No. |
Title and Author |
Area |
Country |
Page |
1 |
SSIM based image quality assessment for lossy image compression
-RIPAL B.PATEL ; Kishor Bamniya; A. N. Patel
With the wide use of computers and consequently need for large scale storage and transmission of data efficient ways of storing of data have become necessary. With the growth of technology and entrance into the Digital Age the world has found itself amid a vast amount of information. Dealing with such enormous information can often present difficulties. Image compression is minimizing the size in bytes of a graphics file without degrading the quality of the image to an unacceptable level. The reduction in file size allows more images to be stored in a given amount of disk or memory space. It also reduces the time required for images to be sent over the Internet or downloaded from Web pages.JPEG and JPEG 2000 are two important techniques used for image compression. Both are Lossy compression scheme that are often used to compress information such as digital images. Image processing is the latest field of research now days. Image Compression is the field of Image processing which includes the compression of Images and is chosen for the thesis work. JPEG 2000 image compression standard makes use of DWT (Discrete Wavelet Transform). DWT can be used to reduce the image size without losing much of the resolutions computed and values less than a pre-specified threshold are discarded. Thus it reduces the amount of memory required to represent given image. Recently discrete wavelet transform has emerged as popular techniques for image compression. The wavelet transform is one of the major processing components of image compression. For image compression, it is desirable that the selection of transform should be responsible for reducing the size of resultant data set as compared to source data set. This thesis is focused on parameter related to image such as compression ratio, PSNR, MSE, Global thresholding and SSIM. Read More...
|
Electronic and Communication Engineering |
India |
1-5 |
2 |
ZigBee Based Weather Station Monitoring System
-Samiksha Kale ; Rohini Pakhare; Deepali Murale; Priti Walekar; Anuj Shakarani
Many significant weather events have affected our life over the years. Today, the temperature, wind and other weather parameters are of equal concern and can have an even greater impact on our high-tech life style. Weather affects a wide range of man’s activities. This can cause the movement of gases through the atmosphere. Also, in an industry during certain mishap it is very difficult to monitor the parameters through wires and analog devices. So to overcome this problem we can use wireless device to monitor the parameters. By monitoring this parameters we can take certain steps in worst cases. In this weather station monitoring systems, different parameters like temperature, light, humidity, wind direction and speed, gas level are all sensed using sensors. Read More...
|
Electrical Engineering |
India |
6-8 |
3 |
harmonic suppression technique using AIA for MPA
-atman trivedi
This thesis work presents a new harmonic suppression technique for microstrip patch antennas. Harmonic suppression in active integrated antennas is known as an effective method to improve the efficiency of amplifiers in transmitter side. In the proposed design, the antenna works as the radiating element and, at the same time, as the tuning load for the amplifier circuit that is directly matched to the antenna. The proposed active antenna architecture is easy to fabricate and is symmetric, so it can be conveniently mass-produced and designed to have circular polarization, which is preferred in many applications such as satellite communications. The antenna simulations were performed using High Frequency System Simulator (HFSS). Based on the success in the single element active antenna design, the thesis also presents a feasibility of applying the active integrated antenna in array configuration, in particular, in scanning array design to yield a low-profile, low-cost alternative to the parabolic atenna transmitter of satellite communication systems Read More...
|
electronics and communication engineering |
India |
9-12 |
4 |
Design and Implementation of 6-bit Charge Scaling Digital to Analog Convertor (DAC) Using 45 Nano-meter Technology.
-NIRAV A. MEHTA ; Prof. B. H. NAGPARA
In this paper, The Design and Implementation of Charge Scaling Capacitor Digital to Analog Convertor (DAC) in 45 nm technology using TANNER TOOL, V15 is presented. The simulation results show the transient analysis waveforms of charge scaling capacitor digital to analog convertor and also different blocks results . In charge scaling digital to analog convertor there is a capacitor and operational amplifier used and also switch is used. The switch is make from CMOS transmission gate which is used for the on and off time in charge scaling capacitor DAC. Here the DAC logic is used for the feedback and its made from the charge scaling capacitor. This design is for low power and low area consumption in chip or circuit design and compared with each other. These charge scaling DAC is high speed switching and low power consumption with compares to any other DAC. Read More...
|
Electronics and Communication Engineering |
India |
13-14 |
5 |
Design and Implementation of 6-bit Successive Approximation Register (SAR) Analog to Digital Convertor (ADC) Using 45 Nano-meter Technology.
-NIRAV A. MEHTA ; Prof. B. H. NAGPARA
In this paper, The Design and Implementation of Successive Approximation Register (SAR) Analog to Digital Convertor (ADC) in 45 nm technology using TANNER TOOL, V15 is presented. The simulation results show the transient analysis waveforms of different blocks of SAR ADC and also the result of 6-bit SAR ADC. The mainly four blocks are in the SAR ADC. The blocks are Sample and Hold, Dynamic Comparator, SAR Logic and DAC Logic. Here the DAC logic is used for the feedback to comparator and its made from the charge scaling capacitor. This design is for low power and low area consumption in chip or circuit design and compared with each other. These SAR ADC is high speed switching and low power consumption with compares to any other ADC. Read More...
|
Electronics and Communication Engineering |
India |
15-18 |
6 |
Analysis and Theoretical Calculation of 3 dB Hybrid Combiner
-DESHAL MISTRY ; Mayuri Prajapati
In this paper we discuss about 3 dB broadside coupled strip line coupler. A hybrid combiner is a passive device and used in radio and telecommunications. It is a directional coupler where input power is equally divided between two ports and gets combined power at output port. We calculate the design data for 3 dB hybrid combiner at 50MHz frequency. Read More...
