No. |
Title and Author |
Area |
Country |
Page |
51 |
Influence of Process Parameters on Surface Quality, TWR and MRR in Electro Discharge Machining of Inconel 825 material
-Chandresh B. Nai ; Vallabh. D. Patel; Nirav. B. Patel
Electrical discharge machining (EDM) is a well-established machining option for manufacturing geometrically complex or hard material parts that are extremely difficult-to-machine by conventional machining processes. However,due to the process nature, there is still incomprehension onprocess parameters influence at the final quality features, endingup by lower productivity and quality ratios. In this research taguchi Methodology is used to investigate the effect various Process Parameters like pulse on time, pulse off time, peak current and voltage on inconel 825. Present study attempts to optimize the complex electrical discharge machining (EDM) process (like: Material removal rate (MRR), Tool wear rate (TWR), Surface Roughness,(Ra) using taguchi Methodology. The analysis is checked by Anlysis of variance with 95% Significant level. Read More...
|
Advanced manufacturing technique optimization |
India |
187-191 |
52 |
Follow Me Trolley
-PATEL MAYANKKUMAR GULABBHAI ; ANSARI ASMAT ALI; SONI SHIVANG SHAILESHBHAI; SHUKLA ABHISHEK RAJENDRA
Retail is more and more moving toward online Shopping. I really doubt whether in even next 10 years we are likely to face disappearance of a supermarkets. To make both customers & super markets life easier we planned to make a follow me trolley with integrated chip and sensors that would come along with Display this would make customers life convenient and time saving while the supermarket will get attraction from the customer. We are going to interface with microcontroller to Motor, Barcode reader And Display and As Possible as Printer which Helps Trolley Can follows to Customer. In this system transmitter is used to transmit the signal. A transmitter is given to Any Customer and Transmitter is Moves According to Customer. IR receiver receives this signal and receiver is connected to microcontroller . Motor driver IC is drive the motor. According to Moving if the transmitter the Recover Mover. Receiver is connected with Trolley so trolley also moves. And Barcode reader for Cost Estimating For Customer. Read More...
|
ELECTRONICS & COMMUNICATION ENGINEERING |
India |
192-193 |
53 |
PAPR Reduction in OFDM system using Tone Reservation Technique
-Patel Ved Chandrakantbhai
Orthogonal frequency-division multiplexing (OFDM) has been considered for many high-speed wireless applications. Indeed, the orthogonal properties among subcarriers of OFDM lead to high spectral efficiency and excellent ability to cope with multipath fading environment. However OFDM systems have two major drawbacks: high peak-to-average ratio (PAPR) due to summing up of large number of subcarriers data together and inter-carrier interference (ICI) because the orthogonal properties are easily broken down byfrequency offset errors caused by oscillator inaccuracies. In this thesis, a coding technique is proposed to reduce both drawbacks. The scheme has tightly bounded PAPR and good error correction capability while reducing ICI significantly. The proposed technique is based on Tone Reservation. Read More...
|
Digital Communication |
India |
194-198 |
54 |
Indexing Genome with the external construction of compressed suffix tree using LCP array
-VIJAY KUMAR VISHWAKARMA
This paper proposes the genome indexing algorithm, which depends upon compressed form of suffix trees, in which every node has four parts; suffix array number, suffix start number, LCP count, and a pointer to another node. The proposed algorithm does not use the whole suffix array, it just takes some necessary information like LCP of two suffix array, compare them and suffix start number, to align the suffix to proper position and suffix array number to distinguish among all the partitions. The use of compressed suffix array minimizes the number of trees, eventually; it also minimizes the random access to input data, as it creates the compressed suffix tree for two suffix arrays using pairwise sorting, sequentially. Read More...
|
Computer Science and Engineering |
India |
199-202 |
55 |
Next Level Data Warehouse with OLAP And OLTP
-kunal kumar
In the data warehouse we are using two important process that is OLTP(Online Transaction Processing) and OLAP(Online Analytical Processing) ,with the help of OLTP in the data warehouse we take data from different type of sources and store in row view in database and after some interval like three or six month that data update in data warehouse because in data warehouse regular updation is difficult because data warehouse contain large amount of data .OLAP is perform analysis data that is present is data warehouse. OLAP help to show our business performance means it show that our business is goes profit or loss or any kind of analysis .But the problem is OLA P take data from data warehouse and in the data warehouse contain historical data because not regular updation.so the problem is analysis report is based on old or historical data and we know business means change every day and result is not in real time. The problem is OLTP and OLAP we work on different type of database .So in this paper we try to solve this problem with the help combining OLTP and OLAP and then get real time result for better business analysis. So because of changing business trend we try to resolve the problem of historical analysis process proposed new techniques that help to analysis historical as well as current data. Read More...
|
computer science |
India |
203-206 |
56 |
Real-time Wireless Re-beamer Automation on LabVIEW Platform
-Hardik M Kabariya ; Prof. Ashish G. Patel
The paper represents the primary development of wireless control and monitoring system based on PLC (programmable logic controller) with LabVIEW communication. The objective of the project is to maintain the tension of thread by controlling the MPM (meter per minute) of Re-beamer of winding system used in textile industries. I have used ZigBee (IEEE standard 802.15.4) as wireless platform. I have used OPC (object linking and embedding for process control) server to link LabVIEW with PLC and to plant. LabVIEW is applied as an SMI (software machine interface) in project. The operation of project execution is – Develop the ladder program and takes Tachogenerator feedback signal of carrier beamer from system and enables the control of VFD (variable frequency drive).VFD worked as a final control element in close loop system. Winding system is controlled under VFD only. Frequency from VFD varies the speed and maintains MPM of the Re-beamer. Read More...
