No. |
Title and Author |
Area |
Country |
Page |
251 |
Customer Relationship Management Using Data Minig
-Namdeo Badhe ; Jinal Doshi; Divya Sharma; Divya Upadhyay
Data Mining is motivated by most important area of research .Data Mining consists of evaluation of very large volume of data which leads to more consumption of time, so to reduce this efficient Data Mining algorithms are needed to be implemented so that the computational time as well as the efficiency increases.[3] CRM (Customer Relationship Management) describes the relationship between the different users and the product they buy or sell. This again involves very large amount of data and record keeping. The existing methodology of Data Mining used in the CRM systems are Apriori algorithms, which finds the frequent item sets and thus finding the relationship between them. But this too has various shortcomings such as excess time consumption which can be ruled out by the implementation of the Improved Apriori algorithm where portioning of the database is done.[1] The proposed system will have a CRM system where with the use of Improved Apriori algorithm the searching and the scanning time of the item sets can be reduced tremendously giving accurate and efficient output.[2] Read More...
|
Information Technology |
India |
965-967 |
252 |
Using Social Media to Gain Business Value
-Shreya Mankame ; Namrata Pawar; Shreya Mankame; Vighnesh Ramasubramanian
As the competition for Business is growing day by day the owners are concerned about the growth of their business. Social networking has become one of the most important parts of our daily life as it enables us to communicate with a lot of people. Social networking sites are created to assist in online networking. It is also is a platform where our creations and thoughts are presented to a huge lot of masses. Online social media represent a fundamental shift of how information is being produced, transferred and consumed. User generated content in the form of blog, posts, comments, and tweets establishes a connection between the producers and the consumers of information. Tracking the pulse of the social media outlets, enables companies to gain feedback and insight in how to improve and market products better. For consumers, the abundance of information and opinions from diverse sources helps them tap into the wisdom of crowds, to aid in making more informed decisions[1] Social media platform (SM) in particular comprises a flourishing new set of viral marketing mechanism that are growing exponentially. More and more companies are using SM because they know it works[1]. How much they spend and how long they continue to spend it will depend on how efficient SM proves to be in the long run. The measurement of social media effectiveness or ROI (Return on Investment) is the key factor in the long term success of SM marketing and management program. [1] The proposed system will calculate the gain of business by using social media as a platform. Read More...
|
Software Engineering |
India |
968-970 |
253 |
A Comparative Study on CN2 Rule and SVM Algorithm for Prediction of Heart Disease Datasets Using Clustering Algorithms
-RAMARAJ.M ; Dr.Antony Selvadoss Thanamani
In this paper, we discuss diagnosis analysis and identification of heart disease using with data mining techniques. The heart disease is a major cause of morbidity and mortality in modern society; it is extremely important but complicated task that should be performed accurately and efficiently. A huge amount data of leads medical data to the need for powerful data analysis tools are availability on the data mining technique. They have long to been an concerned with applying for statistical and data mining tools and data mining techniques to improve data analysis on large datasets. In this paper, the proposed system are implements and find out the heart disease through as to comparing with this techniques are Decision tree, SOM, CN2 Rule and K-Means Clustering and the prediction of high or low risk of Heart Disease. Read More...
|
datamining |
India |
971-974 |
254 |
Online Virtual Classroom
-Amogh Surve ; Vineeta Singh; Dhwani Shah; Rahul Neve
Virtual classroom is a combination of knowledge and technology to provide high values. Internet plays a vital role in Virtual classrooms. E-learning is attaining significance in the world of internet. Due to the advantages of internet, e-learning can be reached at anytime and anywhere. In order to meet the demands of the global economy E-learning should be adopted at all levels for development in education. Computers are reshaping student lives, at home and at school in profound and unexpected ways. The Virtual classroom is a collaborative teaching tool which facilitates the students to learn in an interactive manner. It aims to support the efforts of teachers to integrate technology into their classrooms. It also links the students to the Internet in educationally productive ways and provides them a stimulating, positive and enjoyable environment to study. E-learning technologies are known to spread learning very effectively. If E-learning is effectively implemented in rural areas as well, it will encourage increased participation of students in rural areas. Read More...
