No. |
Title and Author |
Area |
Country |
Page |
151 |
Accident Detection System
-ASWATHY JAMES ; NIMMY ROSE SAM; NEENA K PIUS; JITO TOMY JOSEPH
Accidents like falls in people can happen due to reasons like old age, unconscious mind and poor motor control. Such accidents may result in broken or fractured bones, cuts, and even death. Living with the fear of falling leads to isolation, worsening of mental health, and general degradation of quality of living. If the accidents cannot be prevented, the next best option is detecting them accurately, and alerting the required authorities for medical help. This paper introduces an accident detection mechanism with the help of the Smartphone. Smartphone’s gather the information using the Built-in tri-accelerometer and the data obtained from the accelerometer are analyzed using the displacement based algorithm. On detecting an accident, the user is prompted to respond and can use touch or voice recognition to reduce the false positives. If the user is not responding within a period of time, the application generates alerts like emails and text messages and alerts the predefined contacts. If any unconscious situations occur, the user can press the panic button and the appropriate message/audio/video/image will be sent to the predefined contacts.The system also provides the hospitality facility.That is by providing the details of the nearest hospital. Read More...
|
Information Technology |
India |
570-572 |
152 |
A Novel Approach to Image Compression Technique using Discrete Wavelet Transformation and Self-Organized Map
-Sanjeev Tanwar ; O.P. Malik; Rashmi Kumari
In this paper image compression of gray scale images is done with the utilisation of extreme mathematical concepts like self organising map along with the discrete wavelet transform. The self organising map and discrete wavelet transforms are used in a proper sequence as the self organising map is applied for obtaining the index value and code vector, while the latter is applied further on the code vector. The use of both of these methods leads to a good compression ratio and great peak to signal noise ratio. Vector quantization and discrete wavelet transform techniques cause’s losses in the compression that is why size of the image is reduced so that the images compressed can be accepted. Read More...
|
Electronics & Communication |
India |
573-574 |
153 |
A Review on peformance and exhaust emission characteritics of a diesel Engine by changing piston geometry
-Bhatt Vaibhavkumar Chittaranjan ; Mrs. Vandana. Y. Gajjar; Mr. K. K. Araniya
Internal combustion engines in now a days the best available reliable source of power for all domestic, large scale industrial and transportation applications. The major issue arises at the efficiency and exhaust emission of these engines. Every attempt made to improve these engines tends to attain the maximum efficiency and minimum emission. The study is about the effects of air swirl in the cylinder on its performance and emission. In the present work a review of literatures about influence of air swirl in the cylinder upon the performance and exhaust emission of single cylinder direct injection diesel engine is presented. In order to achieve the different swirl intensities in the cylinder, three design parameters have been changed: the cylinder head, piston crown and inlet duct. Read More...
|
Mechanical Engineering |
India |
575-577 |
154 |
A SURVEY ON VIRTUAL MACHINE SECURITY IN CLOUD COMPUTING EVIRONMENT
-Patel Deepkumar ; Prof.Upen Nathwani
Cloud Computing is a new model that provides, on-demand network access of the computing. Virtualization is a technology for data centers and cloud architectures. It has many security issues that must be point out before cloud computing technology is affected by them. Many companies are starting to utilize the infrastructure-as-a-service (IaaS) sometime called Haas-Hardware as service. Attackers can explore vulnerabilities of a cloud system. in Iaas-infra structure as service ,detection of zombie exploration attacks is extremely difficult for distributed servers in which various virtual machine operating. To prevent vulnerable virtual machines from being compromise in the cloud, we depict multiphase distributed liability detection, measurement. Proposed work customizes Framework for virtual machine attack detection and compromise virtual machine. Read More...
|
Computer engineering |
India |
578-580 |
155 |
Information Obscurity through Visual Cryptography using Quick Response Codes
-SHRUTI AHUJA
QR Codes are two-dimensional or matrix bar codes developed in Japan by Denso Wave. This two-dimensional symbol was invented for tracking of automotive parts, but these codes are increasingly found in other fields as well. These small sized codes can also be hidden inside the images. It’s been more than a decade that this technology has been invented and with the advent of Smartphones this technology has gained an edge over the barcode technology as they require scanners for decoding. As the information stored is in the binary form, so various types of information can be stored in the QR code. QR Code is a two dimensional, matrix type symbol which has a cell structure arranged in form of square comprising of four patterns namely finder patterns, timing patterns, alignment patterns, and a quiet zone also a data area exists where the data is present. Read More...
|
Computer Engineering |
India |
581-582 |
156 |
A Survey on Data Hiding And Steganographic Techniques
-Anjula Gupta ; Navpreet Kaur Walia
Steganography is the process of hiding a secret message within a cover in such a way that someone cannot know the presence of the hidden message. The goal of Steganography is to maintain secret communication between two parties. Hiding secret information in images, there are a large variety of stenographic techniques in which some are complex than others and all have strong and weak points. In this paper, we define Security, methods of protecting information, data hiding applications and requirements, overview of steganography, and different methods such as LSB, MLSB, Pixel indicator etc. are used to implementing steganography. So steganography is the process of hiding information. In this paper we review all the techniques of steganography. Read More...
|
Information Security |
India |
583-588 |
157 |
A Review: Security of Data using Encryption and Decryption Techniques
-Harmeet Kaur ; Ravneet Kaur
While transmitting any confidential information across network, some unauthorized user tend to steal or corrupt the data. To prevent this interruption, security of data is needed. As Data security is needed for protecting data from unauthorized users and destructive forces, some security techniques are used. Encryption is one such technique which is used to protect the database from unauthorized accesses and unwanted actions of external clients. It is used to secure the confidential information from unauthorized user by converting the data in to that format that is only understandable by the authorized receiver that knows the respective decryption to obtain the original data or information. Various techniques have been implemented to ensure the security of data. In this paper, we have studied symmetric, asymmetric encryption and some other techniques. Read More...
|
Computer Science Engineering |
India |
589-591 |
158 |
Comparison of Six Software Engineering Models
-SADDAM HUSSAIN ; Tripathi A.M.