|
Instrumentation and Control Engineering |
India |
207-211 |
57 |
A survey paper on effect of spray characteristics on DI diesel engine emission
-Shivraj Krishna Kumbhar ; Prof. P.A. Wankhade
By optimizing spray characteristics we can minimize raw emissions from the diesel engine which are mainly NOx and PM.As engine manufacturers are under increasing regulatory pressure to reduce NOx and particulate emissions by emission governing agencies, there is need to study effect of spray characteristics. Spray characteristics such as spray angle, spray pattern, atomization, fuel droplet size and distribution, spray tip penetration and nozzle type and nozzle geometry have significant effects on Diesel engine performance parameters and emissions. Turbulent characteristics of air fuel mixing are affected by the shape and condition of the nozzle inlet that is nozzle geometry. In this paper the effects of nozzle whole geometriesare discussed in brief. Read More...
|
Mechanical Engineering |
India |
212-214 |
58 |
An Overview of Cloud Security Paradigm
-Deenu Sharma ; Dr. M. K. Rawat
Cloud computing has been a heart favorite topic for many researchers over the years. In contrast to traditional solutions in which the IT services are under proper physical logical and personnel controls, the cloud computing moves the application software and databases to the large data centers. In those centers the management of the data and services may not be fully trustworthy. This unique feature of cloud computing poses many new security challenges which have not been well understood. Cloud computing do not contain both the data and the on the users system so there is a need of data security. All the modern cloud service provider solve this problem by encryption and decryption techniques. In this paper, we investigate the basic problem of cloud computing security. We have proposed a survey of various models for cloud security. Read More...
|
Computer Engineering |
India |
215-216 |
59 |
PORTING THE LINUX KERNEL TO BEAGLE BONE BLACK
-Jaydevsinh Jadeja ; Chintan Kapadiya
ARM development boards are the ideal platform for accelerating the development and reducing the risk of new SoC designs. The combination of ASIC and FPGA technology in ARM boards delivers an optimal solution in terms of speed, accuracy, flexibility and cost. The Embedded modules, based on ARM, can become very complex machines since these are meant to support varied tasks such as memory management, process management and peripheral interfaces.For seamless integration of these functional modules an OS has to be ported on these ARM based CPUs .Traditionally this OS porting is often the specialized work of third party vendors having expertise in this domain. For every new CPU architecture, the OS has to be customized, compiled and burnt into the core .With the coming of age of Linux as an embedded OS all this has changed quite significantly. Being in Open Source domain, Linux kernel can be freely downloaded and compiled for any system architecture and this includes ARM based systems also. This enables the developers to port the OS themselves. This paper describes the details of porting of Linux kernel to Beagle bone black.Building linux kernel; u-boot and x-loader are described in detail. SD card configuration is also described. [1] Read More...
|
Electronics and Communication Engineering |
India |
217-220 |
60 |
Detailed Analysis and Design of slab-wall system and Column-Beam System Concrete Building
-J.N.S.Suryanarayana Raju ; Senthil Pandian.M; K.Aravindhar Reddy
In the present scenario the high raised concrete buildings are increasing day-by-day in construction field. Construction became one of the significant sectors of Indian economy and is the major part of the development. For growing population the speed of construction needs to be given greater importance especially for large housing projects. The typical floor plan in a structural system of high raised concrete buildings can be easily done by slab-wall form compared to column-beam system. The behavior of the building under gravity and lateral loads is analyzed by using STADD.Pro V8i software for G+8 building. Comparisons with analytical results show that high base shear and deformation in column-beam system than slab-wall system concrete building. Read More...
|
structural engineering |
India |
221-225 |
61 |
E-Governance: Information/Data Security
-Hiren Harshadbhai Darji
As internet supported in e-governance, digital communities involve, in an e-government project, a substantial amount of documentation is done like government recruitment records, police records and so on. Each department is thoughtful so that only authorized people get into the network and access the information. An understanding of the information security technology and the need for its implementation is key for harmless, secured and smooth functioning of e-governance undertaking. Read More...
|
Computer Science |
India |
226-228 |
62 |
Analysis of Low Power-High Speed Sense Amplifier in Submicron Technology
-Sunil R. Gupta ; Pratik P. Shah
In this paper voltage mode sense amplifier, current latch sense amplifier and c urrent sense amplifier is analyzed and simulated with and without MTCMOS technique in a 45nm process technology using Ngspice circuit simulator. When density of memory is increased, the bit line capacitance is also increases and due to that, it limits the speed of voltage sense amplifier. To overcome this problem current sense amplifier is used, which is not dependent on bit line capacitance. This paper shows that delay time is reduced in current sense amplifier compare to voltage mode sense amplifier and current latch sense amplifier but power consumption is increased. MTCMOS technique is used to reduce power dissipation. Read More...
|
Electronics & Communication |
India |
229-233 |
63 |
A Secure Method for Medical Image Fusion
-Azim Syed ; Prof. V. N. Ghodke; Neeraj Gusain; Sagar Rasal
Medical image fusion has been used to derive useful information from multimodality medical image data. The idea is to improve the image content by fusing complimentary images like computer tomography (CT) and magnetic resonance imaging (MRI) images, so as to provide more information to the doctor and clinical treatment planning system. However in existing image fusion software, there is no element of image authentication and security, vital for fields like forensics. We have proposed a unique method in which we perform watermarking on input images of MRI and CT, fuse them using an efficient fusion algorithm and hide the fused image using a suitable steganographic technique, thus authenticating and securing the fused image. Our work covers the selection of best frequency domain based fusion algorithms for medical image fusion, implementation of fusion rules and the fusion image quality evaluation, with special emphasis on the 2-D wavelet transform for images. The fusion performance is evaluated on the basis of the root mean square error (RMSE) and peak signal to noise ratio (PSNR). Read More...