|
Information Technology |
India |
975-976 |
255 |
Design & Implementation 16-Bit Low Power Full Adder Using Reversible Logic Gates
-Patel Fenil S. ; Tarunkumar C. Lad
Everyday new technology which is faster, smaller and more complex than its predecessor is being developed. The increase in clock frequency to achieve greater speed and increase in number of transistors packed onto a chip to achieve complexity of a conventional system results in increased power consumption. Almost all the millions of gates used to perform logical operations in a conventional computer are irreversible. Reversible logic is gaining interest in the recent past due to its less heat dissipating characteristics. It has been proved that any Boolean function can be implemented using reversible gates. That is, every time a logical operation is performed some information about the input is erased or lost and is dissipated as heat. Reversible logic is one of the latest technologies having promising applications in Quantum Computing. Reversible logic has become one of the most promising research areas in the past few decades and has found its applications in several technologies; such as low power CMOS, Nano-computing and optical computing. Reversible logic gates are widely known to be compatible with future computing technologies which virtually dissipate zero heat. Reversible logic gates produce zero power dissipation. So these can be used forlow power VLSI design. Adders are fundamental building blocks in many computational units. For this reason, we have simulated several adder circuits using the reversible gates. This paper implements a design of Adder using reversible logic gates. This paper proposes a new 16-bit reversible adder using 4*4 Reversible DKG gates that can work singly as a reversible full adder. Read More...
|
VLSI Design |
India |
977-982 |
256 |
Analysis and realization of a Viterbi decoder with low power dissipation
-Patel Pratik J. ; Tarunkumar C. Lad
In this paper, a low-power design of Viterbi decoders at the gate level in the standard cell design environment is proposed. In the standard cell design environment, the behavior of a design is described in a high-level hardware description language, such as VHDL or Verilog. The behavioral design is synthesized to generate a gate level design. The gate-level design is placed and routed to generate a layout of the design. The focus of our research in the low-power design of Viterbi decoders at logic level is reduction of dynamic power dissipation in the standard cell design environment. We considered two methods, clock-gating and toggle-filtering, in our design. Read More...
|
VLSI Design |
India |
983-989 |
257 |
Application of Ant colony Optimization technique in Economic Load Dispatch Problem for IEEE-14 Bus System
-Pirmahamad Jamalbhai Vasovala ; Chinmay Y. Jani; Vasim H. Ghanchi; Parth Harshad Kumar Bhavsar
Optimal System operation involves the Consideration of economy of operation, system security, emission of certain fossil-fuel plant. The main aim of this study is to minimize the fuel cost and to keep the power outputs of the generator within prescribed limit with the use of An Ant colony Optimization Techniques. It is based on the ideas of ant foraging by pheromone communication to make path. Ant Colony Optimization technique is a meta-heuristic approach for solving hard combinatorial optimization problems which can be applied for power system optimization. The work reported in this paper is carried out with the objective to make use of Ant colony Optimization for solving the economic load dispatch problem. IEEE-14 Bus 3 machine system is considered to test the Algorithm with cost functions. The proposed approach result has been compared to those which reported in the literature. Read More...
|
Electrical Engineering |
India |
990-994 |
258 |
A Review Comparison of different Spreading Codes for DS CDMA
-Meenakshi ; Paras chawla
In CDMA based systems; the selection of the spreading codes used for multiplexing multiple users’ data places a pivotal role. Some of the known classes of spreading codes used in CDMA-based cellular system are Walsh-Hadamard, Gold codes and Kasami codes. In this paper, presents a comparative study of different properties of these codes with the multi-level codes based on gray and inverse-gray codes In a cellular system, due to multi-path propagation channel, the orthogonality among the codes in the received CDMA signal is destroyed. To characterize this we define metrics based on all delayed auto-correlation and cross-correlation of the codes in a family. Mean Square Aperiodic Auto-Correlation (MSAAC), Mean Square Aperiodic Cross-Correlation (MSACC) measures and the Merit Factor (MF). These metrics for the GIG codes as designed and proposed in [1] were also evaluated and found to be better than other code family. Read More...