Software systems and their applications come and go through a series of passages of time that account for their inception, initial development, techniques, productive operation, upkeep and retirement from one generation to another generation. This paper article categorizes in different ways and examines various numbers of methods and techniques for describing and modeling how software systems are developed. During software development process, software companies and industries are exposed to risks (unwanted events and causes) which leads to economic and competitive loss. Risk management technique and various methods are being used to minimize the loss in software systems and projects. Different software process improvement models are used to include risk management among their rules, methods and guidelines. The main purpose and goal of this paper is to emphasize on evaluation and analyzing how the models can be used as accordance with the comparison based study. Read More...
|
Software Engineering |
India |
592-599 |
159 |
A Review: Energy Efficiency on Multicast Routing in MANETs
-Sonia Ahuja ; Sukhpreet Kaur
In recent years many energy-efficient routing protocols have been proposed. Many efforts have been taken in studying the energy consumption of individual node and route maintaining issues. If the design of energy efficient routing protocol is not consider carefully then it may perform very worst than the normal routing protocol. Establishing correct and efficient routes is an important design issue in mobile ad hoc networks (MANETs), a more challenging goal is to provide energy efficient routes because mobile nodes’ operation time is the most critical limiting factor. Nodes in a Mobile Ad Hoc Network are typically battery-powered so energy consumption is an important metric to consider in designing routing protocols for such networks. The purpose of this paper is to study the existing solutions to offer a more energy efficient routing mechanism. Read More...
|
Computer Science Engineering |
India |
600-603 |
160 |
A Review: Stability of Nodes and Routing in MANET
-Amanpreet Kaur ; Amandeep Kaur Virk
MANETs can manage without fixed infrastructure and can stay active rapid changes in the network topology. The challenge in building a MANET is equipping each device to continuously maintain the information required to appropriately route traffic. Routing with high scalability and robust performance are the key challenges in deploying Mobile Ad-Hoc Networks. In order to operate the Ad-Hoc Networks more efficiently, suitable on-demand routing protocols have to be incorporated to find effective routes between source and destination. The dynamic topology of a mobile ad hoc network (MANET) poses a real challenge in the design of a MANET routing protocol .Since last 10 years, a variety of routing protocols have been developed and their performance simulations are made by network researchers. In this paper, we deliberate on different routing protocols which are widely used in MANETs. We have also emphasized on node stability which is an important consideration to enhance network efficiency. Read More...
|
Computer Science Engineering |
India |
604-606 |
161 |
Blowfish and LSB Procedure to Secure Open Channel Communication
-Neha Gupta
Digital data communication has become an essential part of infrastructure nowadays, a lot of applications are Internet-based and it is important that communication be made secret. Cryptography and steganography are the two popular methods available to provide security. One distorts the message and the other hides the existence of message itself. Using cryptography, the data is transformed into some other gibberish form and in steganography,the data is embedded in an image file and the image file is transmitted.This paper focuses mainly on the strength of combining cryptography and steganography methods to enhance the security of communication over an open channel. Read More...
|
Computer Engineering |
India |
607-612 |
162 |
Harmonics Analysis in Distribution System & Mitigation Using Shunt Active Filter
-Bhatt Jigar Rajendrabhai ; Divyeshkumar Mangroliya
In this paper electrical distribution system use of nonlinear loads is much more and therefore problem of Harmonics distortion is available. For mitigation this distortion we interest in APF topology to produce specific current components that cancel the harmonics current components caused by the nonlinear load. Particular shunt Active power filter is most of used as mitigation purpose in distribution system. It has advantages compensate the load current harmonic & as well as contribute to reactive power compensation. For compensation current in shunt active filter using instantaneous active-reactive power theory used which is most convenient than other time domain theories Read More...
|
Electrical Engineering |
India |
613-616 |
163 |
A Review of Design and Analysis of Small Scale Permanent Magnet Wind Generator
-Meghani Akash Ishwarbhai ; Nisarg Pankajkumar Dave
Renewable energy sources, especially wind turbine generators, are considered as important generation alternatives in electric power systems because they have no exhausted nature and not harmful environmental effects. Permanent magnet generator has a good prospect in small scale wind turbine application. Many types of generator concepts have been proposed and used, but most of the low speed application consist Permanent magnet generator. As compare to conventional electrically excited generators, PMG have many advantages, so it attracted towards interest of research. The purpose of this paper is to review Permanent magnet generator configuration, design methodology, design optimization, and analysis of permanent magnet generator. Different Machine configurations proposed in literature are also discussed for suitability to small scale wind turbine application. Read More...
|
Electrical Engineering |
India |
617-620 |
164 |
Wind Energy Power Generation Integrated with Utility Grid
-VANAPARTHY SHASHANKA ; M.S.Ballal
The performance of wind power generation where it is aimed to obtain efficient and economic energy production, when connected to power network is discussed. As the wind speed is not always constant, the fluctuations in it reflect the output power, but the voltage and frequency should be kept as stable as possible. The maximized power at the required voltage and frequency using an inverter is fed to the load and as the demand is satisfied it delivers the remaining power to the grid. The operation of the circuit breaker that is when to attach to the system and detach from it corresponding to the wind speed is discussed. The parameters like voltage, delta, powerfactor comes across this are discussed briefly. For the same a model is designed and simulated in MATLAB and the results are analyzed. Read More...