|
Electronics and Telcommunication Engineering |
India |
234-237 |
64 |
Artificial Neural Network based Fault Classifier and Distance Locator
-Brijesh Rajubhai Solanki ; Dr. MahipalSinh C. Chudasama
An Artificial Neural Network (ANN) based accurate fault classifier and fault distance locator for a transmission line is presented in this paper. The proposed strategy is implemented on a transmission line fed by the ideal voltage sources at both ends. The database to train the artificial neural network is generated with a MATLAB program. The neural network is trained for an accuracy of detection of ± 1 km in terms of fault distance. The complete scheme is implemented using MATLAB-SIMULINK. Transient fault currents are used to train the network. Hence, if we measure the fault currents with the digital instruments and feed them to the neural network, this module will be helpful to quickly determine the type and distance of fault which is the main contribution of this paper. Since quick detection of type and location of fault is possible, system reliability improves. Read More...
|
Electrical Engineering |
India |
238-242 |
65 |
Vehicle Security System using Relay
-Pooja Agarwal ; Lad Mansi; Patel Nikita; Patil Shweta; Patel Dhrumil
This Project presents an automotive localization system using GPS and GSMSMS services. The system permits localization of the automobile and transmitting the position to the owner on his mobile phone as a short message (SMS) at his request. This system is also provided with emergency switch which can be turned off through an SMS. This switch takes the responsibility to turns OFF the engine and can be turned ON only after receiving a predefined password from the owner of the vehicle. At once if the vehicle seems to be theft, the owner has to just send SMS to that vehicle means vehicle will be stop all the door will be locked then theft will be locked in the car. Read More...
|
Electronics & Communication Engineering |
India |
243-244 |
66 |
Early Warning System in the Improvement of Software Quality
-Riddhi Mehta ; Asha Faldu ; Meera Bhadania
Basic reason behind failure in software development projects is delay in correction of problems even if they are detected within reasonable time. This raises need of a concrete system which can warn against such potential risks. This paper highlights such early warning system based on fuzzy logic using integrated set of software matric. Such system helps accessing risks associated with being schedule. This handles incomplete, inaccurate and non-précised information, and resolves conflicts in an uncertain environment. Process, product, and organizational metrics are collected or computed based on solid software models. The intelligent risk assessment process consists of the following steps: fuzzification of software metrics, rule firing, derivation and aggregation of resulted risk fuzzy sets, and defuzzification of linguistic risk variables. Read More...
|
Computer Engineering |
India |
245-248 |
67 |
RFID and GSM- Based Garbage Collection System
-Bhaumil Prakashbhai Patel ; Dharmeshkumar Maheshchandra Agrawal; Neel Rajeshbhai Harshe; Mayank Pradeepkumar Gupta; Prof. Sandip J. Dawda
A RFID & GSM Based Vehicle Tracking System combine the installation of an electronic device in a vehicle, with purpose-designed computer software to track the vehicle's location. In vehicle tracking systems we use Global System for Mobile communication (GSM) technology for locating the vehicle. Vehicle information can be viewed on electronic maps which are positioned at control room. The control circuit is placed inside the garbage vehicle. Whenever the vehicle will reach in front of the respective trash bin the RFID reader will read the address from the respective trash bin, the microcontroller matches the RFID no. with the existing record and sends the vehicle position details to the control room via GSM module. The module will receive the message through GSM in the control room. This message will then be transferred to the LCD placed in control room through the serial port. In addition to the details of vehicle position, this system will also take care of whether the municipal staff has faithfully collected the garbage or not after reaching there.For this process we will make use of different type of sensors like IR PHOTO and ULTRASONIC sensors. Read More...
|
Electronics & Communication Engineering |
India |
249-251 |
68 |
Low Power Transmitter security system
-DIVYA D. PATEL ; DIVYA D. PATEL; MITALI S. PATEL; JINAL N. RATHOD; PROF. SANDIP J. DAWDA
For any industry one very important thing is its security system for industry and for every section of industry. Because it interpret the caring image of any industry for their product and their employees .Likewise low power transmitters (LPTs) at Doordarshan also require security of LPT’s parameters like Forward power, VSWR, Temperature, i/p overdrive, over voltage protection etc for absolute and noiseless transmission of any program of Doordarshan channel. Based on this, the analysis of control and monitoring is carried out and control card is to be implemented using microcontroller and LCD module at low power transmitters. Read More...
|
Electronic And Communication Engineering |
India |
252-254 |
69 |
IR Follower Cart
-ANSARI ASMAT ALI ; PATEL MAYANKKUMAR GULABBHAI; SONI SHIVANG SHAILESHBHAI; SHUKLA ABHISHEK RAJENDRA
The IR Human Follower Cart is made by using a microcontroller STM32.This trolley can be used in industries for moving goods from one place to another. This can be done by giving one man the transmitter and the receiver is on the trolley. This receiver and transmitters are the IR sensors. We can also put the transmitter at the back of first transmitter and then a second trolley can follow the first one. By this way we can form a queue of trolley and move the goods where we want by the help of single man just for guiding the trolley without doing a laborious job. Read More...