|
Electronics & Communication Engineering |
India |
19-21 |
7 |
Comparative Analysis of Image Denoising by Filtering Techniques
-bhavik mehta ; ratansingh n patel
Digital images are noisy due to ecological disturbances and it is degrade the quality of images. Data sets collected by image sensors are generally infected by noise and it is due to imperfect instruments. The noise is characterized by its pattern and by its probabilistic characteristics. There is a wide variety of noise types while we focus on the most important types of noises and comparative analysis of denoising techniques for corrupted images to enhance image quality is discussed in this paper. There have been several published algorithms and each approach has its assumptions, advantages and limitations. This paper presents a review of some significant work in the area of image denoising in terms of PSNR and ENL with different noise level. Read More...
|
electronics and communication engineering |
India |
22-25 |
8 |
A Short Assessment on Male-Female Categorization Derived From Fingerprints
-Heena Agrawal ; Prof. Siddhartha Choubey
Gender classification from fingerprints is an important step in forensic science in order to provide investigative leads for finding unknown persons. Fingerprint verification is certainly the most trustworthy and acceptable evidence till date in the court of law. Due to the enormous prospective of fingerprints as an effective method of identification an attempt has been made in the present work to analyze their correlation with gender of an individual. Due to the immense potential of fingerprints as an effective method of identification an attempt has been made in the present work to summarize all the recent techniques related to the field. Read More...
|
Image Processing(Biometric) |
India |
26-28 |
9 |
Some Investigation Related to Reliability Based on Preventive Maintenance Strategy for Better Management of Spare Parts
-SANJEEV KUMAR ; CHETAN DEKA; Dr. Somnath Chattopadhayaya
Reliability Centered Maintenance (RCM) is a widely practiced maintenance and repair activity for decreasing equipment downtime. In this paper we conduct an investigative case study on engine maintenance and repair hub, located in the coal mines of Eastern India, wherein breakdown maintenance was still practice. A thorough research was conducted into the causes of failure of all engines which came to the workshop during a three year period and also the various spare parts used in each type of failure, followed by classification of the various spare parts on the basis of their reliability. With the help of this failure data, reliability analysis of the various engine models was conducted using Reliasoft’s Weibull++ and Mean Time To Failure (MTTF) was calculated. Based on these estimations, we scheduled a maintenance program and implemented it for six months and compared the resulting failure trends to the previous data. The results of the case study clearly show that RCM can lead to cost effective Spare Parts Management. Read More...
|
mechanical engineering |
India |
29-34 |
10 |
Review Paper on Comparative Analysis of Denoising Technique Such As Curvelet and Wavelet Transform
-Dhara bhatt ; R.N.Patel
The images usually bring different kinds of noises in process of receiving, coding & transmission. Image denoising has been a fundamental problem in field of image processing. The growth of media communication industry and demand of high quality of visual information has opened the doors for researchers to develop various method of denoising. The curvelet transform is one kind of new multi-scale transform after 1999 that is based on wavelet transform, whose structural elements include the parameters of dimension and location, and orientation parameter more. Therefore, curvelet transform is superior to wavelet in the expression of image edge, such as geometric characteristic of curve and beeline.The images usually bring different kinds of noises in process of receiving, coding & transmission. Image denoising has been a fundamental problem in field of image processing. The growth of media communication industry and demand of high quality of visual information has opened the doors for researchers to develop various method of denoising. The curvelet transform is one kind of new multi-scale transform after 1999 that is based on wavelet transform, whose structural elements include the parameters of dimension and location, and orientation parameter more. Therefore, curvelet transform is superior to wavelet in the expression of image edge, such as geometric characteristic of curve and beeline. Read More...
|
Electronics and Communication |
India |
35-38 |
11 |
Simulation of partial discharge inside the solid insulation in high voltage equipment
-Jayesh G. Patel
Solid dielectric materials are used in all kind of electrical apparatus and devices to insulate one current carrying part from another when they operate at different voltages. But it is found that most of the insulators are manufactured without avoided a small amount of impurity inside the insulator. The impurity of such insulating material is in the form of solid, gas or liquid. During the manufacturing process it is found that most of the solid insulation has impurity in the form of air bubbles (void) which creates a small weak zone inside the insulator. In high voltage power equipments, the insulation failure takes place is due to presence of PDs inside the void enclosed model. Due to above reason PD detection and measurement is necessary for prediction and reliable operation and increase the life time of insulation for HV power apparatus. Accurate simulating of PD is more important for insulation study. In this paper, the mechanism of PD has been simulated by using MATLAB. Read More...
|
Electrical Engineering |
India |
39-41 |
12 |
Secure and Reliable Content Distribution Routing Protocol for VANET
-SHITAL CHAUHAN ; HITESH PATEL
Vehicular Ad Hoc Networks (VANET) is a kind of special wireless ad hoc network, which has the characteristics of high node mobility and fast topology changes so the content distribution in VANET is very difficult because of the fast topology changes and also VANET has open air medium for sending the packet data so there is less security in content distribution and as well as less reliability in content distribution while using broadcasting protocol. All this difficulty will be overcome in proposed algorithm. open issues are Frequently change connectivity, Open air medium i.e. no security, High mobility so chances of dada delivery is Very less, achieve better throughput, average delivery delay, security and Reliability than existing schemes without compromising on overhead. Read More...
|
Information technology |
India |
42-45 |
13 |
Design of Circularly Polarized Square Patch Microstrip Antenna Using IE3D Simulator with Dual Feed.
