No. |
Title and Author |
Area |
Country |
Page |
251 |
Optimal Location of Thyristor Controlled Series Compensator (TCSC) to Maximize the Loss Reduction in Power System
-Kalpesh N. Thakkar ; Dr. I. N. Trivedi
Flexible Alternating Current Transmission Systems (FACTS) devices represent a recent technological development in electrical power systems. FACTS devices offer so many advantages like transient stability improvement, sub-synchronous resonance (SSR) mitigation, damping of power swings, avoiding voltage collapse, enhancing power system reliability, minimize the loss in power system. Though FACTS controllers offer many advantages, their installation cost is very high. Hence the optimal placement and the optimal parameter settings of these devices in the power system are of important issues. In this paper analytical method is proposed to find optimal location and optimal parameter setting considering power loss minimization in power system. The proposed method is carried out on IEEE-14bus power system Read More...
|
Electrical Engineering |
India |
966-967 |
252 |
Design and Simulation of 2GHz Current Starved VCO for Frequency Synthesizer
-Rajeshkumar A. Dabhi ; Bharat H. Nagpara
A low power 2GHz CSVCO is presented in this paper for PLL Frequency synthesizer. The current starve VCO is used to decrease power consumption and to improve noise characteristic of the synthesizer. The proposed VCO achieves low phase noise and wide tuning range and consume low power. The measured phase noise is – 44.77dBc/Hz at 1 MHz offset. The operating frequency can be tuned from 5.231MHz-5.098GHz with the supply voltage varying from 0.1 V to 1V step of 0.5mV. Therefore, wide the tuning range is achieved. The canter frequency of VCO is 2GHZ at 0.5V approximately. The VCO circuit, dissipated 47.874µW power under a 1V supply voltage. The VCO is design and simulated on Tanner EDA Tool using 45nm CMOS process technology with supply voltage 1 V. Read More...
|
VLSI |
India |
968-971 |
253 |
Structural Analysis and Thermal Analysis of Automotive Ventilated Brake Disc
-Mr. Sachin Subhashrao Pujari ; Prof. K.M. Narkar; Mr. Kishor T. Phalke
A brake disc rotor forms a part of foundation brake and rotates with the wheel hub assembly. The main function of a foundation brake is to generate a retarding torque by converting mechanical energy to thermal energy by virtue of the frictional work done in relative sliding at the rotor pad interface. In practice, most of the brake discs are made from cast iron and sometimes subjected to high structural and thermal stresses, which can lead to permanent plastic deformation and occasionally rotor cracking. The aim of this paper is to analysis the brake disc under calculated brake torque, temperature and heat flux. A commercial vehicle of 9.6 T is considered for calculation. It is necessary to carry out finite element approach in order to evaluate the exact stress distribution and make sure that the stress values are well below the allowable limits. Read More...
|
Mechanical Engineering |
India |
972-977 |
254 |
A Location based Secure Access Control Method for Geospatial Data Using Fine Grained Security Access Method
-Ms. Jalpa K. Goswami ; Prof. Chetan Chauhan
Geospatial data is data about the geographic location of earth surface features and boundaries on Earth. Nowadays spatial data is used in every field of society and due to the advancements in spatial data acquisition technologies, such as the advancements in the satellite sensor technologies, high precision digital cameras used in the capturing of photogram metric images and high precision land surveys are producing mass high precision spatial data. Due to these issues nowadays sensitivity of spatial data has increased too many folds. To store such high precision data onto the database is a big challenge today. Major security concerns of the geospatial data are based on authorization, authentication, access control, integrity, security and secure transmission of spatial data over the network and transmission media. In this paper the major security concerns of geospatial data are analyzed. Spatial data and access control methods developed to provide secure access over the spatial database are analyzed and studied. The data models and access control some issues to be resolved for spatial data security are found. In this paper a secure access control method is developed. In this method security over geospatial data on two levels is provided. In first level we provide authorization to every user so that a user can access only that part of spatial database, over which he/she has authority to access. In second level we control access over an image; based on the location over which a user wants to access data and provide access to only that part of an image, so that a significant amount of access time can be saved and quick access to the data can be provided. Read More...
|
Computer Engineering |
India |
978-982 |
255 |
Performance Analysis of Narrowband and Wideband LNA's for Bluetooth and IR-UWB
-ABHISHEK KUMAR SINGH ; Mr. SAMPATH KUMAR
LNA is the first element of building blocks of any Wireless receiver. It amplifies the upcoming signal without adding much noise and distortion. In this paper, design and analysis of four different LNA (Low noise amplifier) is presented using Agilent CMOS14 .5μm and .4μm process. Here, C-S degeneration, Current Mirror, Cascade, Cascade and Feedback technique are used for LNA design. The performance evaluation is carried out for first three Narrowband LNA having frequency band 2.45 GHz to 2.85GHz for Bluetooth application and fourth LNA having frequency band 3.1 GHz to 10.6 GHz for IR-UWB receiver application i.e. Wideband LNA. The simulation is done on software ADS2010. The analysis results- the best gain S21 between first three LNA is 21.10dB , input reflection coefficient S11 is -23.71dB, output reflection coefficient S22 is -9.10dB and noise figure is 2.03dB with 2.5V supply are unconditionally stable with stability factor 7.11at 2.85GHz. The fourth LNA having gain of 12.4dB, S11 is -15.5dB, S22 is -10.64dB and noise figure is 2.6dB with 2.5V supply is unconditionally stable with stability factor 7.11at 2.85GHz. Read More...
|
RF VLSI |
India |
983-987 |
256 |
Securing Online Voting System Using Multimodal Biometrics and Steganography
-Neha Gandhi ; Dr. Chander Kant Verma
with the help of online voting system author can manage election easily and securely. In this paper, we provide security to online voting system with secure user authentication by providing biometric as well as password security to voter accounts. System will decide whether voter is genuine or not. Firstly, system will capture facial image of voter and then take fingerprint impression of voter and after that fuse them. After fusion, we get an image which is taken as cover image and then we embed voter secret data into cover image using Steganography. This method produce stegno image which is quite same as cover image. Extraction of stegno image is take place at server side to perform the voter authentication. Correct use of this procedure decrease threat factor in online voting system the proposed work is to enhance security in online voting system with multimodal biometrics along with steganography concept. Read More...
|
computer engineering |
India |
988-991 |
257 |
Design Of An Optimized Full Adder And Ripple Carry Adder Using Reversible Logic.