|
ELECTRONICS & COMMUNICATION ENGINEERING |
India |
255-256 |
70 |
Automated Toll Collection
-Ms Tarannum Sheikh ; Prof Dr Naveen Hemrajani; Mr gaurav Bagaria; Ms Nilam Choudhary
An Automated Toll System is used for toll collection without making traffic congestion and waiting in long queue with help of RFID technique. Also, by using this system, it will save time, i.e. by avoiding long queue as no need to stop the vehicle and no need of manual transaction. Most important that, the stolen vehicle will be able to catch easily with help of RFID technique and nail assembly. The current system for collecting toll is on the basis of manual transaction. In this each vehicle has to stop at the toll plaza for payment and there can be a problem of exact transaction. It causes traffic congestion, increase in pollution, and wasting time of people. In Automated Toll System no need to stop vehicle at toll plaza, it will detect the RFID tag, which is mounted on vehicle. After detecting RFID tag, the database on the administrators screen will appear and the balance from the customer’s account will get deducted. So there will not be any problem as mentioned above. The system is connected to a PC using the RS232C interface in the embedded system. This allows the system to read and write data from/to a database that is from the account. Read More...
|
Computer Engineering/Information technology |
India |
257-259 |
71 |
Power Quality: Harmonics Case Study And Solution
-Akash N. Lathiya ; Yogesh R. Prajapati
This paper describes the basic power quality issues with the MATLAB analysis. There are different types of the PQ issues like voltage sag, voltage swell, interruption, harmonics, 3 phase unbalance, voltage fluctuation, noise etc. normally current harmonics is produced by the various nonlinear loads which will result the distorted voltage wave which produce the voltage harmonics so harmonics is present in both voltage as well as current. So harmonics as the power quality case study of industrial load is carried out by taking one nonlinear load and filter design is carried out to reduce the current harmonics. Read More...
|
Electrical Engineering |
India |
260-263 |
72 |
END-TO-END QOS IN INTERDOMAIN ROUTING
-Mr. Sagar K. Shah ; Ms. Mohini M. Deshmukh; Prof. Rajesh S. Bansode
Many real-time multimedia and critical applicationscan migrate to Internet, provided it can support better QoS in an Inter-domain environment. The main challenges on this front can be split into two parts; the first part is to develop mechanisms for information exchange, signaling and path set-up. The second part is to find an optimal inter-domain path subjected to multiple QoS constraints. We address the second part in this paper. Providing end-to-end Quality of Service (QoS) guarantees for interdomain routing remains a challenge for next generation Internet. As various realtime, mission-critical, and bandwidth-sensitive applications are migrating to the Internet Protocol (IP) Networks the, need for end-to-end QoS is becoming acute. The paper presents a novel approach to achieve end-to-end QoS support by proposing a new Alliance Network model. The most important aspect of the proposed model is its compatibility with existing BGP infrastructure, such that the traditional BGP traffic continues in a normal fashion. The Alliance Network sets-up interdomain paths for premium traffic that require specific QoS guarantees using interdomain MPLS tunnels with resource reservation. The Alliance Network provides enhanced geographical reach and market penetration for the alliance partners through premium service offerings. Read More...
|
Information Technology [Networking] |
India |
264-266 |
73 |
The Ecofriendly Optimal Disposal And Treatment Of Biodegradable Municipal Solid Waste ?- A Case Study Of Ahmedabad City
-Asim I Shaikh ; Prof. A. M. Malek
Ahmedabad is one of the largest and fastest growing cities of India. The rate of growth of MSW (municipal solid waste) in the city is at the rate of 87181 tons per year. The management of MSW is an area of universal concern for both the developed and developing world. As per the latest data from AMC (Ahmedabad Municipal Corporation), 4000 tons of MSW is generated daily. AMC has done an agreement with several groups of industries to treat MSW by giving 108 acres of land on lease. The total cost for set up of these industries is Rs.430 crores. Optimal solution to this problem is the need of present time. This paper focuses on the optimal disposal and treatment of biodegradable MSW of Ahmedabad City. This paper also gives quantitative assessment of recycling of biodegradable waste. The proposal given in this paper is not only economic but also an ecofriendly. Read More...
|
Civil and Environment Engineerng |
India |
267-269 |
74 |
Path Planning for Unmanned Aerial Vehicle Based on Genetic Algorithm & Artificial Neural Network in 2D
-S AdityaGautam ; Mr. Nilmani Verma
The planning of path for UAV is always considered to be a critical task. Path planning for UAV in multiple missions can be accomplished by finding the solution for an optimization problem. Genetic Algorithm which is a global optimization tool can be used to solve the optimization problem for path planning of UAV. Artificial Neural Networks (ANN) is good at function fitting quickly and can be used to approximate almost any function. The Genetic Algorithms are good at converging to the global optimum solution generation by generation. Neural Networks work faster than Genetic Algorithms but may converge at local optimum. In this paper a new method for path planning of UAV for escaping from obstacle based on the combination of Genetic Algorithms and Artificial Neural Networks has been proposed in which the output generated from the Genetic Algorithms is used to train the network of Artificial Neural Networks. The model for path planning is based on 2D digital map. Read More...
|
Computer Science Engineering |
India |
270-273 |
75 |
Improving punctuality by adjusting time table design
-PATEL MAYANK POPATLAL ; PROF. V. R. GOR; PROF.H.K. DAVE
Transport authorities try to achieve a high level of quality in public transportation networks by creating performance indicators. The performance indicators can be of various designs, e.g. safety, frequency, arrival punctuality and departure punctuality. A common used performance indicator is departure punctuality. This article shows the impact of various characteristics of timetables on departure punctuality. The elements chosen for research are running time, buffer time and surplus time. This research clearly shows the impact of surplus time on punctuality. Surplus time acts as extra buffer time in timetables and therefore increasing punctuality levels. Furthermore it is shown that punctuality can be described as the sum of these 3 elements. The amount of time rewarded to each of these elements will determine eventually the level of punctuality. Changing these elements has therefore a direct influence on punctuality. Read More...
