523-524 |
140 |
Design of Substation Lighting in DIALux software replacing conventional Lights with LED flood Light in a Switchyard
-SHARMA AJAY G ; DEEPA KARVAT; CHAUHAN PARIKSHIT
We cannot imagine life without artificial lights. The LED Lights is the latest trends in lighting. LED’s are state of art technology. We started using LED basically for household purposes lighting mostly used for decoration because of the poor Lumens outcome initially but with the evolution in the technology there is the large increase in the usage of LED in the field of lighting. Its batter and efficient output is also the prime dominant factor which leads LED to the zenith of the Lighting sector focusing both domestic and industries. Flood lighting is the lighting type for substation. It’s important to maintain proper illumination in the substation. The paper describes the evolution of LED in the floodlighting Scheme and its importance as compared to the conventional lighting schemes for the floodlighting used in the substation. The paper deals with a case study of flood lighting used in the Switchyard. Flood lighting of the substation which was installed with conventional lighting scheme will be replaced by the LED lighting its benefits will be showcased in the paper. Designing of the flood lights lighting scheme used in substation is displayed in the paper by using DIALux software Read More...
|
Electrical Engineering |
India |
525-527 |
141 |
Understanding of Multi-machine Simulation Using Simulink Model
-Patel Vrutika Rameshbhai ; Prof. Ashish R. Patel; Prof. D. K. Patel; Prof. J. K. Chauhan
This paper describes simulation of multi-machine power system example using Simulink blocks MATLAB software. This paper also involves designing of 3 machine 9 bus system using MATLAB simulation. This model is very useful for study of stability analysis but is limited to the study of transients for only the “first swing†or for periods on the order of one second. The system is made stable by removing faulted line of given multi-machine. For Ybus simulation M-file is been used and final results is plotted Read More...
|
Electrical Engineering |
India |
528-531 |
142 |
Implementation of Mini-Search Engine
-Sakriti Karan ; Khushboo Pandey; Priyanka Khanka; Neha Kapadia
Search Engine can be defined as a program that searches for and identifies items in a database that correspond to keywords or characters specified by the user, used especially for finding particular sites on the Internet. Search engines retrieve information using algorithms such as distance vector algorithm, crawlers, meta-tags, indexing and many such others based on the keywords or queries entered by the user. When the user queries a search engine to locate information, he/she is actually searching through the index that the search engine has created — not actually searching the Web. These indices are giant databases of information that is collected and stored and subsequently searched. This is why sometimes a search on a commercial search engine, such as Yahoo! or Google, returns results that are, in fact, dead links. Since the search results are based on the index, if the index hasn't been updated since a Web page became invalid the search engine treats the page as still an active link even though it no longer is. It will remain that way until the index is updated. The overall goal of this project is to develop a scalable, high performance search engine. The main focus is on the algorithmic challenges in compactly representing a large data-set while supporting fast searches on it. Our intention is to cluster different documents based on subjective similarities and dissimilarities. Our proposed tool ‘Mini Search Engine’ is based on the concept of data mining, page ranking algorithm and word search program. It presents results in different file formats like .pdf, .doc etc. based on the user’s query. Read More...
|
Information Technology |
India |
532-534 |
143 |
Web Usage Mining: A Research Area in Web Mining
-nisha yadav
Web mining is the application of data mining techniques to extract knowledge from Web. Web mining has been explored to a vast degree and different techniques have been proposed for a variety of applications that includes Web Search, Classification and Personalization etc. Web Usage Mining is that area of Web Mining which deals with the extraction of interesting knowledge from logging information produced by web servers. Web usage mining tries to discover the useful information from the secondary data derived from the interactions of the users while surfing on the web. It focuses on the techniques that could predict user’s behavior while the user interacts with web. This paper discusses a study on web usage mining, its methods and applications. Read More...
|
Computer Science and Applications |
India |
535-539 |
144 |
DNA COMPUTING IN SECURITY
-SHRIKRISHNA RATHI ; Surbhi Handoo; Prachi Thokale
DNA computing is a new computational paradigm by harnessing the potential massive parallelism, high density information of bio-molecules and low power consumption, which brings potential challenges and opportunities to traditional cryptography. In this paper, on the basis of reviewing the principle of DNA computing and the development situation of DNA computing briefly, we analyze some schemes with secret key searching and introduce the application of DNA computing in encryption, steganography and authentication. Read More...