-Vishal Shankarrao Muley ; Anchu Tom; Dr. Vigneswaran.T
the full adder is the basic block building that widely used in digital circuits such as the ALU and multiplier. One of the most promising technologies in designing low power circuits is reversible logic or computing. In the VLSI design of today’s circuits suffered from power consumption which leads to power dissipation in the circuits. To reduce the power dissipation in circuits, reversible logic is used. There are different types of logic gates are used to minimize the power dissipation and chip area such as NOT gate, Controlled NOT gate, Controlled Controlled NOT gate and Fredkin gate. In this research work some basic circuitry such as full adder and ripple carry adder with 45nm technology are highlighted.The proposed design is compare CMOS full adder and 4 bit Ripple carry adder with time delay and power dissipation. Power consumption is reduced 70% compared to conventional full adder and the time delay of the circuit is 19.88 nsec and 19.78 nsec for sum and carry respectively. Read More...
|
Electronics and Telecommunication Engineering. |
India |
992-995 |
258 |
Predict the Frequent Pattern of Amino Acids using Apriori Algorithm, Genetic Algorithm and Fuzzy Logic
-Nikit Patel ; Pratik Kumar
Data Mining is the process of extracting or mining the patterns from very large amount of biological datasets. In recent years, rapid developments in genomics and proteomics have generated a large amount of biological data. So a critical problem in biological data analysis is to classify the biological sequences and structures based on their critical features and functions. From the literature, various algorithms have been employed in generating frequent patterns for distinct application. This algorithm has been lost of frequent produce. So it’s meaningless. Here my approach is to compare the frequent pattern using two algorithms and optimise the data. So it’s very useful for us. Our approach aims at extracting the hidden and the most dominating amino acids among the infected protein sequence which causes some infections in human. We handle this problem by predicting patterns apply strong association rules along with apriori algorithm and genetic algorithm. Also apply the fuzzy logic to optimise data and interesting frequent pattern get form the protein sequence database. This Frequent Pattern is very useful to drug design, drug discovery etc Read More...
|
Data mining in bioinformatics |
India |
996-1000 |
259 |
optimization of cooling water pump by changing impeller blade angle using CFD analysis
-Maulik Patel ; kaushal p khamar
To study about the behaviour of flow inside the cooling water pump, we done extensive search and gone through number of research papers and blogs. Many researchers carried out their analysis on cooling system components like radiator, coolant, water jackets, fin materials etc. but it is very difficult to find the researcher that works on cooling water pump. Cooling system consist centrifugal pump which is widely used in other industries. After reviewing some research papers on centrifugal pumps we found that most of the problems are related to cavitation and efficiency. Computational Fluid Dynamics (CFD) analysis is one of the advance tool used to understand the behaviour of fluid. A detailed CFD analysis is done to carry out the flow pattern inside the impeller which is an active component of pump. After analyzing some old water pumps of various vehicles we found that major problem that pump is facing is due to cavitation effect on blades at High RPM. This research is aimed to analyze the flow behaviour by modifying the impeller design by choosing blade angle.CFD analysis is done using ANSYS CFX software. Read More...
|
Mechanical engineering |
India |
1001-1007 |
260 |
Reliable Routing In AODV Protocol
-Nilesh Kadivar
Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and pre-determined organization of available links. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. Ad hoc Networks more vulnerable due to various security attacks which affects many performance parameter like PDR, Throughput and Delay. To accomplish our goal, we have develop virtual currency based approach to improve perfomance by detecting attack and remove its effect and multiple blackhole node affect more in perfomance. Read More...
|
computer engineering |
India |
1008-1010 |
261 |
Bus Driver Scheduling Problem in Public Transportation System
-Kuvadiya Umesh C. ; Dr. P. J. Gundaliya
In planning an active and proficient public transportation system, essentially every transit system in the world must optimize their available resources such that costs are minimized and numerous other criteria are met. This research study involves of bus driver scheduling problem in public transportation system. Primary jobs in planning for transit systems include route design, vehicle scheduling, and driver scheduling. Apart from minimization of costs, the criteria involved in conducting these tasks may include operational time, the number of vehicles and drivers required, and a variety of driver satisfaction aspects, including union rules. As such, the tasks become multi-objective processes. This research work consist formation of scheduling problem. Also graphical representation of scheduling for identify real condition problem. This study give a solution for bus driver scheduling with description in varies steps. This study gives better methodology for bus driver scheduling problem in form of mathematical formulation and software programing. Read More...
|
Transportation Engineering |
India |
1011-1014 |
262 |
Transient Stability Improvement of Two Machine System using ANN with SSSC
-POORINIMA ; PUSHPALATHA
The main aim of this paper is to damp out power system oscillations and transient stability improvement, which has been recognized as one of the major concerns in power system operation. A Static Synchronous Series compensator (SSSC) is used to investigate the effect of this device in controlling active and reactive powers as well as damping power system oscillations in transient mode. The transient stability and damping oscillations of two machine power system during faulty conditions to be improved by injecting the voltage in series with ANN controller based SSSC.Simulations have been done in MATLAB/SIMULINK environment Read More...
|
Electrical engineering |
India |
1015-1019 |
263 |
A CFD Modeling Study of a Bio-Diesel Blend Oil Evaporation Device Operating In the Stabilized Cool Flame Regime
-RAVAL KEVAL H ; Trilok D Parmar
An innovative modeling approach, based on the
fitting parameter concept, has been developed in order to
simulate cool flame reactions. The model, based on physico chemical reasoning coupled with information from available
experimental data, is implemented in the CFD code and is
validated by comparing numerical predictions to
experimental data obtained from feed pressure, find effect of
recirculation flow in SCF device. From this work analyze
experimental and simulation data, try to find good
agreement with this results. Read More...