|
Electrical Engineering |
India |
621-625 |
165 |
FRACTIONATION OF HEAVY METALS IN SOIL OF INDUSTRIAL AREA OF MYSORE CITY, INDIA
-Dr.D.Shiva Kumar ; Dr.S.Srikantaswamy
The Metals are considered as most important toxic pollutants in the ecosystem. Metals are continuously released into the biosphere by natural processes like volcanoes, weathering of rocks and also by various anthropogenic activities, such as mining, combustion of fuels, industrial and urban sewage and agricultural practices. On a global scale there is evident that, through the anthropogenic activities surrounding environment has polluted heavy metals. Once metals were entered into the environment it goes on accumulation with the natural process. However, in general aspects it is very difficult to eliminate the metals from the environment. Traditional treatments for metal contamination in soils are expensive and cost prohibitive when large areas of soil are contaminated. In this present study the heavy metal pollution in industrial area of Mysore city has been taken and also heavy metal speciation, as well as abiotic and biotic factors affecting their bioavailability of heavy metal pollution was studied. The geochemical behavior of heavy metals was analyzed through speciation studies. The studies show that the heavy metals mobility is less in the Exchangeable metal fraction and Carbonate bound metal fractions. But in the Fe– Mn oxide metal fraction and Organic and sulfide metal fractions mobility of the metals is comparatively little higher than the other fraction. The final residual metal fraction has the non-mobile phase of the heavy metals. In this study period, the industrial surrounding area soil has become polluted and lost their natural fertility with the addition of some heavy metals by several processes taken up by the industries. Read More...
|
Environmental Science |
India |
626-634 |
166 |
Economic Evaluation of Reuse and Recycle of Construction Waste in India
-Patel Mitul Narendrakumar ; Minerva J Pandya
History of Human evaluation indicates that the growth obtained since industrialization era to till date is with consumption of various resources and production of waste. The growth of human kind is conveniently considered as equivalent to the growth of construction industry, which is also the major source of waste. Approximately half of the wastes generated and landed in landfill are from Construction and Demolition waste (CDW). Materials ended as waste of CDW often consists high economic value as well as environmental threats. Since the concept of sustainable development, recycle and reuse of waste are in practice globally, it is now almost indispensable to reuse and recycle construction and demolition waste to utilize the resources utmost and gain economic benefits and to prevent environmental deterioration. This paper categorizes different types and sources of CDW. It also describes current scenario and model for economic evaluation of recycle and reuse. Read More...
|
Civil and Environmental Enginnering |
India |
635-639 |
167 |
Cabernet- Vehicular Content Delivery Using Wi-Fi
-N.SASIKIRAN ; M.SUDHAKAR REDDY; K.VENKAT
Cabernet is a system for delivering data to and from moving vehicles using open 802.11 (Wi-Fi) access points encountered opportunistically during travel. Using open Wi-Fi access from the road can be challenging. Network connectivity in Cabernet is both fleeting (access points are typically within range for a few seconds) and intermittent (because the access points do not provide continuous coverage), and suffers from high packet loss rates over the wireless channel. On the positive side, Wi-Fi data transfers, when available, can occur at broadband speeds. In this paper, we introduce two new components for improving open Wi-Fi data delivery to moving vehicles: The first, Quick Wi-Fi, is a streamlined client-side process to establish end-to-end connectivity, reducing mean connection time to less than 400 ms, from over 10 seconds when using standard wireless networking software. The second part, CTP, is a transport protocol that distinguishes congestion on the wired portion of the path from losses over the wireless link, resulting in a 2× throughput improvement over TCP. To characterize the amount of open Wi-Fi capacity available to vehicular users, we deployed Cabernet on a fleet of 10 taxis in the Boston area. The long-term average transfer rate achieved was approximately 38 Mbytes/hour per car (86 Kbit/s), making Cabernet a viable system for a number of non-interactive applications. Read More...
|
ELECTRONICS AND COMMUNICATION ENGINEERING |
India |
640-644 |
168 |
Comparative Study of Dewatering Technologies for Sewage Sludge
-Parmar Sandip B. ; Prof. H. S. Syed
Today, the treatment of water is a well-known process and is executed by state of the art techniques. The sludge resulting from this process represents the next challenge for the water treatment industry, in particular the minimizing of its volume. Now a days land is a premium and the use of open air drying might be offensive, are prime reason for the use of dewatering. The quantity of treated sewage as well as the level of their treatment results in the increasing amount of sewage sludge. Sewage sludge from water purification stations is difficult to handle. Sludge dewatering is a physical unit operation used to reduce the moisture content of the sludge and biosolids. Sludge dewatering reduce the transportation cost by reducing the volume of dewatering, easy to handle, increase the calorific value so that sludge dewatering is required. There are different types of sludge dewatering techniques but main aim of the paper is techno-economical comparison of belt filter press and centrifuge. Read More...
|
Environmental Engineering |
India |
645-647 |
169 |
Fault Tolerant Control Strategy for Multi Phase Permanent Magnet Synchronous Motor (PMSM)
-RANA VIRALKUMAR ARVINDBHAI ; Jaydeepsinh C. Baria; Swapnil Arya
This paper proposes the PWM based on fault tolerant control strategy for multi-phase permanent magnet synchronous motor and also provides the comparison of three phase and five phase permanent magnet synchronous motor (PMSM) in terms of various types of fault accurse in the five phase (PMSM). At the end the paper simulation results are provided of current, rotor speed and rotor torque of both the three phases and five faze PMSM. Read More...