-SHRAWAN KUMAR KUSHWAHA ; ASIM KUMAR; RAJ KUMAR VISHWAKARMA
Microstrip patch antennas have been widely used in a various useful applications, due to their low weight and low profile, conformability, easy and cheap realization. A low profile patch antenna for wireless application is proposed in this paper. This proposed antenna is made by using the probe feeding methods. The antenna is designed for some improvement in the performance of directivity, gain, return loss and size of circuit area. The compact antenna is expected to improve the cost of production due to the size reduction in the overall circuit area especially in a mass production. IE 3D simulator is used to compute the gain, power, radiation pattern, and S-parameters of the antenna. Changing the parameters like substance’s thickness, material, tangent loss and dielectric constant affect the gain performance of the antenna. Read More...
|
Communication Engineering |
India |
46-49 |
14 |
Feature subset selection and different algorithms for feature selection in data mining
-NITIN KUMAR
In machine learning and statistics, feature selection plays a very important role as a process for the selection of the relevant features from the pool of features for use in model construction and for the better classification and understanding of the data. There are many irrelevant features or attributes in the data that does not give us any information at all or gives very less information. So it is very much compulsory to have a subset of features that can classify describe the data at its best. In this paper a discussion about Feature subset selection algorithm is done. Discussion about the different methods by which we can extract relevant features or methods for the selection of the best subset of features is done. Read More...
|
Computer science Engineering |
India |
50-52 |
15 |
Routing Algorithm For Power Awareness In MANET
-Dave Yogeshkumar Mukundray ; Amit R. Sharma
In Mobile Ad hoc networks (MANETs), portable mobile nodes communicate directly with each other without any central infrastructure. In the absence of central infrastructure, a node establishes communication network and act as router as well. Nodes are battery operated and mobile hence network topology changes frequently.
In MANET, resources are limited. Battery power of the node is one of the important resources. Ad hoc On demand Distance Vector AODV is a reactive protocol which establishes the network connection when needed. When any node has some data for communication, AODV protocol will establish the route. In AODV, route breaks when nodes run out of battery power. Purpose of this work is to maximize the network lifetime by avoiding the routing through nodes with less battery power. Routing will be through the nodes with sufficient battery power.
Power aware routing algorithm is developed and simulated using NS-2. Further more we have compared the results with conventional AODV and demonstrated that remaining battery energy of the nodes increases.
Read More...
|
Electronics and Communication, wireless networking |
India |
53-56 |
16 |
Implementation of v/f Controlled Induction Motor Drive Using Digital Signal Processor
-Yogesh Patel ; Paras Parmar; Rajnikant Patel; Dr. S.N.Pandya
This paper presents the high processing speed and the control accuracy of the DSP which allows sophisticated control technique to be used to build the circuit. The control circuit designed is realized on a digital signal processor TMS320LF2812 based on voltage/frequency (v/f). Which is specially designed to have an accurate control on the three phase induction motor. The controller in the circuit consists of faster generation of the voltage and frequency inputs of sine wave in PWM. The inner sine generation using the voltage and frequency components, the speed control of a three phase induction motor can be handled accurately and a smoother control can be obtained. The experimental results for the speed (v/f) control of the three phase induction motor drive controlled by a digital signal processor 2812 chip has been observed with the effectiveness of the proposed scheme. Read More...
|
Electrical Engineering |
India |
57-60 |
17 |
Design and Analysis of a Full Adder Circuit using XOR and AND gates pass transistors and transmission gates
-Sonam Tripathi ; R.B. Singh
This paper presents a complex full adder design
having higher computing speed, lower operating voltage and low power consumption as these all are requirements of a VLSI design system. The proposed full adder design makes use of low power designs such as XOR and AND gates pass
transistors and transmission gates. The simulation results are matched with the conventional cell by standard implementation. In this circuit design power consumption is done upto 40% by an addition. As the word length of the adder decreases the power consumption decreases significantly. We describe that how efficiently XOR and AND gates are realized to a general full adder circuit based on a pass transistor logic. The simulation results are compared with the standard simulation of the tool proposed
in the project. Read More...
|
Electronics & Communication (VLSI Design) |
India |
61-62 |
18 |
Study of a 3-bit CMOS flash ADC utilizing Threshold Inverter Quantization technique
-kalpana Chaudhary ; R.B. Singh
This paper presents a 3-bit ADC which is considered as the most essential part of a system-on-chip device as it minimizes the gap between analog and digital world. In digital circuits low power and low operating voltage are given first priority as the channel length of the MOSFET shrinks below 0.25 sub-micron values. In this paper a high speed, low power and low voltage CMOS flash ADC for SoC applications is proposed. The proposed ADC utilizes the Threshold Inverter Quantization (TIQ) technique that uses two cascaded CMOS inverters as a comparator. The TIQ technique proposed here has been developed for better implementation in SoC applications using flash ADC Read More...
|
Electronics & Communication (VLSI Design) |
India |
63-64 |
19 |
A Novel Approach to 3-bit Flash ADC
-kalpana Chaudhary ; R.B. Singh
In this paper we have implemented a high speed flash ADC with low power by using threshold inverter quantization technique. The main benefit of the TIQ based CMOS flash ADC design is a simpler comparator design. The proposal is to use digital inverters as analog voltage comparators. This eliminates the requirement of high-gain differential input voltage comparators that are inherently more compound and slower than the digital inverters. The TIQ flash ADC also eliminates the need of reference voltages, which require a resistor ladder circuit. This simplicity in the comparator part provides both high speed and lower power consumption at the same time. Read More...