|
transportation engineering |
India |
274-278 |
76 |
Automatic Lip Reading Using Image Processing
-Anuj Bang ; Manali Kumar; Richard Wilson; Nikita Holani; Neha Jagtap
Automatic lip reading has been focused as a complimentary method of automatic speech recognition in noisy environments. The automatic detection of the lip contour is relatively a difficult problem in computer vision due to the variation amongst humans and environmental conditions. There are several techniques including, but not limited to, the use of lip intensity, lip geometry, explicit lip motion to transcribe human speech. This paper presents a snake guided geometrical feature extraction approach for lip reading. A total of 4 features were extracted comprising the feature vector. A database consisting of vowel utterances was created to test the lip reading system. Read More...
|
Electronics and Tele-Communication Engineering |
India |
279-280 |
77 |
Performance Analysis of Equalization Schemes in MIMO RF Communication
-ANKITA SINGHAL ; NISHU RANI; KRITIKA SENGAR
The wireless communication has derived to the present scenario after passing through number of stages and generation. From analog communication of 1st generation today we talk about digital communication in 4th generation, from the generation of single transmitting antenna and single receive antenna known as SISO systems, we reached the systems with multiple transmitting and multiple receiving antennas known as MIMO systems going through the systems of Multiple Transmit and single receive antenna systems known as MISO systems and Single transmit and multiple receive systems known as SIMO systems. This paper will present a study of generation from SISO systems to MIMO systems for digital communication under the research work going at Banasthali University, Rajasthan, India. Read More...
|
COMMUNICATION,RF |
India |
281-283 |
78 |
A PROTECTED INTERRUPTION DISCOVERY SCHEME FOR MANET
-Kathiresan ; Venkatesan
Protecting the network layer from malicious attacks is an important and challenging security issue in mobile ad hoc networks (MANETs). In this paper, a security mechanism is proposed to defend against Cooperative Black Hole Attack and packet dropper on the well-known AODV routing protocol in MANETs. In this paper we proposed an approach for better analysis and improve security of AODV, which is one of the popular routing protocols for MANET. Our scheme is based on AODV protocol which is improved by deploying DRI table to identify black hole nodes and packet-monitoring algorithm to overhear the next hop’s action to identify selfish node in MANET. Read More...
|
Ad-hoc networks |
India |
284-288 |
79 |
GESTURE RECOGNIZATION SYSTEM FOR DEAF AND DUMB PEOPLE
-GHASKATA SANJAY DAYABHAI ; PRAJAPATI HARDIK R; LIMBACHIYA KETAN H; CHUNDAVAT DHARMVEER B
Generally dumb people use sign language for communication but they find difficulty in communicating with others who don’t understand sign language. It is based on the need of developing an electronic device that can translate sign language into speech in order to make the communication take place between the mute communities with the general public possible. In this project Flex Sensor Plays the major role, Flex sensors are sensors that change in resistance depending on the amount of bend on the sensor. We are in process of developing a prototype using this process to reduce the communication gap between differentially able and normal people. Read More...
|
ELECTRONICS AND COMMUNICATION ENGINEERING |
India |
289-290 |
80 |
MICRO CONTROLLER BASED ULTRASONIC DISTANCE MEASUREMENT SYSTEM
-AMIT D VEKARIYA ; AMBALIYA AMIT V. ; CHARANIYA DHARMESH H.; VASAVA HEMCHANDRA N.
An Ultrasonic distance measurement system uses ultrasonic waves (inaudible to humans) to measure distance. These system consist of an Ultrasonic Transmitter (Tx) that emits the ultrasonic wave, the waves after striking any obstacle bounces back and reach the Ultrasonic Receiver (Rx). By measuring the time it take for the whole process to complete and using simple arithmetic we can measure the distance to the obstacle. This system has a wide operating range of 1cm to 400cm with an accuracy of 1cm. This specification makes it ideal for distance measurement application Read More...
|
electronis engineering |
India |
291-292 |
81 |
Automatic Traffic Control System
-Ashish Kumar ; Sandhya Sagadhara M.; Anjali Rana M.; Payal Prajapati R.
This paper presents an overview of how the major problem of traffic congestion in major cities is solved by using the intelligent system which controls the traffic lights according to the variation in traffic density. This paper also deals with the detection of traffic lights which will help in easy pass out of them through the traffic in case of emergency. Read More...
|
Electronics & Communication Engineering |
India |
293-294 |
82 |
WIRELESS BIDIRECTIONAL MESSAGE SYSTEM: ORDER FROM TABLE AND RESPONSE FROM KITCHEN IN HOTELS
-JANKI PANKAJBHAI SEVAK ; SUSHMA HARIHAR RAO LOKNADAM
The aim of the development of this research is toward quick and efficient method in hotels to use wireless system which is bidirectional. It uses wireless RF module and Automated touch screen menu. In this paper, a new and innovative kind of Hotel system is shown. Which works on wireless communication. In this system the problem of misallocation of ordered food items is solved by using touch screen menu at table. Not only can this but table status be seen from waiting longue. To achieve that kind of qualitative hotels/restaurants service, paper menu should be replaced by electronic menu. Read More...