|
Mechanical Engineering |
India |
1020-1022 |
264 |
Behavior of traffic composition in Urban Area
-Niraj D Trivedi ; Prof.N.G.Raval
The traffic of an urban roads increases rapidly due to the growth in prosperity and vehicle ownership of urban population. The problems occurred due to this increased traffic have also become more and more complex. The urban roads of India generally carry the heterogeneous traffic which is the combination of various vehicles like Cars, Buses, Trucks, Motor cycles, Light goods vehicles, Auto Rickshaws, Pedal Cycles, Hand drawn carts, Animal drawn carts etc. These all vehicles have different speeds, size, Load carrying capacities or passenger capacities etc. which affect the urban heterogeneous traffic flow. The non-uniform carriageway width along the road is common especially in developing countries. Due to change in carriageway width, the traffic stream speed also encounters more congestion level along the length of link. Traffic composition is most important factor which directly affects the traffic stream behavior (i.e., speed, flow and density). In case of homogeneous traffic the characteristics of traffic does not change abruptly, as the traffic composition mainly consisting of same types of vehicle. When the traffic composition has maximum number of two wheelers it gives higher speed value and higher flow values. This is due to the reason that two wheelers occupy less space as compare to car and bus and trucks. Also standstill distance required is very less, as two wheelers can be easily stopped with compare to bus and heavy trucks. Speed is also more when two wheelers are driven on urban streets. Read More...
|
Civil(Transportation Engineering) |
India |
1023-1028 |
265 |
Literature Review and Methodology for Developing Capacity Model of Heterogeneous Traffic in Urban Area
-NIRAJ DILIPBHAI TRIVEDI ; Prof.N.G.RAVAL
The traffic of an urban roads increases rapidly due to the growth in prosperity and vehicle ownership of urban population. The problems occurred due to this increased traffic have also become more and more complex. The urban roads of India generally carry the heterogeneous traffic which is the combination of various vehicles like Cars, Buses, Trucks, Motorcycles, Light goods vehicles, Auto Rickshaws, Pedal Cycles, Hand drawn carts, Animal-drawn carts etc. These all vehicles have different speeds, size, Load carrying capacities or passenger capacities etc. which affect the urban heterogeneous traffic flow. The non-uniform carriage way width along the road is commone specially in developing countries. Due to change in carriage way width, the traffic stream speed also encounters more congestion level along the length of link. Traffic composition is most important factor which directly affects the traffic stream behavior (i.e., speed, flow and density).In case of homogeneous traffic the characteristics of traffic does not change abruptly, as the traffic composition mainly consisting of same types of vehicle. When the traffic composition has maximum number of two wheelers it gives higher speed value and higher flow values. This is due to the reason that two wheelers occupy less pace as compare to car and bus and trucks. Also stands till distance required is very less, as two wheelers can be easily stopped with compare to bus and heavy trucks. Speed is also more when two wheelers are driven on urban streets. Read More...
|
TRANSPORTATION ENGINEERING(CIVIL) |
India |
1029-1031 |
266 |
Saturation Flow Analysis
-Subhas Kumar C. Singh ; Prof. N.G Raval
Minimal work has been done in the past on calibration of the parameters for saturation flow rate used in traffic control of signalized intersections. This paper discusses a saturation flow study conducted in Ahmedabad city, the commercial city of Gujarat, which lies in the west of India. Using linear regression analysis, of saturation flow rate for four signalized intersections has been studied. Base saturation flow rate have been calculated. The results confirm that the methodology for saturation flow rates, put forward by highway capacity manual (HCM) can also be used in India. However, parameters should be systematically calibrated, based upon widespread study, before they can be used effectively in the practice of traffic control in India. Read More...
|
Transportation Engineering |
India |
1032-1037 |
267 |
DEVELOPMENT OF SATURATION FLOW MODEL FOR MIXED TRAFFIC ON URBAN ARTERIAL ROADS, INTERSECTION
-Subhas Kumar C Singh ; Prof. N.G Raval
past research has indicated that the effectiveness and efficiency of traffic control of signalized intersections strongly depend on the accurate calculation of saturation flow rate, particularly when demand approaches capacity. Minimal work has been done in the past on calibration of the parameters for saturation flow rate used in traffic control of signalized intersections. This paper discusses a saturation flow study conducted in Ahmedabad city, the commercial city of Gujarat, which lies in the west of India. Using linear regression analysis, of saturation flow rate for four signalized intersections has been studied. Base saturation flow rate have been calculated. The results confirm that the methodology for saturation flow rates, put forward by highway capacity manual (HCM) can also be used in India. However, parameters should be systematically calibrated, based upon widespread study, before they can be used effectively in the practice of traffic control in India. Read More...
|
Transportation Engineering |
India |
1038-1039 |
268 |
Optimization of Process Parameters for Surface Roughness and Material Removal Rate for SS410 Material During Turning operation
-Jitendra J. Thakkar ; Mitesh I. Patel; Viral B. Prajapati; Sachin P. Patel
Machining of medium SS410 is very difficult. There are a number of parameters like cutting speed, feed and depth of cut etc. which must be given consideration during the machining of SS 410. The prediction of optimal machining conditions for good surface roughness and material removal rate plays a very important role in process planning. This study optimizes the process parameters for surface roughness and Material Removal Rate (MRR) in turning of SS 410 round bars on CNC machine. The experimentation was carried out with PVD-coated (WNMG) cutting tools; a first order mathematical model in terms of machining parameters was developed for surface roughness and material removal rate prediction using RSM. The multi response optimization problems i.e. Optimization of SR and MRR are solved by using Genetic Algorithm (GA). The optimization is done using twenty seven experimental runs based on L’27 orthogonal array. Analysis Of Variance (ANOVA) is also used to analyze the influence of cutting parameters during machining. Result outcomes from the ANOVA for surface roughness are that the Feed rate is found the most significant effect on surface roughness. Increase in feed rate, value of surface roughness is increase. for material removal rate is that the Feed and Depth of cut are found the most significant effect on material removal rate. Increase in feed and depth of cut, value of material removal rate is increase. Read More...