|
Electronics & Communication (VLSI Design) |
India |
65-66 |
20 |
Performance Analysis of a High speed and power efficient Full Adder at 65nm
-Sonam Tripathi ; R.B. Singh
In this paper presents an 8T full adder is designed to achieve lower average power and delay in comparison to 10T, 11T and 16T full adder designs. This design is carried out by the technique of Gate Diffusion i.e.GDI by reducing number of transistor counts which operates at very low voltage and offers a higher computation speed. The performance of the proposed full adder is evaluated by the comparison of the simulation result obtained in tanner tools using 65nm CMOS process technology with a supply voltage of 1.2V. Read More...
|
Electronics & Communication (VLSI Design) |
India |
67-69 |
21 |
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM USING ELLIPTIC CURVE CRYPTOGRAPHY IN DISTRIBUTED COMPUTER NETWORKS
-R.Arunkumar ; Mrs.J.VijiPriya
Single sign-on (shortly called as SSO) is an authentication mechanism that enables a legal user with a single credential to be authenticated by multiple service providers in a distributed computer network. Recently, Chang and Lee proposed a new SSO scheme and claimed its security by providing well-organized security arguments. In another attack, an outsider without any credential may be able to enjoy network services freely by impersonating any legal user or a nonexistent user. We identify the flaws in their security arguments to explain why attacks are possible against their SSO scheme. Our attacks also apply to another SSO scheme proposed by Hsu and Chuang, which inspired the design of the Chang–Lee scheme. In our proposed work we use Elliptic Curve Cryptography (shortly ECC) for high efficiency with smaller key sizes useful for security arguments that has limited power .In the proposed system using ECC the cryptographic operations will be performed with fewer processor cycles and operation can be performed much faster and providing well-organized security arguments in distributed computer network. Read More...
|
Computer Science Engineering |
India |
70-72 |
22 |
WIRELESS SMART CHILD TRACKING SYSTEM FOR INDIAN PARENTS
-Mr. N.Ayyanar ; Mr. J.Lourdu Xavier
Mobile devices are increasingly relied on but are used in context that put them at a misuse place. Thus considered an approach that exploits spontaneous track of the mobile usages of the children. This is especially for parents who want to track their child activity. For such parents they are keep track their children in the way how they are misusing the mobile. Smart Child Tracking System (WSCTS) is a monitoring tool intended for the care-taking children usage. It is composed of two units; one that is carried by the child and a second one functioning as a supervision unit (similar to client / server relationship). The “unit†can be a variety of devices including, but not limited to, cell phones, PDAs etc. Each unit will communicate with supervisor directly or by-directly. Supervisor will keep a record of children about their online / offline status. Hence, supervisor can understand is somebody left the group or not. WSCTS will understand approximately a child is far away from his supervisor. Hence, head of the group can keep track children remotely. The objective of this WSCTS was to track each and every child in 10-25 age groups throughout the country, prepare the data base, use the parent’s findings through on-line “WIRELESS SMART CHILD TRCKING SYSTEM†software and update it annually with a little effort. The key objective of this WSCTS Project is to monitor of the children activity. Frequent monitoring of children dashboards helps the parents and monitoring in focusing on the children where they are and what they are doing. Read More...
|
Computer Science Engineering |
India |
73-77 |
23 |
DYNAMIC MAPREDUCE WORKLOAD MANAGEMENT IN MULTIPLE JOB SCHEDULING
-Mrs. R. Adaline Suji ; Miss. K. Nandini
A scheduling algorithm & technique for managing multi-job map reduce workloads that rely on the ability to dynamically build performance models of the executing workloads, and use these models to provide dynamic performance management. Sometime the server based workloads may happen due to status of the receiver which is not in online. This may cause the data not to be delivered to the receiver. So, the server storage is too high (overloaded). In this paper to overcome the overloading problem, a subserver is used which is related to the main server. If the receiver node take too much of time to come online, then the sub server send the file to receiver using mail account with encrypted data. The data can be decrypted only when the receiver uses the sender mentioned IP address. If the system IP address does not match to the sender defined IP address the file cannot open. Read More...
|
Computer Science Engineering |
India |
78-80 |
24 |
TARGET TRACKING PROBLEM IN A MOBILE SENSOR NETWORK (MSN)
-Mr.S.Punithavel ; Mrs. M.Jothi
Target Tracking is an important problem in sensor networks, where it dictates how accurate a targets position can be measured. In response to the recent surge of interest in mobile sensor applications, this paper studies the target tracking problem in a mobile sensor network (shortly called as MSN), where it is believed that mobility can be exploited to improve the tracking resolution. This problem becomes particularly challenging given the mobility of both sensors and targets, in which the trajectories of sensors and targets need to be captured. We derive the inherent relationship between the tracking resolution and a set of crucial system parameters including sensor density, sensing range, sensor and target mobility. We investigate the correlations and sensitivity from a set of system parameters and we derive the minimum number of mobile sensors that are required to maintain the resolution for target tracking in an MSN. The simulation results demonstrate that the tracking performance can be improved by an order of magnitude with the same number of sensors when compared with that of the static sensor environment. Read More...
|
Computer Science Engineering |
India |
81-84 |
25 |
TIME SYNCHRONIZATION AND ENERGY EFFICIENCY IN WIRELESS SENSOR NETWORKS
-Mr.K.Rajarajan ; Mr.J.Rajesh Kumar; Mr.M.Srinivasan
Wireless sensor networks need accurate time synchronization for data consistency and coordination. Although the existing algorithms for time synchronization offer very good accuracy, their energy consumption is high, and distant nodes are poorly synchronized. We propose a Recursive Time Synchronization Protocol (shortly called as RTSP) which accurately synchronizes all the nodes in a network to a global clock using multi-hop architecture in an energy-efficient way. It achieves better performance due to the MAC-layer time-stamping based on Start of Frame Delimiter byte, infrequent broadcasts by a dynamically elected reference node, compensation of the propagation delay and adjustment of the timestamps at each hop, estimation of the relative skew and offset using least square linear regression on two data points adaptive re-synchronization interval, aggregation of the synchronization requests, and energy awareness. A detailed analysis of the sources of errors is also provided. Simulation results show that the RTSP can achieve an average accuracy of 0.3 microseconds in a large multi-hop flat network while using five-times lesser energy than that of FTSP in the long run and performs even better in a clustered network where it can achieve an average accuracy of 0.23 microseconds while using seven-times lesser energy. Read More...