|
Electrical Engineering |
India |
648-651 |
170 |
Application of Tuned Passive Filter for Industrial Six-Pulse Rectifier with R-L Load
-RANA VIRALKUMAR ARVINDBHAI ; Keyur Rana; Atul Talati
Power electronic devices find tremendous applications in industry as well as in domestic appliances. The excessive use of these devices causes major problems to the power system due to generation of current harmonics. These harmonic current pollute the power system and produce many adverse effect like malfunction of sensitive equipment, reduced power factor, overloading of capacitor, flickering lights, over heated equipments, reduced system capacity etc. This paper proposes the sources of the harmonics in the power system by converter, rotating machine, transformer, arc furnace and especially for the six-pulse rectifier with industrial R-L load and provide the harmonics mitigation technique to remove the harmonics contains from the power system to make it harmonic free. Read More...
|
Electrical Engineering |
India |
652-657 |
171 |
Configuration of Bootable for ARM Embedded System
-Abhishek J. Patel ; Prof. Brijesh N. Shah
This paper is on configuring the linux kernel for an ARM board. ARM system-on-chip is the best platform for reducing the risk and the cost of SOC designs and thus accelerating the speed, accuracy, flexibility. ARM boards are the combination of FPGA and ASIC technology and hence provide the optimal solution in terms of speed, cost and time. The embedded modules based on ARM delivers varied tasks such as process management, memory management and peripheral interfaces. Linux being an open source domain provides an additional edge to the embedded systems and as Linux can be freely downloaded thus it is being compiled for any system architecture including ARM. For new CPU architectures OS has to be configured, compiled burnt to the core and ported to the target platform. Building the linux kernel, Bootloader and the file system are described in detail Read More...
|
Electronics and Communication Engineering |
India |
658-660 |
172 |
Solar Based Air Compressor System using PIC Controller
-Jarecha Parth B. ; Modi Mandip M.
This paper will describe a novel system for generating compressed air energy generation system using solar thermal energy combined with PIC controller for usage and storage. The essential subsystems include solar panels directly coupled to air compressors, battery, and a PIC controller. Solar power is produced by collecting sunlight and converting into electricity. This is done by using solar panels, which are large flat panels made up of many individual solar cells. It is most often used in remote locations, although it is becoming more popular in urban areas as well. Interfacing of air controller with solar cells claims to be able to produce compressed air. This compressed air generation system will be particularly useful to inflate tires and for spray painting tool, with areas of high solar radiation for intermittent energy. This solar system would be a more economical means for achieving zero-emission, firm capacity. Read More...
|
Mechanical Engineering |
India |
661-664 |
173 |
Parameter Monitoring And Controlling In Irrigation System and Data Transfer using Zigbee
-Raval Bhavesh P. ; Parmar Mohit B.
In the past couple of decades, there is rapid growth attached to the PIC controller like sensors, watering pump, etc. This paper reviews some of these monitoring systems and proposes an automatic monitoring and controlling system in terms of technology in the field of irrigation. Different monitoring systems are installed in order to improve the crop quality in the field and the plant in nursery. Monitoring unit monitors the various agricultural parameters like temperature, relative soil moisture, light intensity, etc. the controlling unit controls the peripheral devices model using PIC controller, which may help the farmer to improve the crop quality and the plant development in nursery. Read More...
|
Electronics Engineering |
India |
665-668 |
174 |
Analysis and Design of Cuk Converter using PI Controller for PV Application
-Y.Bhaskar S S Gupta ; Sri Rama Lakshmi.P
Constant and required level of output voltage are important features of DC- DC converters. This paper describes CUK converter using PI controller for PV application. A CUK DC-DC converter is capable of operating in either step-up or step-down mode. Modelling of CUK converter operating in continuous conduction mode using the State-Space Averaging technique. The transfer functions used for feedback control design can be determined from the modelling. Results are presented to verify the accuracy of the obtained model. Read More...
|
Electrical Engineering |
India |
669-672 |
175 |
Predictive Model for Box-office Success of Movies Using Social media
-Poonam Thite ; Nikita Shah; Poonam Thite
Social media comprises interactive applications and platforms for creating, sharing and exchange of user-generated contents. The past ten years have brought huge growth in social media, especially online social networking services, and it is changing our ways to organize and communicate. It aggregates opinions and feelings of diverse groups of people at low cost. Mining the attributes and contents of social media gives us an opportunity to discover social structure characteristics, analyze action patterns qualitatively and quantitatively, and sometimes the ability to predict future human related events. We have assessed how buzz and attention is created for different movies and how that changes over time. Movie producers spend a lot of effort and money in publicizing their movies, and have also embraced the Twitter medium for this purpose. Our hypothesis was the movies that are well talked about are well-watched. Read More...
|
Software Engineering |
India |
673-675 |
176 |
Android Application for College Management System
-Raj Shrivastav ; Purvi Sankhe; Hardik Punamiya; Vatsal Prasad
Mobile technology has introduced a new environment among students and teachers that can be exploited and be used to improve the learning process. Taking into consideration this promising setting, a study was undertaken to realize the impact of such an environment, made possible by the android platform, on the learning process amongst students. The proposed system will introduce and improve interactivity, accessibility, and convenience in the learning process. Overall, the college management system application can be utilized as an inexpensive but potent tool that compliments the learning process. Read More...