|
Mechanical Engineering |
India |
1040-1049 |
269 |
License plate recognition using skew detection and morphological operation
-Archita patel ; krunal patel
License Plate Recognition (LPR) is a well known image processing technology. LPR system consists of four steps: capture the image from digital camera, pre-processing, character segmentation and character recognition. License plates are available in various styles and colors in various countries. Every country has their own license plate format. So each country develops the LPR system appropriate for the vehicle license plate format. Difficulties that the LPR systems face are the environmental and non-uniform outdoor illumination conditions. Therefore, most of the systems work under restricted environmental conditions like fixed illumination, limited vehicle speed, designated routes, and stationary backgrounds. Each LPR system use different combination of algorithms. In this paper I proposed license plate recognition using skew detection and morphological operation. Read More...
|
Computer engineering |
India |
1050-1056 |
270 |
An Image inpaint using Texture Synthesis via masking
-Nirali Pandya ; Asst.Prof.Bhailal Limbasiya
Image inpainting is a art of missing value or a data in an image. The purpose of image inpainting is to reconstruct missing regions which is visibal for human eyes. Image inpainting is the process of reconstructing lost part of images based on the background information. Image inpainting is a technique for restoring damaged old photographs and removing undesired objects from an image. The basic idea behind the technique is to automatically fill in lost or missing parts of an image using information from the surrounding area. It is used for restoration of old films and object removal in digital photographs. It is also applied to red-eye correction, stamped data from photograps, dust spot in film, removing objects to creative effect etc. The main goal of the Inpainting algorithm is to modify the damaged region in an image. In this paper we provide a review of different techniques used for image Inpainting. We discuss tecture synthesis method and inpaint the image using masking. Read More...
|
Computer Engineering |
India |
1057-1059 |
271 |
Analysis and Enhancing QoS in Multihop MANET by cross layer design
-Hardik Patel ; Devang Patel; Parvez Dekavadia
This work proposes a methodology for QoS improvement in MANET based on Medium Access Control (MAC) protocol that takes the above requirements into consideration. This protocol is based on IEEE 802.11 standard, and thus can be easily integrated into existing systems without much difficulty. Here 802.11 and 802.11e with different TCP mechanisms are used to analyze the QoS parameters for MANETs. The proposed system is designed to evaluate the performance of QoS and interaction between Transport layer and the MAC layer protocol operating in a mobile ad hoc network. The system will makes use of IEEE 802.11e MAC mechanism, to improve quality of service in MAC layer, which will improve the quality of service in Transport layer and to suggest a suitable mechanism for improving the quality of service in MANETs. Read More...
|
Electronics and communication |
India |
1060-1062 |
272 |
Utilization Of Glass Powder And Fly Ash In Concrete Production
-Rekha Shinde
The advancementof concrete technology can reduce the consumption of natural resources and energy sources and lessen the burden of pollutants on environment. Presently large amounts of fly ash and glass powder are generated in thermal and glass industries with an important impact on environment and humans. In recent years, many researchers have established that the use of supplementary cementitious materials (SCMs) like glass powder, fly ash (FA), blast furnace slag, silica fume, and rice husk ash (RHA), etc. can, not only improve the various properties of concrete - both in its fresh and hardened state, but also can contribute to economy in construction costs. This research work describes the feasibility of using such industrial waste in concrete production as partial replacement of cement. The use of glass powder and fly ash in concrete formulations as a supplementary cementatious material was tested as an alternative to traditional concrete. The cement has been replaced by glass powder and fly ash accordingly in the range of 0% (without fly ash), 10%, 20%, 30% & 40% by weight of cement for M-25 mix. Concrete mixtures were produced, tested and compared in terms of compressive and split strength with the conventional concrete. These tests were carried out to evaluate the mechanical properties for the test results for compressive strength up to 21 and 28 days. The aim of the present work was to replace cement by glass powder and fly ash as a admixture to assess the pozzolanic activity in concrete and compare its performance with plain concrete. It was found that compressive and tensile strength of the concretes increased as fineness increased. It was concluded that fineness of fly ash have positive impact on mechanical properties of concrete and cement motar. Read More...
|
Civil Engineering |
India |
1063-1066 |
273 |
Design a Nebulizer and its Implementation on FPGA using HDL
-Mitul Patel ; Proff. Bhavesh Soni
VLSI systems plays important role among all other system. A nebulizer is a drug delivery device used to administer medication in the form of a mist inhaled into the lungs. The application of spray device to treat respiratory disease has been effective for long time. Asthma and chronic obstructive pulmonary disease are widely prevalent in industries part of the world. The principle of ultrasonic nebulizers is based on the vibrations of a piezoelectric crystal driven by an alternating electrical field. These periodic vibrations are characterized by their frequency, their amplitude, and their intensity, which corresponds to the energy transmitted per surface unit. When the vibration intensity is sufficient, cavitation occurs, and droplets are generated. For a given nebulizer, the vibration frequency of the piezoelectric crystal is fixed, often in the range 1 to 2.5MHzThis is different way to design nebulizer on FPGA spartan3E kit using Xilinx tool using Verilog HDL. We have tried interface ADC device. Read More...
|
Electronics & commiunication Engineering |
India |
1067-1069 |
274 |
SoC Verification:Approach & Strategy
-Devansh Mehta
A VLSI system plays an important role among all other system and Verification plays important and a huge role in a VLSI life cycle. SOC is now a days very popular due to its reusability. So this paper gives a guidance related to SOC Verification and practical approach for SOC Verification which includes fusion of verification Environment with a mix C tests for debugging embedded processor and Verilog test bench for monitors and checkers. This paper gives an idea of how a SOC is going to verify covering all its functionality using verification methodology’s parameter such as functional coverage and code coverage. Using Verification Techniques and verification approach we can verify system level SOC. Read More...