|
Computer Science Engineering |
India |
85-88 |
26 |
A Secure Intrusion-Detection System Using Enhanced Adaptive Acknowledgement for MANETS
-Mr.I.Jose Sahayam ; Mr.G.Karpaga kannan.; Mr.M.Srinivasan
Mobile ad hoc Networks (shortly called as MANETs) are of increasing interest for various sets of applications. Instead of using any centralized infrastructure, nodes in MANET cooperate with one another to provide networking during their movements. Such capability is essential for some special scenarios like battlefield or emergency field work wherever preexisting or centralized communication infrastructures are not offered. MANET on the battlefield will offer various services to support different missions such as enemy situation, battlefield map, etc. Such applications place increasing demands on reliable transport and persistent sessions. EAACK is capable of detecting malicious nodes despite the existence of false scheme report and compared it against alternative widespread mechanisms in many situations through simulation. The results will demonstrate positive performances against Watchdog, TWOACK and AACK within the cases of receiver collision, restricted transmission power and false misbehavior report, packet delivery Ratio. IDDSA demonstrates higher malicious- behavior-detection rates in certain circumstances while does not greatly have an effect on the network performances. Read More...
|
Computer Science Engineering |
India |
89-92 |
27 |
A New Dual Stack Transistor for Ground Bounce and Leakage Current Reduction
-Priyanka Singhal ; Nidhi Raghav; Pallavi Bahl
In this paper the author have discussed the trade-off between current CMOS technology scaling and static power consumption issues. This power consumption is an important concern for designing a low power integrated circuit. This paper has discussed different approaches for a low power integrated circuit design using leakage power reduction techniques. The main focus is on dual stack power gating approach which reduces the leakage power near about 75% in comparison to base design without the power gating structure at 90 nm technology Read More...
|
Electronics & Communication Engineering |
India |
93-95 |
28 |
Available Transfer Capability Determination Using Linear Sensitivity Based PTDF Method in Restructuring Power System
-Kruti Dipakkumar Mehta ; Vikash Verma; Ravi kumar; Umesh makwana
The demand of electricity is continuously increases day by day in today’s market scenario and complexity arises all over the world due to huge population and modernization in developing countries. To meet the rapidly increasing demand and for the reliable operation we support private participation to generate the electricity. In the last few years the concept of deregulated market is more useful instead of regulated. Thus government has invited the private sectors into the power generation, transmission and distribution by fixing some certain rules over it called as restructuring power system. Having present of so many private participates congestion should be there. This type of competition in the power industry, there has been a search for the better utilization of the transmission facilities. In this contest Available Transfer Capability (ATC) indicates how much inter area power transfers can be increased without change in system security must be considered. Thus ATC calculation gives us an important indication of relative system security and reliability. Read More...
|
Electrical Engineering |
India |
100-103 |
29 |
BEHAVIORAL MODELING AND VHDL SIMULATION OF AN ALL DIGITAL PHASE LOCKED LOOP
-Vikas Gaur ; Vikas Gaur; Gayatri Sakya
In this paper, we have designed a model of an all-digital phase-locked loop (ADPLL) which is discrete in nature. The design is carried out in simulink and then the code of the main blocks i.e. DDS and Hilbert is written and verified in VHDL. The basic components of the ADPLL are the phase detector, the loop filter and voltage controlled oscillator which is realized as the direct digital synthesizer (DDS).The phase detection is realized by using the Hilbert transform and then the phase is calculated using CORDIC algorithm. The linear range of the ADPLL is increased by using the phase-unwrap block. All equations to design this ADPLL are derived by using the relations of time continuous PLL. The time continuous model is simulated first by using matlab-simulink and all equations are analyzed. By using these equations all the relations to design an all-digital PLL are obtained. Read More...
|
Electronics |
India |
100-103 |
30 |
HOME AUTOMATION USING ANDROID AND ARDUINO
-Govinda.K ; K. Sai Krishna Prasad
With the rapid development of technology around us, the home environment had undergone so many evolutions that make life easier. When these current technologies in home combined with an upcoming trend like automation, appliances become smarter leading to concept of home automation. Though there are so many proposals emerged into market, When people order a new car, they often invest a fair amount of money in electronic, comfort-enhancing accessories. Some extras, such as climate control, navigation or entertainment systems, there seem to be nearly no limits as the money one can spend for additional functionality on gadgets. In this paper we propose and implement a procedure through which home automation is delivered in a very simple and powerful manner using open source hardware and software. Read More...
|
Electronics and Communication |
India |
104-109 |
31 |
COMPARISON OF ASPHALT & CONTINUOSULY REINFORCED CONCRETE PAVEMENT
-AKASH AGRAWAL
Transport is a vital infrastructure for rapid economic growth of the country. Speedy transportation of natural resources (such as raw materials), finished goods and perishable materials to all parts of the country including the points of export outlets are basic inputs to economic growth. In India flexible pavement (bitumen) is most common f or both national and state highways. Majority of roads are also built with conventional bitumen pavements considering its lower initial cost, though the life cycle cost of these pavements are very high compared to rigid pavements due to frequent repairs and also need for complete resurfacing at interval of 4-5 years. Further fuel consumption of vehicles is much higher on this type of pavement than that on rigid pavement. In advanced countries rigid pavement is increasingly being used due to large number of benefits it offers. Continuously reinforced concrete pavement, (CRCP) eliminates the need for transverse joints (other than at bridges and other structures) and keep cracks tight, resulting in a continuous, smooth-riding surface that is virtually maintenance free. Read More...
|
CIVIL ENGINEERING |
India |
110-111 |
32 |
GSM Based Mobile Phone Controlled Dam Gate Controlling With High Level Protection
-Dodia Anirudhsinh A. ; Shah Neha S.