|
ELECTRONICS AND COMMUNICATION ENGINEERING |
India |
295-297 |
83 |
DATA MINING IN E-COMMERCE
-AMITHCHAND SHETTY ; POOLA MAHESH; PRADEEP BHAT; DHIRAJ MISHRA; Prof. Manjiri Pathak
The web today is different from what it used to be 10-20 years earlier. Everything nowadays is run on information. More than anything on the data matters the most. If you have accurate data you can do wonders with it. Over the years we have seen that E-Commerce applications have gained an important place in people’s lives. One of the main reasons behind this can be stated as people like what they see on the web and they buy it, thus saving their time and energy. Now how do these E-Commerce websites know what the masses like and dislike is the main question, the answer to this question is Data Mining. Data mining play a major role in every E-commerce website nowadays. With the help of various data mining algorithms various patterns can be traced in the shopping behavior of an average buyer and hence e-commerce websites can have a clear indication what a buyer would like to buy and what to not. Read More...
|
COMPUTER ENGINEERING |
India |
298-302 |
84 |
Modeling and Analysis of design in MTCMOS layout in VDSM
-R R Raghunaath ; A Lalithakumar
For low power design supply voltages and threshold voltages are reduced with advanced 35nm CMOS technology. Lowering the threshold voltage introduces the increase in leakage current. This technique disconnects the low Vth switching block from power supply line and ground line by cutting off high Vth sleep transistors whenever circuit is in idle mode. In this paper, we present a multi threshold CMOS technique to reduce the leakage current as well as it controls the ground bounce noise. This was done by using changing of CMOS design to tri-state MTCMOS transistor. In an MTCMOS circuit, high threshold voltage (high-|Vth|) sleep transistors (header and/or footer) are used to cut off the power supply and/or the ground connections to an idle low threshold voltage (low-|Vth|) circuit block. The propagation delay and the dynamic switching power consumption of active logic blocks can be thereby increased. Multiple autonomous power and ground gated circuit domains are typically utilized for effective control of leakage power consumption in MTCMOS circuits. This is enhanced version of MTCMOS technique to suppress the ground bounce noise. A further high Vth PMOS called Dozer is connected in parallel with footer sleep transistor. The new model, verified by TANNER simulations and measured data, includes delay, area and low power consumption result shows the better performance rate of this proposed system and also make that in 32nm size with that application of Switched Bank circuit. Read More...
|
Electronics engineering |
India |
303-307 |
85 |
Comparison of Neural Net Classification Method with Seeded Region Growing Technique To Identify different classes of wetland using LISS-III Data
-Bhavsar Ronit Nalinkumar ; N.P.Singh; Indra Prakash; Manoj Pandya
This paper classifies wetland of Nal Sarovar by using LISS-III remote sensing data. Taking the Nal Sarovar as study area, LISS-III data of 2013 is used as data source. Neural Net Classification method and Seeded Region Growing Technique is used to identify different classes of wetland of Nal Sarovar area. The paper describes the utilization of accuracy assessment using kappa coefficients. This paper describes that Neural Net classification is more efficient than Seeded Region Growing technique. Read More...
|
Civil Engineering |
India |
308-310 |
86 |
IMPLEMENTATION AND PERFORMANCE EVALUATION OF PACKET FORWARDING BASED ON VS ROUTING SCHEME
-Mr.Vishal S. Shethiya ; Mr.Tarun A. Kachhwah; Prof. Rajesh S. Bansode
Highly scalable dynamic routing scheme can be helpful in reducing congestion hot-spots, balancing network loads, fast failure recovery and improve resource utilization for a small networks with just 25 nodes to large networks with over 1000 nodes having arbitrary connection topologies. Many dynamic routing schemes have been put forward in the recent past. The main issues in a dynamic routing algorithm are the scalability and the computational complexity involved taking into account the real time network conditions, the operational overhead and the stability of the algorithm. Along with this, the algorithm should also preserve the key properties of conventional routing algorithms like loop free routing, distributed route calculations, statistical multiplexing and consistency. A novel routing scheme based on Virtual Space (VS) configuration is presented here for use in high-speed packet networks. This paper presents a comprehensive treatment of the VS routing scheme, including its logical development, formulation, simulated performance analysis, and implementation. First, the VS embedding process transforms the network topology information into a multi-dimensional virtual space representation. The VS configuration of the network is a highly concise representation, which has excellent directionality property to enable simple geometric routing. Dynamic changes in link conditions and traffic loading states are expressed using link costs to enable fast adaptability and failure recovery. Thus, the VS routing scheme is highly scalable, dynamic, robust, and simple to implement. This paper presents an implementation scheme for constructing a VS routing. Domain that is compatible with IP networks. It describes routing and forwarding functionalities of VS domain and routing nodes. It further addresses applications of VS routing scheme to build overlay tools to enhance performance and functionality of existing networks. The existing protocols from the information exchange and scalability perspective. Read More...
|
Information Technology (Networking) |
India |
311-314 |
87 |
Study on Parallel Individual Drive Hybrid Technology
-D. S. Jasoliya ; H. D. Soman; R. S. Jasoliya; J. R. Seta; M. M. Makwana
Now a day the vehicles use conventional fuels like Gasoline, Diesel, etc., which provide speeds and torque but they have very low efficiency and mileage. Also the engine systems which use fossil fuels releases gases like CO2, NOx, SO2,.....etc., which are harmful to environment and human body too. Also alternate energy source like electric energy for propulsion of vehicle have good mileage but not provide desired speed. An important possibility to make steps towards this goal is the hybrid technology. The topic of this research paper is the study on Parallel Individual Drive Hybrid Technology. The methodologies used to construct a Working Model of Concept Hybrid Car based on Parallel Individual Drive Hybrid Technology. The conclusions of the research are that Parallel Individual Drive Hybrid Technology is much suitable for Indian road and traffic condition on mileage point of view. Read More...