|
COMPUTER ENGINEERING |
India |
540-543 |
145 |
Waterfall Graphic Print
-Sandip J. Dawda ; Kamani Shabnam Shabbir Husain; Srivastava Tulika Rakesh; Upadhyay Puja Ramnarayan
Our project “waterfall graphic print†can be described in one word as water speaks. In our project, we are using water as display element and develop a structure using AVR microcontroller, Solenoid valves, Triac-BT316 and MOC-3041. Characters which we display are the combination of water droplets and each character size is very large. We cannot display any word file or book using this technology. When water falls in air it creates the characters, so characters are very large and it takes time to read the whole word with proper attention Our project is used at many places like malls, colleges, company to display numbers and logos and different designs in air by using the water and to increase the value of the place. It is also used in chemical industries and dairy industries to mix the liquids in proper percentage by proper controlling of valves. So this project has many applications in general as well as in industries. It can be used at public places for enjoyment and also for publicity of any product. The most important part of this project is programming and we use AVR controller for programming and the software we used is BASCOM. Programming is very easy in this controller, so we spend more time in developing different logics instead of use that time in syntax. In this project, the microcontroller atmega16 is connected to PC or laptop through keyboard interfacing connection. So that the character can be displayed as soon as corresponding button is pressed on the keyboard. Keyboard interfacing will makes this project more users friendly. Read More...
|
electronics and communication engineering |
India |
544-547 |
146 |
Kinetic Studies on Planktonic Cell Growth, Biofilm Formation and Antimicrobials Production by a Salt-Tolerant Estuarine Actinobacterial Strain Streptomyces sundarbansensis sp nov.
-DR. SREYASHI SARKAR
In this study, effect of initial cultivation temperature on antimicrobials production, planktonic cell growth and biofilm formation by a salt-tolerant estuarine actinobacterial strain Streptomyces sundarbansensis sp nov. was investigated in sucrose based medium at shaken flask level for three different temperatures (25 oC, 30 oC and 35 oC). Peak antimicrobial activity (35 mm) was found at 30oC compared to the peak values of 29.5 mm, 24 mm attained at 25 °C and 35 °C respectively. From the growth curves obtained for both plantonic and biofilm growth, µmax,B (0.043 h-1)and µmax,P (0.063 h-1) were also maximum at 30oC. Product (antimicrobials) concentration increases linearly with total cell growth that comprised of both the planktonic cell growth and the biofilm growth. Luedeking – Piret model satisfactorily described the dependence of antimicrobials productions on total cell growth. Antimicrobials production was found to be strongly growth associated. Read More...
|
Biological & Bio system Engineering |
India |
548-551 |
147 |
New Approach for Advanced Encryption Standard (AES) Engines for Many-Core Processor Arrays
-A.KRISHNAKUMAR ; prof.J.Vijaya; Dr.T.K.Shanthi
The Advanced Encryption Standard (AES) has been lately accepted by NIST as the symmetric key standard for encryption and decryption of blocks of data. In encryption, the AES accepts a plaintext input, which is limited to 128 bits, and a key that can be specified to be 128 bits to generate the Cipher text. By exploring different granularities of AES as a onetime one Processor (OTOP), Small Encryption, Parallel Mixed Column and Full Parallelism we map these implementations on a field programmable gate array system. In comparison with published AES cipher implementations on general purpose processors. The proposed design has occupied less area and small delay. Read More...
|
ELECTRONICS AND COMMUNICATION ENGINEERING |
India |
552-557 |
148 |
Approaches and Techniques for Decision Making in Autonomic Computing Systems
-Rajyagor Bhargav P
Increasingly, applications need to be able to self-reconfigure in response to changing requirements and environmental conditions. Autonomic computing has been proposed as a means for automating software maintenance tasks. As the complexity of adaptive and autonomic systems grows, designing and managing the set of reconfiguration rules becomes increasingly challenging and may produce inconsistencies. Autonomic computing systems adapt themselves thousands of times a second, to accomplish their goal despite changing environmental conditions and demands. The literature reports many decision mechanisms, but in most realizations a single one is applied. This paper compares some state of the art decision making approaches, applied to a self- optimizing autonomic system that allocates resources to a software application providing performance feedback at run- time, via the Application Heartbeat framework. The investigated decision mechanisms range from heuristics to control theory and machine learning: results are compared by means of case studies using standard benchmarks. Read More...
|
Comouter SCience |
India |
558-560 |
149 |
Software Testing
-Deepkumar Kagathara ; Raj Gohel; Nelson Kalariya
Software Testing is an essential process in Software development life cycle. Before releasing product to the masses we have to check software for issues and flaws. Software testing allows one to test the software in real time situations.It is needed to check adaptability and effectiveness. This paper gives idea about different Software Testing techniques and their significance. Read More...
|
Software Engineering |
India |
561-565 |
150 |
Detection of Macular Edema in Color Retinal Images.
-JAYALAKSHMI.V ; SARANYALAKSHMI.T; KOKILA.D
Diabetic macular edema (DME) is an advanced warning sign of diabetic retinopathy and can direct to permanent vision loss. A person having extended term diabetes of more than 10 years is extremely precious by this disease. To recognize the disease we are using automated screening system, the green channel from the retinal color image is divided in order to decrease the noise, erosion, etc. Then the region of interest is extracted from the image. Then specific precious features are selected from the extracted features. By using ANFIS classifiers the given retinal image is recognized as infected or not infected. Finally if it is infected then it classifies the image as moderate (or) severe. Read More...
|
ELECTRONICS AND COMMUNICATION ENGINEERING |
India |
566-569 |