A system for early controlling of dam gate’s at particular location in any water dependent appliance and apparatus used in multi dwelling facilities. In practice, conventional controllers were used to control the system however their parameters are empirically adjusted. Besides, the operation of these controllers relies on the measurements provided by water level sensors located inside and near the dam. This system provides a high level of safety for dam applications. The microcontroller used in this projects is 8051. The water level sensor estimates the dam water level; if the water level increases a particular threshold value then an alert signal will be provided by buzzer unit And We receive the massage through GSM Module. Similarly Microcontroller will trigger the relay drive unit, which will tend to open & close the gate automatically with the help of motor and similar massage signal will be passed to control room units through GSM module. The required parameters of water level, message alert signal and buzzer alert signal will be displayed in LCD display. Read More...
|
Instrumentation and Control Engineering |
India |
112-114 |
33 |
Designing and Fabrication of Multipurpose Tool Post for Lathe Machine.
-Akash Tiwari ; Niral panchal; Parthsolanki; Lalit parmar; Diptesh patel
In Today’s Fast Life Every One Wants To Save Time And Money, Even Small Scale Industrialist Wants To Earn More Profits With Given Limited Resources .Due To The Globalisation The Competation Is Increasing Day By Day, Especially Micro Industries Is Facing Lot Of Trouble To Sustain In Throat Cutting Competation. So We Came Up With An Idea Of Saving Money By Desginning And Fabritacting A Multi-Purpose Tool Post Which Can Save Money Of Small Industrialist By Avoiding The Subcontarction Of Works Which May Required Specail Machines . Read More...
|
Mechanical Engineering |
India |
115-117 |
34 |
PRIVACY- INTENSIFICATION IN DAAS COMPOSITION
-K.Cowsikk ; Mrs.M.Jothi.M.E; M.SRINIVASANB
Data as a Service (DaaS) builds on service-oriented technologies to enable fast access to data resources on the Web. However, this paradigm raises several new privacy concerns that traditional privacy models do not handle. In addition, DaaS composition may reveal privacy-sensitive information. In this paper, we propose a formal privacy model in order to extend DaaS descriptions with privacy capabilities. The privacy model allows a service to define a privacy policy and a set of privacy requirements. We also propose a privacy-preserving DaaS composition approach allowing verifying the compatibility between privacy requirements and policies in DaaS composition. We propose a negotiation mechanism that makes it possible to dynamically reconcile the privacy capabilities of services when incompatibilities arise in a composition. We validate the applicability of our proposal through a prototype implementation and a set of experiments. Read More...
|
Computer Science Engineering |
India |
118-121 |
35 |
Performance Evaluation of Stationary IC Engine Using Biofuels & its Blends
-CHAUHAN HIRALKUMAR UPENDRABHAI ; Prof. D.C.Gosai; Prof. D.R.Shah
This Research deals with the Performance Evaluation of stationary IC engine Using Biofuels (Diesel, Biodiesel, and Biogas) and its Blends. The various Blends of Diesel, Palm Biodiesel and Biogas are used and conducted the test on Stationary IC Engine. The experiment results were analyzed for the selection of better Blend of Diesel, Biodiesel and Biogas for IC Engine for better performance with reduced pollution. Read More...
|
Mechanical Engineering |
India |
122-126 |
36 |
Performance and Emission Characteristics of Diesel Engine Fuels with Biogas and Neem Biodiesel Blends
-Mr. Ankit N. Patel ; Prof. D.C.Gosai; Prof. D.R.Shah
This work presents the dual fuel measurements with Neem Biodiesel and Biogas using 7.5 kW Diesel engine. Tests are done with Neem Biodiesel and with Diesel to characterize the engine’s total Fuel consumption, Brake Thermal Efficiency, Mechanical Efficiency versus Brake power. Dual fuel experiments, adding different quantity of Biodiesel at 15% and 25% blends with Biogas. The experimental results were better total Fuel consumption, Brake Thermal Efficiency, Mechanical Efficiency and Emission. Read More...
|
Mechanical Engineering |
India |
127-131 |
37 |
Content based Image Retrieval using Advanced Techniques
-Mr.A.Praveenkumar ; Ms.D.Vetrithangam
Web data extraction has been an important part for many Web data analysis applications. This paper formulates the data extraction such as the image retrieval using advanced techniques. I propose an unsupervised, page-level data extraction approach to deduce the schema and templates for each individual Deep Website that contains either singleton or multiple data records in one Webpage. FiVaTech applies tree matching, tree alignment, and advanced techniques to achieve the challenging task. In experiments, FiVaTech has much higher precision than EXALG and is comparable with other record level extraction systems like ViPER and MSE. The experiments show an encouraging result for the test pages used in many state-of-the-art Web data extraction works. Since the term has been widely used to describe the process of retrieving desired images from a large collection on the basis of features such as image that can be automatically extracted from the data themselves. The features used for retrieval can be either primitive or semantic, but the extraction process must be pre dominantly automatic. Retrieval of images by manually-assigned keywords is definitely CBIR as the term is generally understood – even if the keywords describe image content. Read More...