|
Mechnical Engineering |
India |
315-318 |
88 |
HVDC tie line simulation
-Patel Pinkesh ; Nirav M. Vaghela
High Voltage Direct Current (HVDC) technology has made considerable advancements in recent years. The HVDC system has been studied to understand HVDC components, their advantages over the conventional ac transmission systems and their implementation with transmission system. The main objective is to determine bidirectional power flow analysis. Also determine the automatic control of rectifier gate signal and automatic control of inverter gate signal. Also whenever any fault occur in DC line at that time we can automatic control the firing angle to prevent the fault. Simulation has been carried out by MATLAB software. In this paper at both the end we can connect the load as a motor and thereafter we can determine the bidirectional power flow analysis. The gate pulse is applied manually.Then after we can check the result of the system. Read More...
|
Electrical Engineering |
India |
319-321 |
89 |
Android Mobile Application for Attendance Marking using Biometrics
-Hussain Jivani ; Gautam Shanbhag; Sushil Shahi; S. P. Khachane
We have seen over the years that the process of manual attendance has been carried out across almost all educational institutions. The process is not only time consuming but also sometimes inefficient resulting in the false marking of attendance. Today, we need not maintain pen and paper based attendance registers. Following this thought, we have proposed an attendance marking and calculation system which is implemented on Android mobile application integrating biometric scanner that communicates with the database and verification can be achieved. This Android application will give the students information on attendance and change in timetable if any whereas the biometric scanner is used for verification, authentication and to avoid proxy. Read More...
|
Computer Engineering |
India |
322-324 |
90 |
EFFECTIVE APPROACH FOR SECURE CLOUD STORAGE THROUGH PUBLIC AUDITING
-R. KAVIYA ; A.SUDHA; V.RAJA; M.Mohamad musthafa
Cloud computing has been envisioned as the de-facto solution to the rising storage costs of IT Enterprises. With the high costs of data storage devices as well as the rapid rate at which data is being generated it proves costly for enterprises or individual users to frequently update their hardware. Apart from reduction in storage costs data outsourcing to the cloud also helps in reducing the maintenance. Cloud storage moves the user’s data to large data centers, which are remotely located, on which user does not have any control. However, this unique feature of the cloud poses many new security challenges which need to be clearly understood and resolved. We provide a scheme which gives a proof of data integrity in the cloud which the customer can employ to check the correctness of his data in the cloud. This proof can be agreed upon by both the cloud and the customer and can be incorporated in the SLA. Read More...
|
computer science Engineering |
India |
330-333 |
91 |
Simulation of Doubly-Fed Induction Generation based Wind Farm
-Keyur Y. Rana ; Prof. N. G. Mishra
The increasing concerns to environmental issues require the search for more sustainable electrical sources. Wind energy is one of the major available non-conventional sources to generate electrical energy. Wind turbine can be operated in constant speed or variable speed mode. DFIG Generator is used in variable speed wind turbine. A detailed model of wind power station including Doubly-Fed Induction Generator (DFIG) is presented in this paper. The model proposed in this paper is developed in simulation tool PSCAD/EMTDC. Read More...
|
Electrical Engineering |
India |
334-337 |
92 |
Analysis and Closed Loop Control of Soft Switching High Gain Converter with Coupled Inductor
-ERUPAKA MAHESHREDDY ; Dr.SWAPNAJIT PATTNAIK
In this paper a soft switching high gain dc-dc converter is analyzed and its closed loop control is done using voltage mode PI controller. The Converter will be having less input Current ripples due to its interleaved structure which is quite useful for renewable applications. Due to soft switching of the converter it will be having less losses and more efficiency. The converter uses coupled inductor which will have turns ratio less than unity for getting desired gain. By obtaining closed loop operation of the converter the efficiency of the converter is further improved and the optimal usage of the converter with variable source (renewable) and load conditions. The closed loop operation of the converter is simulated for 600w prototype using PSIM 9.0 and its waveforms are presented at different operating conditions. Read More...
|
POWER ELECTRONICS AND DRIVES |
India |
338-344 |
93 |
To Study Effect of Social Media to Improve Website Ranking
-Punit R. Patel ; Prof. Kamlesh M Patel
Internet is fast becoming critically important to commerce, industry and individuals. Search Engine (SE) is the most vital component for communication network and also used for discover information for users or people. Search engine optimization (SEO) is the process that is mostly used to increasing traffic from ‘free’, ‘organic’ or ‘natural’ listings on search engines and also helps to increase website ranking. It includes techniques like link building, directory submission, classified submission etc. but SMO, on the other hand, is the process of promoting your website on social media platforms. It includes techniques like RSS feeds, social news and bookmarking sites, video and blogging sites, as well as social networking sites, such as Facebook, Twitter, Google+, Tumblr, Pinterest, Instagram etc. Social media optimization is becoming increasingly important for search engine optimization, as search engines are increasingly utilizing the recommendations of users of social networks to rank pages in the search engine result pages. Since it is more difficult to tip the influence the search engines in this way. Social Media Optimization (SMO) may also use to generate traffic on a website, promote your business at the center of social marketing place and increase ranking. Read More...
|
Computer Engineering |
India |
345-348 |
94 |
Healthcare Application Cloud - Ensuring Data Storage Security and Error Localization
-Mukesh Kumar Patel ; Prof. Upen Nathwani
Cloud computing is a recent trend in IT that moves computing and data away from desktop and portable PCs into large data centers. It refers to applications delivered as services over the Internet as well as to the actual cloud infrastructure — namely, the hardware and systems software in data centers that provide these services. Cloud computing faces many of the same challenges as other information and network technologies: performance, security, resiliency, interoperability, data migration, and transition from legacy systems. To ensure the correctness of users’ Healthcare data in the Healthcare cloud, it is propose a scheme which is flexible and effective with two features, opposing to its predecessors. By making use of homomorphic token with distributed verification of erasure-coded data, the scheme achieves the integration of storage correctness insurance and data error localization, which means the identification of misbehaving server. Read More...