|
VLSI Verification |
India |
1070-1075 |
275 |
A Unified Approach towards Software Requirement Clarification using Mind Map
-Chaitanyakumar Patel ; Harita Chocha
Software development process is challenging and ambitious process. Software requirement specification which gives the developer a direction in designing and development of software and to clarify these requirements mind mapping technique is used to elucidate the software requirements. This paper aims to use the mind mapping method along with extensive elicitation methods to find out the software requirements specification. Read More...
|
Computer Engineering |
India |
1076-1078 |
276 |
Performance evaluation of Kalman filter sensor fusion based algorithm and gain fusion based algorithm
-Nistha Rai ; Neha Arora
The aim of this paper is to analyze the different schemes of data fusion techniques. The data will be generated for different sensors and fused together to generate or deduce an output. The different schemes for data fusion technologies are mentioned in the text. For our analysis we will consider KFA, XXX YYY techniques. The output will be shown with the help of graphs. These schemes are applicable for multi sensor data fusion where the data is generated or collected via different sensors.
DF (Data fusion) or multisensory data fusion (MSDF) is the process of combining or integrating measured or pre-processed data or information originating from different active or passive sensors or sources to produce a more specific, comprehensive, and unified dataset or world model about an entity or event of interest that has been observed. Sensor data fusion has wide number of applications from telecommunications, radar, satellite communication to data networks.
The tracking of moving objects includes targets, mobile robots, and other vehicles which uses measurements from sensors is of considerable interest in many military and civil applications that use radar, sonar systems, and electro-optical tracking systems (EOTs) for tracking flight testing of aircrafts, such as missiles, unmanned aerial vehicles, micro- or mini-air vehicles, and rotorcrafts. It is also useful in nonmilitary applications such as robotics, air traffi c control and management, air surveillance, and ground vehicle tracking. In practice, scenarios for target tracking could include manoeuvring, crossing, and splitting (meeting and separating) targets. Various algorithms are available to achieve target tracking for such scenarios. The selection of the algorithms is generally application dependent and is also based on the merits of the algorithm, complexity of the problem (data corrupted by ground clutter, noise processes,
and so on), and computational burden. Target tracking comprises estimation of the current state of a target, usually based on noisy measurements. The problem is complex even for single target tracking because of uncertainties in the target’s mathematical model, especially for manoeuvring targets (which need more than one model and one transition model, and so on), and process/state and measurement noises. The complexity of the tracking problem increases for multiple-targets using measurements from multiple sensors.
Read More...
|
Digital Signal Processing |
India |
1079-1083 |
277 |
A BRIEF STUDY OF DE-NOISING AN IMAGE AND COMPRESSION AND DECOMPRESSION USING HUFFMAN CODING TECHNIQUES
-Kollipara Chiranjeevi Durgesh ; Kollipara Chiranjeevi Durgesh
Digital image processing is a procedure in which the image processing is done on the images. The digital image processing tends to have wider advantage over analog image processing. This paper deals with restoring the original image by de-noising the image. The de-noising can be done based on the noise type in the image .There are many filters used for the removal of noises in the image. In this paper we also deal with a simple and fast lossy compression and decompression of an image . The decompressed image is close to the one in the original image. The strategy does not restrict itself to any form of image , it works well with all type of images . Read More...
|
Computer Science Engineering |
India |
1084-1088 |
278 |
Hybrid Histogram Approach for Key Frame Extraction for Different Video Stream
-Jignesh P. Siroya
Now a day, there are different kinds of videos available on internet like sports video, entertainment video, news video etc. Many researchers have done research on the video processing. Video abstraction, content searching, video summarization becomes crucial term for the development of the advanced digital video system. Key frame is the frame which contains the salient feature of the video so it is very useful for the video abstraction, summarization and content searching. In this paper, three techniques are discussed for the detection of shot boundary and key frame extraction for uncompressed video stream briefly and also compare these techniques. The three techniques here discussed are X2 based Histogram Method, Edge Change Ratio and Pixel Based Differences. Read More...
|
Computer Engineering |
India |
1089-1091 |
279 |
Design & Analysis of carrying side idler of belt conveyor system
-Soni Hitesh Jayantibhai ; Ronak R. Patel
The raw material has to be transported from one station to another at a long distance (1 Kilo meters or more). The method of manual transport by fork-lift or by trucks etc. is time consuming. A mechanism for continuous and uninterrupted transport is desired. Mechanical conveyor has advantages in terms of the ability to affect accurate control in the monitoring of material from one process to another. Read More...
|
Mechanical Engineering |
India |
1092-1094 |
280 |
A Review of Application of Data Mining Technique for Rainfall Prediction
-Nikhil Sethi ; Dr.Kanwal garg
Globally more than 60% of population lives in monsoon regions. Agriculture is the dominating occupation in India on which most of the economy depends. Due to shortage of water supply for irrigation, agriculture works mostly depends upon other source of water like rainfall so; early prediction of rainfall is necessary for those countries where agriculture plays an important role in economy. Prediction of rainfall is a complex task as it is depends upon various factors. Various techniques are available in literature for early prediction of rainfall. Data mining can also be used for rainfall prediction
This paper gives a review of various data mining techniques for rainfall prediction. The mainly used techniques are artificial neural network, Regression, Clustering etc. All of these provide solution for early prediction of rainfall. This paper also encourages additional research and provides suggestion for further research.