|
Information Technology |
India |
676-678 |
177 |
Flowmeter and Control Valve Loop Automation in Forword and Reverse using PLC and SCADA
-Dodia Nileshkumar Karshanbhai ; Shisangiya Nishilkumar Sanjaykumar; Jalela Devang Kurjibhai
To aim of our project is “flow meter and control valve loop automation in forward and reverse using PLC and SCADAâ€. This project measure and control various type of flow in process industries. This project includes control valve, flow meter, PLC and SCADA. Through PLC and SCADA, it can control the flow in both direction forward and reverse. It can be controlled automatically using PLC and SCADA. Most commonly in process industry, flow control is only in one direction. By this project we can control the flow in both directions. Flow meter senses the flow of object and gives the input to the PLC and SCADA. By this closed loop, control valve take action as per instruction of PLC and SCADA automatically to the set point. Read More...
|
Instrumentation and Control Engineering |
India |
679-680 |
178 |
Pattern Discovery Using Association rule
-Pratik Ahuja ; Chinmay Birla; Sonu Varma
Database mining is motivated by decision support problems faced by most business organizations and is described as an important area of research. One of the most challenges in database mining is developing fast and efficient algorithms that can handle large volume of data because most mining algorithms performs computation over the entire database and often the database are very large.The methodologies of data mining that are used by existing market basket analysis are apriori algorithm to find frequent item sets for a large database but it has many shortcoming which can be resolved by many other algorithms one of which is Partitioning the large database and using apriori algorithm . Existing Market basket analysis display the frequent item set when searched for a particular item but the proposed system will show the results of prediction when searched for a particular item so as to improve the business throughput. Read More...
|
Information Technology |
India |
681-683 |
179 |
Identifying Buying Preferences of Customers in Real Estate Industry Using Data Mining
-Namdeo Badhe ; Manan Buddhadev; Niket Shah; Deepak Dhakan
Database mining is motivated by decision support problems faced by most business organizations and is described as an important area of research. One of the most challenges in database mining is developing fast and efficient algorithms that can handle large volume of data because most mining algorithms performs computation over the entire database and often the database are very large. The methodologies of data mining that are used by existing identifying buying preferences of customers in real estate industries are Apriori algorithm to find frequent item sets for a large database but it has many shortcoming which can be resolved by many other algorithms one of which is Partitioning the large database and using Apriori algorithm which is named as Improved Apriori Algorithm. We are using improved Apriori algorithm as it increases the throughput and reduces the memory that is being used for candidate set generation. Existing identifying buying preferences of customers in real estate industry display the frequent item set when searched for a particular item but the proposed system will show the results of prediction when searched for a particular item so as to improve the business throughput Read More...
|
Information Technology Engineering |
India |
684-687 |
180 |
Study on Economic Configuration of Flat Roofed Steel Trusses
-Majji Sai Priya ; Murali Sagar Varma Sagi; Markandeyaraju Ponnada; Gopi Sandhya
Truss is a frame work of triangles in which members are connected with hinge joints. This structural form transfers external loads acting on the structure by developing only axial forces in the members. As minimum sections are sufficient to resist axial forces, trusses can be considered as an efficient structural form particularly for long span structures. For given span, economy of the truss depends on its configuration, panel length and height of the truss. As there are no guidelines available to fix those parameters which leads to minimum weight of the truss, an attempt was made to obtain economic configuration of all trusses. Four flat roofed Truss Configurations mainly, Warren, Pratt, Howe, N type, spans of 26 m, 30 m, 36 m 42 m and 48 m are considered for different panel lengths and heights for the study. Trusses are analyzed and designed using STAAD.Pro. and total weight of the truss is obtained. The one with minimum weight of the material is considered as economic truss. It is observed that among four configurations considered in the study, warren type is most economical for all spans. Read More...
|
Civil Engineering |
India |
688-692 |
181 |
An Extensive Review on Time & Frequency Synchronization of MIMO - OFDM
-Binjal N. Shah ; Nidhi Bhatt ; Dr. Kiran Parmar
This paper proposes a quick and dependable procedure for timing and frequency synchronization of multiple-input multiple- output (MIMO) orthogonal frequency division multiplexing (OFDM) systems. Orthogonal frequency division multiplexing (OFDM) is a prominent technique for high information rate remote transmission. The execution of OFDM framework is exceptionally touchy to transporter recurrence offset (CFO), which presents between bearer impedance (ICI). Multi-data multi-yield framework utilized for expanding assorted qualities increase and limit of the framework. In this area recurrence synchronization in an OFDM framework is contemplated and gave past work OFDM framework. Read More...
|
Electronics and Communication Engineering Department |
India |
693-695 |
182 |
An Analysis of likely Role of Cloud Computing in E-Governance (A roadmap toward Government-electronic-Cloud (G-e-C))
-Amarjeet Singh ; Dr. Ramakanth Kumar P
Present scenario in the computing world and the fast changing communication technologies giving us the hint that in near future there will be a change in the way we do computation today. As mobile communication and Internet has become our 24 hours need and today we are living in the era of Facebook, YouTube, Google search, twitter and Skype etc. Social networking is becoming a big tool to reach the masses faster and in larger scale. Many Governments are using electronic medium to reach their citizens for better, safer, convenient and corruption less governance. The requirement for large scale computing and to reach the large population faster is becoming a challenge to the governments. The concept of cloud computing is slowly –slowly creating a new innovation in the way Information Technology is being proposed to be used and processed. The concept of cloud computing has been envisaged by the various governments across the globe for playing big role in implementing e-governance projects. In this paper I am making an analysis of likely role of cloud computing in e-governance for which I will give new name G-e-C (Government-electronic-Cloud). Read More...