|
Electronics and communication engineering |
India |
995-999 |
259 |
On securing big data analytics
-Nilotpal Chakraborty ; G K Patra; D S Bhilare; V B Gupta
Big data refers to a large collection of information and data that becomes difficult to manage with traditional database management tools. A huge amount of data is being dumped to the servers of various data centers and they are stored for performing analysis on them. Analysis on big data helps in making more accurate decisions and modeling problems that would otherwise have been difficult with the traditional database systems. But since via this, a large volume of data is now exposed for analytics, securing the privacy and the integrity of the data becomes an important point of concern. In this paper we discussed various security issues and challenges to big data analytics and their probable mitigation techniques. Read More...
|
Computer Science, Information Technology |
India |
1000-1002 |
260 |
UAV based Quadcopter with Wheels
-sejal agarwal ; amisha bhagat ; shruti shetty; jyoti ghule
The goal of this project was to design the systems and algorithms necessary to allow a quadcopter to locate and land on a station target. The purpose of this system was to outline the framework for a quadcopter based data collection or surveillance system that copes with the relatively short battery life. It is capable of hovering in place and is capable of carrying a payload, such as the camera used to determine the location of the target. A system was devised to ensure that the quadcopter can correctly determine the location of a target while hovering and then land when above the target. The basic quadcopter design is modified such that it cannot only land near the target site but also ride near the target with the wheels provided Read More...
|
electronics and telecommunicatio engineering |
India |
1003-1006 |
261 |
Comparative Analysis of Association Rule Mining Algorithms
-Neesha Sharma ; Dr. Chander Kant Verma
In the field of association rule mining, many algorithms exist for exploring the relationships among the items in the database. These algorithms are very much different from one another and take different amount of time to execute on the same sets of data. In this paper, a sample dataset has been taken and various association rule mining algorithms namely Apriori, FP-Growth, Tertius and Predictive Apriori have been compared. These algorithms were applied on the data using Weka tool and the results have been presented. According to the results obtained, it has been found out that FP-Growth algorithm is the fastest of them all. Read More...
|
Computer Science and Engineering |
India |
1007-1010 |
262 |
HPVDB- Human papiloma virus DataBase
-Kumari Vibha ; Praveen Kumar
Human papilloma virus (HPV) is a DNA virus from the papillomavirus family that is capable of infecting humans. Like all papillomaviruses, HPVs establish productive infections only in keratinocytes of the skin or mucous membranes. While the majority of the known types of HPV cause no symptoms in most people, some types can cause warts (verrucae), while others can be in a minority of cases lead to cancers of the cervix, vulva, vagina, penis, oropharynx and anus. Genital human papillomavirus (also called HPV) is the most common sexually transmitted infection (STI). These HPV types can also infect the mouth and throat. Most people who become infected with HPV do not know they have it. HPV is not the same as herpes or HIV (virus results AIDS). There are more than 40 HPV types that can infect males and females. These are all viruses that can be passed on during sex, but they cause different symptoms and health problems Read More...
|
Bio Technology |
India |
1011-1013 |
263 |
A NOVEL SINGLE PHASE Z-SOURCE BUCK-BOOST MATRIX CONVERTER
-HARDIK MEHTA ; Jiten Chavda
This paper presents a novel type of Z-source buck-boost matrix converter which has unique features that cannot be obtained in traditional matrix converter. The proposed converter employs Z-source network to buck or boost the input voltage. The converter employs safe commutation strategy which eliminates voltage spikes on the switches without need of a protection circuit. Read More...
|
Electrical Enginnering |
India |
1014-1018 |
264 |
Performance Emission Characteristic Of Diesel Engines with Coconut Oil based Biodiesel
-satyavrat patel
Recent trends towards usage of diesel engines and depleting fossils fuels. There has been a worldwide interest in searching for alternatives to petroleum-derived fuels due to their depletion as well as due to the concern for the environment. The work done on one of the promising diesel alternative is described. The literature reviewed most of the vegetable oil and its methyl ester and their performance characteristics are also studied from literature. The properties of CME thus obtained are comparable with ASTM biodiesel standards. One such CME has been used as the test fuel for the experiment. The performance of diesel engine on CME and its blend with diesel were compared with diesel. Tests are conducted on a 7.4kw, computerized single cylinder 4-stroke stationery diesel engine to evaluate the feasibility of CME and its diesel blends as alternative fuels. The test was conducted with the different loads. The result shown that the CME can be used as an alternative fuel compared to mineral diesel. CME blends give somewhat same brake thermal efficiency as conventional diesel. As the amount of CME in the blend increase the HC, CO, and NOx concentrations in the exhaust decreased when compared to mineral diesel. However this resulted in an increase in the BSFC. This was attributed to the lower calorific value of CME. Read More...