Read More...
|
Computer science |
India |
1095-1098 |
281 |
REVIEW ON DETECTION AND REMOVAL OF NOISES IN IRIS RECOGNITION SYSTEM
-P.M.BASHIRUN
Iris segmentation is an essential module in iris recognition as a result of it defines the effective region used for feature extraction, and so is directly related to the popularity accuracy. Eyelids, eye lashes and shadows square Iris segmentation is a vital module in iris measure 3 major challenges for effective iris segmentation discuss varied novel strategies to localize every of them. In initial technique, a unique coarse-line to fine parabola eyelid fitting theme is developed for accurate and quick algebra localization. A smart prediction model is established to work out associate appropriate threshold for lash and shadow detection. In second technique includes 2 components mainly. within the initial half, eyelid.
Models square measure conferred and also the second half is iris enhancement .In third technique, a replacement noise removing approach supported the fusion of edge and region info. the full procedure includes three steps: 1) rough localization and normalization, 2) edge info extraction based section congruency, and 3) the infusion of edge and region info and fourth technique discuses a novel lash removal technique for preprocessing of human iris pictures in a very human iris recognition system is presented.
Read More...
|
Computer Engineering |
India |
1099-1101 |
282 |
EXPERIMENTAL STUDY OF ROLLER BURNISHING PROCESS ON AL 6061 MATERIAL USING RSM
-YATIN V. PATEL ; Prof. KIRAN PATEL
Burnishing is a cold working process in which plastic deformation occurs by applying a pressure through a very hard and smooth ball or roller on metallic surfaces. It is a finishing and strengthening process. Improvements in surface finish and surface hardness is major concern in industries for achieving competitive advantage. Roller burnishing is a cold working process which produces a fine surface finish by the planetary rotation of hardened roils over a bored or turned metal surface.[1] The quality of burnishing machined parts is significantly affected by various parameters used in the process. The aim of present work is to study the four important process parameters of the roller burnishing process such as burnishing speed, feed, burnishing force and number of passes are consider. Their influence on surface roughness of the test specimens are study. The response surface methodology is applied for design of experiments. Response Surface method is used to examine the relationship between one or more response variables and a set of quantitative experimental variables or factors. These methods are often employed after identified the important controllable factors and to find the factor selection that optimizes the response. Read More...
|
MECHANICAL |
India |
1102-1104 |
283 |
Real Time Video Monitoring Embedded System using ARM
-Hiren N. Bavarava ; Shwetal N. Pandya
In this paper, Embedded Real-time video monitoring system based on ARM is designed, in which the embedded chip and the programming techniques are used. The central monitor which adopts Raspberry pi is the core of the whole system. First, USB camera video data are collected by the embedded Linux system. All data are processed, compressed and transferred by the processing chip. Then, video data are sent to the monitor client by wireless network. This embedded monitoring system to overcome the week points of the traditional video surveillance systems, such as complex structure, poor stability, and expensive cost. It can been widely used in many fields, and also used for long distance transmission. Read More...
|
Electronics & Communications |
India |
1105-1107 |
284 |
Application of Iris Recognition for Biometric security
-joshi ankit.n
The Algorithm for Iris recognition was developed by Dr.John Daugman,University Of Cambridge.The iris tests have been tested on over 6 million people with no false results. The recognition principle is the failure of a test of statistical independence on iris phase structure encoded by multi-scale quadrature wavelets.This paper explains the iris recognition algorithm that is being used today in various fields. Read More...
|
Electronics and Communication |
India |
1108-1111 |
285 |
Performance Evaluation of TCP in the Presence of UDP in Heterogeneous Networks by using Network Simulator 2
-Devangbhai Govindbhai Chavda ; Prof. Ridhdhi I. Satoniya
The performances of different TCP variants like Tahoe, Reno, New Reno, Vegas and SACK in heterogeneous network is evaluated in this paper via simulation experiment using Network Simulator 2 (NS-2). In simulation experiments, investigation was done on the performance of different TCP variants in heterogeneous wired networks. Read More...
|
Electronics and Communication |
India |
1112-1116 |
286 |
Performance evaluation of ETP of Lifeline Feeds Pvt. Ltd., Chikamagalur, Karnataka, India
-KIRAN B.M ; Srikanthaswamy; Avani macwan; Binu john ; sneha .S
Performance study of the existing wastewater treatment plant of the Lifeline Feeds Pvt.Ltd and the treatability study of the wastewater were conducted from Feb 10th to April 21st, wastewater samples were collected for the present study from 6 predetermined stations. These samples were analyzed for water quality parameters.
For the characterization of the incoming wastewater to the existing treatment plant, influent samples were collected from the existing treatment plant. The study revealed that approximately 100KL/day of wastewater is entering into the treatment plant every day and its pH is maintained in the beginning only. Its average composition for BOD, COD, TDS, TSS and Cl was found to be 320.69mg/L,790.48mg/L,1169.72mg/L,807.33mg/L,242.16mg/L respectively, it has been reduced to 31.4mg/L, 145.576mg/L, 421.366mg/L,86.99mg/L, and 194.67mg/L respectively.
The maximum reduction 98.78% was observed in COD followed by BOD, TSS, TDS and then Cl which is 93.48%, 92.27%, 83.73%, 34.38% respectively. Above reduction indicates that removal efficiency ranges between 34.38 % to 98.78 % which is quite high.
Read More...
|
ENVIRONMENTAL ENGINEERING |
India |
1117-1122 |
287 |
OPTIMIZED MULTIPLIER STRUCTURE USING RADIX -2 WITH TRUNCATED MULTIPLIER
-Tharani ; K.Bashkaran
Truncated multiplication reduces part of the power required by multipliers by only computing the most-significant bits of the product. The truncation and radix-2 multiplication includes physical reduction of the partial product matrix and a compensation for the reduced bits via different hardware compensation sub circuits. However, these results in fixed systems optimized for a given application at design time. A novel approach to truncation is proposed, where a full precision multiplier is implemented, but the active section of the partial product matrix is selected dynamically at run-time. This allows a power reduction tradeoff against signal degradation which can be modified at run time. Such an architecture brings together the power reduction benefits from truncated multipliers and the flexibility of reconfigurable and general purpose devices. Efficient implementation of such a multiplier is presented in a custom digital signal processor where the concept of software compensation is introduced and analyzed for different applications. Experimental results and power measurements are studied, including power measurements from both post-synthesis simulations and a fabricated IC implementation. This is the first system-level DSP core using a fine-grain truncated multiplier. Results demonstrate the effectiveness of the programmable truncated MAC (PTMAC) in achieving power reduction,
with minimum impact on functionality for a number of applications. Software
compensation is also shown to be effective when deploying truncated multipliers in a system.