|
Computer Engineering |
India |
349-352 |
95 |
TELEMATICS ROBOTICS
-PATEL VIBHUTI DILIPBHAI ; MUNERA SHAHENAZ SULEMAN; PATEL JINAL RATILAL; BHAGAT BHAVIKA PRAKASHBHAI; GANVIT KIRTEE FULJIBHAI
There are different types of robots which reduces human efforts used in daily life. But our topic “TELEMATICS ROBOTICS†is different from others because it has hands which can be operated from a far off place or in region where toxic substances are used in industries. So, we are not making the full body of robot, but only its arm. It’s one arm is used at transmitter side and other at receiver. Whatever signals are transmitted by the transmitter arm is received by the receiver arm. The communication between transmitter and receiver arm is wireless. Both the arms are made of different materials. Transmitter arm is made of leather whereas receiver arm is of cardboard or mechanical hand. The components used at transmitter side are flex sensors, ADC 0808 as analog to digital converter and microcontroller IC P89V51RD2 and on receiver side 5 servo motors and LCD (16x2) connected with controller IC. Read More...
|
ELECTRONICS AND COMMUNICATION ENGINEERING |
India |
353-354 |
96 |
A novel coaxial fed swastika (å) shaped slotted circular microstrip patch antenna for wireless applications
-Ankit V Ponkia ; Jignesh M Bhut; Devang G Jani; Anupam N Devani
In this paper a novel circular microstrip patch antenna loaded with “Swastika (å)†shaped slot with 2.4 GHz frequency reponse is investigated and designed. A swastika shaped slot is etched on center of circular patch (radius of 17 mm and thickness of 0.5 mm). The proposed swastika shape slotted circular microstrip patch antenna (CMSA) is designed and analyzed by using Finite Element Method (FEM) based High Frequency Structure Simulator (HFSSâ„¢) EM software. The radiation pattern, return loss and VSWR plots are presented for the proposed antenna. Good return loss and VSWR was achieved for the proposed geometry as depicted in the plots. The presented antenna can be used at 2.4 GHz ISM (Industrial, Scientific and Medical) band applications. Another antenna with modified structure is also presented which gives triple band frequency response. Read More...
|
Electronics and Communication Engineering |
India |
355-358 |
97 |
IMPROVE VISION OF TRAVEL SYSTEM FOR BLIND PEOPLE USING BLUETOOTH MODULE OR ZIGBEE
-Patel Nimishaben Chandubhai ; Patel Hemangini Hiteshbhai; Patel sejalbahen Kishorbhai; Padariya Krishnaben Maheshbhai
This paper intends to solve the problems of visually impaired persons for travelling in bus. Degradation of the visual system can lead to dramatic reduction of the mobility. So a visually impaired person faces many difficulties in their day to day life. One big challenge for them is to transport from one place to another. So we are making a device which makes travelling easier for them. It will help them to get information such as bus timings, routes and stations. Nowadays means the technology world which is day by day progressing fast has contributed many special devices for visually impaired person. So our system is gift for them. Read More...
|
Electronics and communication |
India |
359-360 |
98 |
INTELLIGENT HELMET FOR COAL MINERS
-Patel Namrata Subhashchandra ; Patel Meghnaben Naranbhai; Patel Ankitabahen Parbhubhai; Vasava Sheetalben Manharbhai
Our project based on microcontroller and gsm. Our project is security of coal miners. In the coal mine various type of parameters like Methane, Carbon monoxide, Temperature, humidity of safety and monitoring. The sensors are should be fitted on helmet. In the sensors particulars threshold value fitted. Whenever any parameter are crosses the particular value, a buzzers is turned on so it indicated miners to dangers and gsm through message is transfer to mobile of officers. This project is indicated dangers of miners and save the miners life. Read More...
|
Electronic & Communication Engineering |
India |
361-361 |
99 |
Analysis of ZFE and MMSE schemes for MIMO communication Systems
-ANKITA SINGHAL ; NISHU RANI; KRITIKA SENGAR
MIMO systems are very important technological advancements with respect to the third generation and fourth generation’s wireless networks for RF communication. There are multiple equalization schemes for MIMO systems and two very important of them are ZFE and MMSE. In this paper we are analyzing the performance of both the schemes in different conditions. Read More...
|
COMMUNICATION,RF |
India |
362-364 |
100 |
Analysing security threats and defensive strategies along with misbehaviour detection in VANETs
-Needra Fernando ; Maheswari Mangai; Senthil Kumaar; Prabu
Vehicular Adhoc Networks (VANET) are becoming more popular as the need for accessing and sharing data while on the move is increasing. Value-added applications such as online payment services, geographical location identification, etc. in VANET, improve driving safety, passenger comfort, offer great business opportunities, and attract more and more attention in our daily life. VANETs connect vehicles into a huge mobile adhoc network to share information on a larger scale. The various attacks in VANETs are the Sybil attack, DDOS attack, misbehaving and faulty nodes, sinkhole attack, spoofing, traffic analysis attack, position attack, and illusion attack. Providing security to VANET is important in terms of providing user anonymity, authentication, integrity, and privacy of data. In this paper, a comprehensive survey on the threats and vulnerabilities in VANETs are explored and analysed in detail. The compromised security goals are identified for each threat. The existing solutions for these threats are discussed in this paper. Read More...
|
Ad-Hoc networks (ECE) |
India |
365-370 |