|
Mechanical Engineering |
India |
1019-1022 |
265 |
Design of FPGA based Low Power Embedded System with Application Specific Sensors
-Mursal Ayub ; Prof. RajshekharJ.S
In this paper we proposed a low power Embedded system whose multiple FPGA based switches are operated independently according to the application specific sensors like regional movement detectors in video stream. This system consists of a LED switching circuit, embedded vision system communicating each other through GPIO. All IPs are provided with Verilog codes in RTL, as well as Verilog codes and EDIF netlist of synthesized gate level logic which are verified in FPGA emulation. They are setup as semiconductor IPs in ready-to-use state in remote server computer Embedded vision system is implemented by 32 bit processor, Open RISC and peripherals - SDRAM, SSRAM, DMA, TFT-LCD, GPIO and CIS, etc. - connected on Wishbone on-chip bus. One bus structure is too busy to provide enough high speed transferring of image data from camera both to TFT-LCD and to the processor that is executing motion detecting program. So segmented bus structure is introduced to achieve higher performance. It is verified by simulation that the performance of segmented bus structure is more than two times better than one bus structure. The FPGA implementation confirms higher data transferring speed, suitable for a real-time video application. Read More...
|
Electronics Engineering |
India |
1023-1026 |
266 |
Overcoming the Inside Attacks in VANET
-A. Thendral ; V. Selvakumar
Vehicular networks are becoming wide technology in traffic system. The entities that are part of a vehicular communication system can be private or public vehicles, road-side infrastructure, and authorities, with the latter considered primarily as network entities. The vision for vehicular ad hoc networks includes the frequent exchange of data by vehicles to facilitate route planning, road safety and e-commerce applications. Poorly designed VANETs that permit serious attacks on the network can jeopardize the goal of increased driving safety. In a VANET, for simpler attacks than data modification exist, such as for example transmitting fraudulent data about road congestion or vehicle position, and such attacks can be quite damaging. Hence, security in a VANET relies upon the potentially more challenging problem of handling intruders. Currently we promote a data centric approach for handling intruder exemption. Among these, we identify redundancy as a promising approach particularly for evaluating the scenario of multihop protocols. Representing a message transfer of a multihop protocol as a directed graph, we derive metrics to assess communication redundancy. As a future work of our project we propose to integrate the VANET with the inexpensive wireless sensor network (WSN). That is sensor nodes are deployed along the roadside to sense road conditions and to buffer and deliver information about dangerous conditions to vehicles regardless of the density or connectivity of the VANET. We design a four-way handshake that allows the roadside mote and the information gathering car mote to mutually authenticate themselves, thereby preventing misbehaviour intrusion. Read More...
|
Computer Science & Engineering Department |
India |
1027-1030 |
267 |
A Dust Collecting Mechanism for Vehicles
-Anjil Jain ; Manan Patel
A Dust Collector is a device which is designed to collect the dust rising from road. When the vehicles pass over the road due to the contact of tyres with road dust particles will rise from road level. The forward motion of the tyres will create the cloud of dust. The cloud of dust will create air pollution also it cause sight and breathing problems for two wheelers drivers. So the Dust Collector will suck the dust inside it and will not allow forming a cloud of dust. In this device, the effect of two suction fans performs suction from two sides. There are different parameters like, suction of dust, entrapping of dust, suction of exhaust gas and reduction of air pollution. Read More...
|
Mechanical Engineering |
India |
1031-1032 |
268 |
Linear Generating Relation and Summation Formulae Associated with Gauss Hypergeometric Polynomials
-Deepak Kumar Kabra ; M. I. Qureshi; Yasmeen
In this paper, Some summation formulas and generating relation associated with Gauss Hypergeometric polynomial, are obtained by means of series rearrangement techniques and some algebraic properties of Pochhammer symbol. Read More...