Read More...
|
Electonics and communication engineering (VLSI DESIGN) |
India |
1123-1126 |
288 |
Transmission line loadability improvement by reactive support
-C.R.Patel ; R.H.Bhesdadiya
The recent trend is towards the deregulation in power markets around the world, transfer capability computation emerges as a key issue in running power system smoothly with multiple transactions and reactive power sources. Total Transfer Capability (TTC) is usually limited by overloaded transmission lines and voltage limits imposed at buses. This paper presents the procedure of ATC calculation and enhancement using powerful power world simulator software considering both thermal limits and voltage limits and enhancement using capacitor placement. Read More...
|
Electrical Engineering |
India |
1127-1129 |
289 |
Emission of Single Cylinder Diesel Engine by Varying in Fuel Injection Pressure and Fuel Nozzle.
-Rupak.M.Patel
Injection spray pressure in diesel engines play an important role for engine performance and emissions. For a diesel engine, fuel injection pressure and fuel nozzle are very important parameters which influence the engine performance and emissions. With increasing in fuel injection pressure performance parameter like break thermal efficiency increased. Fuel injection pressure is decreasing break specific fuel consumption decreased. The main objective of this study is to find IP and nozzle which give good performance for diesel engine. The test shows that good results for BTE,BSFC and B.P with IP is 160 using 3HN. Read More...
|
Mechanical Engineering |
India |
1130-1133 |
290 |
Experimental and Computational Analysis of Smart cantilever beam
-Tushar choudhary ; Mukesh kumar Sahu
This paper Concerns with an Experimental and Computational vibration analysis of piezo-laminated cantilever beam. Since vibration is an important parameter is need to consider will design an structural component specially in turbo machinery and automobile sector where main structure such as wings of aircraft, naval vessel etc are subjected to static as well as dynamic loads if these loads are not counter balance this may leads to catastrophic failure. In this analysis a rectangular aluminum beam and there surface is bounded with piezoelectric patches. The bean is subjected to CFFF boundary condition because the cantilever position governs this B.C is modeled with the help of ANSYS 14.5. The obtained result shows good agreement with the experimental result. Read More...
|
Mechanical Engineering Department |
India |
1134-1137 |
291 |
Strengthen Security and Trust in Public Cloud Using- Symmetric Key Cryptographic Algorithms
-NIDA ; PINKI
Cloud computing is an emerging technology which is widely adopted by today’s information technology world. In the current scenario, it has broadly been used for data reposition and computational means. It targets to provide on-demand scalable access to shared pool of computing resources over the internet. Despites of its innumerable benefits such as cost, on-demand availability to its customers, various security concerns are evolving particularly in public cloud. As many organizations are moving towards the cloud there arises the need to protect their valuable data and hence, security of public cloud becomes a challenging issue and must be addressed. This paper presents an overview of several symmetric cryptographic techniques useful for data security, establishing trust and mutual authentication in public clouds. Read More...
|
COMPUTER SCIENCE AND ENGINEERING |
India |
1138-1141 |
292 |
Design Optimization of Steering System for Bump and Brake Steer Using ADAMS.
-GIRISH RANE ; A S Dhekane
Steering system is used to steer the front wheels in response to driver inputs in order to provide overall directional control of the vehicle. Thus, Steering system plays very important role in vehicle handling characteristics. Vehicle drift i.e. deviation of vehicle path from straight line during braking is related various parameters of Suspension, Steering, Tires, Wheel alignment etc. Analysis of steering characteristics such as Brake and bump steer which affects vehicle drift plays an important role.
Modeling and analysis of vehicle have been performed in a multi body dynamics environment based on actual vehicle data for Bump and Brake Steer. Different steering linkage concepts have been proposed to reduce brake and bump steer. Further optimization of hard points is done to reduce bump and brake steer within packaging constraints. It is found out that drag link ball joint position plays an important role in brake and bump steer.
Read More...
|
Automobile Engineering |
India |
1142-1145 |
293 |
MULTIBODY DYNAMIC ANALYSIS OF THE SUSPENSION SYSTEM USING ADAMS
-GAUTAM JIGNESH R. ; CHETAN S. JADAV
In this paper, a review of past and recent developments in the field of Multibody dynamic system is presented. The objective is to review some of the basic approaches used in the computer aided kinematic and dynamic analysis of Vehicular Suspension Systems with the Multibody Dynamics approach and to identify future directions in this research area. Multibody dynamics is the subject concerned with the computer modelling and analysis of constrained deformable bodies that undergo large displacements, including large rotations. Here the aim is to show how Multibody dynamics is associated with the different type of suspension systems and their analysis is based on it. Softwares like ADAMS, DADS and other Multibody codes help in the analysis of the suspension systems. By using ADAMS software package analysis like baseline parallel wheel travel and brake pull analysis can be easily done. Also systems like Macpherson and Double wishbone suspension system modeling and analysis is done and the simulation results are shown in the form of graphs. The alterations are based on the positions of the joints. For better ride and handling performance this analysis is done. Read More...