|
Computer Science Engineering |
India |
132-134 |
38 |
MATLAB BASED SIMULINK MODEL OF PHASOR MEASUREMENT UNIT AND OPTIMAL PLACEMENT STRATEGY FOR PMU PLACEMENT
-Himanshu D. Lashkari ; Prof. Jaydeep B. Sarvaiya
For the secure and reliable operation of the interconnected power system, it is required to measure and monitor the system in real time. Conventional Supervisory Control and Data Acquisition/Energy Management System (SCADA/EMS) obtain the data at interval of 2-10 sec. This paper gives an idea about Synchronized Phasor Measurement (SPM) based Wide Area Monitoring System (WAMS) using Phasor Measurement Unit (PMU) placed at various locations in electrical power network. They are synchronized by the Global Positioning System (GPS) satellites. A Matlab based simulink model of the Phasor Measurement Unit and Phasor Data Concentrator for Data storage and a common reference time data is also developed in Matlab. Optimal PMU Placement in power system network is an important task. A PMU placement strategy is developed and analyzed on IEEE – 14 bus test system. Read More...
|
Electrical Engineering |
India |
135-138 |
39 |
Detection and adjustment of malicious user ratings for measuring webservice reputation
-Abhishek varma G ; Aswani kumar reddy G
In services computing domain, Web service reputation is usually calculated using ratings given by service users. However, the existing of malicious ratings and different preferences of different service users often lead to a chance towards positive or negative ratings. In this paper, we propose a novel reputation measure method for Web services. The proposed method detects malicious rating and adjusts rating to enhance the reputation measure accuracy. Here we detect malicious user ratings by cumulative sum method and reduce the negative effect of unfair ratings. Read More...
|
computer science engineering |
India |
139-141 |
40 |
WORKFLOW MANAGEMENT FOR OPTIMIZATION THE SCHEDULING IN GRID COMPUTING
-Baljeet kaur ; Sarpreet singh
Grid computing is one of the important computing techniques which are used for the storage of the large data. Grid computing which is a type of distributed computing is different from traditionally distributed system. There are various issues corresponding to the grid computing. The work flow is most critical issue in grid computing. The various resources which are available on the grid and using the technique of workflow these available are allocated to the uses. In the previous years, various techniques had been proposed for efficient work flow in grid computing. In this paper, we survey various techniques of work flow in grid computing. Read More...
|
Computer Science and Engineering |
India |
142-144 |
41 |
Cloud Computing:A Study on Security Issue and Challenge
-Sahaj Ohari ; Kirti Sharma; Gaurav Bagaria; Nilam Choudhary
Cloud computing transforms the way information technology (IT) is consumed and managed, promising improved cost efficiencies, accelerated innovation, faster time-to-market, and the ability to scale applications on demand However, cloud Computing presents an added level of risk because essential services are often outsourced to a third party, which makes it harder to maintain data security and privacy, support data and service availability, and demonstrate compliance. Cloud Computing leverages many technologies With the growing adoption of cloud computing as a viable business proposition to reduce both infrastructure and operational costs, an essential requirement is to provide guidance on how to manage information security risks in the cloud. Security is one of the major issues which hamper the growth of cloud. The idea of handing over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a detailed analysis of the cloud computing security issues and challenges Read More...
|
Computer Science Engineering |
India |
145-149 |
42 |
An Experimental Investigation of Effect of Process parameters on Wear of Semi Metallic Automotive Disc Brake Friction Material
-Ashish .D. Dhangar ; Pro. R.J.Jani ; Hiren Bagada
An Experimental wear measurement Test Rig was designed and constructed using readily available materials. The test set up was designed to test automobile disc brake pad wear and effectiveness at various pressure speed inertia load . To determine its functionality a wear test was conducted on a commercial brake pad at various pressure speeds and inertia load. This prototype test rig can be used in testing the brake pad of different vehicle such as Maruti, Tata, Nissan, Toyota, Mitsubishi, Volvo, Peugeot, and other brands of interest. With little modification, this product can be commercialized. Read More...
|
Mechanical Engineering |
India |
147-148 |
43 |
Green Computing: Save Energy
-SANA ; SAOUD SARWAR
As the commitment to reduce environmental impact and power consumption are becoming increasingly important objectives for organizations, architecture leaders are now proactively considering environmental resource. The biggest challenge facing the environment today is global warming, caused by carbon emissions. About 98 percent of CO2 emissions (or 87 percent of all CO2–equivalent emissions from all greenhouse gases) can be directly attributed to energy consumption, according to a report by the Energy Information Administration. Many organizations today are speaking openly about a desire to operate in a “green†manner, publishing principles for environmental practices and sustainability on their corporate Web. In addition, many companies are now paying (or will pay in the near future) some kind of carbon tax for the resources they consume and the environmental impact of the products and services they produce, so a reduction in energy consumed can have a real financial payback. Green computing, also called green technology, is the environmentally sustainable to use of computers and related resources like - monitors, printer, storage devices, networking and communication systems - efficiently and effectively with minimal or no impact on the environment. The evaluation, analysis and optimization of the workload demands and IT infrastructures are required to determine the present and future energy consumption needs. Therefore the primary motivation behind this green approach is cost saving and also at the same time there are lots of money savings and eco-friendly. Read More...
|
Computer Science & Engineering |
India |
150-152 |
44 |
METHODOLOGY FOR PRODUCTION OF EARTHEN POT PROFILE MAKING -A REVIEW
-Roshan R. Shrirao ; Dr. C.C.Handa; N.M.Sawai
This paper presents the process forming of earthen pot by automatically with the related search. The study specifies factors influencing the clay forming process and recommends a number of design options for an automated forming system. These are based on a systematic analysis of the forming process and testing of a prototype forming system consisting of a standard articulated robot. For which we consider literatures reviews &some of them are explained. Read More...