|
Information Science Engineering |
India |
696-700 |
183 |
Optimization of Cutting Parameters in Turning Operation of Hardened Steels based on Taguchi Method - A Review
-Mittal P Brahmbhatt ; Ankit R Patel
This paper has presented a brief review of the application of Taguchi technique for optimization of turning operation in machining of hardened steels. Cutting parameter i.e cutting speed, feed rate and depth of cut are optimized using Taguchi method. The effect of cutting parameter on surface roughness, tool wear and cutting force are analyzed. From the study it was found that for surface roughness and cutting force feed rate is the most significant factor and for tool wear cutting speed is the most significant factor. Also found that Taguchi method provide simple, systematic and efficient methodology for optimization of the turning operation. Read More...
|
Mechanical Engineering |
India |
701-704 |
184 |
MPPT CONTROL OF GRID CONNECTED PMSG WIND TURBINES
-M.M.PATEL ; PROF.A.M.KUBAVAT; PROF.A.D.PATEL
Over the last years, with technological advancements wind power has grown rapidly and becomes the most competitive form of renewable energy especially for VS-WECS as compared to fixed velocity system. Most of system does not capture power at every wind speed, especially low wind speed. To achieve this outcome at variable speed wind energy conversion system (VS-WECS) here Permanent magnet Synchronous Generator (PMSG) is used which eliminates gear box. A simple Maximum Power Point Tracking (MPPT) control Scheme is used for PMSG with diode bridge rectifier and grid side inverter. The Power Conversion are Performed at unity power factor and DC link voltage is maintained constant. An Algorithm named Perturbation and Observation is developed at MPPT for maintaining constant voltage at output side in spite of variation in wind speed. Modeling and simulation of the grid side of the wind turbine system are performed. Results are verified through the MATLAB simulations. Read More...
|
ELECTRICAL |
India |
705-710 |
185 |
Touchscreen based Wireless Robot with Audio and Video Monitoring
-Ajay Prajapati ; Saurabh Darji; Mitul R. Dave; Ashok Vaghela
This Theory represent Touch screen based Wireless Robot with audio and video monitoring. In this project using two types of device: (1) Remote device (2) Robot device. Remote device control the whole project using wireless transceiver to send the command and RF receiver to receive the video gives analog video output. Robot device use the wireless transceiver to receive the command and video camera with RF transmitter. This robot can be used in many different security systems. Read More...
|
Instrumentation and Control Engineering |
India |
711-700 |
186 |
Automation in Bus Body Welding
-Asutosh Patel ; Shailesh Yadav
In this paper PLC and SCADA based Automated Welding System in Bus Body Welding is presented. By using automation in any system, we tend to make the system more precise in every aspect. This system is used to increase the productivity and quality. The automation also increases the safety quotient of the process as welding is quite hazardous process on continuous exposures for prolonged periods of time. Here three axis robot is used for welding of the structure. Here this robot will be controlled with PLC and SCADA. Read More...
|
Instrumentation and Control Engineering |
India |
713-715 |
187 |
Low Cost of PLC using Microcontroller
-Dharmendra Ahir ; Chauhan Mo. Shakir; Prajapati Shailesh
Programmable logic controllers used in industrial applications are very expensive for simple operations like sequential switching of loads. In this project we demonstrate the working of this simple operation using a microcontroller of 8051 family. The development of this application requires the configuration of the program through input switches. In industries, there are many tasks are carried out which requires some repeated operation in various orders and time intervals. For example, certain loads need to be switched ON/OFF in specific time intervals. In order to achieve this, microcontroller is programmed in such a way that the loads a can be operated in three modes: Set mode, Auto mode and Manual mod. In set mode, through timers, the machinery works based on input time set by the user whereas in auto mode it works on default time settings and finally in the manual mode it functions while respective switches are pressed depending on the user’s need and flexibility. All the modes and status of loads are displayed on an LCD. Read More...
|
Instrumentation and Control Engineering |
India |
716-718 |
188 |
GSM based Electronic Voting Machine
-Dhaval Thummar ; Maulik Dudani; Dhaval Gadhetharia
India is world’s largest democracy. Fundamental right to vote or simply voting in election forms the basis of Indian democracy. In India all earlier elections a voter used to cast his vote by using ballot paper. This is a long, time-consuming process and very much prone to errors. This situation continued till elections scenario was completely changed by electronic voting machine. No more ballot paper, ballot boxes, stamping, etc. all this condensed into a simple box called ballot unit of the electronic voting machine. Cellphone based voting machine is capable of saving considerable printing stationery and transport of large volumes of electoral material. It is easy to transport, store, and maintain. It completely rules out the chance of invalid votes. Its use results in reduction of polling time, resulting in fewer problems in electoral preparations, law and order, candidates' expenditure, etc. and easy and accurate counting without any mischief at the counting centre. This project is based on C language programming. Read More...
|
Instrumentation and Control Engineering |
India |
719-721 |
189 |
Dynamic Modelling of Solid Oxide Fuel Cell using MATLAB Simulation
-Keval Patel ; Chintan Patel
In the near future some fuel cell systems could be an accessible and attractive alternative to conventional electricity generation and vehicle drives. fuel cell systems can be made in mw to kw capacities; hence a wide range of applications can be covered by this type of fuel cell. This is a major advantage of this type of fuel cell, because once the technology was developed it can be more or less easily scaled up or down for various applications. fuel cell has attracted a great deal of attention as a potential power source for automobile and stationary applications due to its low temperature of operation, high power density and high energy conversion efficiency. In this Paper Matlab-simulink of model of solid oxide fuel cell (SOFC). Read More...