|
DESIGN AND ANALYSIS OF THE SUSPENSION SYSTEM |
India |
1146-1150 |
294 |
A Review Paper on Productivity Improvement Methods in Production Sector
-Miss. Prachi G. Kantak
Today’s organizations are wrestling with a number of common issues. These issues include Productivity Improvement in every area of organizations. Any small change which lead to improve productivity in the organization will directly affects it’s growth. While the attention to the technology aspect is critical, equally important is an attention to the change issues affecting people and the activities they perform, which are their processes and practices. The simple idea of increasing productivity will increase profits may not always be right. If a firm wants to increase its profits, it should increase productivity but at the same time taking quality of output into consideration. In any manufacturing or Production industry, main challenge in for production engineer is productivity. This paper attempts to cover some factors which are influencing Productivity of Manufacturing Sector and Organizational productivity. Read More...
|
Production Engineering |
India |
1151-1153 |
295 |
Detecting Phishing Websites: User Behaviour Based
-Manohar Kumar Kushwaha ; S.Madhu
Phishing is a form of identity theft, where criminals create fake web sites that masquerade as trustworthy organizations. The goal of phishing is to trick people into giving sensitive information, such as passwords, personal identification numbers, and so on. Simply phishers creates a phishing website and then goes phishing by sending out promiscuous emails to unsuspecting users. The Phishers tries to convince the reader of the email to visit the link included in the email. When the user “bites†on the phish, the link in the email directs the user to the phishing site which appears legitimate and similar or identical to the legitimate target site. The phish is successful when the user enters confidential information on the phishing page and it is leaked to the phishers. Afterwards the phishers tries to exploit the confidential information by transferring money, opening accounts, or making purchases using the captured information. Or the phishers merely acts as a middleman and sells the information to other criminals. In this paper, we describe a novel approach to detect phishing websites that is based on the analysis of users’ online behaviours. Read More...
|
computer science & engineering |
India |
1154-1157 |
296 |
Adaptive Variable Structure Control for Trajectory Tracking of a Two-Link Robotic Manipulator System with Linear Sliding Manifolds.
-Basit Rouf Rafiqi
Adaptive control proves to be a useful solution for problems involving system uncertainties and modelled inaccuracies .In the presence of uncertainties in the manipulator dynamics and model ,due to incorrect parameter values and changes while the manipulator is being operated fixed controllers cannot be implemented accurately. Adaptive laws in manipulator control (by altering the control signal) accounts for changes in manipulator dynamics and for this reason adaptive control of manipulators has become one of the most active research areas during the last few years. This paper presents a novel yet simple technique that combines the adaptive laws with conventionally robust Sliding Mode Control technique. The stability and convergence of the robotic manipulator control system are guaranteed by applying the Lyapunov stability theorem. Read More...
|
Control Systems-Electrical Engineering. |
India |
1158-1162 |
297 |
Modified SLM Technique for PAPR Reduction in OFDM System
-Verma ajay lallu ; R.K.Prasad
Orthogonal Frequency Division Multiplexing (OFDM) systems have gained popularity over the last few years for broadband wireless communication. OFDM is a method that allows transmitting high data rates over extremely hostile channel set a relatively low complexity. However, OFDM faces the Peak-to-Average Power Ratio(PAPR) problem that is a major drawback of multicarrier transmission system which leads to power inefficiency in RF section of the transmitter .PAPR (Peak to average power ratio) nothing but several sinusoidal leads. In this paper we propose SLM(selective mapping) schemes to reduce the peak-to-average power ratio. SLM is phase rotation scheme it applies scrambling rotation to all sub-carriers independently. Read More...
|
Electronic and communication engineering |
India |
1163-1165 |
298 |
The grid authentication system for mobile grid environment
-A.Sudha ; S.M.Karpagavalli; Chamundesshwari
Grid computing is the major resource environment. Security and authentication is the important factor in the grid environment. Recently, Authentication protocol has been recognized as an important factor for grid computing security. This system proposes a new simple and efficient Grid authentication technique providing user anonymity. The system is based on hash function, and mobile users only do symmetric encryption and decryption. In this system, it takes only one round of messages exchange between the mobile user and the visited network, and one round of message exchange between the visited network and the corresponding home network. The system is designed as three applications such as authentication server terminal proxy and grid node. The grid user application is designed to handle user management and authentication process. The terminal proxy is an intermediate application to carry out authentication under the current coverage. The grid node application is designed to communicate the authentication server and terminal proxy with mobility operations. The user id, password and session key values are used for the authentication process. The proposed architecture possesses several desirable emerging properties that enable it to provide an improved level of security for grid computing systems. The one way hash function and time stamp mechanisms are used to perform the user authentication operation under the home network and visited network environment. Read More...
|
computer science and engineering |
India |
1166-1170 |
299 |
Performance Comparison Based on Broadcasting Technique in Mobile Ad-Hoc Network
-Urvish R. Patel ; Prof. Ridhdhi I. Satoniya; Prof. Satish G. Kedar
Broadcasting is a fundamental operation in mobile ad hoc networks (MANETs) crucial to the successful deployment of MANETs in practice. In this work, an attempt has been made to compare the performance of three broadcasting techniques in Manet: - Simple flooding based broadcasting (SFBB), Fixed probability based broadcasting (FPBB) and highly adjusted probability based broadcasting (HAPBB). this broadcasting technique has been compared in terms of Three different performance matrices likewise Throughput , Energy and End to End delay. Read More...
|
Electronics & Communication |
India |
1171-1175 |
300 |
Information Hiding Technique Using LSB Substitution
-PATEL AMITKUMAR JAYANTILAL ; Alpesh H.Dafda
Since the rise of the internet one of the most important factors of information technology and communication has been the security of information. Cryptography was created as a new method or technique for securing the secrecy of communication and many different methods have been developed to encrypt and decrypt data in order to keep the message secret. But it is not enough to keep the contents of a message secret, it is also important to keep the existence of the information secret. The technique which provides this features, is called steganography. Steganography is the art and science of invisible communication. This accomplished through hiding information in other medium, thus hiding the existence of the information which is communicated. The word steganography is comes from the Greek words “stegos†meaning “cover†and “grafia†meaning “writing†defining it as “covered writingâ€[6]. In image hiding using steganography the information is hidden exclusively in images. Read More...
|
Image Processing |
India |
1176-1179 |