|
Mechanical Engineering |
India |
153-156 |
45 |
INTEGRATION OF CO OPERATION INCENTIVES IN MOBILE AD HOC NETWORK
-H.Bharani ; M.Kanchana; S.B.Dhivya
In mobile ad hoc networks (MANETs), tasks are conducted based on the cooperation of nodes in the networks. However, since the nodes are usually constrained by limited computation resources, selfish nodes may refuse to be cooperative. Reputation systems and price-based systems are two main solutions to the node non co-operation problem. A reputation system evaluates node behaviours by reputation values and uses a reputation threshold to distinguish trustworthy nodes and untrustworthy nodes. A price-based system uses virtual cash to control the transactions of a packet forwarding service. Although these two kinds of systems have been widely used, very little research has been devoted to investigating the effectiveness of the node cooperation incentives provided by the systems. In this project, we use game theory to analyze the cooperation incentives provided by these two systems and by a system with no cooperation incentive strategy. We find that the strategies of using a threshold to determine the trustworthiness of a node in the reputation system and of rewarding cooperative nodes in the price-based system may be manipulated by clever or wealthy but selfish nodes. We further enhance the system by addressing the security issues of cooperative nodes. This provides security by encrypting the packet in sender and then it forwards to the intermediate node. And the packets are decrypted by the receiver node. Obviously the packets are not lost during data transmission Read More...
|
Computer science and engineering |
India |
157-161 |
46 |
Optimization of Mahua Oil Methyl Ester by Using Response Surface Methodology
-Ms. Priya S. Dhote ; Prof. V. N. Ganvir
The most commonly used methods for biodiesel preparation is via transesterification of vegetable oil using alkaline catalysts. The transesterification process can be affected by differing parameters. The optimization of experimental parameters, such as oil to alcohol molar ratio, catalyst concentration and reaction time, on the transesterification for the production of Mahua oil methyl ester in Oscillatory Baffled Reactor has been studied. The biodiesel production was optimized by response surface methodology. The optimum condition for the predicted condition product yield is 92.7157 ml with 1:12 of methanol to oil molar ratio, 0.4 wt of catalyst concentration and 10 minutes of reaction time. Read More...
|
Chemical Engineering |
India |
162-166 |
47 |
Storing The Data For Longer Time And Maintain Security API Using Java
-N PRATAP ; N pratap; prashant D.Patil; K Govinda
In recent years the evaluation of Application Programming interfaces (API’s) increases for web-based applications. It describes how few components of software interacted with one another. It is a collection of functions that perform a specified task to interact for components of software it can be defined as standard library and it can be considered as specification of Remote Calls. In this API we are maintaining the data for longer period of time and with security based mechanism using java which provides authentication also. In this API the data can be taken from transactional and relation databases. In this additionally packages of security can be added for data to maintain the data over un-trusted parties. In this API the queries can be handled and maintained accurately with the Google App’s Engine. Read More...
|
COMPUTER SCIENCE |
India |
167-170 |
48 |
IMPLEMENTATION OF ENHANCED ADAPTIVE AKNOWLEDGEMENT FOR MOBILE ADHOC NETWORKS
-I.Vinnarasi Tharania ; M.Kanchana; V.Kavitha
The migration to wireless network from wired network has been a global trend in the past few decades. The mobility and scalability brought by wireless network made it possible in many applications. Mobile Adhoc Network (MANET) is one of the most important and unique applications. On the contrary to traditional network architecture, MANET does not require a fixed network infrastructure; every single node works as both a transmitter and receiver. Nodes communicate directly with each other when they are both within the same communication range. Otherwise, they rely on their neighbors to relay messages. With the improvements of the technology and cut in hardware costs, we are witnessing a current trend of expanding MANETs into industrial applications. To adjust to such trend, we strongly believe that it is vital to address its potential security issues. In this paper, we propose and implement a new intrusion-detection system named Enhanced Adaptive ACKnowledgment (EAACK) specially designed for MANETs. Compared to contemporary approaches, EAACK demonstrates higher malicious-behaviour-detection rates in certain circumstances while does not greatly affect the network performances. Read More...
|
Computer science and engineering |
India |
171-175 |
49 |
INTRUSION DETECTION SYSTEM FOR SMART HOME USING LASER RAY?S
-Govinda.K ; K. Sai Krishna Prasad; Sai ram susheel
Now-a-days security is one of the major issues for home environment. Smart home security is important as the intrusion is increasing very drastically for home. Safeties from theft, damage to resources and leakage to sensitive information are to be handled in a very smart and secure way. The traditional security system uses some form of an alarm signal to detect the intrusion. In recent times, companies have invested considerable amount into home security systems. To handle this problem we propose and implement alarm systems involving light dependent resistors as the main component. In this paper, a circuit has been developed and tested using a light dependent resistor Read More...
|
Electronics and Communication |
India |
176-178 |
50 |
Reservoir water level indicator using UM66 Microcontroller
-Govinda.K ; Sreekar.ch ; Sandilya.k
In this paper we introduce the notion of water level monitoring and management. More specifically, we investigate the microcontroller based water level sensing and controlling through wired or wireless environment. Water level management would be very useful in reducing the man power and it can be remotely monitored. This will even decrease the overflow of water in the reservoir. Microcontrollers are used in the automation of any job. This work is mainly based on setting a water level monitoring indicators for different levels. Finally here we are proposing a method to monitor the water level by providing an indicator system. Read More...
|
Electronics and Communication |
India |
179-181 |