|
Electrical Engineering Department |
India |
722-724 |
190 |
Fin-Fan Control System
-Pankaj Shah ; Jignesh Vaghela
In this paper PLC and SCADA based Fin-Fan control system is presented. This system where use in the heat exchanging through hot water done in petrochemical plant. Fin-Fan control system is originally situated in INDIA in which hot water is cooled by the use of ID Fan. In many industries there are hot water is through in out of industries but in this process we have use hot water and hot water is converted into cool water. We have these project is not only used for petroleum refining but other industries like oil/gas production, power generation, petrochemical etc. Read More...
|
Instrumentation & Control Engineering Department |
India |
725-729 |
191 |
Touch Screen based Automation using Networking of Microcontroller
-Mayur Prajapati ; Nikunj Savaliya; Parth Vasoya
The project is designed to demonstrate how multiple microcontrollers can be connected in a network to achieve the desired output. This technology is widely used in modern automobiles. More and more microcontrollers are embedded in different kinds of products from industrial environment to domestic area. The importance of having multiple microcontrollers against a single one is if one of the microcontrollers goes bad only the function related to that particular microcontroller will be affected. The project demonstrates a command based monitoring tool using the MAX232 protocol. A network of three microcontrollers is used in this project. The first one is connected to touch screen for input action while the second one is connected to an IR sensor and the third one to drive a relay for controlling any load (LAMP). Input takes a password on the first MC to display it on the LCD while the third one executes the output only if the password is right. Wrong password if entered will generate a buzzer sound. Though this task can be performed by a single microcontroller, the project uses multiple microcontrollers to explain the concept of networking. It is practically impossible by a single microcontroller to handle input action, display and output which are located way apart. For example, a display unit requiring 15 connections from the microcontroller needs to be managed using a multi core cable, similarly for a keypad using 7 connections. Thus, for large number of inputs and displays it would require multi core data cable to be connected to the MC running over kilometers, whereas this project uses a pair of wire only thereby reducing the complications in wiring and cost as well. Further this project being based on serial communication can be enhanced by using wireless communication among the controllers by avoiding costly cabling. We can set the security system in this project. That is total depends on IR sensor. If security break than siren will be on. We can use the motor with blade to mix the material so that is the concept of mixing plant. We can set the Blower to control the heating parameter. Read More...
|
Instrumentation and Control Engineering |
India |
730-731 |
192 |
PLC based Thermoforming Process for Gadget Packing Solution
-Trushal Bhatkar ; Dhruvin Vaghela
This paper is introduced with PLC and SCADA based automated THERMOFORMING PROCESS in present product manufacturing industries. Automation in any industry to make plant systematic in every area .The thermoforming process is a main part of the all industries. Normally the thermoforming machine is manually hand operated one for medium and small scale industries. Thermoforming machine has changed radically in the past years by the booming popularity of Automation. Therefore we decided to work on the thermoforming process used in gadget packing solution using Automation. Hence we select this project to reduce man power, increase quality, increase productivity in thermoforming machine through Automation Read More...
|
Instrumentation and Control Engineering |
India |
732-733 |
193 |
Emergence of Nano-PLCs in Vending Machines
-Yash Joglekar ; Vivek Shah
Modern world is technology driven. Ironically, automation, led by us has reached beyond the human imagination. Be it food and processing industry or military application, instrumentation engineering has been proved more than useful in solving the problems as well as easing the hither to used systems. PLCs have been integral in the increasing dependence on automation. Yet with the advent of nanotechnology, it was feared that the PLCs will become obsolete. But the user-friendly modifications have led to nothing but an increase in the use of PLCs in modern industries. Following paper focuses on one such application of beverage vending machine using Nano-PLC, a miniature version of the traditional PLC. Being first of its kind, this paper mainly focuses on the theories rather than other citations and references. Read More...
|
Instrumentation and Control Engineering |
India |
734-735 |
194 |
An Industrial Project Study on Requirements Management using Ontology based Approach
-Pramod Saxena ; Dr. Manju Kaushik
Requirements Management is one of the challenging and key tasks in the development of software products in distributed software development environment. One of the key reasons found in our literature survey the failure of software projects due to poor project management and requirement management activity. This main aim of this paper1. Formulate a framework for the successful and efficient requirements management framework for Global Software Development Projects. (GSD) 2. Design a Mixed organization structure of both traditional approaches and agile approaches, of global software development projects. 3. Apply Ontology based Knowledge Management Systems for both the approaches to achieve requirements issues such as missing, inconsistency of requirements, communication and knowledge management issues and improve the project management activities in a global software development environment. 4. Propose requirements management metrics to measure and manage software process during the development of information systems. The major contribution of this paper is to analyze the requirements management issues and challenges associated with global software development projects. Two hypotheses have been formulated and tested this problem through statistical techniques like correlation and regression analysis and validate the same. Read More...
|
Computer Science & Engineering |
India |
736-742 |
195 |
Various Methods for High Utility Item Set Mining
-Hemant Narottam Chaudhari ; Gajendra Singh Chandel
Data Mining can be defined as an activity that extracts some new nontrivial information contained in large databases. Traditional data mining techniques have focused largely on detecting the statistical correlations between the items that are more frequent in the transaction databases. Also termed as frequent itemset mining , these techniques were based on the rationale that itemsets which appear more frequently must be of more importance to the user from the business perspective .In this thesis we throw light upon an emerging area called Utility Mining which not only considers the frequency of the itemsets but also considers the utility associated with the itemsets. The term transaction utility is the importance or the usefulness of the appearance of the itemset in transactions quantified in terms like profit , sales or any other user preferences. In High Utility Itemset Mining the objective is to identify itemsets that have utility values above a given utility threshold. In this thesis we present a literature review of the present state of research and the various algorithms for high utility itemset mining Read More...