|
Mathematics Department |
India |
1033-1035 |
269 |
Reduction in Harmful Exhaust Gas Emission with use of Catalytic Converter and Fuel Magnetizer
-Nikit B. Patel ; Saurabh B. Patel; Milan S. Patel; Diptesh Patel
This paper reports the review of the reducing the harmful exhaust gas emissions with the combination of the catalytic converter made of non-noble material and fuel magnetizer. Generally with the use of the catalytic converter amount of carbon monoxide (CO) and oxides of nitrogen (NOX) in exhaust gases are reduced but reduction into amount of hydrocarbon (HC) is less. Similarly with the use of fuel magnetizer the amount of oxides of nitrogen (NOX) and hydrocarbon (HC) are reduced but the reduction in amount of carbon monoxide (CO) is less. So, for the effective reduction of harmful component of exhaust gas emission we have to combined use the catalytic converter and fuel magnetizer. Read More...
|
Mechanical Engineering |
India |
1036-1039 |
270 |
Cascade Tripping of the Power Grid
-Apexa Suryakant Purohit ; Asst. Prof. Chinmay Jani
Cascade tripping is the tripping of power grid in unbalanced condition or it is the tripping of safety devices and isolation of the part of the system to prevent damage to equipment. Cascade tripping occurs during under frequency or other unbalance condition. When demand is more than power generated the frequency of machine goes down. When this frequency is less then certain limit, the grid will trip .This will result in sudden loss of power. If demand is less then generation, it will also cause such situations. Which is also called blackout or grid failure. To avoid this synchronism must be maintained in the grid. Synchronous generators thousands of kilometers apart must operate stably and in synchronism during infinitely many load and power transfer conditions, equipment outages, and power disturbances following a short circuit or other disturbance, one group of generators could accelerate relative to another group, causing instability and loss of synchronism. Implications of blackout are clearly enormous for the electrical power industry. Parts of grid are being stretched to their limits. Read More...
|
Electrical Engineering |
India |
1040-1044 |
271 |
An Overview of Cloud Security Paradigm
-Deenu Sharma ; Dr. M. K. Rawat
Cloud computing has been a heart favorite topic for many researchers over the years. In contrast to traditional solutions in which the IT services are under proper physical logical and personnel controls, the cloud computing moves the application software and databases to the large data centers. In those centers the management of the data and services may not be fully trustworthy. This unique feature of cloud computing poses many new security challenges which have not been well understood. cloud computing do not contain both the data and the on the users system so there is a need of data security. All the modern cloud service provider solve this problem by encryption and decryption techniques. In this paper, we investigate the basic problem of cloud computing security. We have proposed a survey of various models for cloud security. Read More...
|
Computer Engineering |
India |
1045-1046 |
272 |
A Review on WSN Coverage Schemes
-Guneet Kaur
In recent years wireless sensor networks (WSNs) have become one of the most active research areas due to the bright and interesting future promised to the world of information technology. It is an emerging field which is accomplishing much importance because of its vast contribution in varieties of applications. Coverage is one of the main research interests in wireless sensor networks (WSN), it is used to determine the quality of service (QoS) of the networks. Therefore this paper aims to review the common strategies use in solving coverage problem in WSN. The strategies studied are used during deployment phase where the coverage is calculated based on the placement of the sensors on the region of interest (ROI). The strategies reviewed are categorized into three groups namely; force based, grid based and computational geometry based approach. Read More...
|
Computer Engineering |
India |
1047-1051 |
273 |
Decision Support System for Managing Educational Capacity and Utilization
-Namdeo Badhe ; Ankit Mehta; Vaibhav Dhakan; Param Vyas
Universities and even individual educational institutions, operate with large amounts of data, typically scattered across multiple, non-centralized information systems and applications. Support of administrative decision-making and knowledge discovery from such decentralized data flows requires a system designed with close eye on the specific needs of the academic domain. A strategic approach is needed to plan activities, optimally allocate resources. Such an approach should be based on appropriate inputs allowing decision makers to meet institutional goals by managing the educational resources and availability of faculty at universities or any educational institution at the particular time. The process must admit students in such a manner as to achieve an efficient utilization of university resources. Hence to facilitate strategic decision making, we propose to develop a decision support system, which is primarily concerned with resource allocation and performance analysis. A number of general performance descriptors like staff per student ratio, teaching load, availability of faculty, their experience in teaching the particular domain etc. are used as parameters for our proposed system. Read More...
|
Information Technology |
India |
1052-1054 |