|
Computer Science & Engineering & Information Technology |
India |
743-745 |
196 |
Frequent Itemsets Mining in Transactional Databases using Utility Pattern Algorithms
-S. Shantha kumar ; V. Anusuya
Recently, high utility pattern (HUP) mining is one of the most important research issues in data mining due to its ability to consider the non binary frequency values of items in transactions and different profit values for every item. On the other hand, incremental and interactive data mining provide the ability to use previous data structures and mining results in order to reduce unnecessary calculations when a database is updated, or when the minimum threshold is changed. This paper proposes three novel tree structures to efficiently perform incremental and interactive HUP mining. This propose two algorithms, namely utility pattern growth (UP-Growth) and UP-Growth+, for mining high utility itemsets with a set of effective strategies for pruning candidate itemsets. The information of high utility itemsets is maintained in a tree-based data structure named utility pattern tree (UP-Tree) such that candidate itemsets can be generated efficiently with only two scans of database. The first tree structure, Incremental UP Lexicographic Tree (IUPL-Tree), is arranged according to an item’s lexicographic order. It can capture the incremental data without any restructuring operation. The second tree structure is the IHUP Transaction frequency Tree (IUPTF-Tree), which obtains a compact size by arranging items according to their transaction frequency (descending order). To reduce the mining time, the third tree, IHUP-Transaction-Weighted Utilization Tree (IUPTWU-Tree) is designed based on the TWU value of items in descending order. Extensive performance analyses show that our tree structures are very efficient and scalable for incremental and interactive HUP mining. Read More...
|
Computer Science & Engineering |
India |
746-749 |
197 |
Singular Value Decomposition for Image Classification
-Amitkumar Sandesara ; Ashwini Singh; Jitesh Ranjak; Shiwani Gupta
The purpose of this paper is to study an important application of Singular Value Decomposition (SVD) to image processing. The idea is that by using the smaller number of vectors, one can reconstruct an image that is closer to the original. The clarity of the image depends on how many singular values are used to reconstruct it. In this paper, SVD was applied to the image. Using the MATLAB software the authors have demonstrated how SVD is used to minimize the size needed to store an image. Read More...
|
Computer Engineering |
India |
750-753 |
198 |
An Efficient Video Transmitting Scheme Under Collision Errors in Cognitive Radio Networks
-Maheswari Mangai ; Shanmuga Sundaram; Suresh Babu
Cognitive Radio (CR) networks are emerging as new paradigm of communication and channels sharing in multimedia and wireless networks. In this paper, we address the problem of video transmission over shared CR networks using progressive compression source coding associated to fountain codes. We consider a TDMA-based transmission where many subscribers share the same infrastructure. Each Secondary User (SU) is assigned one time slot where he transmits with a certain probability. The given model allows each SU to transmit opportunistically in the remaining slots. Therefore, packets are not only corrupted by reason of Primary traffic interruptions, but also we consider losses caused by collisions between several SUs due to the Opportunistic Spectrum Sharing. We use a redundancy-based model for link maintenance to compensate for the loss of spectrum resources caused by the primary traffic reclaims. Moreover, we setup up many Secondary User Links to mitigate the collision effects. Numerical simulations are performed to evaluate the proposed approaches in view of the average Goodput. We conduct a stability and performance analysis of the system and we highlight the achieved gains when using our transmission model. Read More...
|
Electronics and Communication |
India |
754-761 |
199 |
Survey on the Comprehensive Review of Different Classification Techniques and Class Imbalance Problem in Data Mining
-vinay kumar singh ; vinay kumar singh; imran alam; manohar kumar kushwaha
Data Mining is the process of applying machine learning techniques for automatically or semi automatically analyzing and extracting knowledge from stored data. It is defined as non-trivial extraction of implicit, novel and actionable knowledge from large datasets. Data mining can also be defined as technology which enables data analysis, exploration and visualization of very large databases using high level of abstraction. Data mining models can be categorized as predictive models and descriptive models. Classification is one of the important aspects of data mining which is a predictive modeling technique. Classification is a data mining technique used to predict group membership for data instances .We describes the basic classification techniques. Several major kinds of classification method including decision tree induction,etc, We present a Class imbalance problem has received considerable attention in areas such as Machine Learning and Pattern Recognition.We proposed a class imbalance problem in pattern classification. Data level methods for balancing the classes consists of resampling the original data set, either by over-sampling the minority class or by under-sampling and/or under-sampling the majority class, until the classes are approximately equally represented. Read More...
|
Computer Science |
India |
762-764 |
200 |
360 MW Generation of Wind Power & Evacuation to 400Km
-CHAUHAN PARIKSHIT M ; SARAFARAZ GANDHI; SHARMA AJAY; SUBHAG SOLANKI
Power demand had a drastic raise in past few decades. To fulfill the power demand, transmission line becomes a vital part of power system. As power generating units are at a far distant from user, transmission of power to consumer is only possible via transmission and distribution lines. The manual method of transmission line design involves tedious calculation and relies on the knowledge and experience of designer. Computational design of transmission line gives faster result and wide vision of the probable solution. C #based software is developed so as to calculate all electrical parameter required for transmission line design Read More...
|
Electrical Engineering |
India |
765-768 |